Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
status2k status2k - vulnerabilities and exploits
(subscribe to this query)
0.006
EPSS
CVE-2014-5088
Cross-site scripting (XSS) vulnerability in Status2k allows remote malicious users to inject arbitrary web script or HTML via the username to login.php.
Status2k Status2k -
1 EDB exploit
0.010
EPSS
CVE-2014-5089
SQL injection vulnerability in admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary SQL commands via the log parameter.
Status2k Status2k -
1 EDB exploit
0.062
EPSS
CVE-2014-5090
admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the Location field in Add Logs in the Admin Panel.
Status2k Status2k -
1 EDB exploit
0.424
EPSS
CVE-2014-5091
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
Status2k Status2k
1 EDB exploit
0.054
EPSS
CVE-2014-5092
Status2k allows Remote Command Execution in admin/options/editpl.php.
Status2k Status2k
1 EDB exploit
0.111
EPSS
CVE-2014-5093
Status2k does not remove the install directory allowing credential reset.
Status2k Status2k
1 EDB exploit
0.120
EPSS
CVE-2014-5094
Status2k allows remote malicious users to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.
Status2k Status2k -
1 EDB exploit
Preferred Score:
EPSS
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-1496
go-redis
CVE-2025-24472
physical
elevation of privilege
CVE-2025-30066
local file inclusion
CVE-2025-2553
ollama/ollama
CVE-2024-13920
ollama
langgenius/dify
CVE-2025-0313
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started