|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 17, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 249981 | 7.5 | 危険 | Pydio | - | AjaXplorer におけるログインのアクセス権を取得される脆弱性 |
CWE-287
不適切な認証 |
CVE-2012-1840 | 2012-03-26 16:08 | 2012-03-22 | Show | GitHub Exploit DB Packet Storm |
| 249982 | 7.5 | 危険 | Pydio | - | AjaXplorer の Get Template 機能におけるディレクトリトラバーサルの脆弱性 |
CWE-22
パス・トラバーサル |
CVE-2012-1839 | 2012-03-26 16:08 | 2012-03-22 | Show | GitHub Exploit DB Packet Storm |
| 249983 | 5 | 警告 | IBM | - | IBM Tivoli Endpoint Manager における重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2012-1837 | 2012-03-26 16:07 | 2012-03-22 | Show | GitHub Exploit DB Packet Storm |
| 249984 | 4.3 | 警告 | IBM | - | IBM Tivoli Endpoint Manager におけるクロスサイトスクリプティングの脆弱性 |
CWE-79
クロスサイト・スクリプティング(XSS) |
CVE-2012-0719 | 2012-03-26 16:04 | 2012-03-22 | Show | GitHub Exploit DB Packet Storm |
| 249985 | 4.3 | 警告 | ESET K7 Computing AVG Technologies トレンドマイクロ Ikarus Norman ソフォス マカフィー Beijing Rising International Software BitDefender VirusBlokAda フォーティネット カスペルスキー Emsisoft Authentium シマンテック エフ・セキュア Jiangmin |
- | 複数の製品の Gzip ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1461 | 2012-03-26 14:35 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
| 249986 | 4.3 | 警告 | ESET トレンドマイクロ AVG Technologies マカフィー Ikarus Norman ソフォス Beijing Rising International Software Comodo FRISK Software International クイックヒール・テクノロジーズ・ジャパン株式会社 アラジン フォーティネット Panda Security カスペルスキー Emsisoft シマンテック |
- | 複数の製品の TAR ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1456 | 2012-03-26 14:28 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
| 249987 | 4.3 | 警告 | Beijing Rising International Software ESET |
- | NOD32 Antivirus および Rising Antivirus の CAB ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1455 | 2012-03-26 14:26 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
| 249988 | 4.3 | 警告 | トレンドマイクロ Ikarus Emsisoft クイックヒール・テクノロジーズ・ジャパン株式会社 |
- | 複数の製品の CAB ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1448 | 2012-03-26 14:08 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
| 249989 | 4.3 | 警告 | マカフィー Antiy Labs Norman ソフォス CA Technologies Beijing Rising International Software クイックヒール・テクノロジーズ・ジャパン株式会社 PC Tools フォーティネット Panda Security カスペルスキー シマンテック アラジン |
- | 複数の製品の ELF ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1446 | 2012-03-26 14:06 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
| 249990 | 4.3 | 警告 | フォーティネット Panda Security ウェブルート株式会社 アラジン |
- | 複数の製品の ELF ファイルパーサにおけるマルウェア検知を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2012-1444 | 2012-03-26 14:06 | 2012-03-21 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 17, 2026, 4:15 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 213611 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … |
CWE-326
Inadequate Encryption Strength |
CVE-2020-10275 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213612 | 7.1 |
HIGH
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… |
CWE-330
Use of Insufficiently Random Values |
CVE-2020-10274 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213613 | 7.5 |
HIGH
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… |
CWE-312
Cleartext Storage of Sensitive Information |
CVE-2020-10273 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213614 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… |
CWE-306
Missing Authentication for Critical Function |
CVE-2020-10272 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213615 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… |
CWE-668
Exposure of Resource to Wrong Sphere |
CVE-2020-10271 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213616 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10270 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213617 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wirel… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10269 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 213618 | 7.5 |
HIGH
Network |
redhat | wildfly | A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering ca… |
CWE-502
Deserialization of Untrusted Data |
CVE-2020-10740 | 2024-11-21 13:55 | 2020-06-23 | Show | GitHub Exploit DB Packet Storm |
| 213619 | 8.0 |
HIGH
Adjacent |
linuxfoundation | ceph | An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthor… |
NVD-CWE-Other
|
CVE-2020-10736 | 2024-11-21 13:55 | 2020-06-23 | Show | GitHub Exploit DB Packet Storm |
| 213620 | 5.5 |
MEDIUM
Local |
linuxfoundation | jaeger | Sensitive information written to a log file vulnerability was found in jaegertracing/jaeger before version 1.18.1 when the Kafka data store is used. This flaw allows an attacker with access to the co… |
CWE-532
Inclusion of Sensitive Information in Log Files |
CVE-2020-10750 | 2024-11-21 13:55 | 2020-06-20 | Show | GitHub Exploit DB Packet Storm |