Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
status2k status2k vulnerabilities and exploits
(subscribe to this query)
530
VMScore
CVE-2014-5088
Cross-site scripting (XSS) vulnerability in Status2k allows remote malicious users to inject arbitrary web script or HTML via the username to login.php.
Status2k Status2k -
1 EDB exploit
850
VMScore
CVE-2014-5089
SQL injection vulnerability in admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary SQL commands via the log parameter.
Status2k Status2k -
1 EDB exploit
750
VMScore
CVE-2014-5090
admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the Location field in Add Logs in the Admin Panel.
Status2k Status2k -
1 EDB exploit
1000
VMScore
CVE-2014-5091
A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
Status2k Status2k
1 EDB exploit
980
VMScore
CVE-2014-5092
Status2k allows Remote Command Execution in admin/options/editpl.php.
Status2k Status2k
1 EDB exploit
1000
VMScore
CVE-2014-5093
Status2k does not remove the install directory allowing credential reset.
Status2k Status2k
1 EDB exploit
600
VMScore
CVE-2014-5094
Status2k allows remote malicious users to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.
Status2k Status2k -
1 EDB exploit
Preferred Score:
VMScore
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-2538
CVE-2025-24813
CVE-2024-57440
CVE-2024-48591
kube-apiserver
CVE-2025-20014
universal traffic recorder app
CVE-2025-2557
redis
code-projects
spoof
bypass
local
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started