A vulnerability exits in Status2K 2.5 Server Monitoring Software via the multies parameter to includes/functions.php, which could let a malicious user execute arbitrary PHP code.Referenceshttp://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.htmlhttp://www.exploit-db.com/exploits/34239https://exchange.xforce.ibmcloud.com/vulnerabilities/95111https://www.securityfocus.com/bid/69008