Advisories and Vulnerabilities on Google Hacking Database
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.
The latest Vulnerabilities Dorks, some are related to Exploit DB.