Filtered by vendor Centreon
Subscriptions
Filtered by product Centreon
Subscriptions
Total
59 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-32501 | 1 Centreon | 1 Centreon | 2024-08-27 | 9.8 Critical |
A SQL Injection vulnerability exists in the updateServiceHost functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23. | ||||
CVE-2024-5723 | 1 Centreon | 1 Centreon | 2024-08-21 | N/A |
Centreon updateServiceHost SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the updateServiceHost function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the apache user. Was ZDI-CAN-23294. | ||||
CVE-2007-6485 | 1 Centreon | 1 Centreon | 2024-08-07 | N/A |
Multiple PHP remote file inclusion vulnerabilities in Centreon 1.4.1 (aka Oreon 1.4) allow remote attackers to execute arbitrary PHP code via a URL in the fileOreonConf parameter to (1) MakeXML.php or (2) MakeXML4statusCounter.php in include/monitoring/engine/. | ||||
CVE-2008-1179 | 1 Centreon | 1 Centreon | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in include/common/javascript/color_picker.php in Centreon 1.4.2.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) title parameters. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-1178 | 1 Centreon | 1 Centreon | 2024-08-07 | N/A |
Directory traversal vulnerability in include/doc/index.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter, a different vector than CVE-2008-1119. | ||||
CVE-2008-1119 | 1 Centreon | 1 Centreon | 2024-08-07 | N/A |
Directory traversal vulnerability in include/doc/get_image.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter. | ||||
CVE-2015-7672 | 1 Centreon | 1 Centreon | 2024-08-06 | N/A |
Cross-site scripting (XSS) vulnerability in Centreon 2.6.1 (fixed in Centreon 18.10.0 and Centreon web 2.8.27). | ||||
CVE-2015-1561 | 1 Centreon | 1 Centreon | 2024-08-06 | N/A |
The escape_command function in include/Administration/corePerformance/getStats.php in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (fixed in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in the ns_id parameter. | ||||
CVE-2015-1560 | 1 Centreon | 1 Centreon | 2024-08-06 | N/A |
SQL injection vulnerability in the isUserAdmin function in include/common/common-Func.php in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (fixed in Centreon web 2.7.0) allows remote attackers to execute arbitrary SQL commands via the sid parameter to include/common/XmlTree/GetXmlTree.php. | ||||
CVE-2018-21024 | 1 Centreon | 1 Centreon | 2024-08-05 | 9.8 Critical |
licenseUpload.php in Centreon Web before 2.8.27 allows attackers to upload arbitrary files via a POST request. | ||||
CVE-2018-19271 | 1 Centreon | 1 Centreon | 2024-08-05 | N/A |
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.28) allows SQL Injection via the main.php searchH parameter. | ||||
CVE-2018-19312 | 1 Centreon | 1 Centreon | 2024-08-05 | N/A |
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI. | ||||
CVE-2018-19280 | 1 Centreon | 1 Centreon | 2024-08-05 | N/A |
Centreon 3.4.x (fixed in Centreon 18.10.0) has XSS via the resource name or macro expression of a poller macro. | ||||
CVE-2018-19311 | 1 Centreon | 1 Centreon | 2024-08-05 | N/A |
Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen. | ||||
CVE-2018-19281 | 1 Centreon | 1 Centreon | 2024-08-05 | N/A |
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection. | ||||
CVE-2018-11589 | 1 Centreon | 2 Centreon, Centreon Web | 2024-08-05 | N/A |
Multiple SQL injection vulnerabilities in Centreon 3.4.6 including Centreon Web 2.8.23 allow attacks via the searchU parameter in viewLogs.php, the id parameter in GetXmlHost.php, the chartId parameter in ExportCSVServiceData.php, the searchCurve parameter in listComponentTemplates.php, or the host_id parameter in makeXML_ListMetrics.php. | ||||
CVE-2018-11588 | 1 Centreon | 2 Centreon, Centreon Web | 2024-08-05 | N/A |
Centreon 3.4.6 including Centreon Web 2.8.23 is vulnerable to an authenticated user injecting a payload into the username or command description, resulting in stored XSS. This is related to www/include/core/menu/menu.php and www/include/configuration/configObject/command/formArguments.php. | ||||
CVE-2018-11587 | 1 Centreon | 2 Centreon, Centreon Web | 2024-08-05 | N/A |
There is Remote Code Execution in Centreon 3.4.6 including Centreon Web 2.8.23 via the RPN value in the Virtual Metric form in centreonGraph.class.php. | ||||
CVE-2019-20327 | 1 Centreon | 1 Centreon | 2024-08-05 | 7.8 High |
Insecure permissions in cwrapper_perl in Centreon Infrastructure Monitoring Software through 19.10 allow local attackers to gain privileges. (cwrapper_perl is a setuid executable allowing execution of Perl scripts with root privileges.) | ||||
CVE-2019-19699 | 1 Centreon | 1 Centreon | 2024-08-05 | 7.2 High |
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration. |