A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.
- http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html
- http://www.exploit-db.com/exploits/34239
No PoCs found on GitHub currently.