source: https://www.securityfocus.com/bid/27589/info Simple OS CMS is prone to an SQL-injection vulnerability because it fails to adequately sanitize user-supplied data. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Simple OS CMS 0.1c beta is vulnerable; other versions may also be affected. The following exploit information is available: Passing: username: admin' or 1=1/* password: something will bypass the authentication process.