Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
status2k status2k vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2014-5091
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
Status2k Status2k
1 EDB exploit
435
VMScore
CVE-2014-5088
Cross-site scripting (XSS) vulnerability in Status2k allows remote malicious users to inject arbitrary web script or HTML via the username to login.php.
Status2k Status2k -
1 EDB exploit
755
VMScore
CVE-2014-5089
SQL injection vulnerability in admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary SQL commands via the log parameter.
Status2k Status2k -
1 EDB exploit
655
VMScore
CVE-2014-5090
admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the Location field in Add Logs in the Admin Panel.
Status2k Status2k -
1 EDB exploit
655
VMScore
CVE-2014-5092
Status2k allows Remote Command Execution in admin/options/editpl.php.
Status2k Status2k
1 EDB exploit
505
VMScore
CVE-2014-5093
Status2k does not remove the install directory allowing credential reset.
Status2k Status2k
1 EDB exploit
505
VMScore
CVE-2014-5094
Status2k allows remote malicious users to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.
Status2k Status2k -
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started