State-of-the-art IT monitoring for cloud and hybrid infrastructures
Scalable and automated enterprise-wide IT monitoring
Free & open source IT monitoring
The fixed weakness was:
The check_mk application does allow an attacker to write check_mk config files
(.mk files) on arbitrary locations on the server filesystem.
To the list of all Werks
Try out Checkmk now.