Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
status2k status2k vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2014-5090
admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the Location field in Add Logs in the Admin Panel.
Status2k Status2k -
1 EDB exploit
7.5
CVSSv2
CVE-2014-5089
SQL injection vulnerability in admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary SQL commands via the log parameter.
Status2k Status2k -
1 EDB exploit
9.8
CVSSv3
CVE-2014-5091
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
Status2k Status2k
1 EDB exploit
8.8
CVSSv3
CVE-2014-5092
Status2k allows Remote Command Execution in admin/options/editpl.php.
Status2k Status2k
1 EDB exploit
5
CVSSv2
CVE-2014-5094
Status2k allows remote malicious users to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.
Status2k Status2k -
1 EDB exploit
4.3
CVSSv2
CVE-2014-5088
Cross-site scripting (XSS) vulnerability in Status2k allows remote malicious users to inject arbitrary web script or HTML via the username to login.php.
Status2k Status2k -
1 EDB exploit
9.8
CVSSv3
CVE-2014-5093
Status2k does not remove the install directory allowing credential reset.
Status2k Status2k
1 EDB exploit
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
apache atlas
wp html page sitemap
inject
everest forms
CVE-2025-25356
CVE-2024-47264
cross-site scripting
CVE-2025-0837
CVE-2025-25286
*
CVE-2024-12754
arbitrary code
CVE-2025-24472
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started