A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
Practical lessons learned from real-world alert routing, automation, and integrations Introduction As more teams and customers rely on NetEye as their primary monitoring stack, Jira Operations (Jira Ops) may be a central component for alert routing, on‑call scheduling, and automated Read More
We addressed the following issues in the Alyvix module UI: In the General tab of a node, retention policy values only showed two digits, even when the numbers were higher than 99. Tooltips for the different retention settings (Successful, Failed, Read More
Error during GLPI inventory task execution We have fixed a bug related to the Asset Management module and in particular in the usage of the GLPI inventory plugin to gather the inventory. List of updated packages To solve the issue Read More
Important: GLPI security update Type/Severity NetEye Product Security has rated this update as having a high security impact. Topic An update for the glpi packages is now available for NetEye 4. Security Fix for NetEye 4.46 10.0.24_neteye1.17.5-1 Summary The vulnerability is about a Read More
Important: Lampo security update Type/Severity NetEye Product Security has rated this update as having a medium security impact. Topic An update for the lampod packages is now available for NetEye 4. Security Fix for NetEye 4.46 1.1.3-1 Summary The vulnerability is about sensitive Read More