The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Centreon Web

Centreon Web: privilege escalation via API Realtime Rights
An attacker can bypass restrictions via API Realtime Rights of Centreon Web, in order to escalate his privileges...
VIGILANCE-VUL-35000
Centreon Web: Cross Site Scripting via index.php
An attacker can trigger a Cross Site Scripting via index.php of Centreon Web, in order to run JavaScript code in the context of the web site...
VIGILANCE-VUL-34917
Centreon Web 19/20: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web 19/20...
CVE-2020-22425, VIGILANCE-VUL-34666
Centreon Web 2.8: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web 2.8...
VIGILANCE-VUL-34665
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34483
Centreon Web: privilege escalation via centreon_token Evaluation
An attacker can bypass restrictions via centreon_token Evaluation of Centreon Web, in order to escalate his privileges...
VIGILANCE-VUL-34482
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
VIGILANCE-VUL-34436
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
CVE-2021-26804, VIGILANCE-VUL-34278
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
CVE-2021-26804, VIGILANCE-VUL-34215
Centreon Web: privilege escalation via Clickjacking
An attacker can bypass restrictions via Clickjacking of Centreon Web, in order to escalate his privileges...
VIGILANCE-VUL-33979
Our database contains other pages. You can request a free trial to read them.

Display information about Centreon Web: