Multiple SQL injection vulnerabilities in 4Site CMS 2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login and (2) password parameters to pcgi/4site.pl, (3) page parameter to print/print.shtml, (4) s and (5) i parameters to portfolio/index.shtml, (6) h parameter to hotel/index.php, (7) id parameter to news/news1.shtml, and the (8) th parameter to faq/index.shtml.
secunia.com/advisories/33733
wsec.ru/wsec-09-002-4site-cms-26-multiple-sql-injections/
www.htbridge.ch/advisory/sql_injection_in_4site_cms.html
www.osvdb.org/51806
www.osvdb.org/51807
www.osvdb.org/51808
www.osvdb.org/51809
www.securityfocus.com/archive/1/514376/100/0/threaded
www.securityfocus.com/bid/33594
exchange.xforce.ibmcloud.com/vulnerabilities/48483
exchange.xforce.ibmcloud.com/vulnerabilities/48486
exchange.xforce.ibmcloud.com/vulnerabilities/48487
exchange.xforce.ibmcloud.com/vulnerabilities/48488
www.exploit-db.com/exploits/7964