|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 19, 2026, 4 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 249941 | 5 | 警告 | IBM | - | IBM OmniFind におけるサービス運用妨害 (DoS) 状態となる脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2010-3899 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249942 | 5 | 警告 | IBM | - | IBM OmniFind における認証を回避する脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-3898 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249943 | 5 | 警告 | IBM | - | IBM OmniFind の ESSearchApplication/palette.do における重要な情報を取得される脆弱性 |
CWE-255
証明書・パスワード管理 |
CVE-2010-3897 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249944 | 7.5 | 危険 | IBM | - | IBM OmniFind の ESSearchApplication ディレクトリツリーにおけるサーバ設定を変更される脆弱性 |
CWE-287
不適切な認証 |
CVE-2010-3896 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249945 | 7.2 | 危険 | IBM | - | IBM OmniFind の esRunCommand における権限を取得される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-3895 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249946 | 9.3 | 危険 | IBM | - | IBM OmniFind の Java_com_ibm_es_oss_CryptionNative_ESEncrypt 関数におけるスタックベースのバッファオーバーフローの脆弱性 |
CWE-119
バッファエラー |
CVE-2010-3894 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249947 | 7.5 | 危険 | IBM | - | IBM OmniFind の管理インタフェースにおける任意の管理者操作を実行される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-3893 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249948 | 6.8 | 警告 | IBM | - | IBM OmniFind のログインフォームにおけるセッションをハイジャックされる脆弱性 |
CWE-Other
その他 |
CVE-2010-3892 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249949 | 6.8 | 警告 | IBM | - | IBM OmniFind の ESAdmin/security.do におけるクロスサイトリクエストフォージェリの脆弱性 |
CWE-352
同一生成元ポリシー違反 |
CVE-2010-3891 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
| 249950 | 4.3 | 警告 | IBM | - | IBM OmniFind におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2010-3890 | 2012-03-27 18:42 | 2010-11-12 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 19, 2026, 4:16 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 213751 | 4.6 |
MEDIUM
Physics |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a L… |
CWE-287
Improper Authentication |
CVE-2020-10278 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213752 | 6.4 |
MEDIUM
Physics |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually addi… |
NVD-CWE-Other
|
CVE-2020-10277 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213753 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop i… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10276 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213754 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … |
CWE-326
Inadequate Encryption Strength |
CVE-2020-10275 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213755 | 7.1 |
HIGH
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… |
CWE-330
Use of Insufficiently Random Values |
CVE-2020-10274 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213756 | 7.5 |
HIGH
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… |
CWE-312
Cleartext Storage of Sensitive Information |
CVE-2020-10273 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213757 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… |
CWE-306
Missing Authentication for Critical Function |
CVE-2020-10272 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213758 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… |
CWE-668
Exposure of Resource to Wrong Sphere |
CVE-2020-10271 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213759 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10270 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213760 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wirel… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10269 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |