Lucene search

K
Status2kStatus2k

7 matches found

CVE
CVE
added 2020/02/07 6:15 p.m.90 views

CVE-2014-5091

A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.

10CVSS9.5AI score0.46943EPSS
CVE
CVE
added 2020/01/10 2:15 p.m.71 views

CVE-2014-5093

Status2k does not remove the install directory allowing credential reset.

9.8CVSS9.3AI score0.12189EPSS
CVE
CVE
added 2020/01/10 2:15 p.m.43 views

CVE-2014-5092

Status2k allows Remote Command Execution in admin/options/editpl.php.

8.8CVSS9.3AI score0.0551EPSS
CVE
CVE
added 2014/08/06 6:55 p.m.37 views

CVE-2014-5090

admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the Location field in Add Logs in the Admin Panel.

6.5CVSS9.4AI score0.07051EPSS
CVE
CVE
added 2014/10/20 3:55 p.m.37 views

CVE-2014-5094

Status2k allows remote attackers to obtain configuration information via a phpinfo action in a request to status/index.php, which calls the phpinfo function.

5CVSS9AI score0.07149EPSS
CVE
CVE
added 2014/08/06 6:55 p.m.36 views

CVE-2014-5089

SQL injection vulnerability in admin/options/logs.php in Status2k allows remote authenticated administrators to execute arbitrary SQL commands via the log parameter.

7.5CVSS9.5AI score0.01016EPSS
CVE
CVE
added 2014/08/06 6:55 p.m.34 views

CVE-2014-5088

Cross-site scripting (XSS) vulnerability in Status2k allows remote attackers to inject arbitrary web script or HTML via the username to login.php.

4.3CVSS7.7AI score0.00608EPSS