A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
Fix Icingaweb2 GLPI monitoring integration issue We discovered and fixed a bug in the GLPI monitoring integration for Icingaweb2 where API calls to retrieve asset information fail if the hostname contains spaces. Instead of displaying asset information, a string containing Read More
Fix “Invalid OAuth State” error – Login not working We fixed an issue with the authentication, occurring refreshing NetEye after the session expires. The user is now brought to the login page instead of being stuck in an “Invalid OAuth Read More
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
Important: Icingaweb2 Module Geomap security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Topic An update for the package icingaweb2-module-geomap is now available for NetEye 4. Security Fix for NetEye 4.40 1.22.1-1 For Read More
Important: GLPI security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Topic An update for the package glpi is now available for NetEye 4. Security Fix for NetEye 4.40 10.0.18_neteye1.17.1-1 For more details about Read More