Vulnerability Search Top
Show Search Menu
Vendor Name
プロダクト・サービス名
Title
CVE
Urgent
Important
Warning
Warning
CWE
公開-検索開始年
公開-検索開始月
公開-検索開始日
公開-検索終了年
公開-検索終了月
公開-検索終了日
レベルソート
In descending order of publication date
In descending order of update date
Number of items displayed

You can search for vulnerabilities managed by JVN (Japan Vulnerability Note) and NVD (National Vulnerability Database).
Search keywords must be entered in English otherwise will not be searched in both JVN and NVD.

To search by CWE, please refer to the CWE Overview and check the CWE number.

  • Urgent
  • Important
  • Warning
  • Low
JVN Vulnerability Information

Update Date":May 4, 2026, 6 p.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Impact
Show
Exploit
PoC
Search
252831 6.8 警告 Opera Software ASA - Opera における任意の Web スクリプトを実行される脆弱性 CWE-287
不適切な認証
CVE-2009-2059 2010-09-27 16:10 2009-06-15 Show GitHub Exploit DB Packet Storm
252832 9.3 危険 アドビシステムズ
Opera Software ASA
- Opera における Adobe Acrobat の JavaScript の制限を回避される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2009-1599 2010-09-27 16:09 2009-05-11 Show GitHub Exploit DB Packet Storm
252833 5 警告 Opera Software ASA - Opera におけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2008-7245 2010-09-27 16:09 2009-09-18 Show GitHub Exploit DB Packet Storm
252834 9.3 危険 Opera Software ASA - Windows 上で稼働する Opera におけるヒープベースのバッファオーバーフローの脆弱性 CWE-119
バッファエラー
CVE-2008-5178 2010-09-27 16:09 2008-11-20 Show GitHub Exploit DB Packet Storm
252835 10 危険 Opera Software ASA - Opera における脆弱性 CWE-noinfo
情報不足
CVE-2009-0916 2010-09-27 16:08 2009-03-3 Show GitHub Exploit DB Packet Storm
252836 4.3 警告 Opera Software ASA - Windows 上で稼働する Opera におけるサービス運用妨害 (DoS) の脆弱性 CWE-399
リソース管理の問題
CVE-2008-5428 2010-09-27 16:07 2008-12-11 Show GitHub Exploit DB Packet Storm
252837 4.3 警告 Opera Software ASA - Opera の Opera.dll におけるクロスサイトスクリプティングの脆弱性 CWE-79
クロスサイト・スクリプティング(XSS)
CVE-2008-4725 2010-09-27 16:07 2008-10-23 Show GitHub Exploit DB Packet Storm
252838 5.8 警告 Opera Software ASA - Opera における新規フィードの購読を作成される脆弱性 CWE-264
認可・権限・アクセス制御
CVE-2008-4698 2010-09-27 16:05 2008-10-23 Show GitHub Exploit DB Packet Storm
252839 10 危険 Opera Software ASA - Windows 上で稼働する Opera における任意のコードを実行される脆弱性 CWE-noinfo
情報不足
CVE-2008-4293 2010-09-27 16:05 2008-09-27 Show GitHub Exploit DB Packet Storm
252840 10 危険 Opera Software ASA - Opera における CRL の更新時の処理に関する脆弱性 CWE-255
CWE-noinfo
CVE-2008-4292 2010-09-27 16:04 2008-09-27 Show GitHub Exploit DB Packet Storm
NVD Vulnerability Information

Update Date:May 5, 2026, 4:51 a.m.

No CVSS Level
Attach Vector
Vendor Name Project Name Title CWE CVE Update Date Publication Date Show Affected Exploit
PoC
Search
210261 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecuri… CWE-362
CWE-1188
Race Condition
 Insecure Default Initialization of Resource
CVE-2020-10279 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210262 4.6 MEDIUM
Physics
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a L… CWE-287
Improper Authentication
CVE-2020-10278 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210263 6.4 MEDIUM
Physics
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually addi… NVD-CWE-Other
CVE-2020-10277 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210264 9.8 CRITICAL
Network
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop i… CWE-798
 Use of Hard-coded Credentials
CVE-2020-10276 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210265 9.8 CRITICAL
Network
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly … CWE-326
Inadequate Encryption Strength
CVE-2020-10275 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210266 7.1 HIGH
Network
mobile-industrial-robots
easyrobotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_firmware
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related fl… CWE-330
 Use of Insufficiently Random Values
CVE-2020-10274 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210267 7.5 HIGH
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to… CWE-312
 Cleartext Storage of Sensitive Information
CVE-2020-10273 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210268 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the… CWE-306
Missing Authentication for Critical Function
CVE-2020-10272 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210269 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad s… CWE-668
 Exposure of Resource to Wrong Sphere
CVE-2020-10271 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm
210270 9.8 CRITICAL
Network
aliasrobotics
mobile-industrial-robotics
enabled-robotics
uvd-robots
mir100_firmware
mir200_firmware
mir250_firmware
mir500_firmware
mir1000_firmware
er200_firmware
er-lite_firmware
er-flex_firmware
er-one_firmware
uvd_robots_firmware
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wire… CWE-798
 Use of Hard-coded Credentials
CVE-2020-10270 2024-11-21 13:55 2020-06-24 Show GitHub Exploit DB Packet Storm