|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 5, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 227811 | 5 | 警告 | quicksilver forums | - | Quicksilver Forums における任意の PMs を削除される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2007-5171 | 2012-12-20 18:33 | 2007-10-1 | Show | GitHub Exploit DB Packet Storm |
| 227812 | 5 | 警告 | サン・マイクロシステムズ | - | Sun Fire X2100 M2 および ELOM の SP における任意のネットワークトラフィックを送信される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2007-5170 | 2012-12-20 18:33 | 2007-09-28 | Show | GitHub Exploit DB Packet Storm |
| 227813 | 6.8 | 警告 | phplister | - | phpLister の .systeme/fonctions.php における PHP リモートファイルインクルージョンの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2007-5167 | 2012-12-20 18:33 | 2007-10-1 | Show | GitHub Exploit DB Packet Storm |
| 227814 | 5 | 警告 | wzdftpd | - | wzdftpd の libwzd-core/wzd_login.c におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-119 CWE-189 |
CVE-2007-5300 | 2012-12-20 18:33 | 2007-10-9 | Show | GitHub Exploit DB Packet Storm |
| 227815 | 5 | 警告 | skadate | - | SkaDate におけるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2007-5299 | 2012-12-20 18:33 | 2007-10-9 | Show | GitHub Exploit DB Packet Storm |
| 227816 | 4.3 | 警告 | wikepage | - | Wikepage Opus および TipiWiki の index.php におけるクロスサイトスクリプティングの脆弱性 |
CWE-79 CWE-94 |
CVE-2007-5295 | 2012-12-20 18:33 | 2007-10-9 | Show | GitHub Exploit DB Packet Storm |
| 227817 | 6.8 | 警告 | sitesys | - | SiteSys における PHP リモートファイルインクルージョンの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2007-5166 | 2012-12-20 18:33 | 2007-10-1 | Show | GitHub Exploit DB Packet Storm |
| 227818 | 6.8 | 警告 | Restaurant Management System project | - | Thierry Leriche ReMaSys における PHP リモートファイルインクルージョンの脆弱性 |
CWE-94
コード・インジェクション |
CVE-2007-5160 | 2012-12-20 18:33 | 2007-10-1 | Show | GitHub Exploit DB Packet Storm |
| 227819 | 6.8 | 警告 | サン・マイクロシステムズ | - | Sun Java System Access Manager における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2007-5153 | 2012-12-20 18:33 | 2007-09-27 | Show | GitHub Exploit DB Packet Storm |
| 227820 | 7.5 | 危険 | サン・マイクロシステムズ | - | Sun Java System Access Manager における管理者タスクを実行される脆弱性 |
CWE-287
不適切な認証 |
CVE-2007-5152 | 2012-12-20 18:33 | 2007-09-27 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 5, 2026, 4:51 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 210261 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecuri… |
CWE-362 CWE-1188 Race Condition Insecure Default Initialization of Resource |
CVE-2020-10279 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210262 | 4.6 |
MEDIUM
Physics |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a L… |
CWE-287
Improper Authentication |
CVE-2020-10278 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210263 | 6.4 |
MEDIUM
Physics |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually addi… |
NVD-CWE-Other
|
CVE-2020-10277 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210264 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop i… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10276 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210265 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … |
CWE-326
Inadequate Encryption Strength |
CVE-2020-10275 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210266 | 7.1 |
HIGH
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… |
CWE-330
Use of Insufficiently Random Values |
CVE-2020-10274 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210267 | 7.5 |
HIGH
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… |
CWE-312
Cleartext Storage of Sensitive Information |
CVE-2020-10273 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210268 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… |
CWE-306
Missing Authentication for Critical Function |
CVE-2020-10272 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210269 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… |
CWE-668
Exposure of Resource to Wrong Sphere |
CVE-2020-10271 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210270 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10270 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |