@@ -33369,6 +33369,24 @@ Dork by Rootkit Pentester.</textualDescription>
33369
33369
<date>2004-08-09</date>
33370
33370
<author>anonymous</author>
33371
33371
</entry>
33372
+ <entry>
33373
+ <id>8396</id>
33374
+ <link>https://www.exploit-db.com/ghdb/8396</link>
33375
+ <category>Files Containing Juicy Info</category>
33376
+ <shortDescription>(site:jsonformatter.org | site:codebeautify.org) & (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</shortDescription>
33377
+ <textualDescription># Google Dork: (site:jsonformatter.org | site:codebeautify.org) &
33378
+ (intext:aws | intext:bucket | intext:password | intext:secret |
33379
+ intext:username)
33380
+ # Files Containing Juicy Info
33381
+ # Date: 03/01/2024
33382
+ # Exploit: letmewin
33383
+ </textualDescription>
33384
+ <query>(site:jsonformatter.org | site:codebeautify.org) & (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</query>
33385
+ <querystring>https://www.google.com/search?q=(site:jsonformatter.org | site:codebeautify.org) & (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</querystring>
33386
+ <edb></edb>
33387
+ <date>2024-01-23</date>
33388
+ <author>letmewin cyber</author>
33389
+ </entry>
33372
33390
<entry>
33373
33391
<id>522</id>
33374
33392
<link>https://www.exploit-db.com/ghdb/522</link>
@@ -36729,6 +36747,22 @@ Author: loganWHD</textualDescription>
36729
36747
<date>2011-11-19</date>
36730
36748
<author>anonymous</author>
36731
36749
</entry>
36750
+ <entry>
36751
+ <id>8395</id>
36752
+ <link>https://www.exploit-db.com/ghdb/8395</link>
36753
+ <category>Files Containing Juicy Info</category>
36754
+ <shortDescription>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</shortDescription>
36755
+ <textualDescription># Google Dork: inurl:/.well-known/ai-plugin.json
36756
+ # Files Containing Juicy Info
36757
+ # Date: 30/11/2023
36758
+ # Exploit: Mohamed Choukrate
36759
+ </textualDescription>
36760
+ <query>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</query>
36761
+ <querystring>https://www.google.com/search?q=filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</querystring>
36762
+ <edb></edb>
36763
+ <date>2024-01-23</date>
36764
+ <author>web work</author>
36765
+ </entry>
36732
36766
<entry>
36733
36767
<id>5865</id>
36734
36768
<link>https://www.exploit-db.com/ghdb/5865</link>
@@ -99105,6 +99139,27 @@ sometimes with exposed passwords can be found.
99105
99139
<date>2020-03-31</date>
99106
99140
<author>Alexandros Pappas</author>
99107
99141
</entry>
99142
+ <entry>
99143
+ <id>8394</id>
99144
+ <link>https://www.exploit-db.com/ghdb/8394</link>
99145
+ <category>Sensitive Directories</category>
99146
+ <shortDescription>intitle:"index of" database.properties</shortDescription>
99147
+ <textualDescription># Google Dork: intitle:"index of" database.properties
99148
+ # Description:- This page contains various database.properties of spring
99149
+ MVC,
99150
+ # Author: Odela Rohith
99151
+ # Date: 28-DEC-2023
99152
+ # Linkedin: https://www.linkedin.com/in/odela-rohith-b723a7122/
99153
+ # Facebook: https://www.facebook.com/odela.rohith.7
99154
+
99155
+ Regards,
99156
+ Odela Rohith</textualDescription>
99157
+ <query>intitle:"index of" database.properties</query>
99158
+ <querystring>https://www.google.com/search?q=intitle:"index of" database.properties</querystring>
99159
+ <edb></edb>
99160
+ <date>2024-01-23</date>
99161
+ <author>Odela Rohith</author>
99162
+ </entry>
99108
99163
<entry>
99109
99164
<id>5960</id>
99110
99165
<link>https://www.exploit-db.com/ghdb/5960</link>
@@ -116196,6 +116251,62 @@ PsyDel</textualDescription>
116196
116251
<date>2015-03-04</date>
116197
116252
<author>anonymous</author>
116198
116253
</entry>
116254
+ <entry>
116255
+ <id>8398</id>
116256
+ <link>https://www.exploit-db.com/ghdb/8398</link>
116257
+ <category>Vulnerable Servers</category>
116258
+ <shortDescription>Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</shortDescription>
116259
+ <textualDescription>Dork:
116260
+ intitle:"Apache Struts 2.5" "index of /" -git
116261
+ Explanation:
116262
+ intitle:"Apache Struts 2.5": This part specifies that the search results
116263
+ must have the words "Apache Struts 2.5" in the title. It helps narrow down
116264
+ the results to instances related specifically to Apache Struts version 2.5.
116265
+
116266
+ "index of /": This part looks for directories with the "index of /" string.
116267
+ Such directories often contain a listing of files and folders, which could
116268
+ be unintentionally exposed and may include sensitive information.
116269
+
116270
+ -git: This part excludes results that contain the term "git". The idea is
116271
+ to filter out Git repositories from the search results, focusing on other
116272
+ types of exposed directories.
116273
+
116274
+ *Sample output : *
116275
+ https://mirror.softaculous.com/apache/struts/2.5.30/
116276
+ https://ftp.unicamp.br/pub/apache/struts/2.5.25/
116277
+ https://ftp.itu.edu.tr/Mirror/Apache/struts/2.5.32/
116278
+ https://repository.jboss.org/maven2/apache-struts/struts/
116279
+ https://mirrors.gigenet.com/apache/struts/
116280
+ https://ftp.riken.jp/net/apache/struts/
116281
+ https://mirror.math.princeton.edu/pub/apache/struts/
116282
+
116283
+ This Google dork is searching for instances where the title includes
116284
+ "Apache Struts 2.5," and the webpage has a directory listing ("index of /")
116285
+ but excludes any results related to Git repositories. The aim is to
116286
+ identify potentially exposed Apache Struts 2.5 instances that might have
116287
+ unintentionally revealed directory structures.
116288
+
116289
+
116290
+ Additional Information:
116291
+
116292
+ Affected versions: Struts 2.x before 2.5.33 or 6.x before 6.3.0.2
116293
+ Description: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50164
116294
+
116295
+ Thank you for your consideration.
116296
+
116297
+ Sincerely,
116298
+
116299
+ --
116300
+ *Parth Jamodkar*
116301
+
116302
+ *CLoud security researcher 3*
116303
+ *LinkedIn* </textualDescription>
116304
+ <query>Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</query>
116305
+ <querystring>https://www.google.com/search?q=Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</querystring>
116306
+ <edb></edb>
116307
+ <date>2024-01-23</date>
116308
+ <author>Parth Jamodkar</author>
116309
+ </entry>
116199
116310
<entry>
116200
116311
<id>4782</id>
116201
116312
<link>https://www.exploit-db.com/ghdb/4782</link>
@@ -117298,6 +117409,18 @@ This google dork possibly exposes sites with the Article Directory (index.php pa
117298
117409
<date>2004-03-14</date>
117299
117410
<author>anonymous</author>
117300
117411
</entry>
117412
+ <entry>
117413
+ <id>8397</id>
117414
+ <link>https://www.exploit-db.com/ghdb/8397</link>
117415
+ <category>Vulnerable Servers</category>
117416
+ <shortDescription>inurl:install.php intitle:"Froxlor Server Management Panel - Installation"</shortDescription>
117417
+ <textualDescription>inurl:install.php intitle:"Froxlor Server Management Panel - Installation"</textualDescription>
117418
+ <query>inurl:install.php intitle:"Froxlor Server Management Panel - Installation"</query>
117419
+ <querystring>https://www.google.com/search?q=inurl:install.php intitle:"Froxlor Server Management Panel - Installation"</querystring>
117420
+ <edb></edb>
117421
+ <date>2024-01-23</date>
117422
+ <author>Nadir Boulacheb (RubX)</author>
117423
+ </entry>
117301
117424
<entry>
117302
117425
<id>116</id>
117303
117426
<link>https://www.exploit-db.com/ghdb/116</link>
0 commit comments