A security vulnerability in the Checkmk monitoring software narrowly misses being classified as a critical risk. It allows attackers to read and write local files on the Checkmk server without ...
Attackers can abuse a vulnerability in the IT monitoring software checkmk to bypass two-factor authentication. The manufacturer has provided updated software that closes the security gap. The affected ...