Debian Package Tracker
Register | Log in
Subscribe

nagvis

visualization addon for Nagios or Icinga

Choose email to subscribe with

general
  • source: nagvis (main)
  • version: 1:1.9.46-1
  • maintainer: Debian Nagios Maintainer Group (archive) (DMD)
  • uploaders: Jan Wagner [DMD] – Markus Frosch [DMD] – Adam Cecile [DMD] – Alexander Wirt [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:1.9.11-1
  • oldstable: 1:1.9.25-2
  • old-sec: 1:1.9.25-2+deb11u1
  • stable: 1:1.9.34-1
  • testing: 1:1.9.46-1
  • unstable: 1:1.9.46-1
versioned links
  • 1:1.9.11-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.9.25-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.9.25-2+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.9.34-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.9.46-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • nagvis
  • nagvis-demos
action needed
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

4 issues left for the package maintainer to handle:
  • CVE-2023-46287: (needs triaging) XSS exists in NagVis before 1.9.38 via the select function in share/server/core/functions/html.php.
  • CVE-2024-13722: (needs triaging) The "NagVis" component within Checkmk is vulnerable to reflected cross-site scripting. An attacker can craft a malicious link that will execute arbitrary JavaScript in the context of the browser once clicked. The attack can be performed on both authenticated and unauthenticated users.
  • CVE-2024-13723: (needs triaging) The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
  • CVE-2024-47093: (needs triaging) Improper neutralization of input in Nagvis before version 1.9.42 which can lead to XSS

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-10-21 Last update: 2025-05-01 01:00
news
[rss feed]
  • [2025-05-23] Accepted nagvis 1:1.9.47-1~exp1 (source) into experimental (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2025-05-01] Accepted nagvis 1:1.9.25-2+deb11u1 (source) into oldstable-security (Daniel Leidert)
  • [2025-04-10] nagvis 1:1.9.46-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-05] Accepted nagvis 1:1.9.46-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2025-03-27] nagvis 1:1.9.45-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-21] Accepted nagvis 1:1.9.45-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2024-10-06] nagvis 1:1.9.44-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-30] Accepted nagvis 1:1.9.44-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2024-09-05] nagvis 1:1.9.43-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-30] Accepted nagvis 1:1.9.43-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2024-07-21] nagvis 1:1.9.42-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-16] Accepted nagvis 1:1.9.42-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2024-07-14] nagvis 1:1.9.41-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-08] Accepted nagvis 1:1.9.41-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2024-01-15] nagvis 1:1.9.40-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-10] Accepted nagvis 1:1.9.40-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-12-13] nagvis 1:1.9.39-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-07] Accepted nagvis 1:1.9.39-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-10-20] nagvis 1:1.9.38-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-15] Accepted nagvis 1:1.9.38-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-10-07] nagvis 1:1.9.37-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-02] Accepted nagvis 1:1.9.37-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-07-25] nagvis 1:1.9.36-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-20] Accepted nagvis 1:1.9.36-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-06-17] nagvis 1:1.9.35-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-11] Accepted nagvis 1:1.9.35-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2023-05-09] Accepted nagvis 1:1.9.35-1~exp1 (source) into experimental (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2022-09-05] nagvis 1:1.9.34-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-30] Accepted nagvis 1:1.9.34-1 (source) into unstable (Bas Couwenberg) (signed by: Sebastiaan Couwenberg)
  • [2022-05-29] nagvis 1:1.9.33-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (92, 86)
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:1.9.46-1
  • 10 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing