Known Vulnerabilities for Centreon Web by Centreon

Listed below are 10 of the newest known vulnerabilities associated with "Centreon Web" by "Centreon".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-26804 json Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by ... 6.5 - MEDIUM 2021-05-04 2023-11-07
CVE-2019-17108 json Local file inclusion in brokerPerformance.php in Centreon Web before 2.8.28 allows attackers to disclose information or perfo... 6.1 - MEDIUM 2019-10-08 2019-10-15
CVE-2019-17107 json minPlayCommand.php in Centreon Web before 2.8.27 allows authenticated attackers to execute arbitrary code via the command_hos... 8.8 - HIGH 2019-10-08 2021-07-21
CVE-2019-17106 json In Centreon Web through 2.8.29, disclosure of external components' passwords allows authenticated attackers to move laterally... 6.5 - MEDIUM 2019-10-08 2019-10-10
CVE-2019-17105 json The token generator in index.php in Centreon Web before 2.8.27 is predictable. 5.3 - MEDIUM 2019-10-08 2019-10-15
CVE-2019-16406 json Centreon Web 19.04.4 has weak permissions within the OVA (aka VMware virtual machine) and OVF (aka VirtualBox virtual machine... 7.8 - HIGH 2019-11-21 2020-03-06
CVE-2019-16405 json Centreon Web before 2.8.30, 18.10.x before 18.10.8, 19.04.x before 19.04.5 and 19.10.x before 19.10.2 allows Remote Code Exec... 7.2 - HIGH 2019-11-21 2022-03-31
CVE-2019-15300 json A problem was found in Centreon Web through 19.04.3. An authenticated SQL injection is present in the page include/Administra... 8.8 - HIGH 2019-11-27 2019-12-09
CVE-2019-15299 json An issue was discovered in Centreon Web through 19.04.3. When a user changes his password on his profile page, the contact_au... 8.8 - HIGH 2020-02-24 2020-02-28
CVE-2019-15298 json A problem was found in Centreon Web through 19.04.3. An authenticated command injection is present in the page include/config... 8.8 - HIGH 2019-11-27 2020-08-24

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCentreonCentreon Web2.8.9
ApplicationCentreonCentreon Web2.8.8
ApplicationCentreonCentreon Web2.8.7
ApplicationCentreonCentreon Web2.8.6
ApplicationCentreonCentreon Web2.8.5
ApplicationCentreonCentreon Web2.8.4
ApplicationCentreonCentreon Web2.8.31
ApplicationCentreonCentreon Web2.8.30
ApplicationCentreonCentreon Web2.8.3
ApplicationCentreonCentreon Web2.8.29
ApplicationCentreonCentreon Web2.8.28
ApplicationCentreonCentreon Web2.8.27
ApplicationCentreonCentreon Web2.8.26
ApplicationCentreonCentreon Web2.8.25
ApplicationCentreonCentreon Web2.8.24
ApplicationCentreonCentreon Web2.8.23
ApplicationCentreonCentreon Web2.8.22
ApplicationCentreonCentreon Web2.8.21
ApplicationCentreonCentreon Web2.8.20
ApplicationCentreonCentreon Web2.8.2
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report