|
You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database). |
Update Date":May 4, 2026, 6 p.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Impact Show |
Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 252801 | 6.8 | 警告 | Opera Software ASA | - | Opera における任意のコードを実行される脆弱性 |
CWE-94
コード・インジェクション |
CVE-2010-2576 | 2010-09-27 16:18 | 2010-08-12 | Show | GitHub Exploit DB Packet Storm |
| 252802 | 4.3 | 警告 | Opera Software ASA | - | Opera におけるアドレスバーの処理に関する脆弱性 |
CWE-264
認可・権限・アクセス制御 |
CVE-2010-2455 | 2010-09-27 16:18 | 2010-06-28 | Show | GitHub Exploit DB Packet Storm |
| 252803 | 10 | 危険 | Opera Software ASA | - | Opera における脆弱性 |
CWE-noinfo
情報不足 |
CVE-2010-2421 | 2010-09-27 16:18 | 2010-06-21 | Show | GitHub Exploit DB Packet Storm |
| 252804 | 4.3 | 警告 | Opera Software ASA | - | Opera におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2010-2121 | 2010-09-27 16:18 | 2010-06-1 | Show | GitHub Exploit DB Packet Storm |
| 252805 | 5 | 警告 | Opera Software ASA | - | Opera におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2010-1993 | 2010-09-27 16:17 | 2010-05-20 | Show | GitHub Exploit DB Packet Storm |
| 252806 | 5 | 警告 | Opera Software ASA | - | Opera におけるサービス運用妨害 (DoS) の脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2010-1989 | 2010-09-27 16:17 | 2010-05-20 | Show | GitHub Exploit DB Packet Storm |
| 252807 | 9.3 | 危険 | Opera Software ASA | - | Windows および Mac OS X 上で稼働する Opera における任意のコードを実行される脆弱性 |
CWE-399
リソース管理の問題 |
CVE-2010-1728 | 2010-09-27 16:17 | 2010-04-30 | Show | GitHub Exploit DB Packet Storm |
| 252808 | 10 | 危険 | Opera Software ASA | - | Opera における整数オーバーフローの脆弱性 |
CWE-189
数値処理の問題 |
CVE-2010-1349 | 2010-09-27 16:17 | 2010-04-12 | Show | GitHub Exploit DB Packet Storm |
| 252809 | 5 | 警告 | Opera Software ASA | - | Opera における重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2010-1310 | 2010-09-27 16:16 | 2010-03-22 | Show | GitHub Exploit DB Packet Storm |
| 252810 | 4.3 | 警告 | Opera Software ASA | - | Opera における重要な情報を取得される脆弱性 |
CWE-200
情報漏えい |
CVE-2010-0653 | 2010-09-27 16:16 | 2010-02-18 | Show | GitHub Exploit DB Packet Storm |
Update Date:May 5, 2026, 4:51 a.m.
| No | CVSS | Level Attach Vector |
Vendor Name | Project Name | Title | CWE | CVE | Update Date | Publication Date | Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 210261 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecuri… |
CWE-362 CWE-1188 Race Condition Insecure Default Initialization of Resource |
CVE-2020-10279 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210262 | 4.6 |
MEDIUM
Physics |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a L… |
CWE-287
Improper Authentication |
CVE-2020-10278 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210263 | 6.4 |
MEDIUM
Physics |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually addi… |
NVD-CWE-Other
|
CVE-2020-10277 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210264 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop i… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10276 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210265 | 9.8 |
CRITICAL
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … |
CWE-326
Inadequate Encryption Strength |
CVE-2020-10275 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210266 | 7.1 |
HIGH
Network |
mobile-industrial-robots easyrobotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_firmware |
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… |
CWE-330
Use of Insufficiently Random Values |
CVE-2020-10274 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210267 | 7.5 |
HIGH
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… |
CWE-312
Cleartext Storage of Sensitive Information |
CVE-2020-10273 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210268 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… |
CWE-306
Missing Authentication for Critical Function |
CVE-2020-10272 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210269 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… |
CWE-668
Exposure of Resource to Wrong Sphere |
CVE-2020-10271 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |
| 210270 | 9.8 |
CRITICAL
Network |
aliasrobotics mobile-industrial-robotics enabled-robotics uvd-robots |
mir100_firmware mir200_firmware mir250_firmware mir500_firmware mir1000_firmware er200_firmware er-lite_firmware er-flex_firmware er-one_firmware uvd_robots_firmware |
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… |
CWE-798
Use of Hard-coded Credentials |
CVE-2020-10270 | 2024-11-21 13:55 | 2020-06-24 | Show | GitHub Exploit DB Packet Storm |