Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
NA
CVSSv4
CVE-2014-5092
CVSSv4: NA
|
CVSSv3: 8.8
|
CVSSv2: 6.5
|
VMScore: 980
|
EPSS: 0.05464
|
KEV: Not Included
Published: 10/01/2020 Updated: 21/11/2024
Vulnerability Summary
Status2k allows Remote Command Execution in admin/options/editpl.php.
Subscribe to Status2k
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
status2k status2k
Exploits
Exploit DB: Status2k Server Monitoring Software - Multiple Vulnerabilities
# Exploit Title: Status2k Multiple Vulnerabilities/0days # Date: 6/20/2014 # Exploit Author: Shayan Sadigh (twittercom/r1pplex) | <ienjoyripples@gmailcom # Vendor Homepage: status2kcom/ # Version: All # Tested on: Linux/Windows # CVE : CVE-2014-5088, CVE-2014-5089, CVE-2014-5090, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093, CVE-2014-5 ...
Exploit DB: Status2k XSS / SQL Injection / Command Execution
Status2k server monitoring software suffers from cross site scripting, remote command execution, information disclosure, and remote SQL injection vulnerabilities ...
References
CWE-20
https://nvd.nist.gov
https://www.exploit-db.com/exploits/34239/
https://www.first.org/epss
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95112
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95112
Preferred Score:
CVSSv4
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-1496
go-redis
CVE-2025-24472
physical
elevation of privilege
CVE-2025-30066
local file inclusion
CVE-2025-2553
ollama/ollama
CVE-2024-13920
ollama
langgenius/dify
CVE-2025-0313
Home
/
Search Results
/
CVE-2014-5092
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started