Exploitation Summary
EIP tracks 1 public exploit for CVE-2009-3361. PoCs published by noname.
AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in PHP-IPNMonitor, allowing an attacker to extract user credentials from the database via a crafted UNION-based SQL query.
Description
SQL injection vulnerability in index.php in PHP-IPNMonitor allows remote attackers to execute arbitrary SQL commands via the maincat_id parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by noname · textwebappsphp
https://www.exploit-db.com/exploits/9647
This exploit demonstrates a SQL injection vulnerability in PHP-IPNMonitor, allowing an attacker to extract user credentials from the database via a crafted UNION-based SQL query.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
PHP-IPNMonitor (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (1)
Core 1
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9647
Scores
EPSS
0.0023
EPSS Percentile
46.1%
Details
CWE
CWE-89
Status
published
Products (1)
paul_gibbs/php-ipnmonitor
Published
Sep 24, 2009
Tracked Since
Feb 18, 2026