Show filters
85 Total Results
Displaying 31-40 of 85
Sort by:
Attacker Value
Unknown

CVE-2021-27676

Disclosure Date: May 26, 2021 (last updated February 22, 2025)
Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.
Attacker Value
Unknown

CVE-2021-26804

Disclosure Date: May 04, 2021 (last updated February 22, 2025)
Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by changing any file extension to ".gif", then uploading it in the "Administration/ Parameters/ Images" section of the application.
Attacker Value
Unknown

CVE-2021-28055

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
Attacker Value
Unknown

CVE-2020-22425

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
Centreon 19.10-3.el7 is affected by a SQL injection vulnerability, where an authorized user is able to inject additional SQL queries to perform remote command execution.
Attacker Value
Unknown

CVE-2020-10945

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
Centreon before 19.10.7 exposes Session IDs in server responses.
Attacker Value
Unknown

CVE-2020-13627

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the widgetId parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
Attacker Value
Unknown

CVE-2020-10946

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the page parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
Attacker Value
Unknown

CVE-2020-13628

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the widgetId parameter to host-monitoring/src/toolbar.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
Attacker Value
Unknown

CVE-2020-13252

Disclosure Date: May 21, 2020 (last updated February 21, 2025)
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
Attacker Value
Unknown

CVE-2019-19699

Disclosure Date: April 06, 2020 (last updated February 21, 2025)
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.