Skip to content

Commit

Permalink
DB: 2024-07-05
Browse files Browse the repository at this point in the history
1 changes to exploits/shellcodes/ghdb
  • Loading branch information
Exploit-DB committed Jul 5, 2024
1 parent 859e322 commit 388e822
Showing 1 changed file with 147 additions and 0 deletions.
147 changes: 147 additions & 0 deletions ghdb.xml
Original file line number Diff line number Diff line change
Expand Up @@ -39718,6 +39718,22 @@ undeadsec.com</textualDescription>
<date>2021-09-16</date>
<author>J. Igor Melo</author>
</entry>
<entry>
<id>8449</id>
<link>https://www.exploit-db.com/ghdb/8449</link>
<category>Files Containing Juicy Info</category>
<shortDescription>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</shortDescription>
<textualDescription>Google Dork: intext:&quot;proftpd.conf&quot; &quot;index of&quot;
Google finds ProFTPD configuration file.
Date: 06/17/2024
Author: Fernando Mengali
</textualDescription>
<query>intext:&quot;proftpd.conf&quot; &quot;index of&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;proftpd.conf&quot; &quot;index of&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Fernando Mengali</author>
</entry>
<entry>
<id>8353</id>
<link>https://www.exploit-db.com/ghdb/8353</link>
Expand Down Expand Up @@ -57563,6 +57579,19 @@ Reza Abasi(Turku)
<date>2023-10-16</date>
<author>Mayuresh Gadhekar</author>
</entry>
<entry>
<id>8442</id>
<link>https://www.exploit-db.com/ghdb/8442</link>
<category>Files Containing Juicy Info</category>
<shortDescription>site:.edu filetype:xls &quot;root&quot; database</shortDescription>
<textualDescription>xls files of root access of edu sites.
</textualDescription>
<query>site:.edu filetype:xls &quot;root&quot; database</query>
<querystring>https://www.google.com/search?q=site:.edu filetype:xls &quot;root&quot; database</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>defaltredmode</author>
</entry>
<entry>
<id>7730</id>
<link>https://www.exploit-db.com/ghdb/7730</link>
Expand Down Expand Up @@ -62045,6 +62074,22 @@ Reza Abasi(Turku)
<date>2019-07-24</date>
<author>ahmed mohammed adel</author>
</entry>
<entry>
<id>8446</id>
<link>https://www.exploit-db.com/ghdb/8446</link>
<category>Files Containing Passwords</category>
<shortDescription>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</shortDescription>
<textualDescription>Dork For : Finding exposed cloud service credentials

Regards,
Joel Indra
</textualDescription>
<query>intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</query>
<querystring>https://www.google.com/search?q=intext:&quot;aws_access_key_id&quot; | intext:&quot;aws_secret_access_key&quot; filetype:json | filetype:yaml</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Joel Indra</author>
</entry>
<entry>
<id>6433</id>
<link>https://www.exploit-db.com/ghdb/6433</link>
Expand Down Expand Up @@ -63320,6 +63365,22 @@ https://ch.linkedin.com/in/schmidbruno
<date>2004-11-23</date>
<author>anonymous</author>
</entry>
<entry>
<id>8443</id>
<link>https://www.exploit-db.com/ghdb/8443</link>
<category>Files Containing Passwords</category>
<shortDescription>intitle:index of /etc/ssh</shortDescription>
<textualDescription># Google Dork: intitle:index of /etc/ssh
# Files Containing Juicy Info
# Date: 25/04/2024
# Exploit: Shivam Dhingra
</textualDescription>
<query>intitle:index of /etc/ssh</query>
<querystring>https://www.google.com/search?q=intitle:index of /etc/ssh</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Shivam Dhingra</author>
</entry>
<entry>
<id>5732</id>
<link>https://www.exploit-db.com/ghdb/5732</link>
Expand Down Expand Up @@ -117048,6 +117109,35 @@ https://www.exploit-db.com/exploits/48163
<date>2020-06-17</date>
<author>Alexandros Pappas</author>
</entry>
<entry>
<id>8445</id>
<link>https://www.exploit-db.com/ghdb/8445</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</shortDescription>
<textualDescription>Description:
Google Dork : intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;

This Google dork, intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;, reveals
the web interfaces of Siemens S7 series PLC controllers. These interfaces
provide access to critical control and monitoring functions of industrial
systems. Unauthorized access can lead to significant operational
disruptions and security risks in industrial environments.

Proof Of Concept (PoC):
Steps to Reproduce:
1.Open Google Search.
2.Enter the dork query: intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;.
3.Review the search results to find URLs of Siemens S7 PLC web interfaces.
4. Click on a search result to access the web interface of the PLC.
5.Attempt to log in using default or commonly known credentials (if login
is required).
</textualDescription>
<query>intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</query>
<querystring>https://www.google.com/search?q=intext:&quot;siemens&quot; &amp; inurl:&quot;/portal/portal.mwsl&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Kishoreram</author>
</entry>
<entry>
<id>6728</id>
<link>https://www.exploit-db.com/ghdb/6728</link>
Expand Down Expand Up @@ -117076,6 +117166,27 @@ https://www.exploit-db.com/exploits/48163
<date>2004-08-13</date>
<author>anonymous</author>
</entry>
<entry>
<id>8444</id>
<link>https://www.exploit-db.com/ghdb/8444</link>
<category>Vulnerable Servers</category>
<shortDescription>intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal</shortDescription>
<textualDescription># Exploit Title: Dork For GlobalProtect Portal (Login Panels to test
CVE-2024-3400)

# Google Dork:
intext:GlobalProtect Portal inurl:/global-protect intitle:GlobalProtect Portal

# Date: 17/05/2024

# Author: Gurudatt Choudhary
</textualDescription>
<query>Google Dork Submisson For GlobalProtect Portal</query>
<querystring>https://www.google.com/search?q=Google Dork Submisson For GlobalProtect Portal</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Gurudatt Choudhary</author>
</entry>
<entry>
<id>3826</id>
<link>https://www.exploit-db.com/ghdb/3826</link>
Expand Down Expand Up @@ -117375,6 +117486,24 @@ Demewoz Agegnehu | Sabean Technology | https://sabtechx.com</textualDescription>
<date>2004-05-04</date>
<author>anonymous</author>
</entry>
<entry>
<id>8447</id>
<link>https://www.exploit-db.com/ghdb/8447</link>
<category>Vulnerable Servers</category>
<shortDescription>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</shortDescription>
<textualDescription>This dork is for CVE-2024-24919.

# Google Dork: [intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com]
# Date: [30/05/2024]
# Pages Containing Login Portal
# Exploit: Everton Hydd3n
</textualDescription>
<query>intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</query>
<querystring>https://www.google.com/search?q=intitle:&quot;SSL Network Extender Login&quot; -checkpoint.com</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Everton Hydd3n</author>
</entry>
<entry>
<id>117</id>
<link>https://www.exploit-db.com/ghdb/117</link>
Expand Down Expand Up @@ -117676,6 +117805,24 @@ Felipe Molina</textualDescription>
<date>2014-02-05</date>
<author>anonymous</author>
</entry>
<entry>
<id>8448</id>
<link>https://www.exploit-db.com/ghdb/8448</link>
<category>Vulnerable Servers</category>
<shortDescription>inurl:&quot;cgi-bin/koha&quot;</shortDescription>
<textualDescription>Find webservers running Koha library system

--
Regards,

*Hilary Soita.*
</textualDescription>
<query>inurl:&quot;cgi-bin/koha&quot;</query>
<querystring>https://www.google.com/search?q=inurl:&quot;cgi-bin/koha&quot;</querystring>
<edb></edb>
<date>2024-07-04</date>
<author>Hilary Soita</author>
</entry>
<entry>
<id>387</id>
<link>https://www.exploit-db.com/ghdb/387</link>
Expand Down

0 comments on commit 388e822

Please sign in to comment.