Unspecified vulnerability in op5 Monitor before 6.1.3 allows attackers to read arbitrary files via unknown vectors related to lack of authorization.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Monitor | Op5 | * | 6.1.2 (including) |
Monitor | Op5 | 5.3.5 (including) | 5.3.5 (including) |
Monitor | Op5 | 5.4.0 (including) | 5.4.0 (including) |
Monitor | Op5 | 5.4.2 (including) | 5.4.2 (including) |
Monitor | Op5 | 5.5.0 (including) | 5.5.0 (including) |
Monitor | Op5 | 5.5.1 (including) | 5.5.1 (including) |
Monitor | Op5 | 5.5.3 (including) | 5.5.3 (including) |
Monitor | Op5 | 5.5.3.1 (including) | 5.5.3.1 (including) |
Monitor | Op5 | 5.6.0 (including) | 5.6.0 (including) |
Monitor | Op5 | 5.6.1 (including) | 5.6.1 (including) |
Monitor | Op5 | 5.6.2.2 (including) | 5.6.2.2 (including) |
Monitor | Op5 | 5.7.0 (including) | 5.7.0 (including) |
Monitor | Op5 | 5.7.1 (including) | 5.7.1 (including) |
Monitor | Op5 | 5.7.3 (including) | 5.7.3 (including) |
Monitor | Op5 | 5.7.3.1 (including) | 5.7.3.1 (including) |
Monitor | Op5 | 5.7.3.3 (including) | 5.7.3.3 (including) |
Monitor | Op5 | 5.7.4 (including) | 5.7.4 (including) |
Monitor | Op5 | 5.8.0 (including) | 5.8.0 (including) |
Monitor | Op5 | 5.8.1 (including) | 5.8.1 (including) |
Monitor | Op5 | 6.0.0 (including) | 6.0.0 (including) |
Monitor | Op5 | 6.0.3 (including) | 6.0.3 (including) |
Monitor | Op5 | 6.0.4 (including) | 6.0.4 (including) |
Monitor | Op5 | 6.0.6 (including) | 6.0.6 (including) |
Monitor | Op5 | 6.0.7 (including) | 6.0.7 (including) |
Monitor | Op5 | 6.1.0 (including) | 6.1.0 (including) |
Monitor | Op5 | 6.1.0-beta6 (including) | 6.1.0-beta6 (including) |
Monitor | Op5 | 6.1.1 (including) | 6.1.1 (including) |
Monitor | Op5 | 6.1.2-alpha (including) | 6.1.2-alpha (including) |
Monitor | Op5 | 6.1.2-beta4 (including) | 6.1.2-beta4 (including) |