A vulnerability has been detected on the Nagios web interface.
Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users.
To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm .
Update your system using following commands:
yum clean all --enablerepo=neteye
yum update neteye-3.12.0 --enablerepo=neteye
Removed input in Elastic Agent Fleet System integration With the release of Elastic Agent Fleet version 2.0.0, the "System" integration has been updated and now removes support for a deprecated log collection input method that relied on httpjson. This input Read More
Important: Grafana security update Type/Severity NetEye Product Security has rated this update as having a security impact of High Topic An update for the package grafana is now available for NetEye 4. Security Fix for NetEye 4.41 11.6.1_neteye3.27.1-1 For details on how Read More
Fix rpmnew handling in Keycloak upgrade procedure We fixed an issue in Keycloak's update procedure to improve the handling of an rpnew generated during the update. First installation for SIEM clusters without voting-only node We fixed an issue related with Read More
Fix Tornado filter WHERE condition We fixed an issue in Tornado UI in which the WHERE condition of a filter were not being displayed correctly for some conditions not created through the API. List of updated packages To solve the Read More
Fix Tornado filter WHERE condition We fixed an issue in Tornado UI that did not allow deleting the WHERE condition of a filter in some conditions. List of updated packages To solve the issue, the following packages have been updated Read More