Registry
GitHubGitHub
Releases146
Frequency1 month 2 weeks
Last Release
Stars120
Visualization addon for your open source monitoring core

CVE History

CVEPublishedCVSS v2CVSS v3
CVE-2024-38866N/AN/A
Improper neutralization of input in Nagvis before version 1.9.47 which can lead to livestatus injection
CVE-2024-47093N/AN/A
Improper neutralization of input in Nagvis before version 1.9.42 which can lead to XSS
CVE-2023-462876.1 MEDIUMN/A
XSS exists in NagVis before 1.9.38 via the select function in share/server/core/functions/html.php.
CVE-2022-469456.5 MEDIUMN/A
Nagvis before 1.9.34 was discovered to contain an arbitrary file read vulnerability via the component /core/classes/NagVisHoverUrl.php.
CVE-2022-39798.1 HIGHN/A
A vulnerability was found in NagVis up to 1.9.33 and classified as problematic. This issue affects the function checkAuthCookie of the file share/server/core/classes/CoreLogonMultisite.php. The manipulation of the argument hash leads to incorrect type conversion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.9.34 is able to address this issue. The identifier of the patch is 7574fd8a2903282c2e0d1feef5c4876763db21d5. It is recommended to upgrade the affected component. The identifier VDB-213557 was assigned to this vulnerability.
CVE-2017-63936.1 MEDIUM4.3 MEDIUM
An issue was discovered in NagVis 1.9b12. The vulnerability exists due to insufficient filtration of user-supplied data passed to the "nagvis-master/share/userfiles/gadgets/std_table.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVE-2016-61759.8 CRITICAL7.5 HIGH
Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.