This indicates an attempt to exploit a remote SQL injection vulnerability in Etomite CMS.
The vulnerability can be exploited by sending specially crafted SQL statements to the script "manager/index.php", using the "username" parameter, if "magic_quotes" is disabled. As a result a remote attacker can bypass authentication, and can view, add, modify and delete information in the back end database.
Etomite Content Management System 0.6.1 and earlier
System compromise: data manipulation.
Apply the following patch: