📦 Centreon
by Centreon
🔍 What is Centreon?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This is a critical SQL injection vulnerability in Centreon's MediaWiki integration that allows remote unauthenticated attackers to execute arbitrary SQL commands. It affects Centreon monitoring system...
This SQL injection vulnerability in Centreon monitoring software allows attackers to execute arbitrary SQL commands via the instance parameter in hostXML.php. Affected systems include Centreon version...
CVE-2018-21024 is an unrestricted file upload vulnerability in Centreon Web's licenseUpload.php that allows attackers to upload arbitrary files via POST requests. This affects Centreon Web installatio...
This CVE describes a SQL injection vulnerability in Centreon monitoring software that allows attackers to execute arbitrary SQL commands via the svc_id parameter. Attackers can potentially access, mod...
A SQL injection vulnerability in Centreon 24.04.2 allows authenticated high-privileged attackers to execute arbitrary SQL commands through user massive changes inputs. This could lead to data theft, m...
CVE-2022-42425 is an SQL injection vulnerability in Centreon's poller broker configuration that allows authenticated attackers to escalate privileges to administrator level. This affects Centreon inst...
This is an SQL injection vulnerability in Centreon's contact groups configuration page that allows authenticated attackers to escalate privileges to administrator level. It affects Centreon installati...
CVE-2022-42429 is an SQL injection vulnerability in Centreon's poller broker configuration that allows authenticated attackers to escalate privileges to administrator level. This affects Centreon inst...
A SQL injection vulnerability in Centreon's image generation component allows remote authenticated attackers with low privileges to execute arbitrary SQL commands. This affects Centreon monitoring sys...
This SQL injection vulnerability in Centreon-Web allows authenticated attackers to execute arbitrary SQL commands through the Additional Information parameters in the user configuration interface. It ...
This vulnerability allows authenticated attackers with admin access to Centreon's web interface to achieve remote code execution by misconfiguring poller commands. The exploit involves creating a mali...
This vulnerability allows remote attackers to execute arbitrary commands on Centreon monitoring servers via command injection in the minPlayCommand.php file. Attackers can achieve remote code executio...
This vulnerability in Centreon monitoring software allows unauthenticated attackers to access sensitive information via a direct API request. It affects Centreon versions before 18.10.8, 19.04.5, and ...
This vulnerability in Centreon monitoring software allows unauthenticated attackers to access sensitive configuration information via a direct request to a specific PHP file. Affected organizations ar...
This vulnerability in Centreon monitoring software allows unauthenticated attackers to access sensitive information via a direct request to a specific PHP file. It affects Centreon versions before the...
This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on Centreon monitoring servers by injecting shell metacharacters in the server_ip field of API r...
CVE-2019-20327 is a privilege escalation vulnerability in Centreon monitoring software where the cwrapper_perl setuid executable has insecure permissions, allowing local attackers to execute arbitrary...