A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
Important: Chromium security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Security Fix for NetEye 4.41 An update for the following packages is now available for NetEye 4: chromium to version 133.0.6943.141-1 Read More
Fix Tornado Filters names and descriptions editing We fixed an issue in Tornado related to the editing of new Filters names and descriptions, which would have resulted in an error. List of updated packages To solve the issue, the following Read More
Fix Elasticsearch read-only indices check We fixed an issue related to the 01002_elastic_indices_read_only_check.sh light health check, which checks if some indices are present in Elasticsearch in a read-only state. The check may have wrongly recognized as in read-only also some Read More
Important: Icingaweb2 Module Neteye security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Topic An update for the package icingaweb2-module-neteye is now available for NetEye 4. Security Fix for NetEye 4.41 1.164.2-1 For Read More
Important: Icingaweb2 Module Reporting security update Type/Severity NetEye Product Security has rated this update as having a security impact of High Topic An update for the package icingaweb2-module-reporting is now available for NetEye 4. Security Fix for NetEye 4.41 1.0.3_neteye0.16.1-1 For Read More