The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Centreon Web

Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34483
Centreon Web: privilege escalation via centreon_token Evaluation
An attacker can bypass restrictions via centreon_token Evaluation of Centreon Web, in order to escalate his privileges...
VIGILANCE-VUL-34482
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34436
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34278
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34215
Centreon Web: privilege escalation via Clickjacking
An attacker can bypass restrictions via Clickjacking of Centreon Web, in order to escalate his privileges...
VIGILANCE-VUL-33979
Centreon Web: six vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-33973
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-33942
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-33715
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-32751
Our database contains other pages. You can request a free trial to read them.

Display information about Centreon Web: