Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
980
VMScore
CVE-2014-5092
CVSSv4: NA
|
CVSSv3: 8.8
|
CVSSv2: 6.5
|
VMScore: 980
|
EPSS: 0.05464
|
KEV: Not Included
Published: 10/01/2020 Updated: 21/11/2024
Vulnerability Summary
Status2k allows Remote Command Execution in admin/options/editpl.php.
Subscribe to Status2k
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
status2k status2k
Exploits
Exploit DB: Status2k Server Monitoring Software - Multiple Vulnerabilities
# Exploit Title: Status2k Multiple Vulnerabilities/0days # Date: 6/20/2014 # Exploit Author: Shayan Sadigh (twittercom/r1pplex) | <ienjoyripples@gmailcom # Vendor Homepage: status2kcom/ # Version: All # Tested on: Linux/Windows # CVE : CVE-2014-5088, CVE-2014-5089, CVE-2014-5090, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093, CVE-2014-5 ...
Exploit DB: Status2k XSS / SQL Injection / Command Execution
Status2k server monitoring software suffers from cross site scripting, remote command execution, information disclosure, and remote SQL injection vulnerabilities ...
References
CWE-20
https://nvd.nist.gov
https://www.exploit-db.com/exploits/34239/
https://www.first.org/epss
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95112
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95112
Preferred Score:
VMScore
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-2538
CVE-2025-24813
CVE-2024-57440
CVE-2024-48591
kube-apiserver
CVE-2025-20014
universal traffic recorder app
CVE-2025-2557
redis
code-projects
spoof
bypass
local
Home
/
Search Results
/
CVE-2014-5092
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started