Total vulnerabilities in the database
Unspecified vulnerability in op5 Monitor before 6.1.3 allows attackers to read arbitrary files via unknown vectors related to lack of authorization.
Software | From | Fixed in |
---|---|---|
op5 / monitor | 5.7.3.1 | 5.7.3.1.x |
op5 / monitor | 5.7.1 | 5.7.1.x |
op5 / monitor | 5.4.0 | 5.4.0.x |
op5 / monitor | 6.1.0-beta6 | 6.1.0-beta6.x |
op5 / monitor | 5.7.3 | 5.7.3.x |
op5 / monitor | 5.5.3 | 5.5.3.x |
op5 / monitor | 6.0.0 | 6.0.0.x |
op5 / monitor | 6.1.2-alpha | 6.1.2-alpha.x |
op5 / monitor | 6.1.0 | 6.1.0.x |
op5 / monitor | 6.0.6 | 6.0.6.x |
op5 / monitor | 5.8.1 | 5.8.1.x |
op5 / monitor | 6.0.7 | 6.0.7.x |
op5 / monitor | 5.7.4 | 5.7.4.x |
op5 / monitor | 6.0.4 | 6.0.4.x |
op5 / monitor | 5.7.3.3 | 5.7.3.3.x |
op5 / monitor | 5.3.5 | 5.3.5.x |
op5 / monitor | 5.8.0 | 5.8.0.x |
op5 / monitor | 5.6.2.2 | 5.6.2.2.x |
op5 / monitor | - | 6.1.2.x |
op5 / monitor | 5.5.1 | 5.5.1.x |
op5 / monitor | 5.7.0 | 5.7.0.x |
op5 / monitor | 5.5.0 | 5.5.0.x |
op5 / monitor | 6.1.2-beta4 | 6.1.2-beta4.x |
op5 / monitor | 6.1.1 | 6.1.1.x |
op5 / monitor | 5.6.1 | 5.6.1.x |
op5 / monitor | 6.0.3 | 6.0.3.x |
op5 / monitor | 5.6.0 | 5.6.0.x |
op5 / monitor | 5.4.2 | 5.4.2.x |
op5 / monitor | 5.5.3.1 | 5.5.3.1.x |