Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
9.8
CVSSv3
CVE-2014-5093
CVSSv4: NA
|
CVSSv3: 9.8
|
CVSSv2: 5
|
VMScore: 1000
|
EPSS: 0.02694
|
KEV: Not Included
Published: 10/01/2020 Updated: 21/11/2024
Vulnerability Summary
Status2k does not remove the install directory allowing credential reset.
Subscribe to Status2k
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
status2k status2k
Exploits
Exploit DB: Status2k Server Monitoring Software - Multiple Vulnerabilities
# Exploit Title: Status2k Multiple Vulnerabilities/0days # Date: 6/20/2014 # Exploit Author: Shayan Sadigh (twittercom/r1pplex) | <ienjoyripples@gmailcom # Vendor Homepage: status2kcom/ # Version: All # Tested on: Linux/Windows # CVE : CVE-2014-5088, CVE-2014-5089, CVE-2014-5090, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093, CVE-2014-5 ...
Exploit DB: Status2k XSS / SQL Injection / Command Execution
Status2k server monitoring software suffers from cross site scripting, remote command execution, information disclosure, and remote SQL injection vulnerabilities ...
References
CWE-522
https://nvd.nist.gov
https://www.exploit-db.com/exploits/34239/
https://www.first.org/epss
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95113
http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/95113
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
apache atlas
wp html page sitemap
inject
everest forms
CVE-2025-25356
CVE-2024-47264
cross-site scripting
CVE-2025-0837
CVE-2025-25286
*
CVE-2024-12754
arbitrary code
CVE-2025-24472
Home
/
Search Results
/
CVE-2014-5093
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started