|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 5, 2026, 2 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 251451 | 7.5 | 危険 | The PHP Group | - | PHP の ext/shmop/shmop.c における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2011-1092 | 2011-04-21 12:22 | 2011-03-17 | Show | GitHub Exploit DB Packet Storm |
| 251452 | 7.5 | 危険 | The PHP Group | - | PHP の phar_object.c における重要な情報を取得される脆弱性 |
CWE-134
書式文字列の問題 |
CVE-2011-1153 | 2011-04-21 12:21 | 2011-03-17 | Show | GitHub Exploit DB Packet Storm |
| 251453 | 4.3 | 警告 | アップル | - | Apple iOS の MobileSafari の URL ハンドラにおけるサービス運用妨害 (DoS) の脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2011-0158 | 2011-04-8 16:22 | 2011-03-11 | Show | GitHub Exploit DB Packet Storm |
| 251454 | 6.9 | 警告 | Linux レッドハット |
- | Linux kernel の ACPI サブシステムにおける権限を取得される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-4347 | 2011-04-8 13:35 | 2010-12-9 | Show | GitHub Exploit DB Packet Storm |
| 251455 | 5 | 警告 | レッドハット OpenLDAP Foundation |
- | OpenLDAP の modrdn.c におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2011-1081 | 2011-04-8 13:34 | 2011-02-10 | Show | GitHub Exploit DB Packet Storm |
| 251456 | 6.8 | 警告 | レッドハット OpenLDAP Foundation |
- | OpenLDAP の bind.cpp におけるアクセス制限を回避される脆弱性 |
CWE-287
不適切な認証 |
CVE-2011-1025 | 2011-04-8 13:34 | 2011-02-10 | Show | GitHub Exploit DB Packet Storm |
| 251457 | 4.6 | 警告 | サイバートラスト株式会社 レッドハット OpenLDAP Foundation |
- | OpenLDAP の chain.c における内部プログラムの認証を回避される脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2011-1024 | 2011-04-8 13:33 | 2011-02-10 | Show | GitHub Exploit DB Packet Storm |
| 251458 | 6.8 | 警告 | IBM | - | IBM WebSphere Application Server の Security コンポーネントにおけるサーバへアクセスされる脆弱性 |
CWE-20
不適切な入力確認 |
CVE-2011-1320 | 2011-04-8 13:33 | 2010-08-30 | Show | GitHub Exploit DB Packet Storm |
| 251459 | 4 | 警告 | IBM | - | IBM WebSphere Application Server の Security コンポーネントにおけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2011-1319 | 2011-04-8 13:32 | 2010-07-16 | Show | GitHub Exploit DB Packet Storm |
| 251460 | 5 | 警告 | IBM | - | IBM WebSphere Application Server におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2011-1313 | 2011-04-8 13:32 | 2010-06-24 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 5, 2026, 4:51 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 210261 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecuri… |
CWE-362 CWE-1188 Race Condition Insecure Default Initialization of Resource |
CVE-2020-10279 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210262 | 4.6 |
MEDIUM
Physics |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a L… |
CWE-287
Improper Authentication |
CVE-2020-10278 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210263 | 6.4 |
MEDIUM
Physics |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually addi… |
NVD-CWE-Other
|
CVE-2020-10277 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210264 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop i… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10276 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210265 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … |
CWE-326
Inadequate Encryption Strength |
CVE-2020-10275 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210266 | 7.1 |
HIGH
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… |
CWE-330
Use of Insufficiently Random Values |
CVE-2020-10274 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210267 | 7.5 |
HIGH
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… |
CWE-312
Cleartext Storage of Sensitive Information |
CVE-2020-10273 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210268 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… |
CWE-306
Missing Authentication for Critical Function |
CVE-2020-10272 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210269 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… |
CWE-668
Exposure of Resource to Wrong Sphere |
CVE-2020-10271 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210270 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10270 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |