Direct Vulnerabilities

Known vulnerabilities in the nagios package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Use of Hard-coded Credentials

*
  • M
Cross-site Scripting (XSS)

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • M
Link Following

*
  • M
Cross-site Scripting (XSS)

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Link Following

*
  • L
Link Following

*
  • L
Link Following

*
  • L
Use of Hard-coded Credentials

*
  • L
Use of Hard-coded Credentials

*
  • L
Use of Hard-coded Credentials

*
  • L
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Off-by-one Error

*
  • M
Off-by-one Error

*
  • M
Off-by-one Error

*
  • M
Off-by-one Error

*
  • M
Off-by-one Error

*
  • M
Off-by-one Error

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • H
SQL Injection

*
  • H
OS Command Injection

*
  • H
OS Command Injection

*
  • H
Arbitrary Command Injection

*
  • M
Link Following

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*