CVE Certified
GHDB

Google Hacking Database

Advisories and Vulnerabilities

These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.

DATE Title Summary
2011-01-06 "Powered by phpMySport" intext:"Powered by phpMySport" Multiple Vulnerabilities: http://www.exploit-db.com/ex...
2011-01-04 "POWERED BY ALITALK" intext:"POWERED BY ALITALK"...
2011-01-02 inurl:"com_eventcal" Author : AtT4CKxT3rR0r1ST [F.Hack@w.cn] RFI: www.site.com/components/com_eventcal/e...
2011-01-02 "Powered by YourTube v1.0" Author: AtT4CKxT3rR0r1ST CSRF: http://www.exploit-db.com/exploits/15892...
2011-01-02 inurl:"/gadmin/index.php" Author: AtT4CKxT3rR0r1ST SQL Injection: www.site.com/gallery.php?id=null[Sql Injection]...
2010-12-29 "/index.php?id=cmp-noticias" Submitter: xoron http://server/index.php?id=cmp-noticias&n=[SQLi]...
2010-12-29 "Powered by UNO.com.my" Submitter: SiKodoQ http://127.0.0.1/[path]/page.php?pid=[SQLi]...
2010-12-29 "Website Design by Rocktime" Submitter: n0n0x http://server/product.php?fdProductId=[SQL Injection]...
2010-12-29 "Powered by KaiBB 1.0.1" Multiple Vulnerabilities:http://www.exploit-db.com/exploits/15846/...
2010-12-24 "Powered by CubeCart 3.0.4" CSRF:http://www.exploit-db.com/exploits/15822...
2010-12-23 allinurl:index.php?db=information_schema Submitter: modpr0be phpMyAdmin Direct Access to information_schema Database...
2010-12-22 "Powered by: IRIran.net" IRIran eShop Builder SQL Injection: http://server/patch/pages/index.php?id=0[SQL] Submitter...
2010-12-19 inurl:com_jeauto LFI: http://www.exploit-db.com/exploits/15779...
2010-12-18 inurl:"produtos.asp?produto=" Submitter: Br0ly http://www.exploit-db.com/exploits/15776...
2010-12-15 intext: Copyright+MantisBT Group Mantis Bug Tracker http://mantisbt.org http://www.exploit-db.com/exploits/15735 http://www...
2010-12-15 "Powered By PageAdmin CMS Free Version" Author: Sun Army XSS: /include/search.aspx?keycode=">xss ByTakpar&type=1&...
2010-12-15 "powered by simpleview CMS" Author: Sun Army XSS: /search/?searchString=">alert(document.cookie)&submitSearc...
2010-12-14 "POWERED BY: WEBINSPIRE" Author: ghost-dz SQL Injection: http://server/pages.php?id=30+and+1=0+union+select+1,concat(...
2010-12-14 inurl:showcat.asp?id= ======================================== Centralia (admin/dbedit.asp?) Bypass and Shell Upload...
2010-12-14 inurl:panorama-viewer.php?id= [-] http://server/panorama-viewer.php?id=-1+UNION+SELECT+1,2,3,group_concat%28user_name,0x3...