The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Centreon Web

Centreon: four vulnerabilities
An attacker can use several vulnerabilities of Centreon...
VIGILANCE-VUL-17996, ZSL-2015-5263, ZSL-2015-5264, ZSL-2015-5265, ZSL-2015-5266
Merethis Centreon: two vulnerabilities
An attacker can use several vulnerabilities of Merethis Centreon...
CVE-2015-1560, CVE-2015-1561, VIGILANCE-VUL-17327
Centreon: two vulnerabilities
An attacker can use several vulnerabilities of Centreon...
VIGILANCE-VUL-15720
Centreon: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon...
CVE-2014-3828, CVE-2014-3829, VIGILANCE-VUL-15506, VU#298796
Centreon: SQL injection via an HTTP request
An attacker can insert SQL statements into a parameter of an HTTP request, in order to bypass access control to the database...
BID-56911, CVE-2012-5967, VIGILANCE-VUL-12232, VU#856892
Centreon: SQL injection in ping
An authenticated attacker can inject SQL commands in the ping or traceroute tool of Centreon...
VIGILANCE-VUL-9601
Our database contains other pages. You can request a free trial to read them.

Display information about Centreon Web: