Skip to content

Commit 25d1f1d

Browse files
author
certcc-ghbot
committed
Merge remote-tracking branch 'upstream/main'
2 parents 25e127f + 967f9d1 commit 25d1f1d

File tree

1 file changed

+123
-0
lines changed

1 file changed

+123
-0
lines changed

ghdb.xml

+123
Original file line numberDiff line numberDiff line change
@@ -33369,6 +33369,24 @@ Dork by Rootkit Pentester.</textualDescription>
3336933369
<date>2004-08-09</date>
3337033370
<author>anonymous</author>
3337133371
</entry>
33372+
<entry>
33373+
<id>8396</id>
33374+
<link>https://www.exploit-db.com/ghdb/8396</link>
33375+
<category>Files Containing Juicy Info</category>
33376+
<shortDescription>(site:jsonformatter.org | site:codebeautify.org) &amp; (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</shortDescription>
33377+
<textualDescription># Google Dork: (site:jsonformatter.org | site:codebeautify.org) &amp;
33378+
(intext:aws | intext:bucket | intext:password | intext:secret |
33379+
intext:username)
33380+
# Files Containing Juicy Info
33381+
# Date: 03/01/2024
33382+
# Exploit: letmewin
33383+
</textualDescription>
33384+
<query>(site:jsonformatter.org | site:codebeautify.org) &amp; (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</query>
33385+
<querystring>https://www.google.com/search?q=(site:jsonformatter.org | site:codebeautify.org) &amp; (intext:aws | intext:bucket | intext:password | intext:secret | intext:username)</querystring>
33386+
<edb></edb>
33387+
<date>2024-01-23</date>
33388+
<author>letmewin cyber</author>
33389+
</entry>
3337233390
<entry>
3337333391
<id>522</id>
3337433392
<link>https://www.exploit-db.com/ghdb/522</link>
@@ -36729,6 +36747,22 @@ Author: loganWHD</textualDescription>
3672936747
<date>2011-11-19</date>
3673036748
<author>anonymous</author>
3673136749
</entry>
36750+
<entry>
36751+
<id>8395</id>
36752+
<link>https://www.exploit-db.com/ghdb/8395</link>
36753+
<category>Files Containing Juicy Info</category>
36754+
<shortDescription>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</shortDescription>
36755+
<textualDescription># Google Dork: inurl:/.well-known/ai-plugin.json
36756+
# Files Containing Juicy Info
36757+
# Date: 30/11/2023
36758+
# Exploit: Mohamed Choukrate
36759+
</textualDescription>
36760+
<query>filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</query>
36761+
<querystring>https://www.google.com/search?q=filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS</querystring>
36762+
<edb></edb>
36763+
<date>2024-01-23</date>
36764+
<author>web work</author>
36765+
</entry>
3673236766
<entry>
3673336767
<id>5865</id>
3673436768
<link>https://www.exploit-db.com/ghdb/5865</link>
@@ -99105,6 +99139,27 @@ sometimes with exposed passwords can be found.
9910599139
<date>2020-03-31</date>
9910699140
<author>Alexandros Pappas</author>
9910799141
</entry>
99142+
<entry>
99143+
<id>8394</id>
99144+
<link>https://www.exploit-db.com/ghdb/8394</link>
99145+
<category>Sensitive Directories</category>
99146+
<shortDescription>intitle:&quot;index of&quot; database.properties</shortDescription>
99147+
<textualDescription># Google Dork: intitle:&quot;index of&quot; database.properties
99148+
# Description:- This page contains various database.properties of spring
99149+
MVC,
99150+
# Author: Odela Rohith
99151+
# Date: 28-DEC-2023
99152+
# Linkedin: https://www.linkedin.com/in/odela-rohith-b723a7122/
99153+
# Facebook: https://www.facebook.com/odela.rohith.7
99154+
99155+
Regards,
99156+
Odela Rohith</textualDescription>
99157+
<query>intitle:&quot;index of&quot; database.properties</query>
99158+
<querystring>https://www.google.com/search?q=intitle:&quot;index of&quot; database.properties</querystring>
99159+
<edb></edb>
99160+
<date>2024-01-23</date>
99161+
<author>Odela Rohith</author>
99162+
</entry>
9910899163
<entry>
9910999164
<id>5960</id>
9911099165
<link>https://www.exploit-db.com/ghdb/5960</link>
@@ -116196,6 +116251,62 @@ PsyDel</textualDescription>
116196116251
<date>2015-03-04</date>
116197116252
<author>anonymous</author>
116198116253
</entry>
116254+
<entry>
116255+
<id>8398</id>
116256+
<link>https://www.exploit-db.com/ghdb/8398</link>
116257+
<category>Vulnerable Servers</category>
116258+
<shortDescription>Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</shortDescription>
116259+
<textualDescription>Dork:
116260+
intitle:&quot;Apache Struts 2.5&quot; &quot;index of /&quot; -git
116261+
Explanation:
116262+
intitle:&quot;Apache Struts 2.5&quot;: This part specifies that the search results
116263+
must have the words &quot;Apache Struts 2.5&quot; in the title. It helps narrow down
116264+
the results to instances related specifically to Apache Struts version 2.5.
116265+
116266+
&quot;index of /&quot;: This part looks for directories with the &quot;index of /&quot; string.
116267+
Such directories often contain a listing of files and folders, which could
116268+
be unintentionally exposed and may include sensitive information.
116269+
116270+
-git: This part excludes results that contain the term &quot;git&quot;. The idea is
116271+
to filter out Git repositories from the search results, focusing on other
116272+
types of exposed directories.
116273+
116274+
*Sample output : *
116275+
https://mirror.softaculous.com/apache/struts/2.5.30/
116276+
https://ftp.unicamp.br/pub/apache/struts/2.5.25/
116277+
https://ftp.itu.edu.tr/Mirror/Apache/struts/2.5.32/
116278+
https://repository.jboss.org/maven2/apache-struts/struts/
116279+
https://mirrors.gigenet.com/apache/struts/
116280+
https://ftp.riken.jp/net/apache/struts/
116281+
https://mirror.math.princeton.edu/pub/apache/struts/
116282+
116283+
This Google dork is searching for instances where the title includes
116284+
&quot;Apache Struts 2.5,&quot; and the webpage has a directory listing (&quot;index of /&quot;)
116285+
but excludes any results related to Git repositories. The aim is to
116286+
identify potentially exposed Apache Struts 2.5 instances that might have
116287+
unintentionally revealed directory structures.
116288+
116289+
116290+
Additional Information:
116291+
116292+
Affected versions: Struts 2.x before 2.5.33 or 6.x before 6.3.0.2
116293+
Description: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50164
116294+
116295+
Thank you for your consideration.
116296+
116297+
Sincerely,
116298+
116299+
--
116300+
*Parth Jamodkar*
116301+
116302+
*CLoud security researcher 3*
116303+
*LinkedIn* </textualDescription>
116304+
<query>Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</query>
116305+
<querystring>https://www.google.com/search?q=Apache Struts 2.x Path Traversal Vulnerability (CVE-2023-50164) Detection Dork</querystring>
116306+
<edb></edb>
116307+
<date>2024-01-23</date>
116308+
<author>Parth Jamodkar</author>
116309+
</entry>
116199116310
<entry>
116200116311
<id>4782</id>
116201116312
<link>https://www.exploit-db.com/ghdb/4782</link>
@@ -117298,6 +117409,18 @@ This google dork possibly exposes sites with the Article Directory (index.php pa
117298117409
<date>2004-03-14</date>
117299117410
<author>anonymous</author>
117300117411
</entry>
117412+
<entry>
117413+
<id>8397</id>
117414+
<link>https://www.exploit-db.com/ghdb/8397</link>
117415+
<category>Vulnerable Servers</category>
117416+
<shortDescription>inurl:install.php intitle:&quot;Froxlor Server Management Panel - Installation&quot;</shortDescription>
117417+
<textualDescription>inurl:install.php intitle:&quot;Froxlor Server Management Panel - Installation&quot;</textualDescription>
117418+
<query>inurl:install.php intitle:&quot;Froxlor Server Management Panel - Installation&quot;</query>
117419+
<querystring>https://www.google.com/search?q=inurl:install.php intitle:&quot;Froxlor Server Management Panel - Installation&quot;</querystring>
117420+
<edb></edb>
117421+
<date>2024-01-23</date>
117422+
<author>Nadir Boulacheb (RubX)</author>
117423+
</entry>
117301117424
<entry>
117302117425
<id>116</id>
117303117426
<link>https://www.exploit-db.com/ghdb/116</link>

0 commit comments

Comments
 (0)